At KPMG in India’s Digital Trust – Cyber Defense Incident Response (CDIR) team, we work at the intersection of cybersecurity, risk intelligence, and innovation. From breach and attack simulations to global security assessments, from OT security to incident response and from secure coding to developing secure products we help clients secure their digital ecosystems and prepare for tomorrow’s threats. Our work spans industries and borders, and we’re constantly evolving to stay ahead of the curve.
What we do
‘Capture the Flag 2025’ is not just a competition-it's your gateway into the heart of KPMG in India’s Digital Trust practice. Designed exclusively for lateral hires, this event blends technical acumen with real-world scenarios to test your readiness for the challenges we tackle regularly.
Important dates to remember
Registration
3 July 2025 to 17 July 2025
Hackathon
19 July 2025 10:00 a.m. to 19 July 2025 9:59 p.m.
Results
23 July 2025
Hackathon categories - Get ready to explore six core domains that define our work
OT security
Defend industrial systems and critical infrastructure, with hands-on experience in Industrial Control Systems (ICS)/Supervisory Control and Data Acquisition (SCADA) penetration testing, protocol fuzzing (Modbus, OPC, Zigbee, WirelessHART), firmware and hardware exploitation, Programmable Logic Controllers (PLC)/Remote Terminal Units (RTU) attack simulation, and use of specialised tools to identify and exploit vulnerabilities across industrial and embedded systems.
Python scripting
Automate, analyse, and exploit with precision; including exploit development, vulnerability scanning, payload generation, API interaction, log parsing, and tool integration, building custom scripts for penetration testing, threat hunting, and red teaming across diverse environments.
AI security
Secure intelligent systems and machine learning pipelines, adversarial attacks (evasion, extraction, inference), model fuzzing, data poisoning, prompt injection, API abuse, with hands-on experience in exploiting vulnerabilities across AI pipelines and evaluating model exposure to real-world threats.
Cloud penetration testing
Uncover vulnerabilities in cloud environments, with hands-on experience in cloud penetration testing, misconfiguration exploitation, privilege escalation, API abuse, container and serverless attack vectors, and red teaming across AWS, Azure, and GCP.
DevSecOps
Integrate security into every stage of development, encompassing secure CI/CD pipeline integration, automation via scripting, Infrastructure as Code (IaC), container and cloud security, monitoring and alerting, and effective cross-functional communication.
Red teaming
Simulate adversaries and test organisational resilience across IT infrastructure, web, mobile, and thick client applications, with expertise in manual and automated penetration testing, red teaming, vulnerability exploitation, and threat simulation with deep knowledge of network protocols, OS internals, and application security standards (OWASP, NIST, CIS).
The flags are hidden. The vulnerabilities await. The leaderboard is yours to climb.
Whether you're a seasoned professional (one to three years’ experience) this is your chance to prove your mettle.
Who can participate?
* Please note that participation in this event is not a guarantee of an offer at KPMG in India
For any further inquiries, please contact our team
Access our latest insights on Apple or Android devices
