Jobs
Interviews

190 Cis Jobs - Page 3

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 12.0 years

0 Lacs

karnataka

On-site

The role involves contributing to various aspects related to the security of Digital Workplace environments. This includes providing recommendations to project management and architecture teams regarding security constraints in alignment with group guidelines. Conducting risk analysis on different subjects, presenting risks to business sponsors for acceptance, implementing mitigation measures, drafting PASFs for outsourced services, and overseeing pen tests on entrusted perimeters are key responsibilities. Additionally, contributing to the Security Run activities of the entity, resolving incidents on managed perimeters, and monitoring vulnerabilities on managed perimeters are vital tasks. The deliverables expected from this role include creating security specifications for new projects and solutions, conducting security and risk analysis according to Societe Generale Processes, proposing mitigations with experts and architects, presenting to the worldwide security community, following up on mitigation implementation and pen tests, reviewing risks with management or ORM, creating security rules and SSAP documents for external services and contractors, delivering Security RUN tasks, monitoring incidents and vulnerabilities on the target perimeter, defining and industrializing controls, conducting recurrent risk reviews such as Sensitivity Assessments and Risk Assessments, and validating security aspects like Flows, Rights, Exceptions, and Profiles. The ideal candidate for this position should have 8 to 12 years of relevant experience and expertise in MS Exchange/IronPort, MS Windows administration and hardening, Teams Tlphonie/SBC EBC, and Security Standards such as ISO 27001/27005, NIST, CIS, EBIOS. At Socit Gnrale, individuals are considered as agents of change, and the organization believes that the future will be influenced by their initiatives, both big and small. Working at Societe Generale offers the opportunity to make a positive impact on the future, with a focus on creating, daring, innovating, and taking action. The company provides a stimulating and supportive environment where employees can grow, feel useful on a daily basis, and enhance their expertise. Furthermore, employees at Socit Gnrale have the chance to dedicate several days per year to solidarity actions during working hours, including sponsoring individuals in need of professional guidance, contributing to the financial education of young apprentices, and sharing skills with charities. The company is committed to supporting the Group's ESG (Environmental, Social, and Governance) strategy by integrating ESG principles into all activities and policies. This commitment is reflected in business practices, work environment, and responsible initiatives for environmental protection. Socit Gnrale values diversity and inclusion, fostering an environment where individuals from diverse backgrounds can thrive and contribute to the organization's success.,

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

kochi

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

7.0 - 10.0 years

11 - 15 Lacs

hyderabad

Work from Office

The IT Software Asset Management Sr 1. is responsible for handling the day-to-day platform operations of RSMs SAMPro framework. This role involves creating integrations, quality assurance reviews and configuring SAMPro features. The position requires effective communication and collaboration with other analysts, developers and IT stakeholders of the framework. In addition to these responsibilities, the Software Asset Management Sr. will provide related support to other (hardware, cloud) Asset Management staff within ServiceNow. Creates integrations, with a focus on SaaS tools for both IT & LOB software. This includes pre-built integrations and customized APIs. Actively seeks process improvement opportunities with a focus on automation for the SAM and VM teams. Frequently partners within and outside IT for solutions and implements/drives change to accelerate SAMPro adoption firmwide. Completes quality assurance reviews of SAMPro, HAM and other ServiceNow-related stories. May act as an IT Vendor Manager for the purposes of the ServiceNow relationship. Similarly, may require working on behalf of the firm with other 3rd party vendors when working on integrations. Acts as a developer for moderate HAM or ITAM workloads, as appropriate. Other duties as assigned EDUCATION/CERTIFICATIONS (MUST NOTE REQUIRED OR PREFERRED) Bachelors Degree in Information Technology or related business concentration preferred ServiceNow CSA certification preferred; additional developer certifications will be considered, including: Certified Application Developer Certified Implementation Specialist (CIS) in SAM ITAM or similar discipline certification preferred Equivalent experience will be considered TECHNICAL/SOFT SKILLS (MUST NOTE REQUIRED OR PREFERRED) Good understanding of software licensing and compliance required Excellent Microsoft Office skills required Ability to work independently and as part of a team required High degree of professionalism required Demonstrated excellent interpersonal and communication skills required EXPERIENCE (MUST NOTE REQUIRED OR PREFERRED) 6-8 years of experience with SAMPro required. Experience with QA is preferred. IT Asset Management or IT Procurement experience is helpful. Any experience with ITAM or HAM in additional to SAM is preferred. Related experience is preferrable in a large-scale technology environment required LEADERSHIP SKILLS (MUST NOTE REQUIRED OR PREFERRED) Self-starter capability required Ability to build partnerships outside of tactical team required ServiceNow acumen required

Posted 3 weeks ago

Apply

0.0 - 1.0 years

3 - 6 Lacs

coimbatore

Work from Office

Role / Nature of Job : Assembly / Machine Operator Follow and support Safety and Environmental practices on the shop floor, including hazard identification and safe working methods, in line with ISO45001 & ISO14001 standards. Operate machines and follow established processes after required training, ensuring adherence to ISO9001:2015 standards. Support shift production targets by executing assigned operations and coordinating with relevant support teams. Maintain discipline in resource usage to support cell-level productivity and cost control (Volume-adjusted VOH). Carry out production activities as per the shift plan to meet internal customer requirements. Build skills through On-the-Job Training (OJT) and take responsibility for multiple tasks as part of multi-skilling efforts. Assist in tracking and reporting key manufacturing performance indicators (KPIs). Apply Lean principles in daily work and actively contribute improvement ideas to relevant stakeholders. Work on machines such as CNC Horizontal Turning Centers, OD Grinding, HMC, and CNC Gear Grinding as assigned / Assembly line to meet the necessary target. Safely handle heavy components using overhead cranes and follow proper placement procedures. Read and understand engineering drawings and apply them in part machining and inspection. Follow 5S, FIFO, Kanban, CIS, and Kaizen practices in day-to-day operations. Your Profile : Diploma / BE.,(from Tier 3 or 4 college) in Mechanical / Automobile/ Manufacturing/ Production/ Metallurgy / Agriculture 0 - 1 Years experience in Production / Assembly as Operator Be part of our ZF team as Assembly / Machine Operator and apply now!

Posted 3 weeks ago

Apply

4.0 - 8.0 years

4 - 6 Lacs

ahmedabad

Work from Office

1.Prepare, compile, and review regulatory dossiers for submission in ROW/EU/CIS markets. 2.Ensure timely submission of product registration dossiers in compliance with applicable regional regulatory requirements. 3.Liaise with health authorities, partners, and internal cross-functional teams for query responses and updates. 4.Monitor changes in regulatory guidelines and proactively assess impact on product lifecycle. 5.Support renewal and variation submissions for existing products. 6.Coordinate with internal departments such as QA, QC, R&D, and Production for required documentation. 7.Maintain regulatory databases and documentation in an organized and audit-ready manner. 8.Ensure compliance with all local and international regulatory requirements and company standards.

