Home
Jobs

543 Cism Jobs - Page 15

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4 - 9 years

9 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

? Skillset Required Experience in leading threat hunting and threat intel teams. Broad understanding of various security technologies including EDR/XDR, SIEM, Proxy, Email exchange, network, Cloud, etc. Monitor and analyse threat intelligencefeeds, security alerts, and indicators of compromise (IoCs) from multiple sources. Exposure to log analysis using various security tools and operating system logs. Experience with MITRE ATT&CK Framework, Cyber Kill Chain, and NIST Cyber Security Framework. Ability to research and prioritize emerging and significant risks, and take actions including formal threat advisory releases and threat hunting. Research and gather intel on vulnerabilities, threats, attacks, and compromises. Capable of conducting in-depth research on cyber threat actors, their tactics, techniques, and procedures (TTPs). Provide assistance to other cybersecurity teams and recommend mitigation measures.

Posted 2 months ago

Apply

2 - 7 years

12 - 13 Lacs

Trivandrum

Work from Office

Naukri logo

Skills and attributes for success To qualify for the role, you must have Degree, or equivalent, in Information Security, Cyber Security, Information Technology, Informatics, or other similar and technical areas Evidence of self-motivation to continuously develop in the areas of cybersecurity Good organizational and time management skills with the ability to prioritize and complete multiple complex projects under tight deadlines Ability to translate security issues into business risks Excellent interpersonal skills and ability to work effectively within a team at all hierarchical levels Willingness to research client inquiries and emerging issues, including regulations, industry practices, and new technologies Experience, knowledge and strong interest in information and cyber security domains are essential for this role Experience on Cyber Governance, Risk Compliance (GRC), Cyber risk assessments management methodologies Experience on assessing, designing and implementing security strategies, governance frameworks over processes and controls, allowing organisations to optimally manage cyber security Experience on design and implementation of security policies, procedures, standards and controls in line with regulation and/or current standards, such as ISO27001, NIST, SANS etc. Experience in data classification exercises and controls / mechanisms enforcement Working knowledge of control frameworks such as ISO 27001/27002, COBIT, NIST, ITIL, etc. Ability to conduct Security regulatory and compliance assessment independently Hands on with assessment report preparation and presenting to senior technical and business stakeholders Hand on knowledge of excel, PowerPoint and word Articulative and confident in presentation to senior stakeholders Ability to lead workstreams or dedicated portions of projects Cyber maturity assessments, recommendations, roadmap and strategy creation knowledge of use of and risks related to modern and emerging technologies Cybersecurity audit Ability to plan and deliver cyber security training and awareness Ideally, you ll also have Security-related qualifications / certifications such as CISSP, SSCP, CISM, ISO27001 lead implementer or auditor, CompTIA Security+, are desirable Experience in Third Party Risk Management (TPRM) and / or vendor risk assessment engagements Experience in design and implementation of Information Security Management Systems (i.e. security policies, procedures and guidelines) according to leading International Standards Security-related vendor / technology certifications are desirable

Posted 2 months ago

Apply

2 - 7 years

12 - 13 Lacs

Kochi

Work from Office

Naukri logo

Skills and attributes for success To qualify for the role, you must have Degree, or equivalent, in Information Security, Cyber Security, Information Technology, Informatics, or other similar and technical areas Evidence of self-motivation to continuously develop in the areas of cybersecurity Good organizational and time management skills with the ability to prioritize and complete multiple complex projects under tight deadlines Ability to translate security issues into business risks Excellent interpersonal skills and ability to work effectively within a team at all hierarchical levels Willingness to research client inquiries and emerging issues, including regulations, industry practices, and new technologies Experience, knowledge and strong interest in information and cyber security domains are essential for this role Experience on Cyber Governance, Risk Compliance (GRC), Cyber risk assessments management methodologies Experience on assessing, designing and implementing security strategies, governance frameworks over processes and controls, allowing organisations to optimally manage cyber security Experience on design and implementation of security policies, procedures, standards and controls in line with regulation and/or current standards, such as ISO27001, NIST, SANS etc. Experience in data classification exercises and controls / mechanisms enforcement Working knowledge of control frameworks such as ISO 27001/27002, COBIT, NIST, ITIL, etc. Ability to conduct Security regulatory and compliance assessment independently Hands on with assessment report preparation and presenting to senior technical and business stakeholders Hand on knowledge of excel, PowerPoint and word Articulative and confident in presentation to senior stakeholders Ability to lead workstreams or dedicated portions of projects Cyber maturity assessments, recommendations, roadmap and strategy creation knowledge of use of and risks related to modern and emerging technologies Cybersecurity audit Ability to plan and deliver cyber security training and awareness Ideally, you ll also have Security-related qualifications / certifications such as CISSP, SSCP, CISM, ISO27001 lead implementer or auditor, CompTIA Security+, are desirable Experience in Third Party Risk Management (TPRM) and / or vendor risk assessment engagements Experience in design and implementation of Information Security Management Systems (i.e. security policies, procedures and guidelines) according to leading International Standards Security-related vendor / technology certifications are desirable

Posted 2 months ago

Apply

3 - 6 years

5 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Organization Description The Testing CoE (Center of Excellence) is an essential part of our company, ensuring that we are setting our businesses, clients, customers, and employees up for success. The Testing CoE organization is responsible for evaluating Compliance and Operational risk processes and controls to provide an independent assessment of the control environment and compliance with laws, rules and regulations; report results; as well as define and maintain Testing Procedures. The Testing CoE covers all firm businesses, corporate functions, and technology. The CoE is part of the Control Management function which is responsible for maintaining a strong and consistent control environment through a joint accountability model that aligns managers with each function and region to mitigate compliance and operational risk. The Testing CoE is a critical to supporting both 1line and 2line of defense risk management processes. Job Summary As an Associate within the The Testing CoE team is responsible for ensuring a strong and consistent control environment across the firm. Your role in risk identification, control evaluation, and security governance is crucial in advising on complex situations and enhancing the firm s risk posture. Through collaboration and analytical skills, you will contribute to the Testing CoE s overall success and strengthen the firm s compliance with regulatory obligations and industry standards. Job responsibilities Assess end to end business processes to identify significant gaps and determine issue root causes. Partners with business units to drive control evaluation, monitoring and testing efforts across multiple business groups, technology domains, and operational functions to identify control gaps as well as opportunities for effectiveness and efficiency improvements Critical thinking skills to apply substantive testing techniques to thoroughly evaluate the effectiveness of high-risk business processes. Assess and monitor risks, ensuring compliance with firm standards, regulatory requirements, and industry best practices. Collaborate with cross-functional teams and stakeholders to support control design and effectiveness. Contribute to the development and/or enhancement of business control environment through recommended control and other updates to the Compliance and Operational Risk Evaluation (CORE ) application Develop and execute robust control test scripts designed to identify control weaknesses, determine root causes, and recommend solutions Document test steps and results in comprehensive and organized manner to sufficiently support and justify testing conclusions Participate in meetings with business owners at various levels of management, deliver testing results and support sustainable control enhancements; recognize opportunities to strengthen controls and improve operational efficiency. Required qualifications, capabilities, and skills 3+ years of experience or equivalent expertise in risk management, assessment, control evaluations, or a related field with a strong understanding of industry standards Demonstrated ability to analyse complex issues, develop and implement risk mitigation strategies, and communicate effectively with senior stakeholders. Proficient knowledge of risk management frameworks, regulations, and industry best practices Have an ability to effectively develop and communicate recommendations based on regulatory guidance and standards. 1-2 area specific skill sets Preferred qualifications, helpful capabilities, and skills CISM, CRISC, CISSP, CISA, CCEP, CRCM, CRCMP, GRCP,, or other industry-recognized risk and risk certifications preferred. A background in auditing and the ability to understand of internal controls is beneficial. Proficiency in MS (Microsoft Suite) Office - Microsoft Word, Excel, Access, and PowerPoint. Knowledge of data analytical tools such as Tableau, Altryx or Pythyon is a plus. 1-2 area specific skill sets Proficient knowledge of (tech, finance, controls etc.

