Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: GRC Technology. Experience8-10 Years.
Posted 3 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Coimbatore
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.
Posted 3 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: F5 Load Balancers. Experience8-10 Years.
Posted 3 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Noida
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.
Posted 3 weeks ago
6.0 - 10.0 years
11 - 17 Lacs
Bengaluru
Work from Office
JD Design and implement Splunk ITSI services, KPIs, base searches, correlation searches, and episodes. Manage and optimize telemetry ingestion, transformation, and visualization. Develop and maintain dashboards, reports, and alerts for various stakeholders. Ensure compliance with security standards and best practices. Collaborate with cross-functional teams to integrate Splunk solutions. Qualifications: Experience: 6+ years with Splunk, including at least 2 years with ITSI Skills: Strong hands-on experience with metrics, logs, traces, and telemetry ingestion Certifications: Relevant certifications such as CISSP, CEH, or Splunk-specific certifications Technical Knowledge: Familiarity with Splunk UF, HF, and HEC configurations 1. Good to have Skills: Scripting: Knowledge of Python and Bash scripting 2. Automation: Knowledge of Ansible
Posted 3 weeks ago
15.0 - 25.0 years
25 - 27 Lacs
Navi Mumbai
Work from Office
Notice Period: Immediate/0-15 Days Joiners Only Job Description: We are seeking a highly experienced VP to lead and enhance our cybersecurity audit and assurance programs. The ideal candidate will have extensive experience in conducting and managing penetration testing, red teaming, social engineering assessments, secure code reviews, and full-scale IT and cybersecurity assessments. This leadership role involves overseeing security audits, and strengthening our clients overall security posture. Key Responsibilities: Lead cybersecurity audits and assurance programs across IT systems, applications, and infrastructure for our clients. Oversee penetration testing, red teaming, and social engineering assessments, ensuring effective security testing strategies. Manage secure code reviews and application security assessments to identify and remediate vulnerabilities. Collaborate with SOC teams, vulnerability management teams, and security engineers to enhance threat detection and mitigation. Evaluate third-party security risks and conduct supplier security assessments. Provide executive-level reports on security assurance findings, risks, and mitigation strategies. Ensure compliance with global security standards and frameworks. Mentor and develop a team of cybersecurity auditors, penetration testers, and security analysts. Qualifications and Skills: 15-20 years of experience in cybersecurity audits, security assessments, and assurance programs. Deep expertise in penetration testing, red teaming, social engineering tactics, and secure coding. Strong knowledge of security frameworks such as OWASP, SANS, CIS, NIST 800-53, ISO 27001, SOC 2, and PCI DSS. Experience with security testing tools (Burp Suite, Metasploit, Kali Linux, etc.). Ability to engage with executive leadership and present security risks effectively. Certifications preferred: CISSP, CISA, OSCP, CEH, CRTP, or equivalent.
