Cyber Security Analyst
Cybyrotek Solutions
All India • 2 months ago
Experience: 3 to 7 Yrs
PREMIUM
Deal of the Day
--:--:--
7 Days Free Trial
Upgrade to CVX24 Premium
- Free Resume Writing
-
Get a Verified Blue tick
- See who viewed your profile
- Unlimited chat with recruiters
- Rank higher in recruiter searches
- Get up to 10× more recruiter visibility
- Auto-forward profile to 10 top recruiters
- Receive verified recruiter messages directly
- Unlock hidden jobs, not visible to free users
$0
Activate
$0
A small token amount will be charged to verify.
Get Refund in 48 Hours.
After free-trial 6 Months subscription will be auto Activated @ $
1
(Cancel Anytime).
Free Earplugs Delivery Only after Payment of Rs. 99 for Five Consecutive Months.
Enter Your Details
Job Description
As a Cyber Security Specialist, you will play a crucial role in safeguarding the organization's digital assets by conducting a range of security assessments and implementing best practices. Your responsibilities will include:
- **Penetration Testing & Vulnerability Assessment**: Conducting comprehensive penetration tests using tools like Metasploit, Nessus, Burp Suite, and Nmap to identify vulnerabilities in networks, web applications, and systems.
- **Security Audits**: Performing regular security audits, analyzing findings, and providing recommendations to remediate potential weaknesses.
- **Incident Response**: Assisting in identifying, analyzing, and responding to security incidents, including breaches, malware infections, and other cyberattacks.
- **Security Monitoring**: Monitoring network traffic and logs for suspicious activity using IDS/IPS, SIEM tools, and other monitoring software.
- **Vulnerability Management**: Identifying, assessing, and mitigating vulnerabilities within internal and external IT environments, including web servers, applications, and databases.
- **Threat Intelligence**: Staying up-to-date on the latest security threats and trends, collaborating with external threat intelligence platforms.
- **Security Best Practices**: Developing and enforcing security policies, procedures, and best practices across the organization.
- **Collaboration & Reporting**: Working closely with internal teams to integrate security measures and provide reports and presentations to stakeholders.
- **Security Awareness Training**: Conducting internal training sessions to promote awareness of common cyber threats and security best practices for employees.
- **Compliance**: Ensuring the organization's cybersecurity policies are aligned with regulatory standards such as GDPR, HIPAA, PCI-DSS.
- **Tool Management & Automation**: Configuring, managing, and enhancing cybersecurity tools and automating repetitive tasks to improve efficiency.
**Qualifications Required**:
- Certified Ethical Hacker (CEH) certification or equivalent security certifications like CISSP, OSCP.
- Strong knowledge of networking protocols and network security.
- Proven experience in penetration testing, security assessments, and vulnerability management.
- Proficiency with tools like Kali Linux, Metasploit, Burp Suite, Nessus, Wireshark, and Nmap.
- Hands-on experience with firewall management, IDS/IPS systems, and SIEM tools.
- Understanding of operating systems security, web applications, and incident response protocols.
- Knowledge of regulatory requirements, cloud security, and troubleshooting skills.
- Excellent communication and interpersonal skills for effective interaction with cross-functional teams.
In this role, you will contribute to maintaining a secure environment, staying informed about emerging threats, and ensuring compliance with industry standards. As a Cyber Security Specialist, you will play a crucial role in safeguarding the organization's digital assets by conducting a range of security assessments and implementing best practices. Your responsibilities will include:
- **Penetration Testing & Vulnerability Assessment**: Conducting comprehensive penetration tests using tools like Metasploit, Nessus, Burp Suite, and Nmap to identify vulnerabilities in networks, web applications, and systems.
- **Security Audits**: Performing regular security audits, analyzing findings, and providing recommendations to remediate potential weaknesses.
- **Incident Response**: Assisting in identifying, analyzing, and responding to security incidents, including breaches, malware infections, and other cyberattacks.
- **Security Monitoring**: Monitoring network traffic and logs for suspicious activity using IDS/IPS, SIEM tools, and other monitoring software.
- **Vulnerability Management**: Identifying, assessing, and mitigating vulnerabilities within internal and external IT environments, including web servers, applications, and databases.
- **Threat Intelligence**: Staying up-to-date on the latest security threats and trends, collaborating with external threat intelligence platforms.
- **Security Best Practices**: Developing and enforcing security policies, procedures, and best practices across the organization.
- **Collaboration & Reporting**: Working closely with internal teams to integrate security measures and provide reports and presentations to stakeholders.
- **Security Awareness Training**: Conducting internal training sessions to promote awareness of common cyber threats and security best practices for employees.
- **Compliance**: Ensuring the organization's cybersecurity policies are aligned with regulatory standards such as GDPR, HIPAA, PCI-DSS.
- **Tool Management & Automation**: Configuring, managing, and enhancing cybersecurity tools and automating repetitive tasks to improve efficiency.
**Qualifications Required**:
- Certified Ethical Hacker (CEH) certification
Skills Required
Penetration Testing
Vulnerability Assessment
Security Audits
Security Monitoring
Vulnerability Management
Threat Intelligence
Compliance
Networking Protocols
Network Security
Firewall Management
Regulatory Requirements
Cloud Security
Troubleshooting
Analytical Skills
Communication Skills
Interpersonal Skills
Incident Response
Security Best Practices
Collaboration Reporting
Security Awareness Training
Tool Management Automation
Certified Ethical Hacker CEH
Penetration Testing Tools
IDSIPS Systems
SIEM Tools
Operating Systems Security
Web Applications Security
Cryptographic Protocols
Incident Response Protocols
ProblemSolving
Posted on: March 3, 2026
Relevant Jobs
Step 2 of 2