Posted 2 months ago

Apply

6 - 7 years

8 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Total Exp : 6+ Rel Exp : 5+ Loc : BLR Role : Information Security Consultant Mandatory skills: Threat Modeling, Risk Assessment, Secure Design, Application Security Strong knowledge on AI/ML Security, Web , API , JS Security, Mobile, Cloud Security OWASP , ASVS ,NIST Strong communication skill Nice to have : Strong - AI/ML Engineer Security Architecture Development experience - Web, API , Mobile, Full Stack Developer Preferred Certification: CISSP, CISM, OSCP Job Description : Conducts security risk assessments of applications with respect to design and implementation of system and application code Develop and manage security governance processes and procedures for the threat modelling program and application security design & devsecops programs Assist in the development of threat modelling governance documentation Works with information security leadership to develop strategies and plans to enforce threat modeling and address identified control gaps Develops reports for management concerning residual risk and non-compliance Monitor and track compliance with application owners to ensure implementation of security controls as planned Review issued security controls with application owners to ensure identified requirements are implemented

Posted 2 months ago

Apply

7 - 15 years

9 - 17 Lacs

Hyderabad

Work from Office

Naukri logo

Opportunity to shape risk culture and ensure technological safeguards in a dynamic, collaborative environment. As a Tech Risk Assurance Lead in Cybersecurity & Tech Controls team, your role will involve identifying and influencing the design of technology controls to enhance the firms ability to manage compliance and operational risk exposure. You will offer subject matter expertise and technical guidance to technology-aligned product and process owners, ensuring that controls are integrated and adhered to throughout the Global Technology organization, in line with regulatory, legal, and industry standards. By collaborating with various stakeholders, including Product Owners, Business Control Managers, and Regulators, you will help provide a comprehensive view of the technology risk posture and its impact on the business. Your advanced understanding of risk management principles, practices, and theories will enable you to drive innovative solutions and effectively lead a diverse team in a dynamic and evolving risk environment. This position will focus on and offer personal growth in areas such as supply chain risk, software development lifecycle, and emerging technologies like blockchain and AI/ML. Job responsibilities Effectively identify, quantify, communicate, and manage technology risks, emphasizing root cause analysis and resolution recommendations. Build and sustain strong relationships, becoming a trusted partner with line of business technologists, assessment teams, and product owners to support cross-functional collaboration. Facilitate progress toward shared goals through robust partnerships and collaboration. Execute reporting and governance of controls, policies, issue management, and measurements. Provide senior management with insights into control effectiveness and risk posture to ensure proper prioritization. Proactively monitor and evaluate control effectiveness, identify gaps, and recommend enhancements to strengthen risk posture and regulatory compliance Required qualifications, capabilities, and skills Formal training or certification on Tech Risk & Control concepts and 5+ years applied experience Experience in technology risk management, information security, or a related field. Expertise in risk identification, assessment, and mitigation. Familiarity with risk management frameworks and industry standards. Knowledge of financial industry regulatory requirements. Proficient in supply chain risk, software development lifecycle, and control evaluation. Ability to influence executive-level decision-making and translate technology insights into business strategies. Preferred qualifications, capabilities, and skills CISM, CRISC, CISSP, or similar industry-recognized risk and risk certifications are preferred

Posted 2 months ago

Apply

9 - 12 years

5 - 6 Lacs

Bengaluru

Work from Office

Naukri logo

Lead investigations into high-complexity security incidents, such as targeted attacks, APTs, or insider threats. Analyze attacker Tactics, Techniques, and Procedures (TTPs) to understand attack vectors and methods. Correlate diverse data sources (SIEM, endpoint, cloud, and network) to identify and contain sophisticated threats. Design and execute proactive threat-hunting campaigns using SIEM and threat intelligence data. Identify potential weaknesses in the environment and suggest mitigations. Leverage advanced tools and techniques to detect zero-day and novel threats. Take ownership of critical incidents, coordinating with internal teams and external stakeholders. Conduct post-incident analysis to identify gaps and recommend improvements to security controls. Provide detailed reports on incidents, including root cause analysis and mitigation strategies. Act as the technical escalation point for L2 analysts, assisting with complex investigations. Collaborate with threat intelligence, vulnerability management, and IT teams to enhance security posture. Provide mentorship and training to L1 and L2 analysts to improve team capabilities. Participate in purple team exercises to improve detection and response strategies. Refine and improve incident response playbooks and standard operating procedures (SOPs). Define strategies for improving SOC maturity and aligning with frameworks like MITRE ATT&CK. Ensure SOC activities adhere to regulatory requirements and industry best practices. Provide executive-level reporting on security posture, incidents, and trends. Lead tabletop exercises and simulations for executive and IT teams. Develop and implement metrics to measure the effectiveness of detection and response efforts. Qualifications: 8+ years of experience in cybersecurity, with significant focus on security operations and incident response. Expertise in SIEM tools, advanced threat detection, and cybersecurity frameworks. Strong analytical skills to handle complex security incidents and investigations. Excellent leadership, communication, and collaboration skills. Preferred Skills: Experience with advanced threat hunting, malware analysis, and digital forensics. Familiarity with frameworks like MITRE ATT&CK, NIST, and regulatory compliance standards. Certifications such as CISSP, CISM, GIAC, or equivalent are highly desirable. Experience in leading purple team exercises and improving SOC maturity.

Posted 2 months ago

Apply

7 - 12 years

11 - 15 Lacs

Uttar Pradesh

Work from Office

Naukri logo

Role Summary & Key Responsibilities Lead the design and architecture of GRC solutions that integrate risk assessments, DR planning, privacy controls, and regulatory compliance measures. Oversee technical teams to develop standardized processes and deliver high quality compliance outputs. Ensure that technical solutions align with Boeings regulatory and operational requirements. Key Skills & Qualifications Over 10 16 years experience in cybersecurity architecture and governance. Strong technical expertise in compliance frameworks (e.g., NIST, SOX, DFARS) and familiarity with ITSM and risk management tools. Demonstrated leadership and project management skills; relevant certifications such as CISSP, CISM, or CRISC are highly preferred

Posted 2 months ago

Apply

3 - 7 years

4 - 8 Lacs

Uttar Pradesh

Work from Office

Naukri logo

Role Summary & Key Responsibilities Lead the design and architecture of GRC solutions that integrate risk assessments, DR planning, privacy controls, and regulatory compliance measures. Oversee technical teams to develop standardized processes and deliver high quality compliance outputs. Ensure that technical solutions align with Boeings regulatory and operational requirements. Key Skills & Qualifications Over 10 16 years experience in cybersecurity architecture and governance. Strong technical expertise in compliance frameworks (e.g., NIST, SOX, DFARS) and familiarity with ITSM and risk management tools. Demonstrated leadership and project management skills; relevant certifications such as CISSP, CISM, or CRISC are highly preferred.

