Cybersecurity

Accelerated digital transformation has resulted in rapid technology adoption. This includes disruptive technologies like AI, machine learning, IoT, Cloud, and more. The integration of new technologies has also increased data vulnerability. Since IoT and cloud work over different networks, it is necessary for companies to adopt a robust cybersecurity strategy and infrastructure. Hence, there is an increased demand for cybersecurity jobs around the globe. Wondering how to apply to these jobs amidst a pandemic and travel restrictions? You are on the safe side since these opportunities are completely remote and you can work from anywhere.

Job Role: Threat Investigator

Company: Facebook

As a threat investigator, the candidate is expected to lead the development and implementation of the intel cycle and highlight threats across different ecosystems. Create effective strategies to prevent and detect abuse. Produce tactical intelligence to identify the patterns in previously unidentified threats. 

Minimum qualifications include more than 5 years experience in cybersecurity, work experience in developing strategic and tactical intelligence, and data analytics and handling its tools.

Job Role: Cybersecurity Lead

Company: TCS

The role expects the candidates to understand the business strategy and develop security architectures according to its needs. Risk assessment, privilege access management, remediation, vulnerability scans, are some of the other functions. 

The candidate should have valid experience, preferably 6 to 14 years,  in developing security solution architecture and have knowledge in Enterprise Architecture Framework. They should also possess a strong knowledge base in security compliance and regulations, among a trail of other requirements.

Job Role: Application Security Engineer

Company: Confluent

The candidate will be responsible for developing security strategies for their products both on the cloud and on-premise. The role demands the candidate to ensure embedded security in its products, product development, design, and also detect and look out for threats and breaches. 

The company is looking for someone with a strong background in security engineering, cloud security, and product security. They should also have a decision-making mindset and should be able to lead when safety concerns arise.

Job Role: Cloud Security Architect

Company: ValueLabs

Primarily, the job role demands to implement and monitor security services on cloud platforms. They are also expected to deliver on-site technical engagements with stakeholders on cloud platforms like AWS or Azure and implement NIST Cyber Security Framework Compliant security controls. 

The candidate should have valid experience in building security infrastructures on the cloud and hybrid platforms. Experience in cloud computing, enterprise security management, scripting languages, encryption tools, and should be familiar with compliance standards.

Job Role: Senior Security Consultant- DevOps

Company: Claranet

The primary function would be to analyze the client’s technical infrastructure and run it through risk analysis and threat modeling to find any cyber risks. Prepare deliverables in the form of data flow diagrams and risk models. They should also work with the clients to develop security controls and mitigation strategies. 

Hands-on experience in DevOps tools, continuous integration, software tools development, code scanning, and there are more requirements.

Job Role: Information Security Analyst

Company: TAC Security

As an information security analyst, the applicant will be responsible for application security testing, penetration testing, static code analysis, security defect tracking. 

The applicant should have 2 to 4 experience and should be CEH certified. They should also have excellent communication skills and have experience with tools like Burp Suite and Wireshark.

Job Role: Senior InfoSec Risk Analyst (GRC)

Company: SentinelOne

The job role demands an efficient security analyst who can intelligently manage risks and support the security controls of organization and production design and infrastructure. The applicant is expected to assist in evaluating and reviewing compliance frameworks and regulation standards. They should help with configuring, managing, and updating the GRC platform, along with carrying out risk assessments. 

The job demands more than 3 years of experience in information security or compliance. Other requirements include experience in working with security controls, the ability to balance risks, and resourcing.

Job Role: Internal Auditor- Process and Compliance

Company: EC- Council

As an auditor, the job will revolve around auditing the process setup, carrying out internal audits, updating and recording any non-conformities, and more. The individual will be also responsible for evaluating the management’s governance and risk management controls and provide an overview of the compliance strategies of the company. 

Requirements are at least 3 to 5 years experience in internal auditing or compliance, execution and documentation of these audits, extensive experience in quality management, and working knowledge of ISO standards or procedures.

Job Role: Cybersecurity Analyst

Company: PwC India

The job role, as a cybersecurity analyst, includes developing and implementing cybersecurity strategies and architectures, and enable transformation. They are also expected to perform cybersecurity audits

Preferred requirements include experience in cloud security, security governance, enterprise security architecture, and cybersecurity programs.

Job Role: Ransomware Threat Analyst Lead

Company: TCS

As a Ransomware Threat Analyst, the employee is expected to provide SME input and lead the Ransomware Feature team. They should have knowledge in Malware threat intelligence, Ransomware, and Malware lifecycles, Ransomware Defence methods, and technically evaluate Ransomware campaigns. Experience in these fields and excellent communication skills are some of the primary requirements. 

Note:- The information mentioned above is taken from credible sources.