Posted 3 weeks ago
2.0 - 4.0 years
0 - 1 Lacs
Bengaluru
Work from Office
Way of Working - Office/Field - Employees will work full-time from their base location Role – Sales Manager I Job Responsibilities: Serve as the primary point of contact for assigned client accounts, understanding their goals, needs, and challenges Develop account strategies to overcome the challenges and action plans to meet client objectives and maximize account growth as per the target Conduct regular F2F business reviews with clients, discussing performance, identifying areas for improvement, and presenting new opportunities Track and analyze account performance, sales data, account funnel, and market trends to identify opportunities and challenges Drive business growth for newly onboarded partners by working on their basic hygiene and health metrics Deliver Incremental Revenue from the assigned clients through monetization and commercial improvements Deliver incremental counter share for all assigned clients by strategic planning to dominate market share Maintaining a strong relationship with restaurant owners and delivering best-in-class restaurant NPS Collaborate with internal teams to coordinate and deliver exceptional service to clients, addressing any issues or concerns promptly Generate leads and proactively approach potential clients, presenting our value proposition and securing new partnerships Desired Candidate: Graduate with excellent communication skills. Good working knowledge and experience of e-commerce activities and all online marketing channels Confident, Pleasing and a go-getter personality Effective communication skills Attitude & Aptitude for Sales Should be a team player, working alongside people from all walks of life Analytical, good Excel skills Leadership and Influencing skills: Identify, builds, and use a wide network of contacts with people at all levels, internally and externally. Achieves a good result through a well-planned approach Initiative & Flexibility: Recognizes the need to adapt to change & implement appropriate solutions. Be able to identify opportunities and recommend/influence change to increase the effectiveness and success of campaigns Creativity & Initiative: Demonstrate creativity & originality in their work and have the personal drive and initiative to bring about change and help drive the business forward. Being the face of Swiggy in the market and standing up for the values we believe in Key Skills Required: Customer Lifetime Value Business Development Data Logic Data Interpretation Data Visualization MS Excel Data Analysis Result Orientation Managing Relationships Conflict Management Problem-Solving "We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regards to race, colour, religion, sex, disability status, or any other characteristic protected by the law"
Posted 3 weeks ago
4.0 - 8.0 years
8 - 12 Lacs
Noida
Work from Office
Job Title: Manager Application Security Company Name: Info Edge India Ltd Job Description: As the Manager Application Security, you will be responsible for leading the application security initiatives within Info Edge India Ltd. You will work closely with development teams to ensure that security is integrated into the software development lifecycle. The role involves assessing potential vulnerabilities in applications, implementing security best practices, and ensuring compliance with security standards. You will also be responsible for conducting security assessments, managing security incidents, and providing guidance on secure coding practices. Additionally, you will collaborate with cross-functional teams to promote a culture of security awareness throughout the organization. Key Responsibilities: - Lead application security assessments and conduct security reviews of applications. - Develop and implement application security policies, standards, and guidelines. - Collaborate with development teams to integrate security into the software development lifecycle. - Conduct threat modeling and vulnerability assessments to identify security risks. - Provide training and support to developers on secure coding practices. - Monitor security trends and stay updated on emerging threats and vulnerabilities. - Respond to security incidents and coordinate incident response efforts. - Prepare reports and presentations for management on application security metrics and status. Skills and Tools Required: - Strong understanding of application security principles and best practices. - Experience with application security testing tools, such as static and dynamic analysis tools. - Familiarity with secure coding practices and frameworks (e.g., OWASP Top Ten). - Knowledge of security standards and compliance frameworks (e.g., ISO 27001, NIST). - Proficiency in one or more programming languages (e.g., Java, Python, C#). - Experience in conducting threat modeling and risk assessment. - Strong analytical skills and attention to detail. - Excellent communication and interpersonal skills to work collaboratively with various teams. - Certifications in application security (e.g., Certified Secure Software Lifecycle Professional (CSSLP), Certified Information Systems Security Professional (CISSP)) are a plus.
Posted 3 weeks ago
8.0 - 13.0 years
20 - 30 Lacs
Ahmedabad, Aurangabad
Work from Office
We are looking for Cyber security expert for Ahmedabad location but for 1 year you have to work in aurangabad Location. Candidate must have Certification in CISSP, CISM, CISO, CISA. If you are interested you can DROP your cv on 7009326576.
Posted 3 weeks ago
8 - 10 years
12 - 17 Lacs
Bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Microsoft Threat Protection. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
8 - 12 years
12 - 17 Lacs
Bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
8 - 12 years
12 - 17 Lacs
Pune
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
8 - 10 years
12 - 17 Lacs
Bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: PKI - Certificate Management. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
8 - 10 years
12 - 17 Lacs
Bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Symantec DLP. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
8 - 10 years
12 - 17 Lacs
Bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: SailPoint Identity Now. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
3 - 8 years
11 - 13 Lacs
Pune
Work from Office
Knowledge of operating systems, system administration, and application security. Proficiency in security tools and technologies Experience with incident response methodologies. Strong knowledge of IT security protocols, data privacy standards Required Candidate profile Certified Information Systems Security Professional (CISSP) Vulnerability Scanner/Nessus, CrowdStrike, Cisco Meraki, Forcepoint One. Experience with cloud security and network security.