Posted 2 months ago

Apply

8 - 13 years

30 - 35 Lacs

Hyderabad

Work from Office

Naukri logo

The Information Protection Associate Advisor is responsible for providing general technical, operational and review support to Cigna's Information Protection (CIP) Organization. This role will support in enforcing standard information protection controls through infrastructure, application and third-party security assessments . You will work with development teams to ensure they are using the appropriate application security tooling correctly through their SSDLC . Balance multiple project priorities appropriately. Work with the Cigna Information Protection team as required to support reviews, product implementations and security audits. Support the Management team (Regional Information Security Officer and Senior Manager) on dashboard reporting, coordination of incident responses, risk assessments and CIP led initiatives. Job Description: Infrastructure / Application reviews: Partners with the enterprise to implement standard security solutions and capabilities that are aligned with business, technology and threat drivers Performs focused risks assessments of existing or new services and technologies, security architecture, identifies design gaps, risks, and recommends enhancements Communicates risk assessment findings to information security customers, or business partners. Explore risk mitigation controls Serves as an information security expert and trusted advisor to partners in IT and the business Evaluate compliance of operation processes with Information Protection policies and related government regulations Identifies and implements appropriate controls to effectively manage information risks as needed Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing residual risk Maintains strong working relationships with individuals and groups involved in managing information risks across the organization Stays abreast of current and emerging security threats and designs security architectures to mitigate them Service Partner Security Assessment: Perform general walkthrough evaluations of new applications and processes under consideration. Provide recommendation to business. Meet with vendors and employees to resolve or track compliance issues. Attend demonstrations of applications and prepare reports on potential for data leakage or infrastructure security issues. Review any regular security reports for abnormality. Work with supplier chain management on contracts to include security terms. Escalation to the fellow CIP team on security issues related to service partners. Provide development teams with application security vulnerability validation and remediation guidance from various application security tooling (SAST, SCA, IAC, DAST, MAST, etc) Support the Management team (Regional Information Security Officer and Senior Manager): Work with individual local security teams assigned to ensure security controls applied are compliant to CIP policies and standards Work with the RISO on managing security incidents Regular risk & activity reporting Issue tracking with local security teams Review and approval of application/infrastructure changes in terms of security Coordinate CIP initiatives with other countries as required Maintain strong working relationships with individuals and groups involved in managing information risks across the organization Partner with the CIP and IT teams to implement standard security solutions and capabilities that are aligned with business, technology and threat drivers Stay abreast of current and emerging security threats and security architectures to mitigate the threats Skills Needed: Health Insurance or Health Care Industry experience preferred Ability to multitask and timely execute Ability to grasp and understand complicated relationships Proven Communication skills, able to write and verbally communicate effectively Organizational courage to escalate and resolve risk issues Flexible can adapt to changing organization changing business needs, technological advances and agile methodology Demonstrates technical skills in infrastructure, application and third party security assessments. Self-starter and shows empathy towards business requirements and able to influence changes to facilitate security Experience with assessing and mitigating risk Experience with contracting and negotiations Travel required, approximately 10% Qualifications: BS degree or equivalent experience CISSP, CISA, CISM, CRISC or similar certifications preferred Broad high level knowledge, hands-on experience, and exposure to a wide range of IT subject areas, business, application security Strong written and spoken English skills Qualified candidates will typically have 8 to 11+ years of professional IT experience work experience, and 4 years in information security Experience with process and change management, reporting and incident handling. Demonstrated ability to communicate at high levels, both verbally and in reporting Excellent problem identification, solving and critical reasoning skills. Ability to work successfully with a minimum of supervision in a fast paced and sometimes pressured environment. Techno Functional role Cyber security Analysts SDLC must have At least 1+ yrs of working experience SAST, DAST, MAST, SCA: Application Security scanning Tools must have Check vulnerability assessments. Help Developers to check if the integration process is aligned with the results. Check if the team is using the right tools and review the results. Threat Model & Programming languages is good to have not mandate. Software Development Lifecycle

Posted 2 months ago

Apply

4 - 7 years

7 - 8 Lacs

Chennai, Pune, Vadodara

Work from Office

Naukri logo

As a Cybersecurity Playbook Developer, you will play a critical role in developing and maintaining automation playbooks, integrations, and other custom applications within the SOAR platform. These playbooks will automate SOC analyst tasks needed to identify to multiple security incidents. You will collaborate closely with the SOC team to gather requirements and ensure playbooks are accurate, efficient, and reflect the latest security threats and best practices. Additional responsibilities will include supporting process improvement activities for the SOC incident response and ensuring quality and compliance to security best practices. Responsibilities: Develop and maintain SOAR playbooks for automating security workflows and incident response. Integrate SOAR with other security tools and platforms. Create custom scripts to enhance SOAR functionality. Troubleshoot and resolve SOAR issues. Stay updated on SOAR features and best practices. Test playbooks in DEV/QA environments. Design and implement OT network solutions. Configure and optimize network components. Monitor network performance and ensure security. Document network topologies and changes. Collaborate with external service providers and our teams. This position will report to the Execution Manager. MUST Technical Skills: Strong understanding of security technologies used in a SOC environment(SIEM, EDR, firewalls, and vulnerability management). Experience with Cortex xSOAR (preferred) or other security orchestration platforms. Experience with security concepts, frameworks (MITRE ATT&CK, etc.), and incident response methodologies. Scripting and automation skills (Python, JavaScript, PowerShell). Qualifications: Minimum 4+ years in cybersecurity or related field.Experience with Cortex xSOAR or similar platforms. Programming skills in Python or other scripting languages. Knowledge of security concepts, frameworks, and incident response. Familiarity with SOC tools (SIEM, EDR) are an added advantage. Experience as a system engineer in OT networks. Knowledge of network architectures, protocols, and technologies. Certifications in Cisco, Fortinet, or similar are an added advantage. Required Technical Skill: Develop SOAR playbooks to automate security workflows and incident response processes. Manage integrations between SOAR and other security tools and platforms. Develop custom scripts and tasks to enhance the functionality of SOAR. Help troubleshoot and resolve issues within the SOAR environment. Collaborate with security analysts and engineers to understand their requirements. Stay up-to-date with the latest SOAR features and best practices. Help test playbooks in DEV\QA environments. Certifications like CISSP, GSEC, CISM, or SOAR-specific certifications (Good To have). Benefits: The ability to collaborate with, learn from colleagues in a complex, global organisation. We provide a working environment with a creative company, paired with a great compensation package, great benefits, and a supportive atmosphere where you can sharpen with new challenges and development opportunities. Corporate Social Responsibility opportunities. Support from our 24/7 employee assistance program.

Posted 2 months ago

Apply

8 - 15 years

13 - 17 Lacs

Gurgaon

Work from Office

Naukri logo

About the Role: Bright Tier Solutions is seeking an experienced Security Architect to join our team on behalf of our esteemed US client. In this role, you will be responsible for developing architectural designs and leading the implementation of security infrastructure in both on-premises and Microsoft Azure environments. You will collaborate closely with the global Information Security team to implement technical controls that align with security policies. This position is ideal for Enterprise, Solution, or Network Architects with a deep understanding of security who are eager to make a significant impact. This role requires working in-office for 5 days a week, with locations in Gurgaon (preferred) or Bengaluru. Additionally, periodic travel (up to 20%) to client offices within India may be required based on project needs. We are looking for dynamic professionals ready to contribute to our mission of delivering world-class security solutions while collaborating with multi-cultural teams across different time zones. Responsibilities: Collaborate with Information Security and IT Leadership to define the security roadmap and drive strategic initiatives. Design, engineer, and implement security solutions that adhere to a defense-in-depth strategy while meeting business requirements and processes. Periodically review existing security solutions to identify opportunities for improvement, enhancing security capabilities and adding value to the enterprise. Assist in designing security elements for on-premises compute, storage, and network infrastructure services. Contribute to the design of security elements for cloud infrastructure and platform services within Microsoft Azure. Work with the Information Security department to design technical security controls that enforce security policies. Support project managers during project planning and execution phases, creating comprehensive documentation for handover to operations teams. Provide regular updates on project tasks and non-project assignments. Support the Security Operations team in investigating major security incidents. Deliver Level 4 (L4) technical support for escalated major incidents and security incidents to restore production services. Stay current on emerging threats, security trends, and risk mitigation strategies, providing recommendations to the Security Operations team as needed. Create detailed Technical Design Documents and other required documentation. Train Security Operations team members on new security solutions relevant to their roles. Collaborate effectively with multi-cultural teams across different time zones. Qualifications: Bachelors degree in information systems or equivalent experience. 10+ years of experience working in an enterprise IT environment. 3+ years of experience architecting and designing security solutions in on-premises enterprise environments that provide technical controls to meet security policy requirements. Proven experience securing Microsoft Azure cloud infrastructure and platform services. (Candidates with exclusive AWS experience will not be considered.) Experience with log analytics solutions such as Splunk or Azure Log Analytics. Expertise in securing enterprise and globally distributed networks, including firewalls, IDS/IPS, DDoS protections, encryption tools/protocols, and privilege access management systems. Familiarity with vulnerability management systems such as Rapid7 or Nessus. Knowledge of data in-transit and data-at-rest encryption solutions and key management solutions. Understanding of advanced endpoint protection solutions for zero-day defense against threats. Strong consultative and problem-solving skills at a cross-functional level. Ability to quickly learn, self-start, and work both independently and as part of a team. Excellent verbal and written communication skills. Current security certifications (e.g., CISSP, CISM, CCSP) are highly desired. Location & Travel Requirements: Primary Location: Gurgaon (Preferred) or Bengaluru, India - 5 Days in Office Required. Travel Requirements: Up to 20% travel may be required, primarily to client offices within India, depending on project needs.

