201 Ethical Hacking jobs in Pakistan
Ethical Hacking Intern
Posted today
Job Viewed
Job Description
Company Description:
Void Phantoms is a cybersecurity and penetration testing group led by a team of students, formed to provide a practical learning space for beginners and enthusiasts. We are an educational, project-based team where members collaborate remotely to explore ethical hacking, security research, and hands-on pentesting projects.
Our vision is to create opportunities for students to learn by doing, build strong portfolios, and grow together as future cybersecurity professionals.
Role Description:
We are looking for Cybersecurity Interns (Remote, Project-Based) to join Void Phantoms. This is an unpaid, volunteer internship designed to give students practical experience in cybersecurity and pentesting through team-based projects.
As an intern, you will:
Participate in penetration testing simulations and security research.
Explore and practice with real-world cybersecurity tools.
Work with teammates on project reports, labs, and knowledge sharing.
Gain exposure to teamwork in a remote professional environment.
Qualifications:
We're looking for students who are:
Currently enrolled in 3rd–6th semester (CS, IT, Software, Cybersecurity, or related fields preferred).
Passionate about cybersecurity, ethical hacking, and research.
Basic knowledge of computers/networks (no advanced experience required).
Eager to learn, dedicated, and open to collaboration.
Comfortable working remotely with peers.
Nice to Have (Optional):
Familiarity with Kali Linux or basic penetration testing tools.
Any personal projects, labs, or CTF experience.
Information Security Analyst
Posted today
Job Viewed
Job Description
Are you passionate about cyber threat detection and response? We are seeking a Cybersecurity Analyst to monitor, analyze, and triage security alerts, ensuring a proactive defense against evolving threats in a Digital Retail Bank (DRB) environment. This role involves SIEM monitoring, incident handling, vulnerability management, and compliance enforcement to maintain the highest security standards. If you have experience in threat intelligence, log analysis, and security policy implementation, this is the perfect opportunity to contribute to a dynamic and cutting-edge cybersecurity team.
Responsibilities
- Threat Monitoring & Detection:
- Monitor and analyze SIEM alerts to detect potential security incidents.
- Conduct log analysis from firewalls, servers, applications, and endpoint security tools.
- Develop and refine correlation rules and use cases to improve threat detection.
- Utilize threat intelligence sources to enhance anomaly detection and response.
- Incident Response:
- Perform initial triage and incident handling to assess potential threats.
- Conduct root cause analysis to determine the impact and scope of security events.
- Maintain detailed incident documentation for compliance and reporting purposes.
- Vulnerability Management:
- Perform vulnerability scanning and risk assessment to identify security gaps.
- Support penetration testing efforts and assist in remediation strategies.
- Develop and implement risk mitigation plans to reduce attack vectors.
- Security Policy & Compliance:
- Ensure adherence to regulatory security frameworks (PCI DSS, ISO 27001, SBP regulations).
- Conduct security awareness training for internal teams.
- Monitor compliance with security policies and recommend necessary improvements.
- Research & Continuous Improvement:
- Stay updated on emerging threats, attack techniques, and cybersecurity trends.
- Continuously optimize SIEM correlation rules and fine-tune detection mechanisms.
- Enhance security operations processes to improve efficiency.
- Collaboration & Third-Party Security:
- Work closely with internal security teams and third-party service providers to correlate threat intelligence.
- Collaborate with IT and business units to enhance overall cyber resilience.
Requirements
- Bachelor's degree in Computer Science, IT, Cybersecurity, or a related field.
- 4-6 years of experience in infrastructure security, SIEM monitoring, or threat intelligence.
- Strong understanding of network protocols, firewalls, VPNs, IDS/IPS, and endpoint security.
- Proficiency in using SIEM solutions (QRadar, Splunk, ArcSight, Wazuh, etc.).
- Expertise in vulnerability assessment, threat modeling, and risk analysis.
- Hands-on experience with security tools (Metasploit, Burp Suite, Nessus, etc.).
- Experience in policy development, security guidelines, and compliance frameworks.
- Proficiency in scripting languages (Python, PowerShell, SPL, SQL) for security automation.
- Professional certifications such as CISSP, CEH, OSCP, or vendor-specific security credentials are a plus.
Objectives & KPIs
- Mean Time to Detect (MTTD): Average time taken to detect, analyze, and escalate security incidents.
- Incident Resolution Rate: Percentage of incidents resolved within predefined SLAs.