Posted 1 month ago
1 - 4 years
3 - 6 Lacs
Bengaluru
Work from Office
Who we are Were a leading, global security authority thats disrupting our own category. Our encryption is trusted by the major ecommerce brands, the worlds largest companies, the major cloud providers, entire country financial systems, entire internets of things and even down to the little things like surgically embedded pacemakers. We help companies put trust - an abstract idea - to work. Thats digital trust for the real world. Job Summary The Risk Analyst will support the operational functions of DigiCerts Risk Management and assist in maintaining Vercara GRC practices. This role involves collaboration with team members and stakeholders to ensure effective risk management. What you will do Assist in maintaining the risk register and issues register. Support risk and compliance council meetings. Complete customer security assurance tasks. Assist in policy maintenance and updates. Support external compliance audits and assessments. Assist in third-party risk management and business resiliency support. Support the administration of GRC tools and program documentation. What you will have Bachelors degree in information systems, computer engineering, or computer science. Certifications helpful: CRISC, CISSP, CISA, CSM, CompTIA Security. Experience in IT, risk management, or related roles. Knowledge of GRC functions and standards. Good communication and analytical skills.
Posted 1 month ago
1 - 4 years
4 - 7 Lacs
Bengaluru
Work from Office
We are looking for a highly skilled and experienced Third-Party Risk as a Service (TPRaaS) - Staff to join our team in Bengaluru. The ideal candidate will have 1 to 4 years of experience in Third-Party Risk Management, with expertise in TPRM tools and technology solutions. ### Roles and Responsibility Participate in the delivery of Third-Party Risk Management (TPRM) engagements, including walkthroughs, testing, documentation, and other engagement-related activities. Provide delivery updates during vendor calls and client interactions. Follow policies and procedures to support the successful implementation of TPRM operating models. Assist in process walkthrough discussions to document end-to-end business processes and functional requirements. Contribute to assessing the application of legal and regulatory requirements to clients' TPRM practices. Identify process gaps and propose preventive/corrective actions. Demonstrate interest in developing knowledge of market trends, competitor activities, EY products, and service lines. Adhere strictly to fulfilling project activities to achieve exceptional client service. Work effectively as a team member, sharing responsibility, providing support, maintaining communication, and updating senior team members on progress. Conduct research and assist senior team members in preparing client presentations and information memorandums. Continuously strive towards exceeding client & team expectations and work on increasingly complex assignments. Support management in the preparation of proposals and business development materials. Bring an innovative mindset and analytical thinking capability to enhance service delivery. ### Job Requirements Bachelor's degree in IT/Computer Science, BSc.(IT), BE, MCA from a tier 1 or tier 2 college. 1 to 4 years of demonstrated experience in Risk Management, preferably in Third-Party engagement lifecycle (pre-contracting, contracting, and post-contracting). Basic understanding of the TPRM framework, Risk Management, Information Security practices, and Contract Risk Reviews. Good exposure to TPRM tools and technology solutions, such as GRC enablement solutions (Process Unity, Prevalent, Archer, ServiceNow). Basic knowledge of standards like ISO 27001/2, ISO 22301, ISO 27018, PCI – DSS, HITRUST, etc., and privacy regulations like GDPR, CCPA, etc. Basic knowledge of TCP/IP, OSI layer, networking, security concepts, Physical & Environmental Security, Asset Security, and Identity & Access Management. Good to have certifications: CISSP, CISA, CISM, CTPRP, CIPP, ISO 27001 Lead Auditor or Lead Implementer. Exposure to tools like ProcessUnity, ServiceNow, Archer is desirable.