Posted 2 months ago

Apply

8 - 13 years

12 - 17 Lacs

Mumbai

Work from Office

Naukri logo

Job Description: Full-time on-site role for a Sr. Manager - Information Security / GRC in Mumbai. As a Sr. Manager of Information Security, you will be responsible for managing and overseeing all aspects of information security within the organization. Your day-to-day tasks will include designing and implementing security policies and procedures, conducting risk assessments, overseeing security audits and compliance, and leading incident response and recovery efforts. You will also manage the Information Security team and ensure the confidentiality, integrity, and availability of company data and systems. Desired Skills: Minimum of 8 years of experience in information security management Strong knowledge of industry best practices and standards such as ISO 27001, NIST, and GDPR Experience in designing and implementing information security policies and procedures Experience in conducting risk assessments and vulnerability management Knowledge of security technologies and tools such as firewalls, intrusion detection systems, endpoint protection, and associated security controls Experience in managing security audits and compliance Strong leadership and communication skills Relevant certifications such as CISSP, CISM, or CISA are highly preferred Experience in the financial services industry is a plus Bachelors degree in computer science, information security, or a related field

Posted 2 months ago

Apply

6 - 11 years

25 - 30 Lacs

Pune

Work from Office

Naukri logo

At Pitney Bowes, we do the right thing, the right way. As a member of our team, you can too. We have amazing people who are the driving force, the inspiration and foundation of our company. Our thriving culture can be broken down into four components: Client. Team. Win. Innovate. We actively look for prospects who: Are passionate about client success. Enjoy collaborating with others. Strive to exceed expectations. Move boldly in the quest for superior and best in market solutions. Job Description: Join Pitney Bowes as a AD Azure Support Engineer Years of experience: 6+ Job Location - Pune You will: Perform activities related to the Identity Management program, including execution, analysis and reporting of cyber risks and vulnerabilities Be a subject manner expert in Identity Access Management, Active Directory and Entra ID Provide SME experience for a team providing user access provisioning, deprovisioning, terminations and password resets for multiple applications including Dell OneIdentity. Design, implement and maintain identity and access management systems Analyze user access requirements and develop access policies Perform regular audits to ensure security protocols are not being breached Manage user identities and determine their access rights Ensure compliance with privacy laws and regulations Investigate any irregularities in system access Develop strategies to handle security incidents and coordinate responses to such incidents Assist a staff on security protocols and the use of identity management software Work closely with departments to align system protocols with company needs Establish metrics to ensure IAM solutions meet security and business objectives Plan, test, and implement configuration changes Document processes and procedures Escalate and resolve issues in a timely manner Your background: 6-8 plus years professional experience in IT and/or Cybersecurity with an Enterprise Identity Team Significant demonstrated knowledge of Active Directory processes and tools to include patching, hardening, configuration, and risk management Demonstrated communication skills to communicate, persuade, influence without authority, and handle challenging conversations Significant demonstrated knowledge of Identity management processes and tools to include Active Directory, Entra ID, Intune, Dell OneIdentity, Semperis and CyberArk Please type here to enter required qualification for this position Preferred Bachelor s degree in information security, Computer Science or equivalent Information Security Certifications such as CISSP, CRISC, CIMP and/or CISM Knowledgeable and experienced in: Active Directory (Including Azure A/D Synchronization) Entra ID (Including App Registration, Passwordless Authentication, Enterprise Application SSO and Conditional Access Policies) Intune Semperis CyberArk Zscaler AppTotal Automation Tools including Task Scheduler and PowerShell InfoBlox BloxOne Microsoft PKI Microsoft SCCM Patching Microsoft Defender Illumio Dell OneIdentity (Configuration, Monitoring, Migration and Implementation) Microsoft NPS JIRA Service Desk Confluence About Pitney Bowes Pitney Bowes (NYSE:PBI) is a global technology company providing commerce solutions that power billions of transactions. Clients around the world, including 90 percent of the Fortune 500, rely on the accuracy and precision delivered by Pitney Bowes solutions, analytics, and APIs in the areas of ecommerce fulfillment, shipping and returns; cross-border ecommerce; office mailing and shipping; presort services; and financing. For 100 years Pitney Bowes has been innovating and delivering technologies that remove the complexity of getting commerce transactions precisely right. For additional information visit Pitney Bowes at https://www.pitneybowes.com/in . Only Talent Matters at Pitney Bowes Pitney Bowes is an equal opportunity workplace. To remove unconscious biases from our hiring process, we encourage Blind Applications from candidates applying for jobs at Pitney Bowes. This means that details such as gender, caste, religion, nationality, and age are omitted from applications. And candidates can choose to reveal only their first or last name on the application. Watch the video here: https: / / www.youtube.com / watchv=dNB-K5KFU78 Watch the videos below for more information about Life at Pitney Bowes: Who we are Pitney Bowes All Stars Pitney Bowes named a Great Place to Work Pitney Bowes Gratitude Video Pitney Bowes COVID Care We will: Provide the will: opportunity to grow and develop your career Offer an inclusive environment that encourages diverse perspectives and ideas Deliver challenging and unique opportunities to contribute to the success of a transforming organization Offer comprehensive benefits globally ( P B Live Well ) Pitney Bowes is an equal opportunity employer that values diversity and inclusiveness in the workplace. All interested individuals must apply online.

