Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
5 - 10 years
20 - 35 Lacs
Mumbai Suburbs, Greater Noida, Hyderabad
Work from Office
EC-Council is the world's largest cyber security technical certification body. We operate in 145 countries globally and we are the owner and developer of various world-famous cyber security programs. We are proud to have trained and certified over 220,000 information security professionals globally that have influenced the cyber security mindset of countless organizations worldwide. Job Description: OT SOC Specialist Position Title : OT SOC Specialist Department : Security Operations Center (SOC) Position Overview: We are seeking a skilled and motivated OT SOC Specialist to join our team and take responsibility for monitoring, analyzing, and defending our Operational Technology (OT) environment from cyber threats. The ideal candidate will have experience in industrial control systems (ICS), SCADA systems, and a deep understanding of the unique cybersecurity challenges associated with OT. This role involves proactive threat detection, incident response, and collaboration with both IT and OT teams to ensure the security and integrity of critical infrastructure. Key Responsibilities: Monitoring & Detection: Continuouslymonitor OT networks, systems, and devices for security threats and vulnerabilities using specialized tools and methodologies tailored for industrial control systems (ICS). Analyze network traffic, system logs, and data from OT devices to detect anomalies, potential threats, and security incidents. Utilize OT-specific threat intelligence feeds, SIEM (Security Information and Event Management), and other monitoring tools to identify cyber risks in real-time. Incident Response & Mitigation: Lead or assist in the investigation and remediation of security incidents involving OT systems. Collaborate with IT and OT teams to develop and implement containment strategies in response to security breaches. Conduct post-incident analysis to determine the root cause and recommend preventive measures to minimize future risks. Vulnerability Management: Participate in regular vulnerability assessments of OT networks and systems to identify potential weaknesses. Work with the OT engineering and IT teams to patch or mitigate vulnerabilities in OT infrastructure. Maintain awareness of emerging threats and vulnerabilities in OT devices and software (e.g., PLCs, RTUs, SCADA). Collaboration & Communication: Collaborate with OT engineers, IT cybersecurity teams, and other stakeholders to improve security posture and align OT-specific security initiatives with overall enterprise security strategies. Provide technical expertise and guidance on OT security best practices, threat landscape, and emerging technologies. Report and escalate security incidents to senior management, ensuring clear and concise communication. Security Hardening & Best Practices: Assist in the development and implementation of OT security policies, standards, and procedures. Promote the adoption of best practices for securing OT systems, such as network segmentation, access control, and regular auditing. Provide training and awareness sessions for OT and IT staff on cybersecurity best practices for industrial control systems. Compliance & Documentation: Ensure compliance with relevant regulatory frameworks, industry standards (e.g.,NIST, IEC 62443, NERC CIP), and internal security policies. Maintain accurate documentation of security incidents, analysis, response actions, and lessons learned. Participate in audits and assessments to ensure the OT environment meets all required security standards. Continuous Improvement: Stay up to date with the latest OT cybersecurity threats, trends, and technologies. Contribute to the continuous improvement of OT security processes and procedures. Participate in simulated attack scenarios (e.g., red teaming, penetration testing) to evaluate the resilience of OT systems. Qualifications & Requirements: Education: Bachelor's degree in Cybersecurity, Information Technology, Industrial Engineering, or related field. Industry certifications (e.g., CISSP, CISM, GIAC GICSP, CompTIA Security+, ISA/IEC 62443) are preferred. Experience: 5+ years of experience in cybersecurity, with at least 2 years focused on Operational Technology (OT) security or Industrial Control Systems (ICS) security. Familiarity with OT/ICS systems such as SCADA, PLCs, RTUs, DCS, and other industrial automation technologies. Experience with OT security tools, SIEM systems, network monitoring tools, and vulnerability management solutions. Hands-on experience with incident detection, analysis, and response in OT environments. Technical Skills: Strong understanding of networking protocols (Modbus, OPC, BACnet, DNP3, etc.) used in OT environments. Proficiency in using SIEM platforms (e.g., Splunk, IBM QRadar), IDS/IPS, firewalls, and endpoint protection tools. Experience with OT-specific security technologies such as firewalls designed for ICS, intrusion detection systems, and industrial network segmentation. Understanding of risk management frameworks, security controls, and regulatory requirements related to OT (e.g., NIST, IEC 62443, NERC CIP). Knowledge of cybersecurity tools and methodologies, including vulnerability scanning, patch management, and endpoint detection. Desirable Attributes: Experience with threat intelligence platforms and analysis. Knowledge of digital forensics techniques and evidence handling. Familiarity with cloud-based OT/ICS systems or hybrid environments. Experience with incident management frameworks such as NIST or ISO 27001. Additional Information We are an equal opportunity workplace and are an affirmative action employer. We are always committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, or Veteran status and we do not discriminate based on such characteristics, or any other status protected by the laws or regulations in the locations where we work. This job description has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job. EC-Council is committed to working with and providing reasonable accommodation to individuals with disabilities. If you have a medical condition or disability which inhibits your ability to complete any part of the application process and need a reasonable accommodation to complete the process, please contact us ecchr@eccouncil.org and let us know how we may assist you. This notice together with our Privacy Policy and Terms of Use of this website and any other documents we mention here are meant to inform you on what personal data about you we collect, use, disclose, share, or otherwise process when you are applying for a job at EC-Council or when EC-Council contacts you for recruitment purposes. Please read carefully to understand our views and practices on how we protect your personal data - Privacy Policy | EC-Council (eccouncil.org).