Posted 1 month ago
6 - 8 years
15 - 20 Lacs
Hyderabad
Work from Office
We are looking for a highly skilled and experienced Cyber Security Consultant to join our team in Bengaluru. The ideal candidate will have 6-8 years of experience in information security, with a focus on email security, security incident management, and EDR solutions. ### Roles and Responsibility Design, implement, and maintain Email security solutions (Proofpoint/M365) to safeguard Email flow. Manage and respond to security alerts triggered by email security solutions. Collaborate with cross-functional teams to integrate security solutions and ensure seamless operations. Monitor and analyze security incidents, responding promptly to security breaches and user incidents. Stay updated on industry best practices and emerging security threats, adapting security protocols as needed. Perform regular security audits and assessments to identify and mitigate risks. Develop and maintain security documentation, policies, and procedures. Provide technical support and guidance to other IT teams to enhance overall security posture. Troubleshoot and resolve security-related issues in a timely manner, continuously improving and optimizing security processes and procedures to enhance efficiency and effectiveness. ### Job Requirements Bachelor's degree in Computer Science, Information Security, or a related field. 6-8 years of professional experience in information security, focusing on email security, security incident management, and EDR solutions. Hands-on experience with Proofpoint email security and its components. Strong understanding of ITIL processes and the ability to handle security escalations as L2/L3. Excellent verbal and written communication skills, proficient in documentation and PowerPoint. Good social, communication, and technical writing skills, capable of interfacing with internal and external clients. Strong analytical problem-solving skills, able to prioritize tasks and work accurately under pressure to meet deadlines. Ability to understand and follow workplace policies and procedures. Proficiency in security tools and technologies, including encryption, O365, AV, and certificates. Relevant certifications such as CISSP, CISM, or relevant certifications are a plus. Excellent problem-solving skills and attention to detail. Strong communication and teamwork skills. Ability to work independently and manage multiple tasks. Willingness to stay current with evolving security technologies and threats. Clear and concise communication skills.
Posted 1 month ago
2 - 7 years
6 - 10 Lacs
Bengaluru
Work from Office
We are looking for a highly motivated and detail-oriented individual with 2 to 7 years of experience to join our team as a Portfolio Compliance Enablement Specialist in Bengaluru. The ideal candidate will have a strong foundation in Cyber Security, Information Security, or a related field. ### Roles and Responsibility Support projects aimed at improving EY's risk posture and adherence to Information Security policies. Assist in the development and execution of compliance strategies and remediation plans under the guidance of more experienced team members. Contribute to the delivery of processes and/or solutions, focusing on quality and effective risk management. Document and translate technical vulnerabilities into business risk terms for stakeholder communication. Participate in the use and improvement of compliance assessment toolkits under supervision. Support assessments for technology infrastructure, applications, and third-party dependencies.### Job Requirements At least 2 years of experience in Cyber Security, Information Security, or a related field. A degree in Cyber Security, Information Security, Computer Science, or a related discipline. Certifications such as Security+, Network+, or interest in pursuing relevant certifications like CRISC, CISSP, CISM, CISA. Basic knowledge of information security standards like ISO 27001/27002, NIST, PCI DSS. Understanding of regulatory requirements such as PCI, SOX, HIPAA, GDPR. Strong communication skills and technical writing skills, and the ability to work effectively within a team environment.
Posted 1 month ago
3 - 8 years
5 - 8 Lacs
Gurugram
Work from Office
We are looking for a highly skilled and experienced Supervising Analyst to join our team in Bengaluru. The ideal candidate will have 3 to 8 years of experience in risk management, compliance, or a related field. ### Roles and Responsibility Serve as part of the GDS Account Data Risk - Independent Control Monitoring team, executing independent testing of controls related to Data Protection at the client account level. Execute control testing in line with EY’s global data protection framework. Consult and collaborate effectively across key data protection stakeholders on testing activities. Evaluate and summarize test results, proposing remediation activities. Document findings and observations to contribute to continuous learning and improvement. Participate in activities supporting a cohesive and balanced approach across Global Risk Management Data Protection and the client account. ### Job Requirements Bachelor's degree and approximately 3+ years of related work experience. Experience or background in quality, risk management, compliance, cybersecurity, or familiarity with data protection law. Strong understanding of metrics and reporting. Ability to work independently and collaboratively within a team environment. Excellent communication and problem-solving skills. IAPP certifications (CIPP/E, CIPP/US, CIPM) are preferred; CISA, CISM, CISSP, or equivalent certifications are also desirable.