Posted 3 weeks ago

Apply

6.0 - 11.0 years

20 - 25 Lacs

vadodara

Work from Office

Role & responsibilities International Business Development and International Sales and export marketing in Pharmaceutical & Bulk Drugs, APIs Preferred candidate profile

Posted 3 weeks ago

Apply

6.0 - 10.0 years

3 - 8 Lacs

chennai

Work from Office

Position - Operations Security Consultant Experience: 8 to 12 years Location: Chennai Education: B.E./ B.Tech./ MCA Job Profile The Operations Security Consultant is responsible for the end-to-end management of security operations across multiple client environments. The role demands strong leadership in overseeing SOC operations, incident response, threat detection, compliance, and risk management. The ideal candidate will possess extensive hands-on experience in a multi-customer SIEM (QRadar) environment, a deep understanding of security frameworks, and the ability to build trusted relationships with internal and external stakeholders. Key Roles & Responsibilities Oversee Daily security operations and maintain operational excellence ensuring availability, performance, and reliability of security tools and processes. Manage 24/7 monitoring, triage, investigation, and resolution of security incidents via SIEM (QRadar). Coordinate incident management efforts across internal teams and external stakeholders. Develop, fine-tune, and manage security detection rules, use cases, and threat intelligence integration. Implement continuous improvement processes using KPIs, operational reviews, and performance metrics. Manage Lead SOC analysts, threat hunters, and incident responders. Facilitate collaboration across engineering, compliance, and client teams. Ensure compliance with ISO 27001, NIST CSF, CIS Controls, DORA, GDPR, and client-specific standards. Lead preparation of audits, client reports, and executive dashboards. Maintain risk treatment plans aligned with ISO 27001 standards. Conduct vulnerability assessments and prioritize remediation using EBIOS methodology. Desired Skills Hands-on expertise with QRadar SIEM, SOC operations, and incident response. Proficiency in security frameworks: NIST CSF, CIS Controls, DORA, GDPR. Experience with vulnerability management, threat hunting, and risk assessment methodologies. Familiarity with automation, SOAR solutions, and operational workflow optimization. Strong experience on at least one technical environment and related cybersecurity topics: Cloud (AWS/Azure), Mainframe, Datawarehouse, Database, O365 Certifications (Preferred) Security: CISSP, CISM (any one) Technical Skills (Minimum 3 to 4 from below) Environments: Cloud (AWS/Azure), Windows, Linux, Mainframe, Data Warehouse, Database. Tools: Qualys, Splunk, ServiceNow, PAM, IAM, Palo Alto, Fortinet, SOC tools / EDR (MDR), AppSec, Bastion, Network Management, Micro-Segmentation, Vaults & Secret Management, PKI, Vulnerability Scanning (QRadar, Nessus).

Posted 3 weeks ago

Apply

7.0 - 12.0 years

20 - 35 Lacs

chennai, bengaluru, delhi / ncr

Hybrid

Job Title: Hogan IDS/CIS Specialist Location: Multiple Locations (Onsite/Remote options available) Job Description We are seeking skilled professionals with hands-on experience in Hogan banking systems, specifically the IDS (Integrated Deposits System) and CIS (Customer Information System) modules. The selected candidates will be responsible for configuring, maintaining, and supporting core banking applications across diverse client environments. Key Responsibilities Configure and maintain Hogan IDS (Integrated Deposits System) and CIS (Customer Information System) modules. Perform routine system administration, batch processing, and application monitoring. Support day-to-day operations of deposit accounts and customer information management. Troubleshoot application and data issues, perform root cause analysis, and resolve incidents. Collaborate with technical, operations, and support teams on application fixes and enhancements. Execute data extracts, queries, and reporting as needed by business and IT teams. Assist in migrations, upgrades, and deployment of new functionalities. Prepare technical documentation and conduct knowledge transfer to team members. Ensure compliance with data security, risk, and audit requirements. Required Skills & Experience Practical experience working with Hogan IDS and/or CIS modules in banking environments. Strong understanding of core banking operations, deposit products, and customer data structures. Proficiency with mainframe systems, batch processing, and troubleshooting application issues. Experience with COBOL, JCL, VSAM, or similar mainframe technologies is preferred. Ability to work independently and efficiently in multi-location, distributed setups. Excellent communication and documentation skills. Preferred Qualifications Bachelors degree in IT, Computer Science, or related field. Prior experience in technical support or system operations roles within financial services. Knowledge of additional Hogan modules or banking systems is a plus.

Posted 3 weeks ago

Apply

8.0 - 12.0 years

10 - 15 Lacs

navi mumbai

Work from Office

HDB Financial Services Ltd is looking for an experienced Red Team Assessment expert to join our Cyber Security Team. This role is responsible for simulating real-world attacks to test the effectiveness of our security controls, detection capabilities, and incident response processes. The ideal candidate will have a strong background in offensive security, a deep understanding of adversary tactics, and the ability to provide actionable insights to strengthen our overall security posture. Technical Configuration Audit Based Assessment role to strengthen our IT and Cyber Security Posture. The role is responsible for reviewing assessing and auditing systems, network and security configuration to ensure compliance with internal policies, regulatory requirement and industry best practices. This role will play a key role in identifying misconfiguration, recommending corrective measures and ensuing that IT and Cyber Security solution are implemented securely and effectively. KEY RESPONSIBILITIES Red Team Assessment 1. Conduct red team exercises to mimic sophisticated cyberattacks and evaluate the effectiveness of security controls. 2. Develop and execute complex attack scenarios using tactics, techniques, and procedures (TTPs) aligned with real-world threat actors. 3. Perform internal Red Team Assessment across networks, applications, endpoints, and cloud environments. 4. Develop and deploy custom attack tools and payloads (e.g., backdoors, phishing kits, webshells). 5. Use frameworks like MITRE ATT&CK to guide threat simulation strategies. 6. Emulate advanced persistent threat (APTs) using industry-recognized tactics, techniques and procedure (TTPs) 7. Document attack paths, vulnerabilities exploited, and lateral movement techniques, including attack scenarios, vulnerabilities, and recommendations for remediation. 8. Develop custom scripts, tools and methodologies. 9. Hand-on experience with Active Directory attacks, exploitation frameworks and scripting (Python, PowerShell, Bash etc.) 10. Assist SOC team to simulate the SOC Use Case. 11. Assist internal team for Breach Attack Simulation scan and improve overall BAS posture. 12. Identify and exploit vulnerabilities across infrastructure, applications, cloud environment and physical security. 13. Provide detailed reports with remediation strategies and executive summaries. 14. Collaboration with Blue Teams - Work closely with defensive teams to share insights, improve detection capabilities, and strengthen incident response. 15. Track remediation efforts and perform follow-up to confirm closure of reported findings. Configuration Audit Based Assessment 1. Conduct technical configuration audits across servers, database, endpoints, network devices, cloud platforms and cybersecurity solutions. 2. Review system and security settings to ensure alignment with secure configuration standards as per CIS, NIST, ISO & Regulatory requirements. 3. Identify configuration gaps, control weaknesses and recommend remediation steps. 4. Work with IT, Infrastructure and Security Operations teams to validate configuration compliance. 5. Document audit findings, prepare reports and present results to stakeholders in a clear and structured manner. 6. Support risk assessments and internal/external audits by providing configuration compliance evidence. 7. Stay updated evolving security standards, compliance requirements and vendor configuration guidelines. 8. Track remediation efforts and perform follow-up audits to confirm closure of findings. MANDATORY SKILLS REQUIRED 1. Bachelor's degree in Information Security, Computer Science, or a related field (or equivalent experience). 2. MITRE ATT&CK mapping and threat modelling 3. Strong understanding of regulatory frameworks (RBI, ISO 27001). 4. Excellent soft skills: stakeholder communication, presentation, and leadership. 5. Certifications such as OSCP, OSCE, CEH, GPEN are highly preferred 6. Understanding of secure network architecture, segmentation and defence in depth. 7. Designing and implementing security controls across systems, networks and applications. 8. Ability to analyze complex security issues and clearly communicate them to non-technical stakeholders. 9. Strong understanding of offensive security techniques and threat modeling. 10. Proficiency in scripting languages (Python, Bash, PowerShell). 11. Experience with tools like Metasploit, Cobalt Strike, Burp Suite, and Nmap. 12. Familiarity with cloud platforms (AWS, Azure, GCP) and their security configurations. 13. Knowledge of regulatory frameworks and audit standards. 14. Ability to write clear, actionable technical and executive-level reports. 15. Certifications such as OSCP, CRTP, CEH, or CISSP are highly desirable. 16. Familiarity with secure configuration frameworks such as CIS Benchmarks, NIST Framework, ISO 27001 etc. Preferred Traits 1. Analytical mindset with attention to detail. 2. Excellent communication and collaboration skills. 3. Passion for cybersecurity and continuous learning.