Posted 2 months ago
5 - 10 years
10 - 12 Lacs
Chennai
Work from Office
Key Roles and Responsibilities: Work on strategic projects that ensure the efficient and effective reaction to security breaches to mitigate immediate and potential threats. Use mitigation, preparedness, response and recovery approaches to minimise business disruptions & commercial consequences. Offer detailed technical support investigation and analysis response activities and evaluate the effectiveness of and improvements to existing practices. Conduct regular threat and vulnerability assessments and determine deviations from acceptable configurations or policies. Participate in the assessment of the level of risk and support the development of appropriate mitigation countermeasures in operational and non-operational situations. Analyse evidence to support network vulnerability mitigation. Support peers in the management and implementation of the information security management system. Participate in the implementation of policies, processes and guidelines to ensure the standardisation of security management throughout the organisation. Apply tactics, techniques, and procedures to a full range of tools and processes related to administrative, criminal, and counterintelligence gathering (e.g., in-depth case analyses, continuous monitoring, malware analysis, clear documentation). Collaborates with stakeholders to guide and functional and security requirements. Proactively search through our critical infrastructure, systems and networks to detect and isolate advanced threats that may cause harm to our organisation. Use both manual approaches and automated tools to identify, analyse, and report events and support the development of countermeasures to proactively protect against these threats in the future. Knowledge, Skills and Attributes: Knowledge and understanding of IT industry environment and business needs Strong understanding of information technology and information security
Posted 2 months ago
5 - 10 years
25 - 30 Lacs
Chennai
Work from Office
Experience: Minimum 10 years of experience in implementing and handling security related products & services in an organization and out of total experience, 5 years of minimum experience should be as an L2 in SOC management Skills: Experience in 5 or more areas of security like (Antivirus (EPP) / EDR (Endpoint Detection & Response) and Anti-APT (Anti-Advanced Persistent Threat): Trellix / HIPS: Trend Micro / Mobile Device Management (MDM) - Separate resource for MDM: VMWare Work place one / Centralised Log Management Solution (CLMS): Microfocus or IBM / Information Rights Management (IRM): Seclore / Privileged Identity Management (PIM) - Separate resource for PIM: Arcon Important / Anti-Phishing and Anti-Malware)
Posted 2 months ago
8 - 12 years
25 - 30 Lacs
Bengaluru
Work from Office
At EY, you ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cybersecurity Solution Architect Today s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of over 900 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team help protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entre security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting, and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Security Technology Services (STS) group is a division of Information Security that ensures secure access to systems and information for more than 390,000 people in over 150 countries. A Cybersecurity Architect on the STS team is responsible for turning strategic plans into reality by producing architectural designs, leading the development of solutions, and offering security advice to project teams. This person will also oversee experimental projects to determine the best technology choices for integration into EYs infrastructure. Your key responsibilities Connect with key stakeholders, cybersecurity experts, and operational teams within the information security department to help create security solutions that work well on a large scale. Collaborate with Enterprise Architects to make sure solutions are in line with the companys long-term goals, follow design guidelines, and contribute to the direction of projects when necessary. Turn business requirements into technical specifications for solutions, considering risks, dependencies, costs, and the overall risk of the technical solution. Lead the technical side of evaluating and choosing technologies through Requests for Information (RFI) and Requests for Proposal (RFP), which includes: Defining the criteria that will influence technology choices and solution development. Gather and summarize technology research and recommendations for leaders to make decisions. Oversee experimental projects, designs, and the actual building of solutions from an architectural standpoint. Create and update artifacts that describe solution architecture to guide the planning, design, and implementation of the chosen solution. Keep up with the latest in the industry, research thoroughly, and continuously learn about new security technologies. Share expertise with project teams, governance groups, and other audiences as required. Build and keep a network of contacts from different IT and security organizations. Create standards for security technology. Travel requirements Skills and attributes for success Proficient in leading the development and direction of solution architecture. Knowledgeable in security protection technologies, particularly those from Checkpoint, Zscaler, Entra Intra Internet Access and Azure Firewall Extensive experience in Network Protection, including Cloud Secure Web Gateways (CSWG), Zero Trust Network Access (ZTNA), Intrusion Prevention Systems (IPS), Network Detection and Response (NDR), and Network Access Control (NAC). Successfully directed enterprise projects involving complex network technologies such as Next-Generation Firewalls, Expressroute, Secure Access Service Edge (SASE), ZPA and ZIA. Skilled in Network solutions and infrastructure platforms, including Azure Networking/Network Security Groups (NSG), Azure Firewall, SASE, Software-Defined Wide Area Network (SD-WAN), Wide Area Network (WAN), Local Area Network (LAN), management/monitoring tools, Domain Name System (DNS), and wireless technologies. Exposure to Cybersecurity capabilities Vulnerability management, Qualys, Sentinel, Defender XDR, Vulnerability Management and SOAR Experience in building and maintaining client-service relationships, with an understanding of the importance of internal customers. Excellent communication and presentation skills, capable of effectively conveying information to executive leadership. Sensitivity to the perspective of various audiences, both technical and non-technical. Experience in creating security architecture documentation, such as vision statements and Solution Architecture (SA) Design documents. Well versed in common Information Security practices and the CISSP domains Able to identify opportunities for Cybersecurity transformation or enhancements To qualify for the role, you must have Degree in Computer Science, Engineering or equivalent work experience 12+ years of experience in the Information Technology field 2+ years of senior architecture experience, exposure to enterprise architecture teams. 3+ years working with network protection technologies Ideally, you ll also have Security certification such as CISSP, CCIE or CISM TOGAF and/or SABSA architecture framework SANS Certifications including: GSEC, ECSA, ECSP What we look for Deep critical thinking skills demonstrating analytical and systematic approach to problem solving Experience working in a global virtual environment Excellent written verbal communication skills, including preparation delivery of presentations Good judgment, tact, and decision-making ability Ability to understand and integrate cultural differences and motives and to work with cross cultural teams. Ability to deal with ambiguity and change, and exercise appropriate time management to meet objectives Ability to work autonomously but also within a team environment where necessary What we offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial, and social well-being. Your recruiter can talk to you about the benefits available in your country. Here s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 2 months ago
2 - 7 years
4 - 9 Lacs
Chennai, Pune, Delhi
Work from Office
Location: Office-Based / Home-Based / Hybrid- India Position Summary: The candidate will be part of a dedicated software security team (AppSec) at Bentley Systems. The product security team s main responsibility is the security of software created by Bentley. This includes a wide variety of technologies: C#, Typescript, JavaScript, Node.js, single-page applications and Electron applications, Azure cloud services, K8s, and more. The successful candidate will have the opportunity to learn skills such as cloud, Agile, Dev(Sec)Ops, etc. and will work as part of a multinational, diverse team of remotely placed experts . Your Day-to-Day: Major ( 75% of time): Threat-model applications Minor ( 25% of time): Define security best practices and standards. Perform security architecture and design reviews of applications. Work independently with developers to ensure secure design, development, implementation, and verification of applications. Provide remediation guidance and recommendations to developers and administrators. Lead Secure Software Development Lifecycle best practices and standards. Participate in and advance threat modeling practices. Help stakeholders make risk-based decisions. Train developers and create educational presentations. Develop tools and automation supporting responsibilities. What You Bring to The Team: Qualifications - Required Strong interest in software security and development. Strong problem-solving capabilities using various technologies. Capability to research a new topic and to learn quickly. Experience breaking down complex systems and applications to identify threats. Excellent ability to communicate, verbally and in writing, complicated technical issues and the risks they pose to developers, network engineers, system administrators, and management. Proficiency in reading, writing, and auditing code and the ability to learn new languages/technologies. Demonstrated proficiency in cloud and web technologies. 5-7 years of development experience 2+ years development lead experience. Qualifications - Preferred 1 -2 years of application security experience. Experience threat modeling software systems. Experience applying OWASP Top10 or SANS Top 25. Experience with OAuth 2.0/OpenID Connect. Optional skills: Relevant security certifications (CCSP, CISSP, CEH, etc.) Knowledge of containerization solutions, such as Kubernetes, Docker, and Istio. What We Offer: Step into a collaborative work environment where ideas flourish, and teamwork propels us forward towards shared success; see our colleague video for a taste of our culture and watch this short documentary about how we got our start. An attractive salary and benefits package. Bentley Impact Day: take a day off from work to volunteer with an organization of your choice. Celebrate milestone achievements and moments that matter through our colleague recognition award programs and our Bentley Achievers platform. A commitment to inclusion, belonging and colleague wellbeing through global initiatives and resource groups. Be part of a company committed to making a real difference by advancing the world s infrastructure for better quality of life, where your contributions help build a more sustainable, connected, and resilient world. Discover our latest user success stories for an insight into our global impact. About Bentley Systems: Bentley Systems (Nasdaq: BSY) is the infrastructure engineering software company. We provide innovative software to advance the world s infrastructure - sustaining both the global economy and environment. Our industry-leading software solutions are used by professionals, and organizations of every size, for the design, construction, and operations of roads and bridges, rail and transit, water and wastewater, public works and utilities, buildings and campuses, mining, and industrial facilities. Our offerings, powered by the iTwin Platform for infrastructure digital twins, include MicroStation and Bentley Open applications for modeling and simulation, Seequent s software for geoprofessionals, and Bentley Infrastructure Cloud encompassing ProjectWise for project delivery, SYNCHRO for construction management, and AssetWise for asset operations. Bentley Systems 5,200 colleagues generate annual revenues of more than $1 billion in 194 countries. www.bentley.com Equal Opportunity Employer: Bentley is proud to be an equal opportunity employer and considers for employment all qualified applicants without regard to race, color, gender/gender identity, sexual orientation, disability, marital status, religion/belief, national origin, caste, age, or any other characteristic protected by local law or unrelated to job qualifications.