Posted 1 month ago
1 - 2 years
7 - 11 Lacs
Kochi
Work from Office
We are looking for a skilled Security Analyst / Consultant with 1 to 2 years of experience to work on various Identity and Access Management projects in the Risk Consulting team. The ideal candidate will have a strong background in security, excellent communication skills, and the ability to work effectively in a team environment. ### Roles and Responsibility Engage in Identity & Access Management projects as an executioner of deliverables. Establish, maintain, and strengthen internal and external relationships. Identify potential business opportunities for EY and GTH within existing engagements and escalate them as appropriate. Anticipate and identify risks within engagements and share issues with senior team members. Collaborate with cross-functional teams to design and implement secure solutions. Develop and maintain documentation of security procedures and protocols. ### Job Requirements Advanced knowledge of LDAP and LDAP-based directories. Minimum 5 years of hands-on experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync). Experience in implementing migration projects from Oracle LDAP/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards, particularly OAuth 2.0 and OIDC. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Hands-on experience in setting up the Identity and Access Management environment in standalone and cluster environments. Development experience on Provisioning Workflows, triggers, Rules, and customizing the tool as per requirements. B.Tech./B.E. with sound technical skills. Strong command over verbal and written English language. Experience in HTML, CSS, and JavaScript. Strong interpersonal and presentation skills. Desirable to have certifications in the security domain, such as CISSP and CISA or any IAM product-specific certifications. AWS Cloud practitioner and Azure AZ-900 certification.
Posted 1 month ago
1 - 2 years
7 - 11 Lacs
Bengaluru
Work from Office
We are looking for a skilled Security Analyst / Consultant with 1 to 2 years of experience to work on various Identity and Access Management projects in the Risk Consulting team. The ideal candidate will have a strong background in security domain, such as CISSP and CISA or any IAM product-specific certifications. ### Roles and Responsibility Engage in Identity & Access Management projects, including execution of deliverables. Establish, maintain, and strengthen internal and external relationships. Identify potential business opportunities for EY and GTH within existing engagements and escalate them as appropriate. Anticipate and identify risks within engagements and share issues with senior team members. Confer and consult with business, technology, and operations to build and manage solutions using PingDirectory, PingDirectory Proxy, and PingData Sync. Perform installation, configuration, and upgradation of Ping Directory instances. Ensure directory architecture, designs, plans, controls, and processes align with both security and business strategy and standards, and communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and deploy globally PingDirectory and PingDirectory Proxy to provide high-volume, low-latency directory solutions. Implement real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory. Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. ### Job Requirements Advanced knowledge of LDAP and LDAP-based directories. Minimum 5 years of hands-on experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync). Experience in implementing migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, particularly OAuth 2.0 and OIDC. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Hands-on experience with cloud providers – Azure or AWS or GCP. Experience in scripting languages like Python, PowerShell, and Bash. Knowledge of other Ping products – Ping Federate and Ping Access. B.Tech./B.E. with sound technical skills. Strong command over verbal and written English language. Experience in HTML, CSS, and JavaScript. Strong interpersonal and presentation skills. Desirable to have certifications in the security domain, such as CISSP and CISA or any IAM product-specific certifications. AWS Cloud practitioner and Azure AZ-900 certification.
