-3 C
Kabul
Tuesday, February 7, 2023

Top 10 Certified Ethical Hacker (CEH) Jobs to Apply for in 2022

Certified Ethical Hacker (CEH) acts as the core certification for those looking to start a career in ethical hacking

According to a report, the cyberattacks has cost over US$4.24 million in 2022. Ransomware attacks, compromised networks, and information security vulnerabilities cost the business a hefty amount every year. As a result, organizations are looking for skilled ethical hackers to combat the threats of cyberattacks that have paved the way for heavy loss. Owing to the increasing demand, ethical hacking jobs are emerging as a viable career path for IT and security professionals. Generally, ethical hackers help organizations find vulnerabilities and find ways to mitigate that. They protect data stored within electronic devices like computers, mobiles, and tabs. In a nutshell, an ethical hacker is involved in protecting the crucial information of the company by using certain hacking techniques. Certified Ethical Hacker (CEH) acts as the core certification for those looking to start a career in ethical hacking. Here is the list of the top 10 Certified Ethical Hacker (CEH) jobs to apply for in July 2022.

USI-EH-Global-GTS-Gdas-Cyber Defense- SOC Tier 3
Deloitte

Responsibilities:

  • Serve as the regional lead and point of escalation for analysts.
  • Oversee completion of day-to-day checklist(s), including log review, management report scheduling & running, alert analysis, and escalation follow-up activity status
  • Remain current on cyber security trends and intelligence (open source and commercial) to guide the security analysis & identification capabilities of the SOC team
  • Provide oversight and guidance to junior analysts and fulfill SOC manager responsibilities in the absence of the SOC Manager

Click here to apply

Info Security Analyst

Ameriprise Financial Services, LLC

Responsibilities:

The resource will act as a real-time alert monitoring analyst in the cybersecurity team, supporting its three main functions: 24×7 tracking, threat analysis and counter-threat, and incident response and recovery activities. Additional responsibilities include maintaining enterprise security capabilities and operationalization of the same.

Requirements:

  • 2-4 years of experience in the Security Operation Center
  • 2-4 Years’ experience in Network/Server admin
  • Familiarity with Network/Servers/Malware domain
  • Familiarity with Windows/Linux OS

Click here to apply

Consultant, Cyber Security

General Mills India

Responsibilities:

  • Direct incident response team while responding to more complex incidents
  • Handle escalations from other members of the incident response team
  • Monitor SIEM and other tools for potential threats, intrusions, or compromises
  • Analyze emails reported as phishing
  • Investigate the functionality, origin, and potential impact, and contain threats including malware, phishing, and other intrusions

Click here to apply

Ethical Hacker

EnigmaSoft Technologies

Responsibilities:

  • Responsible for Securing the cloud management console, virtual infrastructure, APISSH keys, DevOps admin consoles, Protecting Privileged Credentials, etc. in Cloud Environments Demonstrate knowledge of cloud architecture and implementation features (OS, multi-tenancy, virtualization, orchestration, elastic scalability)
  • Develop and recommend cyber-security technology strategies, publish security standards, and develop security solutions for projects and Infrastructure and methods to monitor compliance. Reduce cloud and infrastructure vulnerabilities across all cloud assets.
  • Implement and manage IAM best practices for cloud directories and identity providers.

Click here to apply

Application Security – Senior Consultant

Deloitte

Responsibilities:

  • Configure and execute vulnerability scans enumerating vulnerabilities within the internal and external network
  • Analyze, enrich and prioritize specific activities designed to remediate discovered vulnerabilities such as patch deployment or configuration hardening
  • Assist in producing a comprehensive operating picture and cyber security situational awareness
  • Work with various vulnerability threat feeds (such as vendor bulletins), assessment tools, asset inventory tools as well as reporting tools and frameworks to match assets to identified vulnerabilities and produce reports

Click here to apply

Lead Security Architect

Hewlett Packard Enterprise

Responsibilities:

  • Interact with senior stakeholders across departments
  • Reach and influence a wide range of people across larger teams and communities
  • Research and apply innovative security architecture solutions to new or existing problems and be able to justify and communicate design decisions
  • Develop vision, principles, and strategy for security architects for one project or technology
  • Work out subtle security needs

Click here to apply

Security Analyst, Technology

Kroll

Responsibilities:

  • Use SIEM technologies and other native tools to perform the monitoring of security events on a 24×7 basis.
  • Perform analysis on logs produced by network devices utilized within the infrastructure such as firewalls, content filtering, syslog from various sources/devices, assorted Intrusion Detection capabilities, substantiating vulnerability scanner results, directory services, DHCP logs, Secure Email Gateway logs, and approved applications.
  • Use the SIEM to monitor the network and perform analysis, while integrating the results and information needed to proactively protect the enterprise. This includes developing customized signatures, enterprise content filtering, or firewall ACL change recommendations.

Click here to apply

Security Track Specialist

Hexaware Technologies

Responsibilities:

  • Ensure engagements are adequately scoped
  • Define per engagement pre-requisites
  • Execute a penetration test
  • Provide technical oversight during the execution phase
  • Interface with vendors who deliver Security Testing engagements
  • Ensure reporting of Security Testing activities are appropriate for the intended audience

Click here to apply

Senior Information Security Analyst

Wells Fargo

Responsibilities:

  • Driving the end-to-end implementation of any application/solution, highlighting/identifying risks, and providing a mitigation approach for the module
  • Strong analytical and problem-solving abilities to identify an issue and propose solutions
  • Understanding of data analysis techniques, standards, and error handling concepts
  • Collaborate effectively with different teams initiate action, manage change, contribute to high-impact decisions, and accept challenging assignments
  • Provides support for testing, emergencies, and audit compliance projects. Participates in the evaluation and implementation of emerging data access control technologies, information systems security issues, safeguards, and techniques

Click here to apply

Cyber Defense Security Analyst

Genpact

Responsibilities:

  • Perform initial triage of security events detected from data protection and other security monitoring controls.
  • Based on the analysis of the security events identify detection rule improvements to reduce false positives and more accurately detect sensitive data/security incidents.
  • Respond to and follow up to security incidents identified by DLP/SIEM system
  • Ability to navigate and work effectively across a complex global organization
  • Good communication and documentation skills

Click here to apply 

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisement -

Latest Articles