Posted 2 months ago

Apply

3 - 7 years

13 - 17 Lacs

Pune

Work from Office

Naukri logo

At Pitney Bowes, we do the right thing, the right way. As a member of our team, you can too. We have amazing people who are the driving force, the inspiration and foundation of our company. Our thriving culture can be broken down into four components: Client. Team. Win. Innovate. We actively look for prospects who: Are passionate about client success. Enjoy collaborating with others. Strive to exceed expectations. Move boldly in the quest for superior and best in market solutions. Job Description: Join Pitney Bowes as a Advisory Software Engineer - User Provision Support Years of experience: 6+ Years Job Location - Pune you have: 8 plus years professional experience in IT and/or Cybersecurity with User Provisioning, administration of user accounts and access privileges in the organization s identity management system. Work closely with the IAM team to ensure that the right people have access to the right resources. Responsible for the day-to-day identity administration Involved in troubleshooting and resolving IAM issues. Participate in IAM projects and initiatives. Work with internal customers, business analysts, and application teams to understand access requirements. Maintain documentation for the IAM program. Participate in IAM audits and review access control reports to identify potential risks. Provide training to new users. Update and maintain the IAM system according to changes in the organization s business needs. Streamline the processes of provisioning, updating and de-provisioning accounts Act as liaison with business units to promote security awareness and identify/recommend quality business processes that not only meet data protection and system resiliency requirements, but preserve a quality user experience Assist the approval process of Change Management of Roles and Profiles to ensure compliance with agreed Security and Authorization guidelines Support / Manage the continuous improvement projects including the production of Role-to-Users and Risk Ruleset changes, Segregation of Duties optimization, and any other as deemed appropriate to satisfy data security and SOX audit requirements Facilitate document requests and information gathering for audit activities Preferred Bachelor s degree in information security, Computer Science or equivalent Information Security Certifications such as CISA, CISSP, IAT, GIAC, CEH, CISM, GSEC Knowledgeable and experienced in: SAP ECC, SCM, GRC, S4 HANA S4C, S4 HANA C4C, S4 HANA IAG, S4HANA FSM IBM CPQ Oracle OLFM SFDC, ServiceMax HFM JIRA Service Desk Confluence About Pitney Bowes Pitney Bowes (NYSE:PBI) is a global technology company providing commerce solutions that power billions of transactions. Clients around the world, including 90 percent of the Fortune 500, rely on the accuracy and precision delivered by Pitney Bowes solutions, analytics, and APIs in the areas of ecommerce fulfillment, shipping and returns; cross-border ecommerce; office mailing and shipping; presort services; and financing. For 100 years Pitney Bowes has been innovating and delivering technologies that remove the complexity of getting commerce transactions precisely right. For additional information visit Pitney Bowes at https://www.pitneybowes.com/in . Only Talent Matters at Pitney Bowes Pitney Bowes is an equal opportunity workplace. To remove unconscious biases from our hiring process, we encourage Blind Applications from candidates applying for jobs at Pitney Bowes. This means that details such as gender, caste, religion, nationality, and age are omitted from applications. And candidates can choose to reveal only their first or last name on the application. Watch the video here: https: / / www.youtube.com / watchv=dNB-K5KFU78 Watch the videos below for more information about Life at Pitney Bowes: Who we are Pitney Bowes All Stars Pitney Bowes named a Great Place to Work Pitney Bowes Gratitude Video Pitney Bowes COVID Care We will: Provide the will: opportunity to grow and develop your career Offer an inclusive environment that encourages diverse perspectives and ideas Deliver challenging and unique opportunities to contribute to the success of a transforming organization Offer comprehensive benefits globally ( P B Live Well ) Pitney Bowes is an equal opportunity employer that values diversity and inclusiveness in the workplace. All interested individuals must apply online.

Posted 2 months ago

Apply

2 - 5 years

3 - 7 Lacs

Chennai, Pune, Vadodara

Work from Office

Naukri logo

Rockwell Automation is a global technology leader focused on helping the world s manufacturers be more productive, sustainable, and agile. With more than 28,000 employees who make the world better every day, we know we have something special. Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that s you we would love to have you join us! Job Description Job Description Position Summary As a Cybersecurity Playbook Developer, you will play a critical role in developing and maintaining automation playbooks, integrations, and other custom applications within the SOAR platform. These playbooks will automate SOC analyst tasks needed to identify to multiple security incidents. You will collaborate closely with the SOC team to gather requirements and ensure playbooks are accurate, efficient, and reflect the latest security threats and best practices. Additional responsibilities will include supporting process improvement activities for the SOC incident response and ensuring quality and compliance to security best practices. Responsibilities: Develop and maintain SOAR playbooks for automating security workflows and incident response. Integrate SOAR with other security tools and platforms. Create custom scripts to enhance SOAR functionality. Troubleshoot and resolve SOAR issues. Stay updated on SOAR features and best practices. Test playbooks in DEV/QA environments. Design and implement OT network solutions. Configure and optimize network components. Monitor network performance and ensure security. Document network topologies and changes. Collaborate with external service providers and our teams. This position will report to the Execution Manager. MUST Technical Skills: Strong understanding of security technologies used in a SOC environment(SIEM, EDR, firewalls, and vulnerability management). Experience with Cortex xSOAR (preferred) or other security orchestration platforms. Experience with security concepts, frameworks (MITRE ATT&CK, etc.), and incident response methodologies. Scripting and automation skills (Python, JavaScript, PowerShell). Qualifications: Minimum 4+ years in cybersecurity or related field.Experience with Cortex xSOAR or similar platforms. Programming skills in Python or other scripting languages. Knowledge of security concepts, frameworks, and incident response. Familiarity with SOC tools (SIEM, EDR) are an added advantage. Experience as a system engineer in OT networks. Knowledge of network architectures, protocols, and technologies. Certifications in Cisco, Fortinet, or similar are an added advantage. Required Technical Skill: Develop SOAR playbooks to automate security workflows and incident response processes. Manage integrations between SOAR and other security tools and platforms. Develop custom scripts and tasks to enhance the functionality of SOAR. Help troubleshoot and resolve issues within the SOAR environment. Collaborate with security analysts and engineers to understand their requirements. Stay up-to-date with the latest SOAR features and best practices. Help test playbooks in DEV\QA environments. Certifications like CISSP, GSEC, CISM, or SOAR-specific certifications (Good To have). Benefits: The ability to collaborate with, learn from colleagues in a complex, global organisation. We provide a working environment with a creative company, paired with a great compensation package, great benefits, and a supportive atmosphere where you can sharpen with new challenges and development opportunities. Corporate Social Responsibility opportunities. Support from our 24/7 employee assistance program. We are committed to equal employment opportunity regardless of race, colour, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender, gender identity or expression, or veteran status. We are proud to be an equal opportunity workplace.At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if youre excited about this role but your experience doesnt align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. #LI-Hybrid #LI-RS1 Rockwell Automation s hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office.

Posted 2 months ago

Apply

2 - 6 years

3 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

The purpose of this role is to embed security into the Creative Practice area Job Description: Information Security Manager The Information Security Manager role within Dentsu Creative is responsible for providing security oversight for customer solutions and infrastructure within the managed services environment across various technology components within the organization s enterprise technology portfolio. The Senior Security Engineer will deliver enterprise class capabilities, support the organization through the enforcement of the security policy, this may include penetration testing, Web application testing, security tooling support and provide support to the engineering and architecture groups. The Information Security Manager role is responsible for performance measurement, analysis and tuning in an enterprise hosting environment. They keep up to date on industry trends and deliver the highest level of customer service possible. This role will report to the Global Cyber Security Director, Creative. The role will work with a team of geographically distributed Creative staff and contract employees. Essential Tasks and Responsibilities: Lead the design and implementation of global, cost effective, enterprise-class systems following ITIL/ITSM processes/practices, while maintaining compliance with all company policies, procedures and standards. Participate in the development of technology roadmaps that align with overall IT strategy and vision Directly work with Development teams to ensure adherence to our SDLC policy Lead innovation, process improvement and standardization within the IT organization. Lead within discipline to develop best practices, case studies, training materials, and whitepapers. Anticipate risks and constraints and proactively work on solutions to address the risk/constraints, escalating as appropriate. Gather requirements, develop the delivery plan for solution and services milestones, managing expectations and coordinating delivery with internal team. Maintain in-depth awareness and fluency of the key features, functions, and/or industry trends around the area of expertise. Perform post incident analysis and document findings. Ability to work in a dynamic and agile creative environment. Strong Stakeholder management Assist Global Cyber Security Director with management information metrics and KPIs. Measures of Success: Consistently deliver IT solutions that exceed customer expectations on-time/budget. Successfully resolve technical incidents/service requests within SLA/OLA timeframe with a high level of quality, escalating where appropriate. Demonstrate a high level of customer service. Participate in the development of dentsu Creative s technology vision and strategy. Demonstrate the ability to work as part of a team and share knowledge with team members. Implementation and adoption of support processes and structures sufficient to ensure system stability and user satisfaction. Operate as a Trusteed Advisor for the business Contribute to the development and evolution of reference architectures. Positive recognition as noted on Employee and Customer satisfaction surveys, completed on a periodic basis. Skills/Requirements: Expert Knowledge of: A focus on Enterprise level security tools and Cloud solutions, including, but not limited to: Microsoft Azure, Google GCP, AWS, Tenable, Microsoft Defender Cloud security configurations and architectural principles Security Architecture consulting and design assurance experience Defining and articulating Modern Security Designs for cloud and datacenter deployments Knowledge of Generative AI solutions and operations from a security perspective. Demonstrate the ability to: Meet project deadlines and manage and prioritize multiple simultaneous projects while adhering to a time allocation model Assess the scope and impact of incidents and respond, with a sense of urgency that matches the incident, following appropriate policies and procedures Multi-task, prioritize, manage workload and adapt to changing business conditions Tolerate stressful situations and remain focused under pressure Effectively communicate at all levels of the organization. Manage through conflict and challenging situations with positive outcomes for the clients and dentsu Creative Develop and cultivate strategic relationships that benefit IT and dentsu Creative Make decisions and judgments based on standard procedures. Demonstrate critical thinking and problem solving skills. Contribute to Managed Hosting standards and best practices for processes, procedures, and technical standards. Education and Experience: Bachelor s Degree or Master s Degree in Information Technology or Computer Science preferred 5+ years of experience supporting and implementing enterprise-class solutions operating in a 24/7 environment 3+ years professional experience in designing technology solutions 5+ Years in Security Architecture and or Risk management Current certifications within Cyber Security discipline and IT industry (CISSP, CISM, CRISC) are highly desired. Location: Bangalore Brand: Bcoe Time Type: Full time Contract Type: Permanent