Posted 2 months ago
2 - 7 years
4 - 9 Lacs
Chennai, Pune, Delhi
Work from Office
Location: Office-Based / Home-Based / Hybrid- India Position Summary: The candidate will be part of a dedicated software security team (AppSec) at Bentley Systems. The product security team s main responsibility is the security of software created by Bentley. This includes a wide variety of technologies: C#, Typescript, JavaScript, Node.js, single-page applications and Electron applications, Azure cloud services, K8s, and more. The successful candidate will have the opportunity to learn skills such as cloud, Agile, Dev(Sec)Ops, etc. and will work as part of a multinational, diverse team of remotely placed experts . Your Day-to-Day: Major ( 75% of time): Threat-model applications Minor ( 25% of time): Define security best practices and standards. Perform security architecture and design reviews of applications. Work independently with developers to ensure secure design, development, implementation, and verification of applications. Provide remediation guidance and recommendations to developers and administrators. Lead Secure Software Development Lifecycle best practices and standards. Participate in and advance threat modeling practices. Help stakeholders make risk-based decisions. Train developers and create educational presentations. Develop tools and automation supporting responsibilities. What You Bring to The Team: Qualifications - Required Strong interest in software security and development. Strong problem-solving capabilities using various technologies. Capability to research a new topic and to learn quickly. Experience breaking down complex systems and applications to identify threats. Excellent ability to communicate, verbally and in writing, complicated technical issues and the risks they pose to developers, network engineers, system administrators, and management. Proficiency in reading, writing, and auditing code and the ability to learn new languages/technologies. Demonstrated proficiency in cloud and web technologies. 5-7 years of development experience 2+ years development lead experience. Qualifications - Preferred 1 -2 years of application security experience. Experience threat modeling software systems. Experience applying OWASP Top10 or SANS Top 25. Experience with OAuth 2.0/OpenID Connect. Optional skills: Relevant security certifications (CCSP, CISSP, CEH, etc.) Knowledge of containerization solutions, such as Kubernetes, Docker, and Istio. What We Offer: Step into a collaborative work environment where ideas flourish, and teamwork propels us forward towards shared success; see our colleague video for a taste of our culture and watch this short documentary about how we got our start. An attractive salary and benefits package. Bentley Impact Day: take a day off from work to volunteer with an organization of your choice. Celebrate milestone achievements and moments that matter through our colleague recognition award programs and our Bentley Achievers platform. A commitment to inclusion, belonging and colleague wellbeing through global initiatives and resource groups. Be part of a company committed to making a real difference by advancing the world s infrastructure for better quality of life, where your contributions help build a more sustainable, connected, and resilient world. Discover our latest user success stories for an insight into our global impact.
Posted 2 months ago
5 - 10 years
7 - 12 Lacs
Mumbai
Work from Office
Role Details: The IT Compliance Manager is responsible for ensuring that the bank's IT systems and processes adhere to regulatory requirements and industry standards. This role involves developing and implementing IT compliance strategies, managing audits, and collaborating with various departments to maintain a robust compliance framework. Key Responsibilities: Develop and oversee the bank's IT compliance strategy, policies, and procedures. Ensure compliance with all relevant regulatory requirements, including RBI guidelines and international standards. Conduct regular assessments of IT systems and processes to identify compliance gaps. Collaborate with IT teams to implement corrective actions and improvements as necessary. Stay up-to-date with changes in IT regulations and industry best practices. Prepare and submit compliance reports to regulatory authorities. Manage a team of compliance professionals and provide guidance and training. Foster a culture of compliance awareness and ethical behaviour within the IT department. Education and Work Experience: Bachelor's degree in Computer Science, Information Technology, or a related field. Relevant certifications (e.g., CISA, CISM, CISSP) is a plus. Minimum of 5 years of experience in IT compliance, governance, or related roles within the banking or financial services industry. Strong understanding of Indian banking regulations and IT security standards. Experience in leading compliance audits and assessments. Excellent communication and leadership skills. Ability to work collaboratively with cross-functional teams.