Posted 1 month ago
- 3 years
11 - 15 Lacs
Mumbai
Work from Office
We are looking for a highly skilled and experienced Senior Analyst to join our team in Mumbai. The ideal candidate will have 0-3 years of experience, responsible for conducting detailed IT audits to ensure compliance with controls and regulatory mandates. ### Roles and Responsibility Conduct comprehensive IT audits to address and ensure compliance with established controls and regulatory requirements. Identify and review IT General Controls (ITGCs) and IT Application Controls (ITACs) to safeguard organizational assets and ensure the accuracy of financial reporting. Execute SOX compliance activities, including risk assessments, controls testing, and remediation efforts. Prepare and assess Service Organization Control Reports (SOCR) to validate the effectiveness of IT controls objectives. Conduct IT process reviews through stakeholder interviews, data validations, and document analysis. Apply IT-related and internal control knowledge to deliver high-quality engagements. Review Change Management processes, ensuring changes are thoroughly reviewed, tested, and approved. Review Access Management procedures to ensure proper access levels and permissions, and evaluate Segregation of Duties (SOD) concerns to prevent unauthorized access and potential conflicts. Collaborate with cross-functional teams to identify control gaps and develop effective remediation plans. Stay abreast of industry trends, regulatory changes, and emerging technologies related to IT controls and compliance. Prepare and communicate audit findings, recommendations, and status updates to key stakeholders and management. ### Job Requirements Excellent analytical and problem-solving skills with attention to detail. Effective communication and interpersonal skills for collaborating with internal teams and external auditors. Relevant professional certifications such as CISA, CISSP, or equivalent are preferred. Ability to adapt to a fast-paced environment and manage multiple priorities. Strong understanding of IT controls and auditing principles. Experience working with various software applications and systems.
Posted 1 month ago
- 3 years
8 - 12 Lacs
Mumbai
Work from Office
We are looking for a highly skilled and experienced Associate Consultant to join our team in Mumbai. The ideal candidate will have 0-3 years of experience in IT controls and auditing, with excellent analytical and problem-solving skills. ### Roles and Responsibility Conduct comprehensive IT audits to ensure compliance with established controls and regulatory requirements. Identify and review IT General Controls (ITGCs) and IT Application Controls (ITACs) to safeguard organizational assets and ensure accurate financial reporting. Execute SOX compliance activities, including risk assessments, controls testing, and remediation efforts. Prepare and assess Service Organization Control Reports (SOCR) to validate the effectiveness of IT controls objectives. Conduct IT process reviews through stakeholder interviews, data validations, and document analysis. Collaborate with cross-functional teams to identify control gaps and develop effective remediation plans. Review Change Management processes, ensuring that changes are thoroughly reviewed, tested, and approved. Evaluate and address Segregation of Duties (SOD) concerns to prevent unauthorized access and potential conflicts. Stay abreast of industry trends, regulatory changes, and emerging technologies related to IT controls and compliance. Prepare and communicate audit findings, recommendations, and status updates to key stakeholders and management. ### Job Requirements Excellent analytical and problem-solving skills with attention to detail. Effective communication and interpersonal skills for collaborating with internal teams and external auditors. Relevant professional certifications such as CISA, CISSP, or equivalent are preferred. Ability to adapt to a fast-paced environment and manage multiple priorities. Strong knowledge of IT controls, auditing, and compliance. Experience working with EY or similar organizations is an advantage.
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The demand for CISSP (Certified Information Systems Security Professional) professionals in India has been on the rise as companies recognize the importance of securing their digital assets. CISSP jobs offer lucrative career opportunities in various industries ranging from IT to finance. If you are a job seeker looking to enter this field, here is a comprehensive guide to help you navigate the CISSP job market in India.
These cities are known for their thriving IT sectors and are hotspots for CISSP job opportunities.
The average salary range for CISSP professionals in India varies based on experience levels. Entry-level positions can expect to earn around INR 6-8 lakhs per annum, while experienced professionals with 5+ years of experience can command salaries upwards of INR 15 lakhs per annum.
A typical career progression in the CISSP field may involve starting as a Security Analyst, moving on to roles such as Security Consultant, Security Manager, and eventually reaching a Chief Information Security Officer (CISO) position.
In addition to CISSP certification, employers often look for professionals with skills in network security, risk management, penetration testing, and knowledge of regulatory compliance such as GDPR and HIPAA.
As you prepare for CISSP job interviews in India, remember to showcase your expertise in information security, stay updated with industry trends, and demonstrate your problem-solving skills. With the right combination of technical knowledge and experience, you can embark on a successful career in the exciting field of cybersecurity. Good luck with your job search!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2