- Alert Accuracy: Ratio of false positives vs. true positives identified in SIEM alerts.
- SIEM Optimization: Percentage of correlation rules and use cases updated or improved.
- Root Cause Analysis (RCA) Completion: Percentage of incidents with a thorough RCA report.
- Rule Tuning Frequency: Regular enhancements to improve SIEM efficiency and reduce unnecessary alerts.
- Regulatory Compliance: Percentage of adherence to SBP regulations, PCI DSS, ISO 27001, and security standards.
Information Security Analyst
Posted today
Job Viewed
Job Description
We are seeking a highly skilled Information Security Analyst to join our growing team. In this role, you will play a crucial role in safeguarding our sensitive financial data and ensuring compliance with industry regulations. The ideal candidate will have a deep understanding of information security principles and best practices, with experience in the fintech or financial services sector. ensuring the protection of our digital assets from unauthorized access and breaches. Additionally, the analyst will be responsible for creating detailed security reports, updating incident response plans and educating employees on best security practices.
Key Responsibilities:
· Monitor and analyze security events and incidents to identify potential threats and vulnerabilities, with a focus on protecting sensitive financial data
· Conduct regular security assessments and audits to ensure compliance with regulatory requirements such as PCI DSS, ISO 27001 and
· Collaborate with cross-functional teams to implement security controls and measures to mitigate cyber risks and safeguard our systems and infrastructure
· Develop and update incident response plans to manage and mitigate the impact of security breaches efficiently.
· Ensure third-party vendors comply with security requirements and standards, mitigating external risks
· Conduct security awareness training and education programs for employees to promote a culture of security awareness.
· Assist with the implementation and management of security tools and technologies, such as firewalls, intrusion detection/prevention systems, and endpoint security solutions.
Desired Skills and Experience:
· In-depth knowledge of cybersecurity, firewalls, network security, information assurance, Linux, UNIX, security information and event management (SIEM), application security, security engineering, and security architecture.
· Proficiency in ethical hacking to expose vulnerabilities and protect against malicious attacks.
· Certifications such as CISSP, CISM, CSSP are a plus
· 3 years of experience in information security roles, with a focus on security analysis and incident response.
· Strong analytical skills for assessing and mitigating security risks.
· Extensive experience in conducting penetration tests on a variety of systems and applications to identify security vulnerabilities.
Interested candidates apply
Information Security Analyst
Posted today
Job Viewed
Job Description
Are you passionate about cyber threat detection and response ? We are seeking a Cybersecurity Analyst to monitor, analyze, and triage security alerts, ensuring a proactive defense against evolving threats in a Digital Retail Bank (DRB) environment. This role involves SIEM monitoring, incident handling, vulnerability management, and compliance enforcement to maintain the highest security standards. If you have experience in threat intelligence, log analysis, and security policy implementation , this is the perfect opportunity to contribute to a dynamic and cutting-edge cybersecurity team.
Responsibilities
- Threat Monitoring & Detection:
- Monitor and analyze SIEM alerts to detect potential security incidents.
- Conduct log analysis from firewalls, servers, applications, and endpoint security tools.
- Develop and refine correlation rules and use cases to improve threat detection.
- Utilize threat intelligence sources to enhance anomaly detection and response .
- Incident Response:
- Perform initial triage and incident handling to assess potential threats.
- Conduct root cause analysis to determine the impact and scope of security events.
- Maintain detailed incident documentation for compliance and reporting purposes.
- Vulnerability Management:
- Perform vulnerability scanning and risk assessment to identify security gaps.
- Support penetration testing efforts and assist in remediation strategies.
- Develop and implement risk mitigation plans to reduce attack vectors.
- Security Policy & Compliance:
- Ensure adherence to regulatory security frameworks (PCI DSS, ISO 27001, SBP regulations).
- Conduct security awareness training for internal teams.
- Monitor compliance with security policies and recommend necessary improvements .
- Research & Continuous Improvement:
- Stay updated on emerging threats, attack techniques, and cybersecurity trends .
- Continuously optimize SIEM correlation rules and fine-tune detection mechanisms.
- Enhance security operations processes to improve efficiency.
- Collaboration & Third-Party Security:
- Work closely with internal security teams and third-party service providers to correlate threat intelligence.
- Collaborate with IT and business units to enhance overall cyber resilience .
- Bachelor’s degree in Computer Science, IT, Cybersecurity, or a related field.
