Enable job alerts via email!

Cybersecurity Consultants & Ethical Hackers

Rao Information Technology

Rajkot

On-site

INR 6,00,000 - 9,00,000

Full time

Today
Be an early applicant

Job summary

A leading tech firm in Gujarat is seeking Cybersecurity Consultants & Ethical Hackers to enhance security infrastructure and conduct key assessments. Responsibilities include developing incident response plans, conducting regular security assessments, and enforcing security policies across the organization. Ideal candidates will possess a strong background in cybersecurity. This role offers a rewarding career journey with opportunities for growth.

Qualifications

  • Experience with security measures including firewalls and intrusion detection systems.
  • Ability to develop incident response plans.
  • Conducting vulnerability assessments and security audits.

Responsibilities

  • Plan and implement security measures.
  • Develop incident response plans.
  • Conduct regular security assessments.
  • Enforce security policies.

Skills

Security Infrastructure Design
Incident Response
Vulnerability Assessment
Security Policies and Procedures
Security Monitoring
Identity and Access Management (IAM)
Security Patch Management
Security Awareness
Compliance and Audit
Encryption
Penetration Testing
Job description

Rao Information Technology is looking for Cybersecurity Consultants & Ethical Hackers to join our dynamic team and embark on a rewarding career journey

Responsibilities include:

  • Security Infrastructure Design: Plan, design, and implement security measures, including firewalls, intrusion detection/prevention systems, access controls, and encryption protocols
  • Incident Response: Develop and execute incident response plans to detect, mitigate, and recover from security incidents and breaches
  • Vulnerability Assessment: Conduct regular security assessments and vulnerability scans to identify and address weaknesses in systems and networks
  • Security Policies and Procedures: Develop and enforce security policies, procedures, and best practices across the organization
  • Security Monitoring: Continuously monitor network traffic, logs, and security alerts for signs of suspicious or unauthorized activity
  • Identity and Access Management (IAM): Manage user access, authentication, and authorization to ensure that only authorized individuals have access to sensitive resources
  • Security Patch Management: Keep systems and software up to date with security patches and updates to mitigate known vulnerabilities
  • Security Awareness: Educate and train employees on cybersecurity best practices and raise awareness about potential threats, phishing, and social engineering tactics
  • Compliance and Audit: Ensure that the organization complies with relevant security regulations, standards, and industry-specific requirements
  • Prepare for and participate in security audits
  • Encryption: Implement encryption technologies to protect data both in transit and at rest
  • Test our software for vulnerabilities (penetration testing)
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.