Posted 2 months ago
1 - 6 years
0 - 0 Lacs
Chennai
Hybrid
Job Description Sailpoint Developer Skills and attributes for success At least 3-4 years of IAM experience in SailPoint IdentityIQ, Identity Now, Saviynt & OIM. At least 3 years of experience in two or more of the following IAM products: SailPoint IdentityIQ, Identity Now, OIM, or Saviynt Experience in Leading the design, implementation, and maintenance of any IGA Products : Identity Now, IdentityIQ, Saviynt & OIM solutions Hands-on experience with IdentityNow, IdentityIQ, and OIM Expertise in Saviynt can be considered if skillset not found in SailPoint IIQ or IDN or OIM Evaluate current IAM solutions and identify areas for improvement Develop and implement IAM policies and procedures Work collaboratively with cross-functional teams to ensure alignment with business goals Provide technical expertise and guidance to project teams Conduct risk assessments and develop mitigation strategies Provide technical support for IAM issues and incidents Stay up to date with the latest IAM technologies and trends Must have experience in application onboarding, provisioning, workflow customization, access review in IAM. Experience in managing complex IAM projects Strong understanding of IAM policies and procedures CISSP, CISM, or other relevant IAM certifications preferred Ability to work independently and manage multiple priorities Design, implement and maintain Oracle Identity Manager (OIM), Oracle Internet Directory (OID) and LDAP systems and infrastructure. Develop and maintain technical documentation for IAM systems and infrastructure. Plan and execute migrations and upgrades for OIM, OID and LDAP systems and infrastructure. Troubleshoot and resolve complex OIM, OID, OAM, and LDAP-related issues. Work with vendors to resolve compatibility issues and ensure the best performance of OIM, OID and LDAP systems and infrastructure. Implement and maintain security and access controls for OIM, OID, and LDAP systems and infrastructure. Mentor and provide guidance to junior IAM engineers. SailPoint connector development experience with both out-of-the-box and custom connectors. Configuring QuickLinks and reports customisation Should have exposure to a variety of programming languages and technologies, including, but not limited to, J2EE (JSP, Servlets, EJB, XML, Java), .Net, Oracle, DB2, and MS/SQL Should have good understanding in concepts such as self-service, automated approval process, RBAC, attestation, separation of duties and recertification Having experience/knowledge in following technologies would be an advantage: LDAP, PKI, SSL. Should have had direct client experience, including working with client teams in an on-site and offshore mode High level networking knowledge is preferred Should have experience in implementing at least one complete IAM SDLC engagements projects. This must include activities such as requirements gathering, analysis, design, development, testing, deployment and application support Should have experience in delivering IT projects. This includes activities such as requirements analysis, defining architecture, and conducting detailed technical design, development, and lead solution delivery Should have exposure to a variety of programming languages and technologies, including, but not limited to, J2EE (JSP, Servlets, EJB, XML, Java), .Net, Oracle, DB2, and MS/SQL Should have good understanding in concepts such as self-service, automated approval process, RBAC, attestation, separation of duties and recertification Should have worked on both out-of-the-box adapters/interfaces and custom adapters /interfaces for IAM enterprise solutions. Having experience/knowledge in following technologies would be an advantage: LDAP, PKI, SSL, Should have experience in carrying out application integration with the IAM solution Should have had direct client experience, including working with client teams in an on-site and offshore mode Should have Knowledge of Linux and Windows operating system High level networking knowledge is preferred Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications Skills Expertise SailPoint IdentityIQ 7.0 or later, Identity Now Knowledge on cloud technologies like Microsoft Azure and AWS Experience in other similar IGA products like OIM and Saviynt Knowledge on REST APIs, JSON and postman tool Knowledge on Java, SQL. Scripting knowledge like PowerShell, Perl, ruby etc. Good soft skills i.e. verbal & written communication, technical document writing etc. Exposure to global security standards e.g. PCI, SOX, HIPAA etc. Experience in managing small to large sized organization. Prior experience working in remote teams on global scale. Excellent analytical and problem-solving skills Customer orientation skills.
Posted 2 months ago
2 - 6 years
0 - 0 Lacs
Chennai
Hybrid
JOB DESCRIPTION SAILPOINT DEVELOPER Your key responsibilities Engage and contribute to the Identity & Access Management projects Work effectively as a team member, sharing responsibility, providing support, maintaining communication and updating senior team members on progress Execute the engagement requirements, along with review of work by junior team members Help prepare reports and schedules that will be delivered to clients and other interested parties Develop and maintain productive working relationships with client personnel Build strong internal relationships within EY Consulting Services and with other services across the organization Help senior team members in performance reviews and contribute to performance feedback for staff/junior level team members Contribute to people related initiatives including recruiting and retaining IAM professionals Maintain an educational program to continually develop personal skills Understand and follow workplace policies and procedures Building a quality culture at GDS Manage the performance management for the direct reportees, as per the organization policies Foster teamwork and lead by example Training and mentoring of project resources Participating in the organization-wide people initiatives Skills and attributes for success At least 3-4 years of IAM experience in SailPoint IdentityIQ, Identity Now, Saviynt & OIM. At least 3 years of experience in two or more of the following IAM products: SailPoint IdentityIQ, Identity Now, OIM, or Saviynt Experience in Leading the design, implementation, and maintenance of any IGA Products : Identity Now, IdentityIQ, Saviynt & OIM solutions Hands-on experience with IdentityNow, IdentityIQ, and OIM Expertise in Saviynt can be considered if skillset not found in SailPoint IIQ or IDN or OIM Evaluate current IAM solutions and identify areas for improvement Develop and implement IAM policies and procedures Work collaboratively with cross-functional teams to ensure alignment with business goals Provide technical expertise and guidance to project teams Conduct risk assessments and develop mitigation strategies Provide technical support for IAM issues and incidents Stay up to date with the latest IAM technologies and trends Must have experience in application onboarding, provisioning, workflow customization, access review in IAM. Experience in managing complex IAM projects Strong understanding of IAM policies and procedures CISSP, CISM, or other relevant IAM certifications preferred Ability to work independently and manage multiple priorities Design, implement and maintain Oracle Identity Manager (OIM), Oracle Internet Directory (OID) and LDAP systems and infrastructure. Develop and maintain technical documentation for IAM systems and infrastructure. Plan and execute migrations and upgrades for OIM, OID and LDAP systems and infrastructure. Troubleshoot and resolve complex OIM, OID, OAM, and LDAP-related issues. Work with vendors to resolve compatibility issues and ensure the best performance of OIM, OID and LDAP systems and infrastructure. Implement and maintain security and access controls for OIM, OID, and LDAP systems and infrastructure. Mentor and provide guidance to junior IAM engineers. SailPoint connector development experience with both out-of-the-box and custom connectors. Configuring QuickLinks and reports customisation Should have exposure to a variety of programming languages and technologies, including, but not limited to, J2EE (JSP, Servlets, EJB, XML, Java), .Net, Oracle, DB2, and MS/SQL Should have good understanding in concepts such as self-service, automated approval process, RBAC, attestation, separation of duties and recertification Having experience/knowledge in following technologies would be an advantage: LDAP, PKI, SSL. Should have had direct client experience, including working with client teams in an on-site and offshore mode High level networking knowledge is preferred Should have experience in implementing at least one complete IAM SDLC engagements projects. This must include activities such as requirements gathering, analysis, design, development, testing, deployment and application support Should have experience in delivering IT projects. This includes activities such as requirements analysis, defining architecture, and conducting detailed technical design, development, and lead solution delivery Should have exposure to a variety of programming languages and technologies, including, but not limited to, J2EE (JSP, Servlets, EJB, XML, Java), .Net, Oracle, DB2, and MS/SQL Should have good understanding in concepts such as self-service, automated approval process, RBAC, attestation, separation of duties and recertification Should have worked on both out-of-the-box adapters/interfaces and custom adapters /interfaces for IAM enterprise solutions. Having experience/knowledge in following technologies would be an advantage: LDAP, PKI, SSL, Should have experience in carrying out application integration with the IAM solution Should have had direct client experience, including working with client teams in an on-site and offshore mode Should have Knowledge of Linux and Windows operating system High level networking knowledge is preferred Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications Skills Expertise SailPoint IdentityIQ 7.0 or later, Identity Now Knowledge on cloud technologies like Microsoft Azure and AWS Experience in other similar IGA products like OIM and Saviynt Knowledge on REST APIs, JSON and postman tool Knowledge on Java, SQL. Scripting knowledge like PowerShell, Perl, ruby etc. Good soft skills i.e. verbal & written communication, technical document writing etc. Exposure to global security standards e.g. PCI, SOX, HIPAA etc. Experience in managing small to large sized organization. Prior experience working in remote teams on global scale. Excellent analytical and problem-solving skills Customer orientation skills. Certification: SailPoint Engineer Certification (Good to have) ITIL or equivalent (Good to have) CISSP (Good to have) To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in IAM domain like SailPoint IdentityIQ, IDN & OIM. Strong interpersonal and presentation skills. 