logotype

Our Culture

The secret to retaining employees on board for extended periods of time is our office culture.

Our Values

Growth

Believe. Develop.
Follow Growth Mindset.

Transparency

Transparent approach across the channels

Zero Hierarchy

Open communication and ease of access.

Careers for Experienced Professionals

Bring your knowledge to our organization, the global IT & cyber security organization and help the best of the best revolutionizing industries.

Careers for Interns & Freshers

The initial step in your professional life is to find suitable employment.
Are you an Intern, Fresher or someone with a job gap, we are here to offer you an opportunity to work for our firm.

Jobs at RNR

Job Title: Information Security Analyst

Department: Information Technology

Summary:

The Information Security Analyst is responsible for the design, implementation, and monitoring of the organization’s information security policies and procedures. This includes identifying and mitigating security risks, conducting security assessments, and responding to security incidents.

Responsibilities:

  • Monitor the organization’s networks and systems for security threats and vulnerabilities.
  • Investigate security incidents and recommend corrective actions.
  • Implement security controls to protect the organization’s information assets.
  • Develop and maintain security policies and procedures.
  • Train users on security best practices.
  • Stay up-to-date on the latest security threats and trends.

Qualifications:

  • Bachelor’s degree in computer science, information security, or a related field.
  • Strong understanding of security principles and best practices.
  • Experience with security tools and technologies.
  • Excellent analytical and problem-solving skills.
  • Excellent written and verbal communication skills.

If you are a highly motivated and experienced Information Security Analyst with a passion for protecting information assets, we encourage you to apply.

Job Title: VAPT (Vulnerability Assessment and Penetration Testing) Analyst

Summary:

A VAPT Analyst is responsible for conducting vulnerability assessments and penetration tests on networks, web applications, and other systems. They identify and exploit vulnerabilities in order to assess their impact, and they develop and execute penetration testing plans. VAPT Analysts also write detailed reports of findings and recommendations, and they stay up-to-date on the latest security threats and vulnerabilities.

Responsibilities:

  • Conduct vulnerability assessments and penetration tests on networks, web applications, and other systems.
  • Identify and exploit vulnerabilities in order to assess their impact.
  • Develop and execute penetration testing plans.
  • Write detailed reports of findings and recommendations.
  • Stay up-to-date on the latest security threats and vulnerabilities.
  • Work with other security professionals to improve the overall security posture of an organization.

Qualifications:

  • Bachelor’s degree in computer science, information security, or a related field.
  • 2+ years of experience in vulnerability assessment and penetration testing.
  • Strong understanding of information security principles and practices.
  • Experience with vulnerability assessment and penetration testing tools and techniques.
  • Ability to think critically and creatively to identify and exploit vulnerabilities.
  • Excellent written and verbal communication skills.

VAPT is a challenging but rewarding career field. If you are interested in helping to protect organizations from cyber threats, then a career in VAPT may be the right choice for you

Job Title: Business Development Executive

Department: Sales

Summary:

The Business Development Executive (BDE) is responsible for identifying and developing new business opportunities for the company. They will work with a variety of stakeholders, including sales, marketing, and product teams, to identify and qualify potential customers, develop and execute sales plans, and close deals.

Responsibilities:

  • Identify and qualify potential customers
  • Develop and execute sales plans
  • Close deals
  • Build relationships with key stakeholders
  • Conduct market research
  • Manage a pipeline of leads
  • Track and report on sales performance

Qualifications:

  • Bachelor’s degree in business, marketing, or a related field
  • 2+ years of experience in sales or business development
  • Strong understanding of the company’s products or services
  • Strong understanding of the target market
  • Strong understanding of the competitive landscape
  • Ability to build relationships with potential customers
  • Ability to negotiate effectively
  • Ability to close deals
  • Excellent written and verbal communication skills

    Service Request Form

    Select Service(s) You Want:

    Information & cyber security program strategy & roadmapEnterprise & cyber security risk assessment & managementThird party risk managementVirtual CISO serviceCyber security awareness programPhishing simulation programThreat modelingUser access governance & certificationIncident management and response planISO 27001/22301/27701/9001RBI master directionNHB cyber security guidelinesIRDAI cyber security guidelinesNIST FrameworkSOC1/SOC2Data localization as per RBI circular of storage of payment system dataCIS frameworkInternal audit managementCloud assessment as per CISDesigning cloud security architectureCSPM security monitoringGap assessment as per applicable guidelinesNetwork architecture reviewFirewall rule reviewFirewall configuration reviewSystem hardening checksVulnerability assessment program managementWeb application penetration testingMobile application penetration testingInfrastructure vulnerability assessmentAPI vulnerability assessmentAPI fuzzingRed teaming ExerciseData protection advisoryData flow diagramDigital personal data protection acData protection controls implementationData discovery and classificationDesigning of data protection policyData governance programDigital personal data protection acGap assessmentArticulation of policy and proceduresISO 27001/22301/27701/9001, PCI-DSS, SOC1/SOC2, COBIT, COSO, HIPPA, RBI, IRDAI, NIST, Data Localization, CISGRC tool implementationArticulation of BCP plan and strategyCrisis management planBCP/DR planning and implementationImplementation of BCMS standard (ISO 22301)Conducting actual and tabletop DR drillsFunctional recovery planGRC resource deployment onsite/offsiteSecurity services resource deployment onsite/offsite

    Contact Details:

    Name (required):

    Organization Name (required):

    Email (required):

    Contact No (required):

    Detail about the requirement (optional):