- 4-6 years of experience in infrastructure security, SIEM monitoring, or threat intelligence.
- Strong understanding of network protocols, firewalls, VPNs, IDS/IPS, and endpoint security .
- Proficiency in using SIEM solutions (QRadar, Splunk, ArcSight, Wazuh, etc.).
- Expertise in vulnerability assessment, threat modeling, and risk analysis .
- Hands-on experience with security tools (Metasploit, Burp Suite, Nessus, etc.).
- Experience in policy development, security guidelines, and compliance frameworks .
- Proficiency in scripting languages (Python, PowerShell, SPL, SQL) for security automation.
- Professional certifications such as CISSP, CEH, OSCP , or vendor-specific security credentials are a plus.
Objectives & KPIs
- Mean Time to Detect (MTTD): Average time taken to detect, analyze, and escalate security incidents.
- Incident Resolution Rate: Percentage of incidents resolved within predefined SLAs.
- Alert Accuracy: Ratio of false positives vs. true positives identified in SIEM alerts.
- SIEM Optimization: Percentage of correlation rules and use cases updated or improved.
- Root Cause Analysis (RCA) Completion: Percentage of incidents with a thorough RCA report.
- Rule Tuning Frequency: Regular enhancements to improve SIEM efficiency and reduce unnecessary alerts .
- Regulatory Compliance: Percentage of adherence to SBP regulations, PCI DSS, ISO 27001, and security standards .
Information Security Analyst
Posted 9 days ago
Job Viewed
Job Description
Overview
We are looking for a skilled Information Security Analyst to protect our organization's information assets and maintain the integrity of our systems. In this role, you will monitor network security, assess risks, and identify potential threats while conducting thorough incident response.
Responsibilities- Monitor network and system activities for potential security threats and breaches
- Conduct risk assessments to identify vulnerabilities in our infrastructure and data
- Implement security measures, including firewalls and intrusion detection systems, to safeguard sensitive information
- Perform regular audits of security protocols and compliance with regulatory requirements
- Analyze security incidents to determine root causes and develop strategies for prevention
- Utilize various security tools, including SIEM systems, to enhance threat detection capabilities
- Execute penetration testing to evaluate the effectiveness of existing security measures
- Collaborate with other teams to address security issues and implement best practices
- Prepare detailed reports on security incidents and assessment findings for stakeholders
- Stay updated on the latest security trends, vulnerabilities, and regulatory changes to improve the organization's security posture
- Information Technology
- Category: Computer Networking
- Job Type: Full Time/Permanent (First Shift (Day))
Information Security Analyst
Posted 10 days ago
Job Viewed
Job Description
The Information Security Analyst will safeguard Syhtek's digital assets and IT infrastructure. You will monitor and defend against security threats, ensuring compliance with policies and regulations. You will be instrumental in identifying vulnerabilities and implementing security measures to protect our clients and internal systems. Join our team to protect cutting-edge technologies while contributing to a secure digital environment.
Key Responsibilities- Monitor Security Systems: Identify potential threats, vulnerabilities and risks.
- Implement Security Protocols: Create and enforce security policies and standards across the company.
- Incident Response: Respond to and mitigate security breaches or attacks efficiently.
- Risk Assessment: Conduct regular security audits to identify areas of improvement.
- Compliance Assurance: Ensure security practices meet regulatory and legal requirements.
- Employee Training: Provide ongoing security training for staff to reduce human errors.
- Report Security Issues: Maintain documentation of security issues, breaches and resolutions.
- Security Analysis Tools: Utilize security tools and software for monitoring and analysis.
- Minimum 3 years of experience in cybersecurity or information security roles.
- Experience with firewalls, VPNs, IDS/IPS and endpoint security systems.
- Proven track record of responding to and resolving security incidents effectively.
- Strong knowledge of security frameworks and IT governance standards.
- Familiarity with risk management practices and threat assessment tools.
- Excellent communication skills for reporting security matters to non-technical staff.
Information Security Analyst
Posted 16 days ago
Job Viewed
Job Description
Overview
Information Security Analyst vacancy in Lahore Pakistan
The Information Security Analyst will be responsible for ensuring the security of our company's information systems and data. They will conduct regular risk assessments, implement and maintain security protocols, and monitor network activity for any potential threats. The ideal candidate should have a strong understanding of information security principles and practices, as well as experience with network and system security tools. They should also possess excellent problem-solving and communication skills, and be able to work independently or as part of a team. This is a contract position with accommodation provided in Lahore, and includes free visa and ticket for candidates of any gender. Salary is competitive at 1500$ per month.
