Jobs

Top Ethical Hacking Jobs Enthusiasts Should Apply For in May

Adilin Beatrice

Owing to the increasing demand, ethical hacking jobs are emerging as a viable career path

The alarming rate of cyberattacks across the globe has pushed corporates and government agencies to strengthen their defense mechanism. In the past couple of years, the number of cyber incidents has surged drastically, thanks to the Covid-19 pandemic lockdown and the remote working model that followed. According to a report, the cyberattacks has cost over US$4.24 million in 2022. Ransomware attacks, compromised networks, and information security vulnerabilities cost the business a hefty amount every year. As a result, organizations are looking for skilled ethical hackers to combat the threats of cyberattacks that have paved the way for heavy loss. Owing to the increasing demand, ethical hacking jobs are emerging as a viable career path for IT and security professionals. Generally, ethical hackers help organizations find vulnerabilities and find ways to mitigate that. They protect data stored within electronic devices like computers, mobiles, and tabs. In a nutshell, an ethical hacker is involved in protecting the crucial information of the company by using certain hacking techniques. Certified Ethical Hacker (CEH) acts as the core certification for those looking to start a career in ethical hacking. Analytics Insight has listed the top 10 ethical hacking jobs that CEH can apply for in May 2022.

Top Ethical Hacking Jobs to Apply For
Certified Ethical Hacker at CRAW Security

Location(s): Kannur, Mumbai, Hyderabad, Delhi, Pune, Chennai, Bengaluru

Qualifications:

  • The candidate must have knowledge about ethical hacking.
  • He/she should be ready to work in an office and have excellent communication skills and written skills.
  • The company is willing to hire a candidate who is looking for maturity, passion, and problem-solving skills.

Apply here for the job.

Information Security Analyst at Cotiviti

Location(s): Hyderabad, Pune

Roles and Responsibilities: As an information security analyst at Cotiviti, the candidate is responsible for detecting threats and vulnerabilities in target systems, networks, and applications by conducting systems, network, and vulnerability assessment/security testing and security monitoring. He/she should monitor service now for tickers created by the VSOC. They should perform investigations using various monitoring security technologies.

Qualifications:

  • The candidate should own a Bachelor's degree in computer science or any equivalent field.
  • He/she should have 4-8 years of similar industry experience.
  • They should have experience in information security, governance, IT audit, or risk management.
  • The ability to communicate concisely, effectively, and directly to executive management is mandatory.

Apply here for the job.

Cloud Security Engineer at Wipro

Location(s): Hyderabad, Chennai, Delhi

Roles and Responsibilities: The cloud security engineer is expected to develop and carry out information security plans and policies for the company. He/she should migrate from on-prem to Google Cloud infrastructure and apply relevant security policies. They should deploy and maintain various security control technologies such as data loss protection, file integrity, antimalware, firewalls, intrusion prevention systems (IPS), password vault, mobile device management (MDM), static, and dynamic code analysis, cloud security, etc.

Qualifications:

  • The candidate should have a passion for cybersecurity with an enthusiastic approach to learning and self-motivation for gaining security skillset enhancements.
  • He/she should have extensive knowledge of internet protocols, communication protocols, data and network security, and security monitoring tools.
  • They should have experience performing IT enterprise-wide security risk assessments.

Apply here for the job.

Security Operations Analyst at Genpact

Location(s): Hyderabad, Bengaluru

Roles and Responsibilities: As a security operations analyst at Genpact, the candidate should manage and support security tools including leading SIEM tools such as QRadar, Splunk, LogRhthm, and ArcSight. He/she should ensure all monitored devices are compliant with security politics and resolve issues with anomalous behavior of such devices. They should recommend whitelisting or quarantining endpoints based on observed malicious behavior or as directed by the incident response teams.

Qualifications:

  • Bachelor's degree in IS, computer science, MIS management, or any relevant field is mandatory.
  • The candidate should have L2 experience in information security operations, incident response, and remediation.
  • He/she should have a good understanding of the cyber kill chain and MITRE ATT&CK frameworks.

Apply here for the job.

Data Security Head at ICICI Bank

Location(s): Hyderabad

Roles and Responsibilities: The data security head is primarily responsible for the overall management of data security solutions such as DLP, CASB, DRM, and Data Classification across the organization. He/she should be responsible for managing the third-party risk management program of the organization. They should develop and manage a governance framework of various aspects of data security, policy, processes, and SOPs for effective working on the entire function.

Qualifications:

  • The candidate should have experience in building and maintaining the high performance of analysts.
  • He/she should have strong knowledge of various data security tools and techniques.
  • They should have hands-on experience with the implementation of data security technologies across the enterprise.

Apply here for the job.

Cyber Security Manager at KFin Technologies

Location(s): Hyderabad

Roles and Responsibilities: The company is looking for a passionate cybersecurity enthusiast with the ability to lead, build, motivate, deliver, etc. The candidate should lead security operations and security compliance. He/she should plan and complete the implementation of security projects for SIEM, DAM, EDR, and DLP. They should manage the entire security landscape and lead a team of engineers and analysts for SOC, VAPT, EDR, IAM, and DLP.

Apply here for the job.

Security Analyst at Phenompeople

Location(s): Hyderabad

Roles and Responsibilities: As a security analyst, the candidate should work with the sales team to be the security lead in assisting with security tasks sales face in the sales life-cycle. He/she should contribute to technical sections of the RFPs and proposals. They should be able to run application scans for various plenum applications and work with the development of remediating vulnerabilities. The candidate should conduct manual pen testing on the complex application.

Qualifications:

  • The candidate should have a strong application security background.
  • He/she should perform information security compliance tasks with autonomy.
  • The ability to conduct web applications and infrastructure ethical hacking is very important.

Apply here for the job.

Join our WhatsApp Channel to get the latest news, exclusives and videos on WhatsApp

                                                                                                       _____________                                             

Disclaimer: Analytics Insight does not provide financial advice or guidance. Also note that the cryptocurrencies mentioned/listed on the website could potentially be scams, i.e. designed to induce you to invest financial resources that may be lost forever and not be recoverable once investments are made. You are responsible for conducting your own research (DYOR) before making any investments. Read more here.

Top 10 Cryptocurrencies to Watch for Long-Term Growth

Best Cryptos with 1000x Potential: Qubetics Democratises RWA Tokenisation, Litecoin Turns Meme Coin, Gensler Exit Hint Buoys XRP Price

Litecoin Price Shoots Up as Top Crypto Rebrands as Memecoin, Dogecoin Killer to Rise in Response

DeFi Takeover: Why ETFSwap (ETFS) Could Overtake Dogecoin And Shiba Inu As Crypto’s Top Invent In 2025 Bull Run

Top Cryptocurrencies for Privacy and Anonymity