Posted 2 months ago

Apply

4 - 9 years

6 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

The purpose of this role is to embed security into the Creative Practice area Job Description: Information Security Manager The Information Security Manager role within Dentsu Creative is responsible for providing security oversight for customer solutions and infrastructure within the managed services environment across various technology components within the organization s enterprise technology portfolio. The Senior Security Engineer will deliver enterprise class capabilities, support the organization through the enforcement of the security policy, this may include penetration testing, Web application testing, security tooling support and provide support to the engineering and architecture groups. The Information Security Manager role is responsible for performance measurement, analysis and tuning in an enterprise hosting environment. They keep up to date on industry trends and deliver the highest level of customer service possible. This role will report to the Global Cyber Security Director, Creative. The role will work with a team of geographically distributed Creative staff and contract employees. Essential Tasks and Responsibilities: Lead the design and implementation of global, cost effective, enterprise-class systems following ITIL/ITSM processes/practices, while maintaining compliance with all company policies, procedures and standards. Participate in the development of technology roadmaps that align with overall IT strategy and vision Directly work with Development teams to ensure adherence to our SDLC policy Lead innovation, process improvement and standardization within the IT organization. Lead within discipline to develop best practices, case studies, training materials, and whitepapers. Anticipate risks and constraints and proactively work on solutions to address the risk/constraints, escalating as appropriate. Gather requirements, develop the delivery plan for solution and services milestones, managing expectations and coordinating delivery with internal team. Maintain in-depth awareness and fluency of the key features, functions, and/or industry trends around the area of expertise. Perform post incident analysis and document findings. Ability to work in a dynamic and agile creative environment. Strong Stakeholder management Assist Global Cyber Security Director with management information metrics and KPIs. Measures of Success: Consistently deliver IT solutions that exceed customer expectations on-time/budget. Successfully resolve technical incidents/service requests within SLA/OLA timeframe with a high level of quality, escalating where appropriate. Demonstrate a high level of customer service. Participate in the development of dentsu Creative s technology vision and strategy. Demonstrate the ability to work as part of a team and share knowledge with team members. Implementation and adoption of support processes and structures sufficient to ensure system stability and user satisfaction. Operate as a Trusteed Advisor for the business Contribute to the development and evolution of reference architectures. Positive recognition as noted on Employee and Customer satisfaction surveys, completed on a periodic basis. Skills/Requirements: Expert Knowledge of: A focus on Enterprise level security tools and Cloud solutions, including, but not limited to: Microsoft Azure, Google GCP, AWS, Tenable, Microsoft Defender Cloud security configurations and architectural principles Security Architecture consulting and design assurance experience Defining and articulating Modern Security Designs for cloud and datacenter deployments Knowledge of Generative AI solutions and operations from a security perspective. Demonstrate the ability to: Meet project deadlines and manage and prioritize multiple simultaneous projects while adhering to a time allocation model Assess the scope and impact of incidents and respond, with a sense of urgency that matches the incident, following appropriate policies and procedures Multi-task, prioritize, manage workload and adapt to changing business conditions Tolerate stressful situations and remain focused under pressure Effectively communicate at all levels of the organization. Manage through conflict and challenging situations with positive outcomes for the clients and dentsu Creative Develop and cultivate strategic relationships that benefit IT and dentsu Creative Make decisions and judgments based on standard procedures. Demonstrate critical thinking and problem solving skills. Contribute to Managed Hosting standards and best practices for processes, procedures, and technical standards. Education and Experience: Bachelor s Degree or Master s Degree in Information Technology or Computer Science preferred 5+ years of experience supporting and implementing enterprise-class solutions operating in a 24/7 environment 3+ years professional experience in designing technology solutions 5+ Years in Security Architecture and or Risk management Current certifications within Cyber Security discipline and IT industry (CISSP, CISM, CRISC) are highly desired. Location: Bangalore Brand: Bcoe Time Type: Full time Contract Type: Permanent

Posted 2 months ago

Apply

3 - 5 years

8 - 9 Lacs

Trivandrum

Work from Office

Naukri logo

Overview: We are seeking a skilled IT Security Engineer to manage patching, endpoint security, and automation across our infrastructure. The ideal candidate will be responsible for implementing security measures, ensuring compliance, and optimizing system performance through proactive security initiatives. Key Responsibilities: Patch Management: Develop and implement an effective patching strategy for Windows, Linux, and third-party applications. Utilize Endpoint Central (ManageEngine) to deploy patches, track compliance, and troubleshoot failures. Coordinate with teams to test and schedule patch rollouts with minimal business impact. Generate patch compliance reports and remediate non-compliant systems. Endpoint Central Management: Administer and optimize ManageEngine Endpoint Central for device management, patching, and software deployment. Monitor system health, enforce policies, and manage endpoint security configurations. Automate routine endpoint tasks using custom scripts. CrowdStrike Antivirus Management: Deploy, configure, and manage CrowdStrike Falcon for endpoint protection. Monitor security s, analyze threats, and take remediation actions. Ensure endpoint devices comply with security standards and company policies. Collaborate with SOC teams to investigate security incidents and fine-tune detection rules. Scripting & Automation: Develop and maintain PowerShell, Python, or Bash scripts to automate patching, compliance checks, and endpoint management tasks. Create dashboards and reports for patch status, endpoint security, and compliance tracking. Optimize security operations through custom automation solutions. Required Skills & Qualifications: 3+ years of experience in IT security, patch management, and endpoint protection. Hands-on experience with ManageEngine Endpoint Central for endpoint and patch management. Strong knowledge of CrowdStrike Falcon or similar EDR/XDR solutions. Proficiency in scripting (PowerShell, Python, or Bash) for automation and system management. Understanding of vulnerability management tools (Qualys, Nessus, Tenable, etc.). Familiarity with compliance frameworks like ISO 27001, NIST, or CIS benchmarks. Strong troubleshooting, analytical, and communication skills. Preferred Qualifications: Experience in security hardening and compliance auditing. Knowledge of cloud-based security solutions. Relevant certifications such as CISSP, CISM, CEH, or Security+.