6-9 Years Work Experience Work Requirements: Willingness to travel as required Willingness to be on call support engineer and work occasional overtime as required Willingness to work in shifts as require What we look for Who has hands on experience in setting up the Identity and Access Management environment in standalone and cluster environment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What working at EY offers At EY, were dedicated to helping our clients, from startups to Fortune 500 companies and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way thats right for you About EY As a global leader in Assurance, Tax, Strategy & transactions and Consulting services, were using the finance products, expertise and systems weve developed to build a better working world. That starts with a culture that believes in giving you the training, opportunities and creative freedom to make things better. Whenever you join, however long you stay, the exceptional EY experience lasts a lifetime. And with a commitment to hiring and developing the most passionate people, well make our ambition to be the best employer by 2020 a reality. If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible. Join us in building a better working world. Apply now
Posted 2 months ago
5 - 8 years
7 - 10 Lacs
Hyderabad
Work from Office
OVERVIEW: Skillsoft is currently seeking an experienced and motivated Senior Network and Security Engineer to assist with ensuring a comprehensive, proactive and complete network and security for a customized eLearning solutions in a SaaS data center and cloud environment. OPPORTUNITY HIGHLIGHTS: Ensure security for complex software solutions for Fortune 1000 customers Responsible for the Fedramp compliance programs Work with SOC 2, UKCE, IRAP and ISO 27001 compliance programs Respond to customer RFPs/RFIs as well attending meetings Enforce system and environment security standards Create and maintain network and security documentation for Skillsoft operating environments Facilitate third-party and customer penetration tests and/or security assessments Remain abreast of security developments and trends SKILLS & QUALIFICATIONS: At least 5 years of experience in a compliance related programs Excellent communication skills to interact with technical and non-technical stakeholders Good readingcomprehension and writing skills Good knowledge of industry technologies including the Cloud. Security certifications such as CISM and CISSP considered and asset
Posted 2 months ago
5 - 10 years
7 - 12 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : ServiceNow Governance, Risk, and Compliance (GRC) Good to have skills : Security Architecture Design Minimum 5 year(s) of experience is required Educational Qualification : BTECH Summary:As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve documenting the implementation of the cloud security controls and transitioning to cloud security-managed operations using ServiceNow Governance Risk and Compliance (GRC) as the primary skill. Roles & Responsibilities:- Lead the development and implementation of the cloud security framework and architecture using ServiceNow Governance Risk and Compliance (GRC) as the primary skill.- Ensure that the cloud security framework and architecture meet the business requirements and performance goals.- Document the implementation of the cloud security controls and transition to cloud security-managed operations.- Collaborate with cross-functional teams to ensure that the cloud security framework and architecture are aligned with the overall security strategy.- Stay updated with the latest advancements in security architecture design and integrate innovative approaches for sustained competitive advantage. Professional & Technical Skills:- Must To Have Skills:Experience in ServiceNow Governance Risk and Compliance (GRC).- Good To Have Skills:Security Architecture Design.- Strong understanding of cloud security framework and architecture.- Experience in documenting the implementation of cloud security controls and transitioning to cloud security-managed operations.- Solid grasp of security strategy and cross-functional collaboration. Additional Information:- The candidate should have a minimum of 5 years of experience in ServiceNow Governance Risk and Compliance (GRC).- The ideal candidate will possess a strong educational background in computer science, information technology, or a related field, along with a proven track record of delivering impactful security solutions.- This position is based at our Gurugram office. Qualifications BTECH
Posted 2 months ago
12 - 17 years
14 - 19 Lacs
Noida
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : ServiceNow Governance, Risk, and Compliance (GRC) Good to have skills : Security Architecture Design Minimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Your typical day will involve designing and implementing security solutions, collaborating with cross-functional teams, and ensuring compliance with governance and risk management standards. Roles & Responsibilities: Expected to be an SME in ServiceNow Governance, Risk, and Compliance (GRC) Collaborate and manage the team to perform effectively Responsible for team decisions and ensuring adherence to security standards Engage with multiple teams and contribute to key decisions Expected to provide solutions to problems that apply across multiple teams Design and implement security solutions to protect cloud infrastructure Collaborate with cross-functional teams to ensure security requirements are met Ensure compliance with governance and risk management standards Professional & Technical Skills: Must To Have Skills:Proficiency in ServiceNow Governance, Risk, and Compliance (GRC) Strong understanding of cloud security architecture and design principles Experience with implementing security controls in cloud environments Knowledge of industry best practices for cloud security Experience with security assessment and risk management Good To Have Skills:Experience with Security Architecture Design Recommendation:Familiarity with other security frameworks and standards Additional Information: The candidate should have a minimum of 12 years of experience in ServiceNow Governance, Risk, and Compliance (GRC) This position is based at our Pune office A 15 years full time education is required Qualifications 15 years full time education
Posted 2 months ago
5 - 10 years
7 - 12 Lacs
Gurgaon
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Cloud Security Architecture Good to have skills : Managed Cloud Security Services Minimum 5 year(s) of experience is required Educational Qualification : Minimum 15 years of full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Your typical day will involve designing and implementing cloud security solutions, collaborating with cross-functional teams, and providing guidance on security best practices. Roles & Responsibilities: Expected to be an SME, collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Design and implement cloud security solutions to protect the organization's cloud infrastructure. Collaborate with cross-functional teams to ensure the security architecture meets business requirements. Provide guidance on security best practices and ensure compliance with industry standards. Conduct risk assessments and vulnerability scans to identify potential security threats. Develop and maintain security policies, procedures, and standards. Monitor and respond to security incidents and breaches. Stay up-to-date with the latest security trends and technologies. Train and educate employees on security awareness and best practices. Professional & Technical Skills: Must To Have Skills:Proficiency in Cloud Security Architecture, Managed Cloud Security Services. Strong understanding of cloud security principles, best practices, and industry standards. Experience in designing and implementing security controls for cloud environments. Knowledge of cloud platforms such as AWS, Azure, or Google Cloud. Familiarity with security tools and technologies used in cloud environments. Excellent problem-solving and analytical skills. Ability to communicate complex security concepts to technical and non-technical stakeholders. Additional Information: The candidate should have a minimum of 5 years of experience in Cloud Security Architecture. This position is based at our Gurugram office. A minimum of 15 years of full-time education is required. Qualifications Minimum 15 years of full time education
Posted 2 months ago
10 - 16 years
11 - 18 Lacs
Mumbai
Work from Office