Posted 3 weeks ago

Apply

5.0 - 8.0 years

0 Lacs

bengaluru, karnataka, india

Remote

Security Operations (SecOps) Engineer Location: Bangalore Team: Security & Compliance Reports to: Engineering Manager Platform & Security About Josys Josys is on a mission to redefine enterprise IT operations through automation, visibility, and security. As we continue to scale globally, securing our cloud-native infrastructure and application ecosystem is more critical than ever. We are looking for a passionate Security Operations Engineer to join our security team and help strengthen our defenses and practices across the cloud. Job Summary As a Senior SecOps Engineer , you&aposll lead the design and implementation of security controls across cloud infrastructure, CI/CD pipelines, and application layers. Youll act as a subject matter expert in both preventive and detective controls, vulnerability management, and compliance enforcement. We are looking for someone hands-on with a deep understanding of cloud and application security especially across AWS, data privacy, and regulatory frameworks . Key Responsibilities 1. Cloud Security Monitoring & Compliance Configure and optimize AWS-native security tools like Security Hub, GuardDuty, Config, CloudTrail for real-time detection and compliance. Drive Cloud Gap Assessments and security posture reviews across multi-account AWS environments. Ensure alignment with standards like CIS, ISO 27001, SOC 2 , and regulatory requirements including GDPR and data residency controls . 2. Incident Response & Remediation Lead investigation and remediation efforts in partnership with L1 support and SRE teams . Perform root cause analysis , implement fixes, and establish preventive controls. Build runbooks, define escalation processes, and improve incident response automation . 3. Secure DevOps & CI/CD Integration Integrate automated security tools in CI/CD for both infrastructure and applications (e.g., SAST, DAST, IaC scanning). Implement IaC policy enforcement using tools such as tfsec, Checkov, or OPA . Embed security gates and practices early in the software development lifecycle. 4. Penetration Testing & Vulnerability Management Conduct or coordinate regular penetration testing using tools like Burp Suite, OWASP ZAP , or via third-party assessors. Manage end-to-end vulnerability lifecycle , from discovery through remediation. Translate findings into developer-friendly guidance and track fixes to closure. 5. Continuous Improvement & Security Awareness Stay current with cloud security trends, vulnerabilities, and threats . Drive security awareness training and contribute to improving engineering security hygiene. Influence architectural decisions by embedding security principles into project planning. Required Qualifications 58 years of experience in cloud security, application security, or security operations roles. Deep knowledge of AWS security architecture, IAM, networking, and encryption practices . Hands-on experience with security testing tools like Burp Suite, OWASP ZAP , Nmap, and cloud-native monitoring tools. Strong grasp of compliance frameworks including GDPR, SOC 2, ISO 27001 , and data residency considerations . Solid scripting or automation skills (e.g., Python, Bash, Terraform). Must hold at least one relevant certification: AWS Certified Security Specialty CISSP (Certified Information Systems Security Professional) CCSP (Certified Cloud Security Professional) Nice to Have Experience with container security (e.g., EKS, Docker) and runtime protection tools . Familiarity with security operations platforms (e.g., Splunk, ELK, or SIEM tools ). Experience working in fast-paced SaaS or DevOps-centric environments . Why Join Us Work on a global SaaS platform at the cutting edge of IT automation and cloud security. Lead initiatives that shape how modern enterprises manage risk. Join a culture of ownership, innovation, and collaboration. Remote-friendly work culture with high-impact opportunities. Show more Show less

Posted 3 weeks ago

Apply

5.0 - 7.0 years

0 Lacs

mumbai, maharashtra, india

On-site

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion its a place where you can grow, belong and thrive. Your day at NTT DATA The Security Consultant is a seasoned level role, responsible for translating clients cybersecurity requirements and customizing and implementing security solutions into specific systems, applications and product designs. This role identifies and develops the security solutions for clients using company products, outsourced technology solutions and technical tools. This role consults with clients regarding secure product configuration, deployment, and security patches to minimize security vulnerabilities and provides comprehensive scanning, penetration testing, vulnerability assessments, monitoring services and source code analysis and delivers detailed results to clients. This role guides and supports clients in the development and implementation of product security controls. Key responsibilities: Works on strategic projects that ensure the efficient and effective reaction to security breaches to mitigate immediate and potential threats. Uses mitigation, preparedness, response and recovery approaches to minimize business disruptions and commercial consequences. Offers detailed technical support investigation and analysis response activities and evaluate the effectiveness of and improvements to existing practices. Conducts regular threat and vulnerability assessments and determine deviations from acceptable configurations or policies. Participates in the assessment of the level of risk and support the development of appropriate mitigation countermeasures in operational and non-operational situations. Analyzes evidence to support network vulnerability mitigation. Supports peers in the management and implementation of the information security management system. Participates in the implementation of policies, processes and guidelines to ensure the standardization of security management throughout the organization. Applies tactics, techniques, and procedures to a full range of tools and processes related to administrative, criminal, and counterintelligence gathering (e.g., in-depth case analyses, continuous monitoring, malware analysis, clear documentation). Proactively searches through our critical infrastructure, systems and networks to detect and isolate advanced threats that may cause harm to our organization. Use both manual approaches and automated tools to identify, analyze, and report events and support the development of countermeasures to proactively protect against these threats in the future. To thrive in this role, you need to have: Strong understanding of information technology and information security Solid understanding of security risks and preventative controls Excellent understanding of security operational processes and controls Service consulting aptitude, focusing on the business, service and sales aspects Excellent verbal and written communication skills Demonstrate impeccable attention to detail are able to translate internal customer requirements into solutions Maintain up-to-date knowledge of security threats, countermeasures, security tools, and network technologies High level of drive and ability to work under pressure Ability to build and maintain cross-functional relationships with a variety of stakeholders Understanding of relevant laws, regulations, and compliance frameworks affecting the technology sector. Good ability to assess and manage cybersecurity risks at both organizational and project levels. Good knowledge of security frameworks and standards like NIST, ISO/IEC 27001, CIS, etc. Academic qualifications and certifications: Bachelor&aposs degree or equivalent in Information Technology or Computer Science or Engineering or related field. Industry relevant certifications such as CISSP, CISM, CEH, GSEC or CompTIA Security+ essential. Required experience: Seasoned demonstrable experience in the Information Technology Security Industry or relevant experience in similar role within a related environment. Seasoned experience with security architecture design principles. Seasoned experience with industry compliance and standards such as ISO 27000, PCI DSS, NIST, HIPAA or others. Seasoned experience with security tools and techniques to cover SANS Top 25, OWASP or others. Seasoned experience working in a multi-team environment across multiple geographies. Workplace type: Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today. Show more Show less

Posted 3 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

coimbatore, tamil nadu

On-site

At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture, and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. As part of our EY-cyber security team, you shall engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You'll also identify potential business opportunities for EY and GDS within existing engagements and escalate these as appropriate. Similarly, you'll anticipate and identify risks within engagements and share any issues with senior members of the team. We're looking for a Senior Security Analyst / Senior Consultant in the Technology Consulting team to work on various Identity and Access Management projects for our customers across the globe. You'll need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY's commitment to quality, you'll confirm that work is of the highest quality as per EY's quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you'll help to create a positive learning culture, coach and counsel junior team members, and help them to develop. Your key responsibilities include engaging and contributing to Identity & Access Management projects, providing Level 3 and Level 4 support for the system within agreed service levels, working independently, adapting quickly, and maintaining a positive attitude. You must have at least 3-6 years of Active Directory / Azure Active Directory (Entra) experience, experience in maintaining & administering Active Directory, knowledge of Bulk updates using scripts, managing backup/restore of AD database, handling escalated issues and providing RCA, experience in AD server migration, deployment, and DC promotion, knowledge on AD migrations from one domain to another domain, good verbal & written communication, technical document writing, awareness of security standards such as NIST and CIS, knowledge on AD Core Servers handling through command lines, hands-on experience on managing Azure AD connect server synchronization, experience on handling synchronization issues on Azure AD Connect and troubleshoot, preparing Operational Manual, Procedure Documents & Design Documents, understanding concepts of Authentication, Authorization, Provisioning, Identity and Access Management, good knowledge of basic security concepts and certificate management, understanding of Authentication, Authorization, MFA, SSO, Federation, and Directory Services concepts, supporting Single Sign-On (SSO) infrastructure, analyzing issues related to SSO and Multi-Factor Authentication (MFA), strong knowledge about OAuth, OpenID and SAML concepts, proficient in Azure Active Directory B2C & B2B connections, technical knowledge of Active Directory and experience with user and computer account administration, understanding of Active Directory Forest, domain, trust, permissions, access control lists, and related concepts, knowledge and experience of AD concepts like FSMO roles, DNS, DHCP and Group Policies, AD SIEM and log events, AD Sites, GPO, Build it groups, Policies, Directory Sync, hands-on experience on end-to-end Identity and Access Management Tools such as Active Directory, Azure AD Operations, flexibility to work on new technology on IAM domain, experience in a techno-functional role of Identity and Access Management Implementation, worked in a client-facing role, good understanding of Identity Access Management solutions, hands-on experience or good knowledge on Active directory domain migrations, thorough in their respective tool with hands-on experience involving configuration, implementation & customization, prior experience working in remote teams on a global scale, ability to implement and manage the effectiveness of Incident, Service Request, Change, and Problem management processes for the service area, ability to perform Root Cause Analysis and suggest solutions to avoid errors, resolve technical issues through debugging, research, and investigation, strong communication skills, both verbal and written, perform systems analysis and tuning to ensure optimal infrastructure response. Skills and attributes for success include hands-on experience on end-to-end implementation of Identity and Access Management tool, strong communication, presentation, and team building skills and experience in producing high-quality reports, papers, and presentations, ability to communicate detailed technical information to a non-technical audience clearly, hands-on experience on tools like PKI, MFA, ADFS, Entra, QMM. Work Requirements: - Willingness to travel as required - Willingness to be an on-call support engineer and work occasional overtime as required - Willingness to work in shifts as required To qualify for the role, you must have a Bachelor's or Master's degree in a related field or equivalent work experience, 3-6 years of experience implementing IAM projects (Active Directory and Azure AD) and migration, strong command of verbal and written English language, strong interpersonal and presentation skills. What working at EY offers: - Inspiring and meaningful projects - Education and coaching alongside practical experience - Personal development control with an individual progression plan - Growth into a responsible role with challenging assignments - Interdisciplinary environment emphasizing high quality and knowledge exchange - Support, coaching, and feedback from engaging colleagues - Opportunities to develop new skills and progress your career - Freedom and flexibility to handle your role in a way that's right for you EY exists to build a better working world, helping to create long-term value for clients, people, and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform, and operate. Working across assurance, consulting, law, strategy, tax, and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

coimbatore, tamil nadu

On-site

At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture, and technology to become the best version of you. We're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself and a better working world for all. As part of our EY-cyber security team, you will engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You'll also identify potential business opportunities for EY and GDS within existing engagements and escalate these as appropriate. Similarly, you'll anticipate and identify risks within engagements and share any issues with senior members of the team. We're looking for Senior Security Analyst / Senior Consultant in the Technology Consulting team to work on various Identity and Access Management projects for our customers across the globe. You will need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY's commitment to quality, you'll confirm that work is of the highest quality as per EY's quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you'll help to create a positive learning culture, coach and counsel junior team members, and help them to develop. **Your key responsibilities:** - Engage and contribute to the Identity & Access Management projects - Provide Level 3 and Level 4 support for the system within agreed service levels. - Ability to work independently, adapt quickly, and maintain a positive attitude. - At least 3-6 years of Active Directory / Azure Active Directory (Entra) experience - Have experience in maintaining & administering Active Directory - Knowledge of Bulk updates using scripts - Managing backup/restore of AD database. - Must have good experience in handling escalated issue and providing RCA. - Experienced in AD server migration, deployment, and DC promotion. - Knowledge on AD migrations from one domain to another domain will be an added advantage. - Good verbal & written communication, technical document writing - Awareness of security standards such as NIST and CIS - Must have knowledge on AD Core Servers handling through command lines. - Must have hands-on experience on managing Azure AD connect server synchronization. - Experience on handling synchronization issues on Azure AD Connect and troubleshoot. - Preparing Operational Manual, Procedure Documents & Design Documents - Understands concepts of Authentication, Authorization, Provisioning, Identity and Access Management - Good knowledge of basic security concepts and certificate management - Understanding of Authentication, Authorization, MFA, SSO, Federation, and Directory Services concepts - Supporting Single Sign-On (SSO) infrastructure, analyzing issues related to SSO and Multi-Factor Authentication (MFA) - Strong knowledge about OAuth, OpenID and SAML concepts, Proficient in Azure Active Directory B2C & B2B connections - Technical knowledge of Active Directory and experience with user and computer account administration - Understanding of Active Directory Forest, domain, trust, permissions, access control lists and related concepts - Knowledge and experience of AD concepts like FSMO roles, DNS, DHCP and Group Policies, AD SIEM and log events, AD Sites, GPO, Build it groups, Policies, Directory Sync - Hands-on experience on end-to-end Identity and Access Management Tools such as Active Directory, Azure AD Operations. - Should be flexible to work on new technology on IAM domain. - Worked in the capacity of a techno-functional role of Identity and Access Management Implementation - Worked in a client-facing role. - Good understanding of Identity Access Management solutions - Hands-on experience or good knowledge of Active directory domain migrations will be an added advantage. - Need to be thorough in their respective tool with hands-on experience involving configuration, implementation & customization. - Prior experience working in remote teams on a global scale. - Implement and manage the effectiveness of Incident, Service Request, Change and Problem management processes for the service area. - Ability to perform Root Cause Analysis and suggest solutions to avoid errors. - Resolve technical issues through debugging, research, and investigation. - Strong communication skills, both verbal and written - Perform systems analysis and tuning to ensure optimal infrastructure response. **Skills and attributes for success:** - Hands-on experience on end-to-end implementation of Identity and Access Management tool. - Strong communication, presentation, and team building skills and experience in producing high-quality reports, papers, and presentations. - Ability to communicate detailed technical information to a non-technical audience clearly. - Hands-on experience on tools like PKI, MFA, ADFS, Entra, QMM. **Work Requirements:** - Willingness to travel as required - Willingness to be on call support engineer and work occasional overtime as required - Willingness to work in shifts as required **To qualify for the role, you must have:** - Bachelor or master's degree in a related field or equivalent work experience - 3-6 years of experience implementing IAM projects (Active Directory and Azure AD) and migration. - Strong command of verbal and written English language. - Strong interpersonal and presentation skills. **What working at EY offers:** At EY, we're dedicated to helping our clients, from startups to Fortune 500 companies, and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: - Support, coaching, and feedback from some of the most engaging colleagues around - Opportunities to develop new skills and progress your career - The freedom and flexibility to handle your role in a way that's right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people, and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform, and operate. Working across assurance, consulting, law, strategy, tax, and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.,

Posted 1 month ago

Apply

5.0 - 7.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Key Responsibilities : Cyber Security KPI Monitoring: Develop & maintain the detailed plan (including Work plan / Work Breakdown Structure) for all activities which are part of the engagement. Create and maintain the communication plan with AMNSI internal and external stakeholders for all activities which are part of the program to meet the defined timelines. Identify the security KPIs for Data Leakage Prevention, Intune, Awareness trainings, Information and Operational Technology, BCP and DR strategies etc. and monitor as per the set objectives in place. Assess the effectiveness of the controls and processes defined. Recommending any Improvement suggestion in cybersecurity process (Emergency Incident response, BCP, DR drills and simulation) Schedule weekly, monthly governance meeting with AMNSI management to update on the status and future plans for improvement. Coordinate with internal and external stakeholders Maintain the evidence and documentations for audits for future reference. All Individual KPI target for improvement to 95% which are beyond the target level. (Ex. user awareness training, vulnerabilities, cloud security framework, IT/OT baseline review and suggestions). Audit Management: Develop recommendations to improve business processes, controls, efficiencies, and effectiveness to ensure AMNS is in line with applicable regulations and standards. Internal and external audits compliance process designs, procedure for conducting security audit programs, risk register and audit results templates. Processes for internal and external communication relevant to security audit programs. Responsible for defining the scope of audit, preparing audit calendar, informing relevant stakeholders on audit schedule, providing support during audit, documenting results, report findings to Sun Pharmas stakeholders for review and develop an action plan for improvement areas with any gaps in compliance. Lead the closure of all cybersecurity-related audit findings from both internal and external audits. Collaborate with various departments (IT, Legal, HR, Admin etc.) to gather necessary evidence, implement corrective actions, and track progress until findings are closed. Provide detailed root cause analysis for all audit findings and ensure remediation plans are aligned with industry standards. Risk Mitigation: Develop and implement remediation plans to address identified risks and vulnerabilities. Ensure all corrective actions are documented and comply with regulatory and policy requirements. Continuously evaluate and improve the effectiveness of risk management, controls, and governance processes. Compliance & Standards Adherence: Ensure the organization meets or exceeds compliance requirements (e.g., ISO 27001, NCIIPC, etc.) by addressing cybersecurity risks identified during audits. Keep up to date with changes in regulatory requirements and cybersecurity best practices. Collaboration and Communication : Work closely with IT, compliance, legal, and operational teams to ensure audit findings are understood, prioritized, and addressed within defined timelines. Report progress and potential roadblocks to senior management and stakeholders. Continuous Improvement: Identify and recommend opportunities for process improvement in cybersecurity audits and the closure of findings. Support in developing and updating cybersecurity policies, procedures, and controls to prevent future non-compliance. Documentation & Reporting: Prepare and maintain documentation related to audit findings, including remediation activities, timelines, and final resolution. Provide detailed audit reports and closure status updates to senior management and relevant stakeholders as required. Required Skills & Qualifications: Experience: Minimum of 5+ years in cybersecurity, IT audit, or related roles with a focus on managing audit findings and compliance. Technical Knowledge: Strong understanding of cybersecurity frameworks such as ISO 27001, NIST, CIS, COBIT, etc. Familiarity with cybersecurity tools (SIEM, vulnerability scanners, firewalls, IDS/IPS). Deep knowledge of risk management, incident response, and security monitoring. Audit and Compliance Knowledge: Experience with audits (internal/external) and audit closure, specifically in IT environments. Proven experience with compliance such as NCIIPC, IT Act 2000/2008, DPDPA. Soft Skills: Strong problem-solving skills and the ability to implement solutions in complex environments. Excellent communication and interpersonal skills to work across departments and with senior management. Attention to detail and a methodical approach to handling multiple audit findings simultaneously. Certifications (Preferred): Certified Information Systems Auditor (CISA) ISO 27001 Lead Auditor / Implementer Any other relevant cybersecurity certifications. Show more Show less

Posted 1 month ago

Apply

0.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the worlds largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazines Top Company Cultures list and ranked among the Worlds Most Innovative Companies by Fast Company. We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time at Cloudflare. Come join us! Available Locations: Bengaluru About The Role As an Security Architect you will play a key role in effectively designing secure network architectures, defensible builds & configurations, security platforms and automation, assisting in secure tool and product development, and will help establish security standards and guidelines across the enterprise. This role will focus on designing robust public key infrastructure and secrets management solutions to support Cloudflares secure authentication processes and encryption solutions for both our internal and client facing systems, users and applications. This role will also include collaborating with cross-functional teams including software engineering, cybersecurity, product management, etc. to integrate key management solutions into the Cloudflare environments. We are looking for a candidate that is passionate about cryptography and security. We are seeking Security Architects or Engineers proficient in strategy, design, and implementation of public key infrastructure and secrets management solutions to help make a better internet. What Youll Do Define security requirements for and design efficient public key infrastructure and secrets management solutions in complex environments. Take the lead security role in developing or enhancing existing enterprise-wide architectures, including Hardware Security Modules (HSMs), Certificate Authorities (CAs), Certificate Lifecycle Management (CLM), Key Vaults (KV), and similar technologies. Create and drive the secrets management capability roadmap with enterprise stakeholders. Lead projects to implement secure enterprise systems and identify issues that could compromise data integrity or security. Serve as the subject matter expert (SME) for PKI and secrets management across the enterprise. Develop security policies, procedures, and guidelines and recommend necessary changes to a given project team to ensure the companys systems are fully compliant with all applicable regulatory requirements and privacy laws. Identify access management gaps and partners with application development teams for remediation. Design processes and workflows for rotation and revocation of secrets. Identify automation opportunities for lifecycle management of secrets. Utilize open communication and managerial courage to ensure the standards, expectations and goals of the organization are respected and upheld. Lead security-related public key infrastructure and secrets management projects from inception to successful completion. Effectively coach technology staff on appropriate security protocols and requirements as they implement new technology into the organization. Work on complex issues where analysis of situations or data requires an in-depth evaluation of variable factors. In conjunction with engineering and operations, improve and develop sustainable processes. Leverage wide-ranging experiences, professional concepts, and company objectives to resolve complex issues in creative and effective ways. Exercise judgment in selecting methods, techniques and evaluation criteria for obtaining results. Ensure security technology strategies are aligned with companies' business goals. Examples Of Desirable Skills, Knowledge And Experience. Extensive years of experience in an IT or Security related field heavily focused on secrets management and PKI. In-depth understanding of security concepts. Demonstrable expertise in cryptography, certificate management, and networking protocols. Hands-on experience with PKI technologies and standards such as X.509, OCSP, and CRL. Scripting / coding skills, in various languages, for automation. Knowledge of IT and Cybersecurity frameworks, such as NIST, FIPS, CSF, CIS, ISO 27001/2. Working knowledge of Cloud provider security architecture design patterns, and key control methods - Bring your own key, Hold your own key, partitioned HSMs. Experience with OWASP Web/API vulnerabilities and compensating controls (CSRF, XSS, SQLI, etc.) Understand how business, engineering, IT, and security processes align, and how to research, test, and implement solutions to complex objectives. Hands on experience in Information Security, specifically in PKI/Cryptography (on-premise and cloud) and secrets management. Experience in building Certificate Policy (CP) and Certificate Practice Statements (CPS) Experience with vendors such as Venafi, Hashicorp, Microsoft, Thales, etc. In-depth knowledge of Certificate Lifecycle Management, PKI Strategy and Design, and PKI Implementation. Experience producing and reviewing Technical Documentation What Makes Cloudflare Special Were not just a highly ambitious, large-scale technology company. Were a highly ambitious, large-scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo : Since 2014, we&aposve equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflares enterprise customers--at no cost. Athenian Project : In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we&aposve provided services to more than 425 local government election websites in 33 states. 1.1.1.1 : We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy-centric public DNS resolver. This is available publicly for everyone to use - it is the first consumer-focused service Cloudflare has ever released. Heres the deal - we dont store client IP addresses never, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Sound like something youd like to be a part of Wed love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their, or any other person&aposs, perceived or actual race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status, or any other basis protected by law. We are an AA/Veterans/Disabled Employer. Cloudflare provides reasonable accommodations to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job. Examples of reasonable accommodations include, but are not limited to, changing the application process, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. If you require a reasonable accommodation to apply for a job, please contact us via e-mail at [HIDDEN TEXT] or via mail at 101 Townsend St. San Francisco, CA 94107. Show more Show less

Posted 1 month ago

Apply

7.0 - 11.0 years

0 Lacs

pune, maharashtra

On-site

Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you'd like, supported and inspired by a collaborative community of colleagues around the world, and able to reimagine what's possible. Join us and help the world's leading organizations unlock the value of technology and build a more sustainable, more inclusive world. Assess organizational security posture and conduct risk analysis for IT projects and operations. Perform security reviews to identify architectural and policy gaps, and recommend corrective actions. Ensure compliance with security principles across applications, networks, and systems. Develop and test security baselines, build audit environments, and prepare compliance reports. Drive continuous security improvements and guide teams in remediating control gaps. 69 years of experience in network/system security, threat analysis, and risk mitigation. Strong knowledge of security architecture, principles, and compliance frameworks like ISO 27001, PCI-DSS. Proficient in vulnerability assessments, system hardening, and tools such as Qualys, Algosec, or Rapid7. Experienced in reviewing application/system configurations and aligning with OWASP, CIS, and NIST standards. Excellent communication and presentation skills, with a proven ability to engage executive stakeholders. Work on enterprise-scale security architecture, risk mitigation, and compliance using modern tools and frameworks. Collaborate with global teams to assess vulnerabilities, implement hardening guidelines, and ensure secure system/application configurations. Clear career progression paths from engineering roles to architecture and consulting. Be part of mission-critical projects that ensure security, compliance, and operational efficiency for Fortune 500 clients. Capgemini is a global business and technology transformation partner, helping organizations to accelerate their dual transition to a digital and sustainable world, while creating tangible impact for enterprises and society. It is a responsible and diverse group of 340,000 team members in more than 50 countries. With its strong over 55-year heritage, Capgemini is trusted by its clients to unlock the value of technology to address the entire breadth of their business needs. It delivers end-to-end services and solutions leveraging strengths from strategy and design to engineering, all fueled by its market-leading capabilities in AI, generative AI, cloud and data, combined with its deep industry expertise and partner ecosystem.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

coimbatore, tamil nadu

On-site

At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture, and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. As part of our EY-cyber security team, you shall engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You'll also identify potential business opportunities for EY and GDS within existing engagements and escalate these as appropriate. Similarly, you'll anticipate and identify risks within engagements and share any issues with senior members of the team. We're looking for a Senior Security Analyst / Senior Consultant in the Technology Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, you shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY's commitment to quality, you'll confirm that work is of the highest quality as per EY's quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you'll help to create a positive learning culture, coach and counsel junior team members, and help them to develop. **Your key responsibilities** - Engage and contribute to the Identity & Access Management projects - Provide Level 3 and Level 4 support for the system within agreed service levels - Ability to work independently, adapt quickly, and maintain a positive attitude - At least 3-6 years of Active Directory / Azure Active Directory (Entra) experience - Have experience in maintaining & administering Active Directory - Knowledge of Bulk updates using scripts - Managing backup/restore of AD database - Must have good experience in handling escalated issue and providing RCA - Experienced in AD server migration, deployment, and DC promotion - Knowledge on AD migrations from one domain to another domain will be an added advantage - Good verbal & written communication, technical document writing - Awareness of security standards such as NIST and CIS - Must have knowledge on AD Core Servers handling through command lines - Must have hands-on experience on managing Azure AD connect server synchronization - Experience on handling synchronization issues on Azure AD Connect and troubleshoot - Preparing Operational Manual, Procedure Documents & Design Documents - Understands concepts of Authentication, Authorization, Provisioning, Identity and Access Management - Good knowledge of basic security concepts and certificate management - Understanding of Authentication, Authorization, MFA, SSO, Federation, and Directory Services concepts - Supporting Single Sign-On (SSO) infrastructure, analyzing issue related to SSO and Multi-Factor Authentication (MFA) - Strong knowledge about OAuth, OpenID, and SAML concepts, Proficient in Azure Active Directory B2C & B2B connections - Technical knowledge of Active Directory and experience with user and computer account administration - Understanding of Active Directory Forest, domain, trust, permissions, access control lists and related concepts - Knowledge and experience of AD concepts like FSMO roles, DNS, DHCP, and Group Policies, AD SIEM and log events, AD Sites, GPO, Build it groups, Policies, Directory Sync - Hands-on experience on end-to-end Identity and Access Management Tools such as Active Directory, Azure AD Operations - Should be flexible to work on new technology on IAM domain - Worked in the capacity of techno-functional role of Identity and Access Management Implementation - Worked in a client-facing role - Good understanding of Identity Access Management solutions - Hands-on experience or good knowledge on Active directory domain migrations will be an added advantage - Need to be thorough in their respective tool with hands-on experience involving configuration, implementation & customization - Prior experience working in remote teams on a global scale - Implement and manage the effectiveness of Incident, Service Request, Change, and Problem management processes for the service area - Ability to perform Root Cause Analysis and suggest solutions to avoid errors - Resolve technical issues through debugging, research, and investigation - Strong communication skills, both verbal and written - Perform systems analysis and tuning to ensure optimal infrastructure response **Skills and attributes for Success** - Hands-on experience on end-to-end implementation of Identity and Access Management tool - Strong communication, presentation, and team building skills and experience in producing high-quality reports, papers, and presentations - Ability to communicate detailed technical information to a non-technical audience clearly - Hands-on experience on tools like PKI, MFA, ADFS, Entra, QMM **Work Requirements** - Willingness to travel as required - Willingness to be on-call support engineer and work occasional overtime as required - Willingness to work in shifts as required **To qualify for the role, you must have** - Bachelor or master's degree in a related field or equivalent work experience - 3-6 years of experience implementing IAM projects (Active Directory and Azure AD) and migration - Strong command of verbal and written English language - Strong interpersonal and presentation skills **What working at EY offers** At EY, we're dedicated to helping our clients, from startups to Fortune 500 companies, and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: - Support, coaching, and feedback from some of the most engaging colleagues around - Opportunities to develop new skills and progress your career - The freedom and flexibility to handle your role in a way that's right for you EY exists to build a better working world, helping to create long-term value for clients, people, and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform, and operate. Working across assurance, consulting, law, strategy, tax, and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.,

Posted 1 month ago

Apply

8.0 - 12.0 years

0 Lacs

karnataka

On-site

You are hiring a Manager for GCP Migration & Infrastructure based in Bangalore within the Cloud Engineering Consulting Practice department. The ideal candidate should have 9-12 years of experience and will be responsible for leading large-scale cloud migration and infrastructure transformation projects on Google Cloud Platform (GCP), with expertise in GKE, GCVE, VMware to GCVE migrations, and landing zone architecture. This client-facing role involves hands-on delivery, technical leadership, and cross-functional collaboration. Your key responsibilities will include leading VMware to GCVE migration initiatives with minimal disruption, designing secure and scalable GCP landing zones, deploying and managing GKE clusters for containerized apps, and architecting secure VPCs, firewalls, and hybrid connectivity. You will also be responsible for implementing IAM, RBAC, and data protection frameworks, ensuring regulatory compliance, and collaborating with cloud, security, and client teams to align on strategy. As a Manager, you will guide engineering teams through deployment and migration phases, develop detailed technical documentation and runbooks, and provide support for presales activities including solution design, effort estimation, and proposals. You will also participate in client workshops to gather requirements and pitch solutions. To qualify for this role, you should have 8-10 years of IT experience, with at least 3-5 years focused on GCP cloud migration. Strong experience in GCVE, GKE, VMware migrations, and landing zone design is required, along with a deep understanding of GCP networking, IAM, firewalls, and security best practices. GCP certifications such as Professional Cloud Architect, Security Engineer, or Network Engineer are preferred.,

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

hyderabad, telangana

On-site

At Broadridge, we have created a culture that aims to empower individuals to achieve more. If you are enthusiastic about advancing your career while supporting others in their journey, we invite you to become a part of the Broadridge team. Your role involves providing expert guidance for the implementation and advancement of secure cloud and container architectures, controls, and best practices across various cloud services such as IaaS, PaaS, SaaS, and hybrid configurations. You will collaborate closely with developers, system administrators, and IT management to drive proactive solutions. Additionally, you will be responsible for identifying, suggesting, and assessing new technology options to enhance process efficiency, automation, security, visibility, developer support, and operational streamlining in cloud and container environments. Furthermore, you will contribute to the enhancement of continuous monitoring solutions to verify systems against security standards and address policy breaches. Analyzing the latest attacker tactics and implementing strategies to mitigate associated risks is also a key aspect of your role. You will provide insights into the design and implementation of automated security solutions and work closely with product and development teams to ensure alignment with company directives and objectives. In terms of technical skills, you should have demonstrated expertise in cloud-native architectures, microservices, and operational best practices related to cloud and container orchestration. Experience in integrating enterprise-scale security solutions in AWS and/or Azure, including user, security, and networking configurations, is essential. Proficiency in full-stack cloud automation using tools like Git, Terraform, Ansible, and Jenkins is required. Previous programming experience is necessary, with a preference for familiarity with Python. A Bachelor's degree or higher in Computer Science, Engineering, or a related field, or equivalent certifications and practical experience, is expected. You should have at least 5 years of experience in network, application, or infrastructure security. A solid understanding of IT Risk Management, Security Policies and Procedures, Internal Audit, and Compliance Standards is vital, along with familiarity with SOC, FFIEC, CSA, and FedRAMP. Experience in aligning security programs with benchmarks and standards such as NIST, CIS, FIPS, PCI DSS, HIPAA, and FIPS 140-2 is advantageous. Regarding soft skills, excellent communication skills in both oral and written English are crucial. You should be able to articulate complex ideas effectively to ensure clear direction and outcomes. Adaptability to changing technology landscapes and requirements is also a key attribute for this role.,

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

chennai, tamil nadu

On-site

We are searching for a proficient Information Security Auditor to become a part of our team. In this position, you will play a key role in safeguarding our organization's data and IT systems against cyber threats and ensuring compliance with industry standards. To qualify for this role, you should hold a Bachelor's or Master's degree in Computer Science, Information Technology, or Cybersecurity. In addition, you must have a minimum of two years of experience in IT Security or IT Audit. It is essential to possess knowledge of software development processes and hold at least one IT Security certification, such as CISA, CISSP, or a similar technical certification. You should have a deep understanding of industry security frameworks like NIST and CIS, along with a grasp of inherent and control risks. Proficiency in ISO 27001/2 standards is crucial. Moreover, you should have proven experience in implementing or testing IT General Controls and possess excellent verbal and written communication skills to effectively interact with leaders at all levels. The capability to work autonomously in a dynamic environment is also required. Desirable qualifications include diverse IT experience in areas like programming, systems analysis, and security administration. Strong project management skills and the ability to manage multiple tasks simultaneously are also beneficial. Join our team and play a vital role in protecting our information systems while gaining exposure to cutting-edge technologies and business processes. Your responsibilities will include gaining a comprehensive understanding of the organization's business objectives, processes, goals, and strategies to analyze and interpret IT risks and technology challenges effectively. You will be responsible for examining and assessing technology and business risks through IT audits, defining audit plans, scope, and procedures, and preparing detailed audit reports. Stay updated on industry trends relevant to our environment, including those in automotive, finance, mobility, technology, cybersecurity, and auditing. Contribute to the development of a risk-based IT audit plan and evaluate areas of risk that require IT audit procedures. Execute these audit procedures based on their risk and impact on the business, covering various applications, technologies, and business processes. Collaborate with internal and external partners and oversee the completion of planned actions. Support departmental transformation initiatives by testing new processes and creating audit responses. Proactively identify business initiatives and changes in the business environment and assess their impact on both the business and control environment. Collaborate with global business auditors on combined business and IT audits. Maintain regular communication with the Internal Controls, Office of General Counsel (OGC), and Enterprise Cybersecurity & Policy teams. This role may involve travel as needed.,

Posted 1 month ago

Apply

3.0 - 8.0 years

0 - 1 Lacs

Bengaluru

Work from Office

Lead Analyst- Emerging Markets Strategy: Elevate Your Impact Through Innovation and Learning Evalueserve is a global leader in delivering innovative and sustainable solutions to a diverse range of clients, including over 30% of Fortune 500 companies. With a presence in more than 45 countries across five continents, we excel in leveraging state-of-the-art technology, artificial intelligence, and unparalleled subject matter expertise to elevate our clients' business impact and strategic decision-making. Our team of over 4, 500 talented professionals operates in countries such as India, China, Chile, Romania, the US, and Canada. Our global network also extends to emerging markets like Colombia, the Middle East, and the rest of Asia-Pacific. Recognized by Great Place to Work in India, Chile, Romania, the US, and the UK in 2022, we offer a dynamic, growth-oriented, and meritocracy-based culture that prioritizes continuous learning and skill development, work-life balance, and equal opportunity for all. Curious to know what its like to work at Evalueserve? Read on. About Investment Research (IR) As a global leader in knowledge processes, research, and analytics, youll be working with a team that specializes in global market research, working with the top-rated investment research organizations, bulge bracket investment banks, and leading asset managers. We cater to 8 of the top 10 global banks, working alongside their product and sector teams, supporting them on deal origination, execution, valuation, and transaction advisory-related projects. What you will be doing at Evalueserve Work directlywith the head of the team, who has been consistently ranked as the top analystin CEEMEA strategy by several top-tier investment banks. Handle research, strategy, and analytics for all EM fixed income-related products offered by theresearch platform of the banking client. Conduct macroeconomicand market research across emerging markets. Develop andmaintain financial models and analytical frameworks for EM fixed incomeproducts. Analyze largedatasets to identify market trends and investment opportunities. Support theteam in producing high-quality research reports and market commentary. Collaboratewith trading, sales, and risk teams to align strategy insights with businessneeds. Utilize toolssuch as Bloomberg, Macrobond, and Haver, and IMF databases for data extractionand analysis. What were looking for: Advanceddegree in economics /statistics /engineering with minimum relevant experienceof 3 years. Progress towards CFA / FRM is preferable. Priorexperience of macro research, financial modeling, structuring, trading, ormarket risk management Keen interestin global financial markets and knowledge of recent developments. Strongquantitative and mathematical skills with experience of working with largeamounts of data. AdvancedExcel, VBA analytical skills, and knowledge of basic econometrics is a must.Working knowledge of Python or R will be considered a plus. Excellentwritten and verbal communication skills ability to write research reports andcomment on market developments. Knowledge ofdatabase tools Bloomberg, Macrobond, Haver, World Bank, IMF, etc. Follow us on https://www.linkedin.com/compan y/evalueserve/ Click here to learn more about what our Leaders talking on achievements AI-powered supply chain optimization solution built on Google Cloud. How Evalueserve is now Leveraging NVIDIA NIM to enhance our AI and digital transformation solutions and to accelerate AI Capabilities . Know more about how Evalueserve has climbed 16 places on the 50 Best Firms for Data Scientists in 2024! Want to learn more about our culture and what its like to work with us? Write to us at: careers@evalueserve.com Disclaimer: The following job description serves as an informative reference for the tasks you may be required to perform. However, it does not constitute an integral component of your employment agreement and is subject to periodic modifications to align with evolving circumstances. Please Note: We appreciate the accuracy and authenticity of the information you provide, as it plays a key role in your candidacy. As part of the Background Verification Process, we verify your employment, education, and personal details. Please ensure all information is factual and submitted on time. For any assistance, your TA SPOC is available to support you.