Posted 2 months ago

Apply

7 - 10 years

9 - 14 Lacs

Bengaluru

Work from Office

Naukri logo

Job Summary: We are seeking an experienced Cyber Security professional to lead the Cyber Security team . The ideal candidate will be responsible for developing and implementing comprehensive security strategies to protect our organizations information assets. This role involves overseeing security operations, managing security incidents, and ensuring compliance with relevant regulations and standards. Key Responsibilities: Leadership and Strategy: Develop and implement the overall security strategy for the organization. Build, Lead and mentor cyber security team, ensuring continuous development and improvement. Provide strategic direction and guidance on all security-related matters to senior management. Security Operations: Oversees the day-to-day operations of the IT security and cloud security, including monitoring, incident response, and vulnerability management. Knowledge of SIEM, XDR, ASM, DMARC, IAM , cloud security, email security, CASB, DLP is mandatory Experience and knowledge of managing security operations center (SOC). Proficiency with SIEM tools (e.g., Splunk, ArcSight, QRadar). Ability to configure, monitor, and analyze security events. Knowledge of threat hunting, threat modeling, and incident response. Ability to analyze threat data and implement proactive security measures. Cloud Security:Understanding of cloud security principles and best practices for AWS and Google Cloud. Experience with cloud security tools and services Manage and respond to security incidents and breaches, conducting thorough investigations and implementing corrective actions. Risk Management: Identify, assess, and prioritize potential security risks and vulnerabilities. Experience with vulnerability assessment tools (e.g., Nessus, Qualys). Knowledge of patch management processes and remediation strategies. Develop and implement risk mitigation strategies and controls. Conduct regular security assessments and audits to ensure compliance with policies and standards. Policy and Compliance: Develop, review, and update security policies, procedures, and guidelines. Ensure compliance with industry standards and regulatory requirements (e.g., ISO 27001, PCI-DSS, RBI, IRDAI and SEBI). Coordinate and lead internal and external audits related to IT security. Training and Awareness: Promote a culture of security awareness throughout the organization. Technology and Innovation: Stay current with emerging security threats, technologies, and industry trends. Evaluate and implement new security technologies and solutions to enhance the organizations security posture. Qualifications: Education: Bachelors degree in Computer Science, Information Technology, Cybersecurity, or a related field. Relevant certifications such as CISSP, CISM, CISA, or equivalent are highly desirable. Experience: 7 to 10 years of experience in cyber security, with at least 2 years in a Team lead role. Proven experience in developing and implementing security strategies and policies. Strong knowledge of security frameworks, standards, and best practices. Skills: Excellent leadership and team management skills. Strong analytical and problem-solving abilities. Effective communication and interpersonal skills. Proficiency in security tools and technologies (e.g., firewalls, intrusion detection/prevention systems, SIEM). Personal Attributes: High level of integrity and ethical conduct. Ability to work under pressure and manage multiple priorities. Strong attention to detail and accuracy.

Posted 2 months ago

Apply

4 - 6 years

3 - 8 Lacs

Bengaluru

Hybrid

Naukri logo

Kyndryl Location: Bangalore Shift: 7am-4pm,3pm-12pm, 10pm-7am 24*7, Rotational off Transport not provided Interested applicant please apply to the below link: https://kyndryl.wd5.myworkdayjobs.com/KyndrylProfessionalCareers/job/INMANBP-Bangalore-INMANBP-Manyatha/InfoSec-Admin_R-31998 Job Posting Title Security Engineer Job Description Summary Assist in enabling and securing the client's organization, culture and ecosystem. Responsibilities include asset classification models, risk analysis reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. Requires experience in analyzing and translating business requirements into control objectives, designing security controls, and implementation within a security management cycle. Job Description Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science taking information that has been gathered and looking for areas to have that Ah Ha moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Job Qualifications You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Skills and Experience Bachelor’s degree in computer science, Information Security or a related field. 4-6 years of experience in information security, Firewall, VPN (Virtual Private Network) , NAC (Network Access Control), DNS, Infoblox Strong knowledge of security frameworks and standards (e.g., NIST, ISO). Proficiency in security technologies and tools Firewall (Palo Alto, Fortinet), VPN (Citrix), NAC (ForeScout, HP ClearPass Airwave), DNS (Infoblox) Strong communication and teamwork abilities. Ability to work independently and manage multiple tasks simultaneously. Detail-oriented with a focus on delivering high-quality results. Preferred Skills and Experience Relevant certifications (e.g., CISSP, CEH, CISM) are highly desirable. Excellent problem-solving and analytical skills. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed.

Posted 2 months ago

Apply

5 - 8 years

6 - 15 Lacs

Bengaluru

Hybrid

Naukri logo

Kyndryl Location: Bangalore Shift: 7am-4pm,3pm-12pm, 10pm-7am 24*7, Rotational off Transport not provided Interested applicant please apply to the below link: https://kyndryl.wd5.myworkdayjobs.com/KyndrylProfessionalCareers/job/INMANBP-Bangalore-INMANBP-Manyatha/InfoSec-Admin_R-31999 Job Posting Title Security Engineer Job Description Summary Assist in enabling and securing the client's organization, culture and ecosystem. Responsibilities include asset classification models, risk analysis reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. Requires experience in analyzing and translating business requirements into control objectives, designing security controls, and implementation within a security management cycle. Job Description Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science taking information that has been gathered and looking for areas to have that Ah Ha moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you wont find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Job Qualifications Youre good at what you do and possess the required experience to prove it. However, equally as important you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused someone who prioritizes customer success in their work. And finally, youre open and borderless naturally inclusive in how you work with others. Required Skills and Experience Bachelors degree in computer science, Information Security or a related field. 4-6 years of experience in information security, Firewall, VPN (Virtual Private Network) , NAC (Network Access Control), DNS, Infoblox Strong knowledge of security frameworks and standards (e.g., NIST, ISO). Proficiency in security technologies and tools Firewall (Palo Alto, Fortinet), VPN (Citrix), NAC (ForeScout, HP ClearPass Airwave), DNS (Infoblox) Strong communication and teamwork abilities. Ability to work independently and manage multiple tasks simultaneously. Detail-oriented with a focus on delivering high-quality results. Preferred Skills and Experience Relevant certifications (e.g., CISSP, CEH, CISM) are highly desirable. Excellent problem-solving and analytical skills. Ability to work independently and manage multiple tasks simultaneously Being You Diversity is a whole lot more than what we look like or where we come from, its how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But were not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed.