Hi, We are having an opening for Manager -Cloud Architect at our Mumbai location. Job Summary : We are looking for a highly skilled Cloud Architect to join our dynamic team. The Cloud Architect will play a critical role in designing, implementing, and optimizing our cloud-based solutions. This position requires a strategic thinker with deep technical expertise and a strong understanding of cloud architecture principles, security, compliance, and performance optimization. As a Cloud Architect, you will be responsible for defining and documenting the overall solution architecture, developing and maintaining architectural standards and best practices, and leading the design and planning of cloud solutions. You will collaborate closely with internal and external technology teams to ensure seamless implementation, testing, and execution of these solutions. Key responsibilities include performing design, debugging, and performance analysis, ensuring data consistency and availability, and integrating various system components. You will also be tasked with assessing security risks, designing secure solutions, and ensuring compliance with industry standards and regulations. Additionally, you will focus on optimizing system performance and scalability, automating deployment and monitoring processes, and maintaining continuous delivery pipelines in collaboration with DevOps/DevSecOps teams. The ideal candidate will have a strong background in cloud architecture, excellent problem-solving skills, and a proactive approach to staying updated on industry trends and emerging technologies. If you are passionate about cloud technology and have a proven track record of delivering high-quality cloud solutions, we would love to hear from you. Areas Of Responsibility : Solution Architecture - Define and document the overall solution architecture. Develop and maintain architectural standards and best practices. Evaluate and select appropriate technologies and platforms for the solution. Design and deploy solutions in cloud environments. Implement infrastructure as code (IaC) practices. Technical Implementation : Lead the design and planning of the chosen solution Work closely with technology/IT teams internal and external to ensure effective implementation, testing, UAT and end to end execution Perform design, debugging, and performance analysis on solutions, document and share best practice knowledge for new solutions. Define data models, schemas, and storage solutions. Ensure data quality, consistency, and availability. Design and implement integration patterns between systems. Ensure seamless data flow across different components. Monitor the progress of development and keep stakeholders informed. Security and Compliance : Assess security risks and design secure solutions. Ensure compliance with industry standards and regulations (e.g., GDPR, HIPAA) Implement security controls and encryption mechanisms. Conduct security reviews and vulnerability assessments. Conduct technology assessments to identify potential risks in the system. Monitor and ensure the required practices are in place to fix the observation Scalability and Performance : Optimize system performance and scalability. Conduct load/performance testing and capacity planning. Address bottlenecks and optimize resource utilization. DevOps, DevSecOps and Automation : Automate deployment, monitoring, and scaling processes Collaborate with DevOps/DevSecOps teams for infrastructure automation and Security automation. Implement CI/CD pipelines for continuous delivery. Innovation and Continuous Improvement : Stay updated on industry trends and emerging technologies. Continuously research emerging technologies that may benefit the pharma sector. Propose innovative solutions to drive digital transformation. Lead the evaluation and piloting of new tools and technologies. Evaluate, Pilot and prototype new solutions. Stakeholder Collaboration, Communication and Reporting: Interface with various departments to understand their technology needs. Work closely with external partners, vendors, and technology providers. Lead cross-functional teams to deliver technology solutions. Ensure the architecture meets both technical and business needs. Clearly communicate technical concepts and architectures to non-technical stakeholders. Provide regular updates and deliver comprehensive reports to management. Project Management and Delivery : Oversee the development and delivery of projects from an architectural standpoint. Ensure projects are completed within scope, time, and budget constraints. Manage resources and timelines for project execution. Educational Qualification :BTech, MTech, BE ,MCA Experience: 12-16 years of experience in cloud architecture, with a proven track record of designing and implementing cloud solutions across various platforms (AWS, Azure, Google Cloud). Specific Certification : Mandatory Certifications (at least 01 in each group) Cloud Certification (one or more of the following): AWS Certified Solutions Architect Professional Microsoft Certified: Azure Solutions Architect Expert Google Cloud Professional Cloud Architect Security Certification (one or more of the following): Certified Information Systems Security Professional (CISSP) Certified Cloud Security Professional (CCSP) DevOps Certification (one or more of the following): AWS Certified DevOps Engineer Professional Microsoft Certified: DevOps Engineer Expert Google Cloud Professional DevOps Engineer Optional Certifications (any one of more of below will be a value add)) Project Management Professional (PMP) Certified ScrumMaster (CSM) Skill (Functional & Behavioural): Functional Skills Cloud Architecture and Design: Expertise in designing and implementing scalable, secure, and robust cloud solutions using platforms such as AWS, Azure, and Google Cloud. Infrastructure as Code (IaC): Proficiency with tools like Terraform, AWS CloudFormation, and Azure Resource Manager to automate cloud infrastructure. Security and Compliance: Strong knowledge of cloud security principles, controls, and compliance standards (e.g., GDPR, HIPAA). Performance Optimization: Skills in optimizing cloud resources for performance and cost-efficiency, including system monitoring and tuning. DevOps and Automation: Familiarity with CI/CD pipelines and tools (e.g., Jenkins, GitLab CI) to automate deployment, monitoring, and scaling processes. Networking: Understanding of cloud networking concepts such as VPC, subnets, VPN, and load balancing. Database and Storage: Knowledge of cloud-based databases and storage solutions, including data migration and management. Cost Management: Ability to manage and optimize cloud costs using cost management tools and best practices. Behavioural Skills Analytical Thinking: Strong problem-solving skills with the ability to analyse complex technical issues and make data-driven decisions. Communication: Excellent verbal and written communication skills to explain technical concepts to non-technical stakeholders. Collaboration and Teamwork: Proven ability to work effectively in cross-functional teams and collaborate with various stakeholders. Adaptability: Quick learner who can adapt to new technologies and methodologies, and adjust to changing project requirements. Leadership: Ability to lead and mentor technical teams, with strong project management skills to drive initiatives to completion. Attention to Detail: High level of accuracy and commitment to maintaining high standards in technical implementations. Customer Focus: Understanding of business requirements and dedication to providing excellent support and service to internal and external customers
Posted 2 months ago
5 - 10 years
1 - 5 Lacs
Pune
Work from Office
Role & responsibilities : Responsible for the security of an organization's information, systems, and technology. Identifying vulnerabilities in our current network. Developing and implementing a comprehensive plan to secure our computing network. Monitoring network usage to ensure compliance with security policies. Keeping up to date with developments in IT security standards and threats. Collaborating with management and the IT department to improve security. Documenting any security breaches and assessing their damage. Educating colleagues about security software and best practices for information security. Preferred candidate profile : Experience of minimum 5 years. Certified in at least two INFOSEC areas. Perks and benefits : As per company standards
Posted 2 months ago
7 - 12 years
25 - 30 Lacs
Noida
Hybrid
Key Responsibilities: Conduct thorough assessments of server infrastructure to identify vulnerabilities and security weaknesses. Develop and implement a comprehensive vulnerability remediation plan in collaboration with IT security teams, application teams, and server infrastructure teams. Prioritize vulnerabilities based on risk assessment and business impact, and establish timelines for remediation efforts. Monitor and report on remediation progress, metrics, and results to stakeholders. Document all findings, remediation steps taken, and recommendations for future improvements. Qualifications: Bachelors degree in Computer Science, Information Technology, Cybersecurity, or a related field. Minimum [3] years of experience in IT security, system administration, or a related role. Proven experience leading vulnerability remediation projects in enterprise environments. Strong knowledge of server operating systems (e.g., Linux, Windows Server) and security best practices. Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys, Rapid7) and patch management solutions. Excellent problem-solving skills and attention to detail. Strong communication and interpersonal skills, with the ability to collaborate effectively with various teams. Relevant certifications (e.g., CISSP, CISM, CEH) are a plus.
Posted 2 months ago
2 - 7 years
4 - 9 Lacs
Maharashtra
Work from Office
Description JD for Azure Security Engineer. Bachelors degree in Computer Science, Information Technology, or related field (or equivalent work experience). Minimum 6 years of industry experience. Proficiency in cloud services and tools Specific to Azure and strong understanding of Azure Cloud Security Services. Proven experience as Azure security Engineer with azure EntraID Identity and Access Management RBAC, ID governance, PIM/PAM, Conditional Access Policies, ID protection, MFA Access Reviews. Work under the guidance of security Architect team and help in Designing security Standards. Collaborate with engineering and architecture teams to identify security risks and recommend mitigating controls. Hands on Experience with Design/test/Implementation of Azure policies Covering infra/resource security. Hands on Experience with configuring Azure Security Services - MDC, Key Vault azure monitor and Log Analytics Workspace. Participate in creation and maintenance technical security policies, standards, configuration baselines, benchmarks, guidelines, and SOPs. Expertise in Azure technologies including CSPM, CWPP, EDR, SIEM/SOAR and CIEM with experience in Integration, Configuration and troubleshooting. Develop and execute information security plans, procedures, and policies Deep understanding of cloud security principles and best practices, with experience implementing security controls in Azure infrastructure services. Implement security best practices and ensure compliance with industry standards and regulations Such as MCSB, CIS, NIST, SOC in Azure infrastructure services. Collaborate with Enterprise Operations, Engineering, and IT teams to implement security standards and ensure standards are followed. Experience assessing and implementing security controls in all relevant areas (including access management, encryption methods, vulnerability management, network security, application security, etc.) Experience with security tools MDC , Wiz, CrowdStrike, Defender 365, Microsoft Entra, along with managing and troubleshooting issues in CrowdStrike, and Microsoft Defender. Excellent communication, collaboration interpersonal and relationship skills are required. Ability to work as a team player and as an individual contributor. Must be willing to learn, adapt, and work in fast paced, dynamic environment Azure certifications (e.g., Azure Security Engineer Associate AZ500, Security Operations Analyst Associate SC-200 and relevant certifications SC100 or Etc., are a plus. Advanced industry certification in relevant field (e.g., Ethical Hacker, CISM, CISSP). Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility No Global Role Family To be defined Local Role Name To be defined Local Skills Azure Cloud Services Languages RequiredENGLISH Role Rarity To Be Defined
Posted 2 months ago
10 - 17 years
10 - 20 Lacs
Bengaluru
Work from Office
IT Strategy and Planning: Infrastructure Management: Application and Software Management: 4Data Security and Compliance: Support and Troubleshooting: Vendor and Budget Management: Innovation and Automation: Reporting and Documentation:
Posted 2 months ago
10 - 20 years
18 - 30 Lacs
Gurgaon
Work from Office
Job Description: Responsibilities Lead and oversee company's Data Protection programme and related initiative. Manage and monitors compliance with all applicable Data privacy laws, regulations and standards including DPDPA, GDPR etc. Perform regular compliance assessments and reporting, i.e. Data Privacy Impact Assessment (DPIA) Work with business and technical team members, third party vendors and auditors to ensure adherence to all applicable Data protection law, regulations and standards Provide periodic and adhoc security awareness training for employees/contractors to increase Data Protection awareness pertaining to their job functions and evaluate training effectiveness Recommend and develops KPIs and metrics to evaluate the Data protection / Privacy program and related controls. Participate in planning, scheduling and preliminary analysis for all internal and external Data Protection / Privacy audits and assessments and maintain list of outstanding audit actions and works with the remediation team to remediate identified gaps Oversee process documentation and compliance adherence Measures of Success: Timely implementation of data privacy programs at org level Completion of privacy impact assessments as per schedule Timely reporting of data privacy incident both internally and to the regulator as per the mandate Timely updation and board approval for data privacy policy No adverse observations in internal/external audits Timely completion of data privacy trainings for all eligible users Timely remediation of any findings or recommendations made by any of the internal or external assessors as part of privacy impact Adherence to data privacy policy within the organization Qualifications: 10-12 years of post qualification experience. Relevant Experience with respect to the role: At least 05 years of experience in working with privacy laws, including drafting of privacy policies, technology provisions, and working on compliance. One or more certifications related to Privacy, i.e., Certified Information Privacy Professional (CIPP/E), Certified Data Privacy Solutions Engineer (CDPSE),Certified Information Privacy Manager (CIPM), DSCI Certified Privacy Professional, CISSP, DSCI Certified Data Protection Officer (DCDPO) or any other equivalent certification Experience in technical training and in conducting awareness sessions Experience in dealing successfully with different business and external stakeholders Experience working with IT programming or infrastructure, including certification in information security standards Experience in performing audits of information systems, attestation audits and risk assessments Knowledge on how to assess, develop and implement Data Privacy program including drafting of privacy policies, standards, processes, procedures and technology provisions etc.
Posted 2 months ago
10 - 15 years
22 - 25 Lacs
Mumbai Suburbs, Mumbai, Mumbai (All Areas)
Work from Office
Experience with vulnerability management, secure coding practices, and the OWASP Top 10 vulnerabilities. compliance standards (SOC 2, ISO 27001, PCI-DSS, GDPR). Experience with threat modelling, penetration testing, and security risk assessments. Required Candidate profile Proven experience with end-to-end security in cloud and containerized environments. Experience in leading security initiatives and guiding teams toward better security practices. CISSP
Posted 2 months ago
0 - 4 years
4 - 7 Lacs
Coimbatore
Work from Office
1. Identifying security measures to improve incident response 2. Responding to security incidents 3. Coordinating incident response across teams 4. Performing security assessments and code audits 5. Developing technical solutions to security vulnerabilities 6. Researching new attack vectors and developing threat models 7. Automating security improvements 8. Examining vulnerabilities 9. Implementing security measures 10. Ensuring compliance with security regulations Requirements If candidate completed certification relavent to end user security on CISSP its added advantage. Benefits What We Offer: Competitive salary and performance-based incentives. Comprehensive benefits package, including health insurance. Opportunities for professional development and careergrowth. A dynamic and supportive work environment.
Posted 2 months ago
12 - 14 years
30 - 45 Lacs
Bengaluru
Work from Office
Summary The role requires providing expertise and leadership for Incident Response capabilities including good understanding of cyber incident forensics. It requires providing both subject matter expertise and project management experience to serve as the point person” of client engagement in domain. The candidate shall pertain efficient incident response and remediation skills to minimise the impact of cyber risks. The individual will oversee and support security monitoring operations team and assist them during security incidents and ensure incidents are managed and responded effectively including and reporting to stakeholders. This role primarily consists of leading team of the Incident responders, Incident managers and stakeholders (including client, vendors, etc.) and to conduct thorough response activities on behalf of a wide variety of clients across sectors. Candidate is required to work in complex security environments and alongside SOC team to design, communicate and execute incident response, containment and remediation plans. Candidate is required to have hands-on experience of incident management and investigation tools and shall be comfortable leading teams on challenging engagements, communicating with clients, providing hands-on assistance with incident response activities, and creating and presenting high-quality deliverables. Designation / Role: Role: Incident Response Leader Level: AD Responsibilities Manage client engagements, with a focus on incident response and investigation. Provide both subject matter expertise and project management experience to serve as the “point person” for client engagements Assist with client incident scoping call and participate in the incident from kick-off through full containment and remediation. Security Analytics - Efficiently distill actionable information from large data sets for reporting, hunting, and anomaly detection. Recommend and document specific countermeasures and mitigating controls with post incident analysis findings Develop comprehensive and accurate reports and presentations for both technical and executive audiences Conduct Digital Forensic and Incident Response (DFIR) analysis, network log and network PCAP analysis, malware triage, and other investigation related activities in support of Incident Response investigations Supervise Digital Forensics and Incident Response staff, and assisting with performance reviews and mentorship of cybersecurity professionals Mature the Security Incident Response process to ensure it meets the needs of the Clients Interact with Client’s CSIRT teams to cater continuous and/or ad-hoc client requests for Incident Response services Possess the experience, credibility and integrity to perform as an expert witness. Involve in business development activities and supporting pre-sales teams in Identify, market, and develop new business opportunities Assist with research and distribute cyber threat intelligence developed from Incident Response activities Research, develop and recommend infrastructure (hardware & software) needs for DFIR and evolve existing methodologies to enhance and improve our DFIR practice. Skills required 10-14 years Information Security experience with at least 5 year of Incident Response experience. Solid understanding of MITRE ATT&CK, NIST cyber incident response framework and Cyber kill chain. Understanding of Threat Hunting and threat Intelligence concepts and technologies Experience of leveraging technical security solutions such as SIEM, IDS/IPS, EDR, vulnerability management or assessment, malware analysis, or forensics tools for incident triage and analysis. Deep experience with most common OS (Windows, MacOS, Linux, Android, iOS) and their file systems (ext3.4, NTFS, HFS+, APFS, exFAT etc) Proficiency with industry-standard forensic toolsets (i.e. EnCase, Axiom/IEF, Cellebrite/UFED, Nuix and FTK) Experience of enterprise level cloud infrastructure such as AWS, MS Azure, G Suite, O365 etc.. Experience of malware analysis and understanding attack techniques. CISSP, ECIH v2, GCFA, GCIH, EnCE or equivalent DFIR certification. Ability to work in time-sensitive and complex situations with ease and professionalism, possess an efficient and versatile communication style Good verbal and written communication skill, excellent interpersonal skills Abilities: Strong English verbal, written communication, report writing and presentations skills. Ability to multitask and prioritize work effectively. Responsive to challenging tasking. Highly motivated self-starter giving attention to detail. Strong analytical skills and efficient problem solving. Capable to operate in a challenging and fast-paced environment.
Posted 2 months ago
10 - 15 years
30 - 37 Lacs
Bengaluru
Hybrid
Cybersecurity Architect 10+ Years Educational Background: A Bachelors or Master’s degree in Information technology, cybersecurity, computer science, or a related field is essential. [10+] years of experience in cybersecurity, previous experience in a security engineering role highly desired Holding professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or certifications recognized by the NCSC is highly regarded. Familiarity with relevant cybersecurity frameworks and standards, including the CIISec Skills Framework and guidelines provided by the NCSC, is essential Must have extensive experience of architecture design, security regulations and security implementation in Infra and Cloud Security, Product Security, etc
Posted 2 months ago
5 - 10 years
8 - 12 Lacs
Greater Noida, Noida
Work from Office
We are seeking a highly skilled Defender Endpoint Security Specialist with 5-10 years of solid implementation and operational experience. The ideal candidate will be responsible for ensuring the security of our endpoints and will be ready to work during shift hours and weekends. Key Responsibilities: Implement and manage Microsoft Defender for Endpoint solutions. Monitor and respond to security incidents and alerts. Conduct regular security assessments and vulnerability scans. Develop and maintain security policies and procedures. Collaborate with IT and other departments to ensure comprehensive endpoint security. Provide training and support to staff on security best practices. Stay updated with the latest security trends and threats. Qualifications: Bachelors degree in Computer Science, Information Technology, or a related field. 5-10 years of experience in endpoint security, specifically with Microsoft Defender. Microsoft Defender certification (SC200). Strong knowledge of security frameworks and best practices. Experience with security incident response and management. Excellent problem-solving and analytical skills. Ability to work independently and as part of a team. Willingness to work offpeak hours and weekends. Preferred Skills: Certifications such as SC500, CISSP, CISM, or similar. Experience with other security tools and technologies. Ms Defender, Cyber Security
Posted 2 months ago
5 - 7 years
7 - 9 Lacs
Bhubaneshwar, Kolkata
Work from Office
Business Development will spearhead the efforts to establish and grow a network of business partners delivering cybersecurity training courses in Eastern and North-Eastern India Bachelors degree in Engineering, Business Administration / Management, Information Technology, or a related field; Qualification will be not a limitation for the right candidate Keywords : - CISSP, CEH (Certified Ethical Hacker), and CISA, CompTIA Security+, strategic roadmap Mandatory Key Skills : - Partnership Development, Building and Managing a Regional Team, Spreading Regional Awareness of Cybersecurity Certifications, Organising Webinars, Conferences, and Events, Strategic Market Engagement Ability to build and lead teams effectively in a dynamic and competitive environment. Strong event management and marketing acumen. Data-driven decision-making with excellent reporting and analysis capabilities. Readiness for extensive travel across Eastern and North-Eastern India.
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The demand for CISSP (Certified Information Systems Security Professional) professionals in India has been on the rise as companies recognize the importance of securing their digital assets. CISSP jobs offer lucrative career opportunities in various industries ranging from IT to finance. If you are a job seeker looking to enter this field, here is a comprehensive guide to help you navigate the CISSP job market in India.
These cities are known for their thriving IT sectors and are hotspots for CISSP job opportunities.
The average salary range for CISSP professionals in India varies based on experience levels. Entry-level positions can expect to earn around INR 6-8 lakhs per annum, while experienced professionals with 5+ years of experience can command salaries upwards of INR 15 lakhs per annum.
A typical career progression in the CISSP field may involve starting as a Security Analyst, moving on to roles such as Security Consultant, Security Manager, and eventually reaching a Chief Information Security Officer (CISO) position.
In addition to CISSP certification, employers often look for professionals with skills in network security, risk management, penetration testing, and knowledge of regulatory compliance such as GDPR and HIPAA.
As you prepare for CISSP job interviews in India, remember to showcase your expertise in information security, stay updated with industry trends, and demonstrate your problem-solving skills. With the right combination of technical knowledge and experience, you can embark on a successful career in the exciting field of cybersecurity. Good luck with your job search!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2