Responsibilities- Ensure the security of company information systems and data
- Conduct regular risk assessments
- Implement and maintain security protocols
- Monitor network activity for potential threats
- Strong understanding of information security principles and practices
- Experience with network and system security tools
- Excellent problem-solving and communication skills
- Ability to work independently or as part of a team
- Contract position with accommodation in Lahore
- Salary: 1500$ per month
Be The First To Know
About the latest Ethical hacking Jobs in Pakistan !
Information Security Analyst
Posted 20 days ago
Job Viewed
Job Description
, Junior Information Security Analyst
As a Junior Information Security Analyst, you will work closely with our team to ensure the security and integrity of our company's data and systems. You will be responsible for monitoring and analyzing potential security threats, implementing security measures, and conducting regular vulnerability assessments. Additionally, you will assist in creating and maintaining policies and procedures related to information security. We are looking for a detail-oriented individual with strong analytical skills and a passion for staying up-to-date on the latest security trends. This entry-level position offers an excellent opportunity to gain hands-on experience in the field of information security. Salary starting at 1500$ per month in Gujrat.
This job has no reviews yet. You can be the first!
Information Security Analyst Jobs in Gujrat:
The most in-demand professions in Gujrat:
MEAT SLAUGHTERHOUSE WORKER | PACKERS, SORTERS | UKRAINE | without work experience
1200 $
Ukraine
1500
5 minutes ago
Vacancy Job available inbox for more details and how to apply.
Users also frequently search in these cities:
More professions from the category IT sphere:
Subscribe to our telegram channel @layboard_in
#J-18808-LjbffrInformation Security Analyst
Posted 24 days ago
Job Viewed
Job Description
Overview
Are you passionate about cyber threat detection and response? We are seeking a Cybersecurity Analyst to monitor, analyze, and triage security alerts, ensuring a proactive defense against evolving threats in a Digital Retail Bank (DRB) environment. This role involves SIEM monitoring, incident handling, vulnerability management, and compliance enforcement to maintain the highest security standards. If you have experience in threat intelligence, log analysis, and security policy implementation, this is the perfect opportunity to contribute to a dynamic and cutting-edge cybersecurity team.
Responsibilities- Threat Monitoring & Detection: Monitor and analyze SIEM alerts to detect potential security incidents; conduct log analysis from firewalls, servers, applications, and endpoint security tools; develop and refine correlation rules and use cases to improve threat detection; utilize threat intelligence sources to enhance anomaly detection and response
- Incident Response: Perform initial triage and incident handling to assess potential threats; conduct root cause analysis to determine the impact and scope of security events; maintain detailed incident documentation for compliance and reporting purposes
- Vulnerability Management: Perform vulnerability scanning and risk assessment to identify security gaps; support penetration testing efforts and assist in remediation strategies; develop and implement risk mitigation plans to reduce attack vectors
- Security Policy & Compliance: Ensure adherence to regulatory security frameworks (PCI DSS, ISO 27001, SBP regulations); conduct security awareness training for internal teams; monitor compliance with security policies and recommend necessary improvements
- Research & Continuous Improvement: Stay updated on emerging threats, attack techniques, and cybersecurity trends; continuously optimize SIEM correlation rules and fine-tune detection mechanisms; enhance security operations processes to improve efficiency
- Collaboration & Third-Party Security: Work closely with internal security teams and third-party service providers to correlate threat intelligence; collaborate with IT and business units to enhance overall cyber resilience
- Bachelor's degree in Computer Science, IT, Cybersecurity, or a related field
- 4-6 years of experience in infrastructure security, SIEM monitoring, or threat intelligence
- Strong understanding of network protocols, firewalls, VPNs, IDS/IPS, and endpoint security
- Proficiency in using SIEM solutions (QRadar, Splunk, ArcSight, Wazuh, etc.)
- Expertise in vulnerability assessment, threat modeling, and risk analysis
- Hands-on experience with security tools (Metasploit, Burp Suite, Nessus, etc.)
- Experience in policy development, security guidelines, and compliance frameworks
- Proficiency in scripting languages (Python, PowerShell, SPL, SQL) for security automation
- Professional certifications such as CISSP, CEH, OSCP, or vendor-specific security credentials are a plus
- Mean Time to Detect (MTTD): Average time taken to detect, analyze, and escalate security incidents
- Incident Resolution Rate: Percentage of incidents resolved within predefined SLAs
- Alert Accuracy: Ratio of false positives vs. true positives identified in SIEM alerts
- SIEM Optimization: Percentage of correlation rules and use cases updated or improved
- Root Cause Analysis (RCA) Completion: Percentage of incidents with a thorough RCA report
- Rule Tuning Frequency: Regular enhancements to improve SIEM efficiency and reduce unnecessary alerts
- Regulatory Compliance: Percentage of adherence to SBP regulations, PCI DSS, ISO 27001, and security standards
- Mid-Senior level
- Full-time
- Other
- IT Services and IT Consulting
Referrals increase your chances of interviewing at HugoBank by 2x
Get notified about new Information Security Analyst jobs in Karāchi, Sindh, Pakistan .
#J-18808-LjbffrInformation Security Analyst
Posted 1 day ago
Job Viewed
Job Description
cyber threat detection and response ? We are seeking a
Cybersecurity Analyst
to monitor, analyze, and triage security alerts, ensuring a
proactive defense
against evolving threats in a
Digital Retail Bank (DRB)
environment. This role involves
SIEM monitoring, incident handling, vulnerability management, and compliance enforcement
to maintain the highest security standards. If you have experience in
threat intelligence, log analysis, and security policy implementation , this is the perfect opportunity to contribute to a dynamic and cutting-edge cybersecurity team. Responsibilities Threat Monitoring & Detection: Monitor and analyze
SIEM alerts
to detect potential security incidents. Conduct
log analysis
from firewalls, servers, applications, and endpoint security tools. Develop and refine
correlation rules and use cases
to improve threat detection. Utilize
threat intelligence sources
to enhance
anomaly detection and response . Incident Response: Perform
initial triage and incident handling
to assess potential threats. Conduct
root cause analysis
to determine the impact and scope of security events. Maintain detailed
incident documentation
for compliance and reporting purposes. Vulnerability Management: Perform
vulnerability scanning
and risk assessment to identify security gaps. Support
penetration testing efforts
and assist in remediation strategies. Develop and implement
risk mitigation plans
to reduce attack vectors. Security Policy & Compliance: Ensure adherence to
regulatory security frameworks
(PCI DSS, ISO 27001, SBP regulations). Conduct
security awareness training
for internal teams. Monitor compliance with security policies and
recommend necessary improvements . Research & Continuous Improvement: Stay updated on
emerging threats, attack techniques, and cybersecurity trends . Continuously
optimize SIEM correlation rules
and fine-tune detection mechanisms. Enhance
security operations processes
to improve efficiency. Collaboration & Third-Party Security: Work closely with internal security teams and
third-party service providers
to correlate threat intelligence. Collaborate with IT and business units to enhance overall
cyber resilience . Bachelor’s degree
in Computer Science, IT, Cybersecurity, or a related field. 4-6 years of experience
in infrastructure security, SIEM monitoring, or threat intelligence. Strong understanding of
network protocols, firewalls, VPNs, IDS/IPS, and endpoint security . Proficiency in using
SIEM solutions
(QRadar, Splunk, ArcSight, Wazuh, etc.). Expertise in
vulnerability assessment, threat modeling, and risk analysis . Hands-on experience with
security tools
(Metasploit, Burp Suite, Nessus, etc.). Experience in
policy development, security guidelines, and compliance frameworks . Proficiency in
scripting languages
(Python, PowerShell, SPL, SQL) for security automation. Professional certifications
such as
CISSP, CEH, OSCP , or vendor-specific security credentials are a plus. Objectives & KPIs Mean Time to Detect (MTTD):
Average time taken to detect, analyze, and escalate security incidents. Incident Resolution Rate:
Percentage of incidents resolved within predefined SLAs. Alert Accuracy:
Ratio of
false positives vs. true positives
identified in SIEM alerts. SIEM Optimization:
Percentage of correlation rules and use cases updated or improved. Root Cause Analysis (RCA) Completion:
Percentage of incidents with a thorough RCA report. Rule Tuning Frequency:
Regular enhancements to improve
SIEM efficiency and reduce unnecessary alerts . Regulatory Compliance:
Percentage of adherence to
SBP regulations, PCI DSS, ISO 27001, and security standards .
#J-18808-Ljbffr