Posted 2 months ago

Apply

5 - 10 years

20 - 35 Lacs

Mumbai Suburbs, Greater Noida, Hyderabad

Work from Office

Naukri logo

EC-Council is the world's largest cyber security technical certification body. We operate in 145 countries globally and we are the owner and developer of various world-famous cyber security programs. We are proud to have trained and certified over 220,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide. Job Description: OT SOC Specialist Position Title : OT SOC Specialist Department : Security Operations Center (SOC) Position Overview: We are seeking a skilled and motivated OT SOC Specialist to join our team and take responsibility for monitoring, analyzing, and defending our Operational Technology (OT) environment from cyber threats. The ideal candidate will have experience in industrial control systems (ICS), SCADA systems, and a deep understanding of the unique cybersecurity challenges associated with OT. This role involves proactive threat detection, incident response, and collaboration with both IT and OT teams to ensure the security and integrity of critical infrastructure. Key Responsibilities: Monitoring & Detection: Continuouslymonitor OT networks, systems, and devices for security threats and vulnerabilities using specialized tools and methodologies tailored for industrial control systems (ICS). Analyze network traffic, system logs, and data from OT devices to detect anomalies, potential threats, and security incidents. Utilize OT-specific threat intelligence feeds, SIEM (Security Information and Event Management), and other monitoring tools to identify cyber risks in real-time. Incident Response & Mitigation: Lead or assist in the investigation and remediation of security incidents involving OT systems. Collaborate with IT and OT teams to develop and implement containment strategies in response to security breaches. Conduct post-incident analysis to determine the root cause and recommend preventive measures to minimize future risks. Vulnerability Management: Participate in regular vulnerability assessments of OT networks and systems to identify potential weaknesses. Work with the OT engineering and IT teams to patch or mitigate vulnerabilities in OT infrastructure. Maintain awareness of emerging threats and vulnerabilities in OT devices and software (e.g., PLCs, RTUs, SCADA). Collaboration & Communication: Collaborate with OT engineers, IT cybersecurity teams, and other stakeholders to improve security posture and align OT-specific security initiatives with overall enterprise security strategies. Provide technical expertise and guidance on OT security best practices, threat landscape, and emerging technologies. Report and escalate security incidents to senior management, ensuring clear and concise communication. Security Hardening & Best Practices: Assist in the development and implementation of OT security policies, standards, and procedures. Promote the adoption of best practices for securing OT systems, such as network segmentation, access control, and regular auditing. Provide training and awareness sessions for OT and IT staff on cybersecurity best practices for industrial control systems. Compliance & Documentation: Ensure compliance with relevant regulatory frameworks, industry standards (e.g.,NIST, IEC 62443, NERC CIP), and internal security policies. Maintain accurate documentation of security incidents, analysis, response actions, and lessons learned. Participate in audits and assessments to ensure the OT environment meets all required security standards. Continuous Improvement: Stay up to date with the latest OT cybersecurity threats, trends, and technologies. Contribute to the continuous improvement of OT security processes and procedures. Participate in simulated attack scenarios (e.g., red teaming, penetration testing) to evaluate the resilience of OT systems. Qualifications & Requirements: Education: Bachelor's degree in Cybersecurity, Information Technology, Industrial Engineering, or related field. Industry certifications (e.g., CISSP, CISM, GIAC GICSP, CompTIA Security+, ISA/IEC 62443) are preferred. Experience: 5+ years of experience in cybersecurity, with at least 2 years focused on Operational Technology (OT) security or Industrial Control Systems (ICS) security. Familiarity with OT/ICS systems such as SCADA, PLCs, RTUs, DCS, and other industrial automation technologies. Experience with OT security tools, SIEM systems, network monitoring tools, and vulnerability management solutions. Hands-on experience with incident detection, analysis, and response in OT environments. Technical Skills: Strong understanding of networking protocols (Modbus, OPC, BACnet, DNP3, etc.) used in OT environments. Proficiency in using SIEM platforms (e.g., Splunk, IBM QRadar), IDS/IPS, firewalls, and endpoint protection tools. Experience with OT-specific security technologies such as firewalls designed for ICS, intrusion detection systems, and industrial network segmentation. Understanding of risk management frameworks, security controls, and regulatory requirements related to OT (e.g., NIST, IEC 62443, NERC CIP). Knowledge of cybersecurity tools and methodologies, including vulnerability scanning, patch management, and endpoint detection. Desirable Attributes: Experience with threat intelligence platforms and analysis. Knowledge of digital forensics techniques and evidence handling. Familiarity with cloud-based OT/ICS systems or hybrid environments. Experience with incident management frameworks such as NIST or ISO 27001. Additional Information We are an equal opportunity workplace and are an affirmative action employer. We are always committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, or Veteran status and we do not discriminate based on such characteristics, or any other status protected by the laws or regulations in the locations where we work. This job description has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job. EC-Council is committed to working with and providing reasonable accommodation to individuals with disabilities. If you have a medical condition or disability which inhibits your ability to complete any part of the application process and need a reasonable accommodation to complete the process, please contact us ecchr@eccouncil.org and let us know how we may assist you. This notice together with our Privacy Policy and Terms of Use of this website and any other documents we mention here are meant to inform you on what personal data about you we collect, use, disclose, share, or otherwise process when you are applying for a job at EC-Council or when EC-Council contacts you for recruitment purposes. Please read carefully to understand our views and practices on how we protect your personal data - Privacy Policy | EC-Council (eccouncil.org).

Posted 2 months ago

Apply

5 - 10 years

10 - 12 Lacs

Chennai

Work from Office

Naukri logo

Key Roles and Responsibilities: Work on strategic projects that ensure the efficient and effective reaction to security breaches to mitigate immediate and potential threats. Use mitigation, preparedness, response and recovery approaches to minimise business disruptions & commercial consequences. Offer detailed technical support investigation and analysis response activities and evaluate the effectiveness of and improvements to existing practices. Conduct regular threat and vulnerability assessments and determine deviations from acceptable configurations or policies. Participate in the assessment of the level of risk and support the development of appropriate mitigation countermeasures in operational and non-operational situations. Analyse evidence to support network vulnerability mitigation. Support peers in the management and implementation of the information security management system. Participate in the implementation of policies, processes and guidelines to ensure the standardisation of security management throughout the organisation. Apply tactics, techniques, and procedures to a full range of tools and processes related to administrative, criminal, and counterintelligence gathering (e.g., in-depth case analyses, continuous monitoring, malware analysis, clear documentation). Collaborates with stakeholders to guide and functional and security requirements. Proactively search through our critical infrastructure, systems and networks to detect and isolate advanced threats that may cause harm to our organisation. Use both manual approaches and automated tools to identify, analyse, and report events and support the development of countermeasures to proactively protect against these threats in the future. Knowledge, Skills and Attributes: Knowledge and understanding of IT industry environment and business needs Strong understanding of information technology and information security

Posted 2 months ago

Apply

5 - 10 years

25 - 30 Lacs

Chennai

Work from Office

Naukri logo

Experience: Minimum 10 years of experience in implementing and handling security related products & services in an organization and out of total experience, 5 years of minimum experience should be as an L2 in SOC management Skills: Experience in 5 or more areas of security like (Antivirus (EPP) / EDR (Endpoint Detection & Response) and Anti-APT (Anti-Advanced Persistent Threat): Trellix / HIPS: Trend Micro / Mobile Device Management (MDM) - Separate resource for MDM: VMWare Work place one / Centralised Log Management Solution (CLMS): Microfocus or IBM / Information Rights Management (IRM): Seclore / Privileged Identity Management (PIM) - Separate resource for PIM: Arcon Important / Anti-Phishing and Anti-Malware)

Posted 2 months ago

Apply

Exploring CISM Jobs in India

The demand for Certified Information Security Manager (CISM) professionals is on the rise in India as organizations are focusing more on securing their digital assets. CISM professionals play a crucial role in designing, implementing, and managing information security programs to protect an organization's sensitive data and information systems.

Top Hiring Locations in India

  1. Bangalore
  2. Mumbai
  3. Delhi
  4. Pune
  5. Hyderabad

Average Salary Range

The average salary range for CISM professionals in India varies based on experience and location. Entry-level positions can expect a salary range of INR 6-10 lakhs per annum, while experienced professionals can earn upwards of INR 20 lakhs per annum.

Career Path

A typical career progression for CISM professionals may include roles such as Information Security Analyst, Information Security Manager, Chief Information Security Officer (CISO), and ultimately, a Senior Information Security Consultant.

Related Skills

In addition to CISM certification, employers often look for professionals with skills such as: - Cybersecurity - Network Security - Security Risk Management - IT Governance

Interview Questions

  • What is the role of CISM in an organization? (basic)
  • Can you explain the difference between CISM and CISSP certifications? (medium)
  • How do you handle a security breach in an organization? (advanced)
  • What is your experience with implementing security policies and procedures? (basic)
  • How do you stay updated with the latest cybersecurity trends and threats? (medium)
  • Can you describe a successful security project you have led in the past? (advanced)
  • What is the importance of risk management in information security? (basic)
  • How do you assess the security posture of an organization? (medium)
  • Explain the concept of defense in depth in cybersecurity. (advanced)
  • How do you ensure compliance with data protection regulations such as GDPR? (medium)
  • Describe a scenario where you had to handle a security incident in real-time. (advanced)
  • How do you prioritize security measures based on risk assessment? (medium)
  • What is the role of encryption in information security? (basic)
  • Can you explain the concept of security governance? (medium)
  • How do you communicate security risks to non-technical stakeholders? (advanced)
  • What is the importance of security awareness training for employees? (basic)
  • How do you conduct a security audit of an organization's systems? (medium)
  • Describe a time when you had to resolve a conflict between security requirements and business needs. (advanced)
  • How do you ensure the continuity of operations in the event of a security incident? (medium)
  • What is the significance of incident response planning in cybersecurity? (basic)
  • How do you handle vendor risk management in information security? (medium)
  • Can you explain the concept of threat intelligence in cybersecurity? (advanced)
  • Describe a situation where you had to make a tough security decision under pressure. (medium)
  • How do you assess the effectiveness of security controls in an organization? (advanced)

Closing Remark

As you prepare for CISM job opportunities in India, remember to showcase your expertise in information security, risk management, and governance during interviews. Stay updated with the latest trends in cybersecurity and practice answering both technical and situational questions confidently. Good luck in your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies