Get the job you really want.
Maximum of 25 job preferences reached.
Top Cyber Security Jobs in Kolkata
Cloud • Information Technology • Productivity • Software • Automation
You will conduct penetration tests, vulnerability research, and red team exercises to identify security weaknesses and provide actionable threat intelligence.
Top Skills:
AWSAzureBurp SuiteGCPMetasploit
Cloud • Information Technology • Productivity • Software • Automation
The Senior Advisory IT Security role involves securing Boomi's multi-cloud environment by designing and implementing security controls, managing CSPM tools, and responding to cloud security incidents.
Top Skills:
AWSAzureGCPTerraform
Artificial Intelligence • Fintech • Information Technology • Logistics • Payments • Business Intelligence • Generative AI
Responsible for maturing operational risk and business continuity capabilities, conducting risk assessments, collaborating across teams, and supporting risk evaluation processes.
Top Skills:
AWSIso 27001Iso 27701Nist CsfPci DssSoc 2
Financial Services
Seeking a WAF Security Consultant to advise on security systems and policies. Responsibilities include assessing, implementing, and optimizing web application firewalls.
Financial Services
The Security Monitoring Analyst monitors security events, reviews multiple system logs, implements correlation searches, investigates threats, and guides teams in security incident remediation.
Top Skills:
IdsIpsMcafee DlpSplunkUnixWindows
Internet of Things • Analytics
The Network Security Engineer will design, configure, and manage the enterprise network security infrastructure, collaborate with teams, and ensure compliance with security policies.
Top Skills:
Amazon Web ServicesAutomation (Python)CheckpointCiscoFortinetInfobloxIpsecAzureNext Gen FirewallsPalo AltoPkiSecure Access Service EdgeTlsUnified Threat ManagementZscaler
Fintech • Software • Travel • Business Intelligence • Consulting • App development • Big Data Analytics
The Manager, Information Security-STAR is responsible for overseeing security assessments, managing vendor compliance, and ensuring risks are managed during onboarding and offboarding processes.
Top Skills:
Grc ToolInformation Security ComplianceRisk Management Plan
New
Track Smarter, Apply Better.
Ditch the spreadsheets. Organize your job search with our freeApplication Tracker.
Use For Free
Fintech • Software • Travel • Business Intelligence • Consulting • App development • Big Data Analytics
Assist in Third-Party Cyber Security assessments, document risk management processes, and support contract reviews and vendor compliance audits.
Top Skills:
Grc ToolSecurity+Sscp
Healthtech • Pharmaceutical
As a Sr. Analyst for Information Security, you'll respond to threats, design detection use cases, manage log sources, and lead threat hunting efforts.
Top Skills:
CriblGoogle SecopsNxlogPaloalto XsoarQradarSplunkTorqWef
Healthtech • Pharmaceutical
The role involves managing PCI DSS compliance through assessment coordination, documentation management, identifying control gaps, regulatory updates, and collaboration across IT teams to ensure ongoing compliance and risk mitigation.
Top Skills:
Archer GrcAWSAzureCcpaFwGCPIdsIpsIvsNacPci DssTcp/IpVpn Technologies
Big Data • Logistics • Analytics
The Security Engineer II will design and maintain security solutions, conduct risk assessments, manage compliance initiatives, and enhance security operations for ShipBob's systems and data.
Top Skills:
Azure AdBashGoGoogle WorkspaceGrc ToolsM365PowershellPythonSalesforce
Fintech • Financial Services
The Information Security Manager conducts audits, assesses risks, ensures compliance with security standards, and communicates findings effectively to stakeholders.
Top Skills:
AWSAzureCobitGCPIso 27001NistPci Dss
Security • Cybersecurity
As an Application Security Engineer at Bugcrowd, you'll manage security vulnerability submissions and assist clients with incident response while enhancing your skills in a diverse range of security contexts.
Top Skills:
Burp SuiteKali LinuxNmapSqlmap
Reposted 18 Days AgoSaved
Easy Apply
Easy Apply
Financial Services
The BISO for APAC oversees cybersecurity policies for IBKR affiliates, ensuring compliance with regulations, facilitating audits, and liaising with stakeholders.
Top Skills:
Application DevelopmentCis CscDatabase ManagementIso/Iec 27001:27013Network EngineeringNist Cybersecurity FrameworkSystem Administration
Information Technology • Security • Cybersecurity
Lead Security Researchers analyze emerging cyber threats, create technical content, and collaborate across teams to improve product defenses against adversaries.
Top Skills:
EdrMitre Att&CkShodanVirustotalXdr
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Top Kolkata Companies Hiring Cyber Security Roles
See AllPopular Job Searches
Tech Jobs & Startup Jobs in Kolkata
Remote Jobs in Kolkata
Accounts Executive Jobs in Kolkata
Android Developer Jobs in Kolkata
Artificial Intelligence Jobs in Kolkata
Backend Jobs in Kolkata
Business Analyst Jobs in Kolkata
Content Writing Jobs in Kolkata
Cyber Security Jobs in Kolkata
Data Analyst Jobs in Kolkata
Data Engineer Jobs in Kolkata
Data Science Jobs in Kolkata
Design Engineer Jobs in Kolkata
DevOps Engineer Jobs in Kolkata
Digital Marketing Jobs in Kolkata
Engineering Jobs in Kolkata
Finance Jobs in Kolkata
Front End Developer Jobs in Kolkata
Graphic Designer Jobs in Kolkata
HR Jobs in Kolkata
IT Jobs in Kolkata
IT Support Jobs in Kolkata
Java Developer Jobs in Kolkata
Legal Jobs in Kolkata
Machine Learning Jobs in Kolkata
Marketing Jobs in Kolkata
NET Jobs in Kolkata
Network Engineer Jobs in Kolkata
Operations Manager Jobs in Kolkata
Product Manager Jobs in Kolkata
QA Jobs in Kolkata
React JS Jobs in Kolkata
Sales Jobs in Kolkata
Sales Manager Jobs in Kolkata
SEO Jobs in Kolkata
Software Engineer Jobs in Kolkata
Tech Support Jobs in Kolkata
UX Designer Jobs in Kolkata
Web Developer Jobs in Kolkata
All Filters
Total selected ()
No Results
No Results



