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

coimbatore, tamil nadu

On-site

At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture, and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself and a better working world for all. As part of our EY-cyber security team, you shall engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You'll also identify potential business opportunities for EY and GDS within existing engagements and escalate these as appropriate. Similarly, you'll anticipate and identify risks within engagements and share any issues with senior members of the team. We're looking for Senior Security Analyst / Senior Consultant in the Technology Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY's commitment to quality, you'll confirm that work is of the highest quality as per EY's quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you'll help to create a positive learning culture, coach and counsel junior team members, and help them to develop. **Your key responsibilities:** - Engage and contribute to the Identity & Access Management projects. - Provide Level 3 and Level 4 support for the system within agreed service levels. - Ability to work independently, adapt quickly, and maintain a positive attitude. - At least 3-6 years of Active Directory / Azure Active Directory (Entra) experience. - Have experience in maintaining & administering Active Directory. - Knowledge of Bulk updates using scripts. - Managing backup/restore of AD database. - Must have good experience in handling escalated issues and providing RCA. - Experienced in AD server migration, deployment, and DC promotion. - Knowledge of AD migrations from one domain to another domain will be an added advantage. - Good verbal & written communication, technical document writing. - Awareness of security standards such as NIST and CIS. - Must have knowledge of AD Core Servers handling through command lines. - Must have hands-on experience in managing Azure AD connect server synchronization. - Experience in handling synchronization issues on Azure AD Connect and troubleshoot. - Preparing Operational Manual, Procedure Documents & Design Documents. - Understands concepts of Authentication, Authorization, Provisioning, Identity, and Access Management. - Good knowledge of basic security concepts and certificate management. - Understanding of Authentication, Authorization, MFA, SSO, Federation, and Directory Services concepts. - Supporting Single Sign-On (SSO) infrastructure, analyzing issues related to SSO and Multi-Factor Authentication (MFA). - Strong knowledge about OAuth, OpenID, and SAML concepts. Proficient in Azure Active Directory B2C & B2B connections. - Technical knowledge of Active Directory and experience with user and computer account administration. - Understanding of Active Directory Forest, domain, trust, permissions, access control lists, and related concepts. - Knowledge and experience of AD concepts like FSMO roles, DNS, DHCP, and Group Policies, AD SIEM and log events, AD Sites, GPO, Build it groups, Policies, Directory Sync. - Hands-on experience on end-to-end Identity and Access Management Tools such as Active Directory, Azure AD Operations. - Should be flexible to work on new technology on IAM domain. - Worked in the capacity of a techno-functional role of Identity and Access Management Implementation. - Worked in a client-facing role. - Good understanding of Identity Access Management solutions. - Hands-on experience or good knowledge of Active directory domain migrations will be an added advantage. - Need to be thorough in their respective tools with hands-on experience involving configuration, implementation & customization. - Prior experience working in remote teams on a global scale. - Implement and manage the effectiveness of Incident, Service Request, Change, and Problem management processes for the service area. - Ability to perform Root Cause Analysis and suggest solutions to avoid errors. - Resolve technical issues through debugging, research, and investigation. - Strong communication skills, both verbal and written. - Perform systems analysis and tuning to ensure optimal infrastructure response. **Skills and attributes for success:** - Hands-on experience on end-to-end implementation of Identity and Access Management tools. - Strong communication, presentation, and team-building skills and experience in producing high-quality reports, papers, and presentations. - Ability to communicate detailed technical information to a non-technical audience clearly. - Hands-on experience on tools like PKI, MFA, ADFS, Entra, QMM. **Work Requirements:** - Willingness to travel as required. - Willingness to be an on-call support engineer and work occasional overtime as required. - Willingness to work in shifts as required. **To qualify for the role, you must have:** - Bachelor or master's degree in a related field or equivalent work experience. - 3-6 years of experience implementing IAM projects (Active Directory and Azure AD) and migration. - Strong command of verbal and written English language. - Strong interpersonal and presentation skills. **What working at EY offers:** At EY, we're dedicated to helping our clients, from startups to Fortune 500 companies, and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: - Support, coaching, and feedback from some of the most engaging colleagues around. - Opportunities to develop new skills and progress your career. - The freedom and flexibility to handle your role in a way that's right for you. EY | Building a better working world: EY exists to build a better working world, helping to create long-term value for clients, people, and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform, and operate. Working across assurance, consulting, law, strategy, tax, and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.,

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

Genpact is a global professional services and solutions firm committed to delivering outcomes that shape the future. With over 125,000 employees in more than 30 countries, we are driven by curiosity, agility, and the desire to create lasting value for our clients. Our purpose, the relentless pursuit of a world that works better for people, guides us as we serve and transform leading enterprises, including the Fortune Global 500, leveraging our deep business and industry knowledge, digital operations services, and expertise in data, technology, and AI. We are currently seeking a talented individual to join us as a Senior Manager, Infosec Metrics Program. In this role, you will be responsible for leading our Information Security (InfoSec) Program Metrics team to design, develop, and maintain interactive dashboards displaying key performance indicators and metrics for our InfoSec program. Your main responsibilities will include collaborating with cybersecurity analysts, engineers, and managers to understand their data needs, integrating data from multiple sources, performing data analysis and validation, and designing interactive dashboards using tools like Power BI, Tableau, SQL, and Python. You will also be responsible for optimizing dashboard performance, providing technical support, documenting the development process, and supporting initiatives to improve security maturity. To be successful in this role, you should have a Bachelor's degree in computer science, information systems, cybersecurity, or a related field, or equivalent work experience. You should also have relevant years of information security experience, strong technical background, and experience in developing dashboards and reports using tools like Power BI, Tableau, Python, or similar. Additionally, you should have functional knowledge of cybersecurity concepts, frameworks, standards, and best practices, strong analytical and problems-solving skills, attention to detail, and excellent communication and collaboration skills. If you are passionate about information security, data analytics, and driving security maturity, we invite you to apply for this exciting opportunity with Genpact.,

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

You should have formal training or certification on the ServiceNow platform concepts and possess proficient applied experience. Demonstrated expertise in at least two ServiceNow Modules such as ITSM, ITOM, SecOps, GRC, etc., is required. It is essential to have knowledge of the automation/orchestration functionalities of ServiceNow. Strong analysis, problem-solving, and decision-making skills are necessary to debug issues and find proactive monitoring solutions for ensuring platform stability. Additionally, you should have the ability to mentor junior developers, fostering a collaborative and innovative team environment. Strong communication skills are also crucial to clarify requirements with stakeholders and work collaboratively with the team. The ideal candidate should have 5-9 years of experience and hold a qualification of BE in Computer Science, MCA, or MSc in Computer Science. In terms of technical skills, you must have experience in ServiceNow development and implementation on ITSM, ITOM, SecOps, or GRC modules. Proficiency in working with Business Rules, Client Scripts, UI Policies, UI Scripts, UI Actions, UI Pages, Script Includes, and Access Control Lists is required. Experience in the creation and customization of complex workflows and custom workflow activities is necessary. Hands-on experience in Glide and Jelly Scripting, Java Script, HTML, XML, AJAX, JSON, and CSS is essential. Additionally, experience in Webservices, SOAP, email, and other integrations is expected. Knowledge of Performance Analytics, email notifications, inbound actions, reports, gauges, and home pages is crucial. Familiarity with AngularJS, Bootstrap, and service mapping would be an added advantage. Expertise in API integrations with other systems, flow designer, instance upgrade, and execution of test plans is required. You should also be able to create test cases, test data, and contribute to the software development life cycle methodology. Resolving technical issues of projects, exploring alternate designs, fostering teamwork, collaborating with stakeholders, and ensuring client satisfaction are key responsibilities. The certifications needed for this role include CSA and CIS (ITSM)/CAD, as well as ITIL V4 certification. About Mphasis: Mphasis applies next-generation technology to help enterprises transform businesses globally. Customer centricity is foundational to Mphasis and is reflected in the Mphasis Front2Back Transformation approach. Front2Back leverages the power of cloud and cognitive technologies to provide hyper-personalized digital experiences to clients and their end customers. The Mphasis Service Transformation approach helps shrink the core through the application of digital technologies across legacy environments within an enterprise, enabling businesses to stay ahead in a changing world. Mphasis's core reference architectures, tools, speed, innovation, domain expertise, and specialization play a pivotal role in building strong relationships with marquee clients.,

Posted 1 month ago

Apply

5.0 - 8.0 years

12 - 17 Lacs

Thane, Navi Mumbai, Mumbai (All Areas)

Work from Office

We are looking for Regulatory Affairs - Executive / Sr. Executive handling Africa and Asia and will be based at Juinagar, Navi Mumbai. Minimum 5 Years in RA is must Roles & Responsibilities: 1. Dossier Preparation and Submission: Compile and review regulatory submissions in ACTD, CTD and formats. Ensure all regulatory documents are accurate, complete, and compliant with regulatory requirements. 2. Review of Plant and R&D Data: Review R&D data to confirm compliance with regulatory expectations and assist in developing effective submission strategies. 3. Regulatory Compliance and Updates: Stay informed of changes in Asian and CIS market regulations, ensuring timely implementation of updates to maintain compliance. Provide regulatory insights to internal teams on best practices for data management and documentation. 4. Documentation and Record Keeping: Maintain well-organized records of submissions, communications, and approvals. Use regulatory software and systems for document tracking, version control, and report generation. Education: 5 - 8 years of experience in regulatory affairs, focusing on Asian markets. Desirable Skills & Competencies: Attention to Detail: Ability to review and analyze technical documentation with precision. Collaboration: Effective communication skills for working with R&D, manufacturing, and quality assurance teams. Problem Solving: Proactive in identifying compliance issues and developing solutions to address regulatory challenges. Proficient in MS Office and regulatory documentation software. Interested candidates can apply or mail your resume. If you have good references you can share - Thanks & Regards, Vaibhavi Behere HR Department Titan Laboratories Pvt Ltd vaibhavi.b@titanpharma.com

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies