Home
Jobs

516 Cissp Jobs - Page 17

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2 - 5 years

10 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

*Bachelors degree in computer science, Information Technology, Information Security, or related field (or equivalent experience) *Knowledge on Splunk, Firewall, and any Security tools along with CloudFlare WAF *Knowledge on Cloud Security * Experience working in a technical support or helpdesk role is preferred * Familiarity with enterprise security tools such as SIEM, IDS/IPS, EDR, web application firewall, identity and access management solutions, etc. * Basic understanding of networking concepts and protocols (TCP/IP, DNS, DHCP, etc.) * Proficiency in at least one scripting language (e.g., Python, PowerShell) is a plus * Certifications such as CompTIA Security+, CISSP, CCSP or GIAC are advantageous but not required * Ability to prioritize and manage multiple tasks simultaneously * Strong problem-solving skills and a methodical approach to troubleshooting * Adaptability and willingness to learn new technologies and processes * Commitment to providing exceptional customer service and support

Posted 2 months ago

Apply

3 - 8 years

12 - 16 Lacs

Panchkula, Bengaluru, Gurgaon

Work from Office

Naukri logo

?Minimum 3+ years of experience in vulnerability assessment and penetration testing domain. Proven track record in identifying, exploiting, and remediating vulnerabilities across networks, applications, and systems. In-depth knowledge of network protocols, operating systems (Linux, Windows, etc.), web application technologies, and common security tools. Expertise in penetration testing tools like Burp Suite, Metasploit, Nessus, Nmap, Wireshark, etc. Strong knowledge of ethical hacking techniques, vulnerability scanning, and risk analysis. Familiarity with network security concepts such as firewalls, VPNs, IDS/IPS, and SIEM tools. Strong problem-solving skills and attention to detail. Ability to communicate complex technical findings in a clear, non-technical manner. Proficiency in scripting languages such as Python, Bash, or PowerShell for automation and exploitation. ?Certifications: Industry-recognized certifications must have as: Offensive Security Certified Professional (OSCP) Certified Information Systems Security Professional (CISSP)

Posted 2 months ago

Apply

5 - 7 years

7 - 9 Lacs

Bhubaneshwar, Kolkata

Work from Office

Naukri logo

Business Development will spearhead the efforts to establish and grow a network of business partners delivering cybersecurity training courses in Eastern and North-Eastern India Partnership Development, Building and Managing a Regional Team, Spreading Regional Awareness of Cybersecurity Certifications, Organising Webinars, Conferences, and Events, Strategic Market Engagement Ability to build and lead teams effectively in a dynamic and competitive environment. Strong event management and marketing acumen. Data-driven decision-making with excellent reporting and analysis capabilities. Readiness for extensive travel across Eastern and North-Eastern India. CISSP, CEH (Certified Ethical Hacker), and CISA, CompTIA Security+, strategic roadmap

Posted 2 months ago

Apply

10 - 15 years

30 - 35 Lacs

Pune

Remote

Naukri logo

What You'll Do As the Manager of Product Security with a focus on Data Privacy, you will help ensure that our products are designed with strong security and privacy controls. You will lead a team of security professionals, collaborate with teams, and lead the implementation of privacy-by-design principles across all stages of the product lifecycle. Your responsibilities will include safeguarding customer data, ensuring compliance with privacy regulations, and mitigating security risks in product development. You will report to VP Security What Your Responsibilities Will Be Lead the product security team focused on embedding data privacy and security controls into product development processes. Develop a comprehensive product security strategy with a focus on data privacy. Partner with engineering, legal, compliance, and product teams to ensure privacy and security are integrated into all stages of the product lifecycle. Drive privacy-by-design principles and advocate for secure development practices across the organization. Data Privacy Governance : Ensure products comply with relevant data privacy regulations such as GDPR, CCPA, HIPAA, and other global standards. Develop product security policies and procedures that align with legal, regulatory, and industry requirements. Perform privacy impact assessments (PIAs) and security risk assessments (SRAs) on products and services. Risk Management : Identify privacy and security risks related to product development and deployment. Implement controls and measures to reduce data breaches, unauthorized access, and other security incidents. Lead incident response efforts related to privacy violations or data security breaches in collaboration with legal and IT teams. Collaboration & Communication : Collaborate with engineering teams to integrate security tools, practices, and automated testing into CI/CD pipelines. Work closely with the legal and compliance teams to interpret and respond to data privacy regulations and standards. Communicate privacy and security risks, issues, and solutions to senior leadership and other stakeholders. Training & Awareness : Develop and conduct training programs to educate product development teams on privacy and security best practices. Stay up-to-date with emerging data privacy trends, threats, and technologies and ensure the team is aligned with industry best practices. Monitoring & Reporting : Oversee continuous monitoring of product security and privacy controls to ensure ongoing compliance and risk mitigation. Provide regular updates to leadership on the status of product security initiatives, privacy compliance, and risk management activities. What You'll Need To Be Successful Qualifications: Education & Experience : Bachelor's or Master's degree in Information Security, Computer Science, or related field. 10+ years of experience in product security, cybersecurity, or data privacy, with a focus on software product development. Proven experience managing teams in a security or privacy role. Skills & Knowledge : Deep understanding of data privacy laws and regulations (e.g., GDPR, CCPA, HIPAA). Strong knowledge of product security principles, including secure software development practices, encryption, and threat modeling. Familiarity with privacy-enhancing technologies, data anonymization, and data retention practices. Experience with security tools, automation, and CI/CD practices. Certifications (preferred): Certified Information Privacy Professional (CIPP), Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or similar certifications.

Posted 2 months ago

Apply

4 - 7 years

9 - 9 Lacs

Gurgaon

Work from Office

Naukri logo

Responsibilities: Lead cybersecurity testing for CCTV devices per BIS/ITSAR, ensuring ISO 17025 compliance. Develop methodologies, oversee assessments, review reports, collaborate with clients on security needs, and enhance lab operations.

Posted 2 months ago

Apply

12 - 15 years

25 - 31 Lacs

Bengaluru

Work from Office

Naukri logo

Connect with key stakeholders, cybersecurity experts, and operational teams within the information security department to help create security solutions that work well on a large scale. Collaborate with Enterprise Architects to make sure solutions are in line with the companys long-term goals, follow design guidelines, and contribute to the direction of projects when necessary. Turn business requirements into technical specifications for solutions, considering risks, dependencies, costs, and the overall risk of the technical solution. Lead the technical side of evaluating and choosing technologies through Requests for Information (RFI) and Requests for Proposal (RFP), which includes Defining the criteria that will influence technology choices and solution development. Gather and summarize technology research and recommendations for leaders to make decisions. Oversee experimental projects, designs, and the actual building of solutions from an architectural standpoint. Create and update artifacts that describe solution architecture to guide the planning, design, and implementation of the chosen solution. Keep up with the latest in the industry, research thoroughly, and continuously learn about new security technologies. Share expertise with project teams, governance groups, and other audiences as required. Build and keep a network of contacts from different IT and security organizations. Create standards for security technology. Travel requirements Skills and attributes for success Proficient in leading the development and direction of solution architecture. Knowledgeable in security protection technologies, particularly those from Checkpoint, Zscaler, Entra Intra Internet Access and Azure Firewall Extensive experience in Network Protection, including Cloud Secure Web Gateways (CSWG), Zero Trust Network Access (ZTNA), Intrusion Prevention Systems (IPS), Network Detection and Response (NDR), and Network Access Control (NAC). Successfully directed enterprise projects involving complex network technologies such as Next-Generation Firewalls, Expressroute, Secure Access Service Edge (SASE), ZPA and ZIA. Skilled in Network solutions and infrastructure platforms, including Azure Networking/Network Security Groups (NSG), Azure Firewall, SASE, Software-Defined Wide Area Network (SD-WAN), Wide Area Network (WAN), Local Area Network (LAN), management/monitoring tools, Domain Name System (DNS), and wireless technologies. Exposure to Cybersecurity capabilities Vulnerability management, Qualys, Sentinel, Defender XDR, Vulnerability Management and SOAR Experience in building and maintaining client-service relationships, with an understanding of the importance of internal customers. Excellent communication and presentation skills, capable of effectively conveying information to executive leadership. Sensitivity to the perspective of various audiences, both technical and non-technical. Experience in creating security architecture documentation, such as vision statements and Solution Architecture (SA) Design documents. Well versed in common Information Security practices and the CISSP domains Able to identify opportunities for Cybersecurity transformation or enhancements To qualify for the role, you must have Degree in Computer Science, Engineering or equivalent work experience 12+ years of experience in the Information Technology field 2+ years of senior architecture experience, exposure to enterprise architecture teams. 3+ years working with network protection technologies Ideally, you ll also have Security certification such as CISSP, CCIE or CISM TOGAF and/or SABSA architecture framework SANS Certifications including GSEC, ECSA, ECSP Deep critical thinking skills demonstrating analytical and systematic approach to problem solving Experience working in a global virtual environment Excellent written & verbal communication skills, including preparation & delivery of presentations Good judgment, tact, and decision-making ability Ability to understand and integrate cultural differences and motives and to work with cross cultural teams. Ability to deal with ambiguity and change, and exercise appropriate time management to meet objectives Ability to work autonomously but also within a team environment where necessary What we offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial, and social well-being. Your recruiter can talk to you about the benefits available in your country. Here s a snapshot of what we offer Continuous learning You will develop the mindset and skills to navigate whatever comes next. Success as defined by you We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture You will be accepted for who you are and empowered to use your voice to help others find theirs.

Posted 3 months ago

Apply

10 - 15 years

15 - 19 Lacs

Vadodara

Work from Office

Naukri logo

Firewall Support Manager Location : Vadodara Office (Work from Office) Shift : US shift time (5 days a week) About VikingCloud VikingCloud is the leading Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions faster. Powered by the Asgard Platform, the industry’s largest repository of anonymized cybersecurity and compliance event data, we continuously monitor and analyze over 6+ billion online events every day. Viking Cloud is the one-stop partner trusted by 4+ million customers to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruptions to their business. Our 1,000 dedicated cybersecurity and compliance expert advisors understand that it’s not just about technology. It’s about transacting business and delivering an exceptional customer experience every day, without fail. That’s the measurable value we deliver. And that’s what we call, Business Uninterrupted. This Position We are seeking a highly skilled and experienced Firewall Support Manager to join our team. This position will be responsible for overseeing the implementation, configuration, and maintenance of the organization's firewall systems to ensure the security and integrity of the network. This role involves managing a team of Lead and support engineers, coordinating with other IT departments, and ensuring compliance with security policies and procedures. This role requires strong technical expertise, strategic thinking, excellent communication skills and strong team management skills. Key Responsibilities: Oversee the configuration, administration, and maintenance of firewall systems. Ensure firewalls are updated with the latest security patches and firmware. Monitor firewall performance and security logs to identify and mitigate potential threats. Develop and implement Firewall systems strategies, policies and procedures to safeguard the company's systems, networks and data Conduct regular assessments and audits to identify vulnerabilities and recommend corrective actions Manage the deployment and maintenance of security tools, such as firewalls, intrusion detection/prevention systems and antivirus software Monitor security logs and alerts for suspicious activities and respond to security incidents in a timely manner Collaborate with cross-functional teams to integrate security best practices into software development lifecycle and infrastructure deployment processes Stay up to date on emerging threats, vulnerabilities and security technologies to proactively mitigate risks Provide guidance and support to internal teams on security-related matters, including incident response, data protection and access control Conduct security awareness training and workshops for employees to promote a culture of security awareness and compliance Liaise with external auditors, regulatory agencies and third-party vendors to ensure compliance with relevant standards and regulations Prepare and present reports on cybersecurity metrics, incidents and compliance status to senior management and stakeholders Lead the response to security incidents and breaches. Coordinate with other IT teams to investigate and resolve security issues. Develop and implement incident response plans Project Management Manage firewall-related projects, including upgrades, migrations, and new implementations. Coordinate with vendors and service providers for firewall-related products and services. Ensure projects are completed on time, within scope, and budget. Reporting and Documentation Generate regular reports on firewall performance, security incidents, and compliance status. Maintain detailed documentation of firewall configurations, policies, and procedures. Communicate security updates and status reports to senior management. Team Leadership Manage and mentor a team of firewall support engineers. Assign tasks, provide technical guidance, and conduct performance reviews. Develop training programs (in collaboration with offshore team)to enhance the team's skills and knowledge. Improve customer satisfaction metric, through stable transparent service Deliver better than agreed customer SLAs. Continuous Improvement Monitor and assist their team to meet individual metrics for Level 1 Support Engineer Identify and suggest process improvements as they arise. Participate in departmental training activities including training programs in support of new technologies, procedures, and customer service enhancements. Assist the Manager on creating training needs Work closely with the Quality Team: Plan the required Trainings based on the feedback Work closely with the Leads to develop improvement plan for the Team-members based on the feedback Technical Skills Knowledge and experience with network protocols and concepts including SSH, FTP, ICMP, TCPIP (IPv4 & IPv6), Network Address Translation (NAT), SNMP, IPSec, GRE, QoS, and VLANs. Ability to interpret output from network traffic analysis tools such as Ethereal (Wireshark) Hands-on experience with Meraki and Fortinet firewalls. Ability to effectively collaborate in a dynamic team environment. Monitor performance, capacity, and availability of the firewalls on an ongoing basis. Recommend improvements in technologies and practices to increase these metrics. Maintain awareness of and familiarity with trends and new developments in technologies used in, or appropriate for use in, firewall support and operating infrastructure. Work with the direct manager, other senior member of the team to develop firewall architectures, technologies, and quality assurance policies and procedures. Education Bachelor’s degree in computer science, Information Technology, or a related field. Relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable. Experience: Minimum of 10+ years of experience in firewall management and network security. Proven experience in leading and managing a technical support team. Skills: In-depth knowledge of firewall technologies (e.g., Cisco, Palo Alto, Fortinet). Strong understanding of network protocols, security architectures, and best practices. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Ability to manage multiple tasks and projects simultaneously

Posted 3 months ago

Apply

5 - 9 years

18 - 25 Lacs

Chennai

Work from Office

Naukri logo

Senior DevSecOps Engineer Experience: 5 - 9 Years Exp Salary : INR 12,00,000-25,00,000 / year Preferred Notice Period : Within 30 Days Shift : 10:00AM to 7:00PM IST Opportunity Type: Onsite (Chennai) Placement Type: Permanent (*Note: This is a requirement for one of Uplers' Clients) Must have skills required : DevSecOps, Security engineering, CI/CD, Cloud Security, Security Testing, Containerization, Scripting, Network Security Good to have skills : infrastructure-as-code, Monitoring tools, Security certifications, automation, Incident Response (One of Uplers' Clients) is Looking for: DevSecOps Engineer who is passionate about their work, eager to learn and grow, and who is committed to delivering exceptional results. If you are a team player, with a positive attitude and a desire to make a difference, then we want to hear from you. Role Overview Description Job Overview: We are seeking a skilled and motivated DevSecOps Engineer to join our team. The ideal candidate will play a critical role in integrating security into every phase of the software development lifecycle (SDLC). You will collaborate with development, operations, and security teams to ensure secure coding practices, infrastructure security, and automation of security processes. This position requires a solid understanding of security protocols, automation, and cloud environments. Key Responsibilities: Implement, manage, and enhance DevSecOps processes, including integrating security practices into CI/CD pipelines. Perform vulnerability assessments and security audits of software and infrastructure. Collaborate with software engineers and DevOps teams to ensure secure coding practices. Develop, configure, and manage automated security tools, such as static/dynamic code analysis tools, intrusion detection/prevention systems, and SIEM. Design and implement security controls to protect applications, data, and infrastructure. Monitor security incidents, respond to threats, and ensure timely remediation. Automate security processes such as patch management, incident response, and compliance checks. Ensure compliance with security standards, including SOC 2, ISO 27001, PCI DSS, and others. Conduct regular security training and awareness sessions for development and operations teams. Collaborate with third-party security teams for audits, assessments, and external reviews. Key Skills and Requirements: Bachelors degree in Computer Science, Information Security, or a related field. 5+ years of experience in DevSecOps, security engineering, or related roles. Strong knowledge of CI/CD pipelines and tools like Jenkins etc. Experience with cloud security on platforms like AWS, Azure, or GCP. Familiarity with security testing tools (e.g., OWASP ZAP, Burp Suite, Nessus, etc.). Experience with containerization and orchestration tools such as Docker, Kubernetes, etc. Knowledge of infrastructure-as-code (IaC) tools like Terraform, Ansible, etc. Solid understanding of security protocols, cryptography, and secure software development. Proficient in scripting languages (Python, Bash, etc.) for automation. Strong understanding of network security, firewalls, and VPNs. Experience with logging and monitoring tools such as ELK, Splunk, or Prometheus. Excellent communication skills and ability to work collaboratively in cross-functional teams. Working experience on Disaster Recovery planning or implementation in their previous roles. Qualifications: Any Security certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or AWS Certified Security Mandatory. How to apply for this opportunity: Easy 3-Step Process: 1. Click On Apply! And Register or log in on our portal 2. Upload updated Resume & Complete the Screening Form 3. Increase your chances to get shortlisted & meet the client for the Interview! About Our Client: IppoPay is a Chennai-based Fintech Startup. We are payment aggregators for businesses that collect and accept payments from their customers and vendors. We provide a comprehensive technology for online and oine businesses to accept payments of any kind. We target small businesses, freelancers, homepreneurs, women entrepreneurs, and merchants in the Tier2 and Tier3 towns of the Indian market, promising consistent support and administration in their choice of language. About Uplers: Our goal is to make hiring and getting hired reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant product and engineering job opportunities and progress in their career. (Note: There are many more opportunities apart from this on the portal.) So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!

Posted 3 months ago

Apply

3 - 6 years

8 - 14 Lacs

Mumbai

Work from Office

Naukri logo

Experience : 3-4years in SOC Admin role, SIEM Administrator, SOAR Administrator. The Use-Cases Factory worker is responsible for : - Develop and deploy use-cases to detect security threats into our SIEM from the log collection to the incident handling playbook. Fine-tune detection rules to minimize false positives and false negatives. - Maintain detailed documentation of use-cases, ensuring transparency and accountability. - Manage execution of standard procedures for the content management, change management and lifecycle management of the use-cases. - Work closely with other IT and security teams to develop specific use cases and to enhance the overall security posture of the organization. Share insights and recommendations to improve overall cybersecurity posture. - Regularly review and update use-cases to adapt to the evolving threat landscape and incorporate new threat intelligence. - Manage reports, dashboards, metrics for CyberSOC KPIs and presentation to senior management & other stakeholders. Skills : - Bachelor's degree in Computer Science, Information Security, EXTC or related field. - Relevant certifications (e.g., CISSP, CCSP, CompTIA Security+) are highly desirable. - Proven experience (3+ years) working within the Cybersecurity field, with a focus on developing and managing use-cases. - Excellent understanding and proven hands-on experience in SIEM/SOAR concepts such as log collection, correlation, aggregation, normalization, parsing, playbooks, layouts. - Experience with Palo Alto XDR and/or other SIEM platforms like Sentinel, Qradar, Splunk, ArcSight, etc. - Experience with Palo Alto XSOAR and/or equivalent SOAR Platforms like Resilient, Phantom, etc. - Proficiency in scripting languages (e.g., Python, Bash) for automation and customization of security processes is highly desirable. - Deep understanding of various cyber threats, attack vectors, and defense mechanisms.

Posted 3 months ago

Apply

2 - 5 years

15 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

*Bachelors degree in computer science, Information Technology, Information Security, or related field (or equivalent experience) *Knowledge on Splunk, Firewall, and any Security tools along with CloudFlare WAF *Knowledge on Cloud Security * Experience working in a technical support or helpdesk role is preferred * Familiarity with enterprise security tools such as SIEM, IDS/IPS, EDR, web application firewall, identity and access management solutions, etc. * Basic understanding of networking concepts and protocols (TCP/IP, DNS, DHCP, etc.) * Proficiency in at least one scripting language (e.g., Python, PowerShell) is a plus * Certifications such as CompTIA Security+, CISSP, CCSP or GIAC are advantageous but not required * Ability to prioritize and manage multiple tasks simultaneously * Strong problem-solving skills and a methodical approach to troubleshooting * Adaptability and willingness to learn new technologies and processes * Commitment to providing exceptional customer service and support

Posted 3 months ago

Apply

11 - 14 years

35 - 40 Lacs

Hyderabad

Work from Office

Naukri logo

Role Summary & Key Responsibilities: • Lead the design and architecture of GRC solutions that integrate risk assessments, DR planning, privacy controls, and regulatory compliance measures. • Oversee technical teams to develop standardized processes and deliver high-quality compliance outputs. • Ensure that technical solutions align with Boeings regulatory and operational requirements. Key Skills & Qualifications: • Over 10- 16 years experience in cybersecurity architecture and governance. • Strong technical expertise in compliance frameworks (e.g., NIST, SOX, DFARS) and familiarity with ITSM and risk management tools. • Demonstrated leadership and project management skills; relevant certifications such as CISSP, CISM, or CRISC are highly preferred

Posted 3 months ago

Apply

11 - 14 years

35 - 40 Lacs

Hyderabad

Work from Office

Naukri logo

Role & responsibilities Role Summary & Key Responsibilities: • Lead the design and architecture of GRC solutions that integrate risk assessments, DR planning, privacy controls, and regulatory compliance measures. • Oversee technical teams to develop standardized processes and deliver high-quality compliance outputs. • Ensure that technical solutions align with Boeings regulatory and operational requirements. Key Skills & Qualifications: • Over 10- 16 years experience in cybersecurity architecture and governance. • Strong technical expertise in compliance frameworks (e.g., NIST, SOX, DFARS) and familiarity with ITSM and risk management tools. • Demonstrated leadership and project management skills; relevant certifications such as CISSP, CISM, or CRISC are highly preferred.

Posted 3 months ago

Apply

4 - 9 years

15 - 19 Lacs

Pune

Work from Office

Naukri logo

Divisional Risk and Control Analyst TDI Controls Testing & Assurance, AS Role Description Infrastructure Chief Operating Office (COO) is responsible for the effective operation of the infrastructure functions, driving operational efficiency whilst supporting the effective delivery of infrastructure services in line with business objectives and control requirements. It also includes oversight of Infrastructure Divisional Control Office (DCO) and Trade Settlement and Confirmations Operations (TSCO). Infrastructure Divisional Control Office (IDCO) as part of Infrastructure COO, provides services to multiple functions in infrastructure. The IDCO function is a dedicated risk, control, and regulatory oversight function, with prime responsibility for managing and proactively mitigating risk across the full breadth of the Technology and Infrastructure organization. Function also provides a consolidated view and central coordination of (non-financial) risks, as well as effective, efficient, and consistent standards and policies. (Technology Data & Innovation) TDI Control Testing & Assurance team part of IDCO identifies, tracks and reports control testing & assurance activities, conducts independent controls testing (design and operating effectiveness) on different risk types in line with the Control Testing Standards. The team also focuses on regulatory and risk-based assurance requirements. This role is within TDI Control Testing & Assurance team. Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Flexible working arrangements Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Perform Control Testing in line with Control Testing methodology/minimum standard Identify control deficiencies (findings), risks related to elements of controls, participate in findings agreement with stakeholders, escalate potential issues and exception items noted during the testing to senior management for discussion and further investigation, if deemed necessary Prepare Control Testing workpapers for senior management detailing testing results, document findings with highest quality Track Control Testing identified findings, perform required follow-up on open findings Consider regulatory and internal firm policy requirements as well as established best practices for control assurance. Support controls assurance activities Support in monitoring Control testing teams adherence to Control Testing methodology/minimum standards Support, contribute in managing Control Testing vendor resources, where applicable Track testing related effort/budget Plan Vs. Actuals throughout the testing lifecycle Build and maintain solid working relationships with key stakeholders such as within the DCO, IDCO, TSCO, GTI and other Testing Teams including Divisions/sub-divisions, 2 LoD and Group Audit (GA) Your skills and experience University degree preferably in Computer Science, Mathematics, Engineering or a related subject or equivalent qualification in the areas of information security. Professional/industry recognized qualifications e.g., CISA, CISSP, CISM, CRISC are beneficial. Experience in Cloud Security audit/testing, GCP (Google Cloud Platforms) or Professional/industry recognized qualifications e.g., CCSP, CCSK will be an advantage Good knowledge of auditing IT application controls, e.g., from IT audits or IT risk management. Understanding of the relationship between IT risk and underlying business process risk. Knowledge of regulations governing financial institutions is beneficial. Strong written and verbal communication skills and the ability to communicate effectively in conflict situations. Strong organizational skills and attention to detail. Ability to work under pressure, multi-task and prioritize workload. Strong analytical skills and structured thought process with the ability to clearly articulate control deficiencies and related risk Flexible, proactive, and innovative mind set with strong organizational skills to take ownership and responsibility for agreed targets and to meet them within budget to enable a timely and efficient completion of projects. This is an IC (individual contributor) role.

Posted 3 months ago

Apply

5 - 7 years

15 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Minimum of 5+ years work experience working with security tools and with security administration. Designing, implementing, managing & maintaining a Public Key Infrastructure (PKI) system, ensure secure issuance, distribution and revocation of digital certficates across Oracle Health org, including tasks like conducting security assessments, managing certificate lifecycle, troubleshooting PKI related issues and adhering to industry best practices for cryptographic key management. Hands on experience on Key Factor and any other relevant tool Strong ethics and understanding of ethics in business and information security Ability to mentor juniors and get them up to speed with the process Possess any current security certifications (e.g., CISSP, Security+) Ability to present and articulate findings to technical staff and executives Ability to participate in on-call rotation as needed Must be able to pass a background check Must have requirements: Minimum of 5+ years work experience working with security tools and with security administration. Designing, implementing, managing & maintaining a Public Key Infrastructure (PKI) system, ensure secure issuance, distribution and revocation of digital certficates across Oracle Health org, including tasks like conducting security assessments, managing certificate lifecycle, troubleshooting PKI related issues and adhering to industry best practices for cryptographic key management. Hands on experience on Key Factor and any other relevant tool Strong ethics and understanding of ethics in business and information security Ability to mentor juniors and get them up to speed with the process Possess any current security certifications (e.g., CISSP, Security+) Ability to present and articulate findings to technical staff and executives Ability to participate in on-call rotation as needed Must be able to pass a background check

Posted 3 months ago

Apply

5 - 10 years

10 - 20 Lacs

Delhi NCR, Gurgaon

Work from Office

Naukri logo

BE / MCA Data security main role is making strategy about data management. And he should auditing department/dealership/vendor/etc. Candidate needs strong data security analytical skills to identify and mitigate potential security threats. Required Candidate profile Certifications like CompTIA Security+, Certified ISO 27001, Certified Information Systems Security Professional (CISSP), and Certified Ethical Hacker (CEH) Manage Information Security policies

Posted 3 months ago

Apply

2 - 5 years

18 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

*Bachelors degree in computer science, Information Technology, Information Security, or related field (or equivalent experience) *Knowledge on Splunk, Firewall, and any Security tools along with CloudFlare WAF *Knowledge on Cloud Security * Experience working in a technical support or helpdesk role is preferred * Familiarity with enterprise security tools such as SIEM, IDS/IPS, EDR, web application firewall, identity and access management solutions, etc. * Basic understanding of networking concepts and protocols (TCP/IP, DNS, DHCP, etc.) * Proficiency in at least one scripting language (e.g., Python, PowerShell) is a plus * Certifications such as CompTIA Security+, CISSP, CCSP or GIAC are advantageous but not required * Ability to prioritize and manage multiple tasks simultaneously * Strong problem-solving skills and a methodical approach to troubleshooting * Adaptability and willingness to learn new technologies and processes * Commitment to providing exceptional customer service and support

Posted 3 months ago

Apply

2 - 5 years

15 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

*Bachelors degree in computer science, Information Technology, Information Security, or related field (or equivalent experience) *Knowledge on Splunk, Firewall, and any Security tools along with CloudFlare WAF *Knowledge on Cloud Security * Experience working in a technical support or helpdesk role is preferred * Familiarity with enterprise security tools such as SIEM, IDS/IPS, EDR, web application firewall, identity and access management solutions, etc. * Basic understanding of networking concepts and protocols (TCP/IP, DNS, DHCP, etc.) * Proficiency in at least one scripting language (e.g., Python, PowerShell) is a plus * Certifications such as CompTIA Security+, CISSP, CCSP or GIAC are advantageous but not required * Ability to prioritize and manage multiple tasks simultaneously * Strong problem-solving skills and a methodical approach to troubleshooting * Adaptability and willingness to learn new technologies and processes * Commitment to providing exceptional customer service and support

Posted 3 months ago

Apply

10 - 18 years

20 - 27 Lacs

Bengaluru

Work from Office

Naukri logo

Job Purpose: The Security Architect will be responsible for designing, implementing, and maintaining the overall security posture of the NBFC's IT infrastructure, applications, and data. This role involves developing and enforcing security policies, standards, and procedures to protect the organization from cyber threats, ensuring compliance with regulatory requirements, and safeguarding customer data. The Security Architect will work closely with IT, risk management, and business teams to align security strategies with business objectives. Key Responsibilities: Information Security Strategy Develop and implement an organization-wide information security strategy and vision. Align information security initiatives with business goals and objectives. Stay abreast of emerging threats and technologies to adapt the security strategy accordingly. Meeting and Board Presentation Participate in senior management meetings. Present the security strategy and vision to the board. Present risk and mitigation plans to the risk committee. Risk Management Identify, assess, and prioritize information security risks. Develop and implement risk mitigation strategies. Establish risk management frameworks and policies. Security Policies and Procedures Develop, implement, and enforce information security policies and procedures. Ensure compliance with relevant laws, regulations, and industry standards. Promote security awareness and education throughout the organization. Incident Response and Management Develop and maintain an incident response plan. Lead and coordinate responses to security incidents. Conduct post-incident reviews and implement improvements. Security Architecture Design and implement a robust information security architecture. Evaluate and select security technologies and tools. Ensure the integration of security measures into the organization's IT infrastructure. Security Awareness and Training Develop and implement security awareness programs for employees. Provide training to staff on security policies and best practices. Vendor and Third-Party Risk Management Assess and manage the security risks associated with external vendors and third-party relationships. Ensure that third-party contracts include appropriate security requirements. Compliance Monitor and ensure compliance with relevant data protection and privacy laws. Coordinate with legal and compliance teams to address regulatory requirements. Ensure compliance with relevant regulatory requirements (e.g., RBI guidelines, DPDPA, Cert-In, etc.). Security Audits and Assessments Conduct regular security audits and assessments. Prepare and maintain documentation for audits and regulatory inspections. Ensure the effectiveness of security controls and measures. Security Governance Establish and chair a security governance committee. Report regularly to executive leadership and the board on the state of information security. Budget and Resource Management Develop and manage the information security budget. Allocate resources effectively to support security initiatives. Collaboration and Communication Collaborate with other senior executives to integrate security into overall business strategies. Communicate effectively with stakeholders about the importance of information security. Provide guidance and training to employees on security best practices and awareness.

Posted 3 months ago

Apply

3 - 8 years

14 - 24 Lacs

Pune, Bengaluru, Hyderabad

Hybrid

Naukri logo

Role- Data Protection Location: Bangalore, Hyderabad,Mumbai , Pune, kolkata, chennai and Gurgaon Exp- 3-9 yrs Qualifications and Experience Required: B.E. / B. Tech / MBA Demonstrated experience in designing and implementing technology and process solutions to reduce the potential risk of data compromise Understanding of the entire ecosystem of data protection including well-rounded understanding of the information security domains and their inter-relations across that ecosystem Minimum 5 years of relevant experience required on Data Protection technologies Strong domain expertise, implementation and/or integration skills in two to four or more (depending on years of experience) of following areas: Data classification and inventory programs including the use of data discovery tools Data Loss Prevention Database activity monitoring Data access governance Cloud Access Security Broker Securing credential repositories and authentication services Systems administration experience with various operating systems such as Windows Server, Unix, and Linux DBA experience with database technologies such as Oracle and Microsoft SQL Understanding of key industry and regulatory requirements such as PCI, HIPAA, NIST Cyber Security Framework, NERC, or FFIEC requirements Demonstrated ability to identify and address internal and external client needs, including: Demonstrated problem solving and critical thinking skills Working collaboratively with clients to design and implement process and technology solutions Able to build solid, trust - based relationships with stakeholders Excellent verbal and written communication Willingness to travel Preferred: • CISSP, or equivalent certification desired • Technical skills including scripting - Python/JAVA/ASP/C#, Coding frameworks • Data protection product certifications • Previous experience with cyber incident response

Posted 3 months ago

Apply

10 - 20 years

45 - 50 Lacs

Mumbai

Work from Office

Naukri logo

Role Description The first line Tech Risk function for business divisions CB, IB and Ops at Deutsche Bank sits within the Divisional Control Office. CB and IB front-to-back have the largest footprint as a risk bearing function within the banking divisions and you will be part of a dynamic team which is consistently in demand for providing insights, assessments and managing Information Technology (IT) and Information Systems (IS) risks on behalf of the business. As part of the team, you will join the Banks journey and contribute towards our strategic goal of managing technology risk within appetite whilst enabling adoption of emerging and new technologies for business growth. Your key responsibilities Information Security Officer (ISO) The ISO is a manager aligned to an application (Application ISO) both together hereafter referred to as area of responsibility. The ISO has the responsibility for ensuring the compliance with the Group Information Security requirements, for this role the candidate will be aligned under the Crporate Bank (CB) D-CISO area under the larger CB, IB and Ops Tech Risk function. Key responsibilities comprise but not limited to ISO Defining strategy, governance and processes, including identification, asset categorization, control monitoring and risk assessments for the TPMA portfolio of 700+ applications in additional to performing the ISO tasks below for their own portfolio of a subset TPMA applications. Understand and analyze business setting from an information security perspective Perform risk assessments on complex applications, vendors, processes and projects from an information security perspective Identify security gaps, evaluate options for remediation, define and implement check points and compensating controls. Provide sufficient information related to the business context, information sensitivity and nature of usage of an application, including identification and implementation of controls for identified Information Security risks in their area of responsibility To cooperate with the D-ISO / D-CISO to address requests for policy interpretation, guidance and advice, to ensure creation of divisional policies in accordance with the IS Policy Governance and to support policy authors by raising questions to the policy advisory team Present assessments results and options to the business and discuss steps for resolution. Initiate and track risk acceptance process if required. Analyze and redesign access management processes (request and approval). Define and implement Segregation of Duties rules (details outlined below) Identifying applications and roles which allow access to PSI and assess appropriateness of access controls. Review of roles and application role concepts. Support on inquiries from internal and External Audit, regulators and clients. Advisory and support projects on information security questions. Advisory vendor relationships. Interact with and educate the business on information security risks and controls and handling sensitive data. Assist in assessing and determining appropriate controls on unstructured data hosted on internal and external data rooms. Conduct information security awareness sessions for stakeholders in CB. Assist in designing and implementing control framework for third party applications. Analyze the root cause for delays or incorrect processing and propose sustainable solutions Generate MIS for multiple IS topics and to assist senior management identify risks Support the wider D-CISO office where required including any adhoc analysis and presentations Special Projects support on ongoing remediation projects. Your skills and experience Skills Profile: Experience as IT and/or IS analyst ideally in a Corporate Banking environment Proficiency in Microsoft Office applications (Excel, PowerPoint, Word, etc.) Excellent communication skills in English (verbal and written) with ability to articulate / engage with Senior management stakeholders (a must) Strong analytical skills and ability to transform complex issues into efficient solutions Advanced presentation/interactive skills sufficient to convey complex conceptual information/ideas on issues requiring interpretation and opinion. Desire to work in a fast paced, challenging multi-cultural environment and with ability to work in a global team Self-motivated, critical thinking and good understanding of major business and risk processes Management Skills : Strong operational and people management skills, including the ability to operate within a diverse team. Excellent partnering skills and stakeholder management. The ability to successfully navigate a complex organisation, build strong relationships and work collaboratively with business and management teams and with other control functions. Comprehensive management / leadership skills, including the ability to motivate teams through demonstrable commitment to CB and DBs success. Experience/qualifications: Good university graduate or post-graduate degree with Information Security, Risk Management and Governance Prior experience in a risk environment (e.g. in BISO, ORM, Audit, Data Privacy) Good understanding of major business and operational risk processes. Certifications such as ISO27001-LA/LI, CISM, CISSP etc. Experience in banking industry with a strong sense of accountability and integrity

Posted 3 months ago

Apply

8 - 13 years

18 - 20 Lacs

Pune

Work from Office

Naukri logo

Desired Candidate The ideal candidate is a proactive and detail-oriented professional with strong leadership skills and a passion for cybersecurity. They should have excellent communication abilities to convey technical concepts to diverse audiences and a proven track record of managing teams and fostering a culture of security awareness. Adaptable and ethical, the candidate thrives in dynamic environments and collaborates effectively to address evolving cyber threats while maintaining the highest standards of confidentiality and integrity. Responsibilities: Strategic Planning: Develop, implement, and maintain a comprehensive cybersecurity strategy aligned with organizational goals. Risk Management: Identify, assess, and mitigate potential cybersecurity risks and vulnerabilities across systems, applications, and networks. Incident Response: Lead and coordinate incident response activities, ensuring quick containment, recovery, and root-cause analysis of security breaches. Compliance and Standards: Ensure adherence to relevant regulatory standards (e.g., GDPR, ISO 27001) and internal security policies. Team Collaboration: Lead and mentor the cybersecurity team, fostering skill development and ensuring alignment with security objectives. Stakeholder Communication: Act as a liaison between technical teams and senior management, translating technical risks into business terms. Continuous Improvement: Monitor and evaluate the effectiveness of security measures, and recommend enhancements to maintain a robust security posture. Tool and Technology Management: Oversee the deployment and management of security tools (e.g., SIEM, firewalls, endpoint protection, etc.) to ensure system integrity and confidentiality. Training and Awareness: Develop and conduct security training programs to promote awareness and compliance across the organization. Requirements: Education: Bachelors or Masters degree in Cybersecurity, Information Technology, Computer Science, or a related field. Experience: 6-10 years of experience in cybersecurity roles with progressive leadership responsibilities. Certifications: CISSP (Certified Information Systems Security Professional) [Ongoing is acceptable]. Additional certifications (e.g., CISM, CEH) are a plus. Technical Expertise: Strong understanding of security architecture, protocols, and best practices. Experience with tools like SIEM, IDS/IPS, endpoint security, firewalls, and vulnerability management systems. Knowledge of cloud security (AWS, Azure, GCP) and securing hybrid environments. Soft Skills: Excellent verbal and written communication skills for technical and non-technical audiences. Strong leadership, project management, and team collaboration abilities. Analytical and problem-solving mindset with attention to detail.

Posted 3 months ago

Apply

8 - 12 years

6 - 16 Lacs

Chennai

Work from Office

Naukri logo

Role & responsibilities Job description: Devise and Enhance the IT Security Policies and Controls. Involving, Educating, Training all the stakeholders on IT Policies. Plan, lead and execute cyber audits/assessments, which include managing the conduct of audit(s) and ensure that they are delivered on time, on budget, to the required standard and audit methodology Articulate and discuss control issues/gaps and corrective action plans with stakeholders and audit Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems. Prepare audit reports for Senior management, audit committee and auditees Validate management's remediation for audit issue closure Document all interactions in the form of Incident (Phone / Walk-in / Web) Responsible for problem/incident management, tracking of all issues, escalation and reporting Budgeting and Implementation of Security Policies. Provide 24 * 7 supports as a team Skill Set Requirement: Must possess good written and Oral Communications skills. Good Telephone and Email etiquette. Basic IT Knowledge Interpersonal Skills Should have at least 5 years of exp in IT security and certified with CISA, CISM. Should possess working experience (i.e. technical hands-on experience) in cyber/IT audit role. Preferably in BFSI sector. Should possess good analytical and critical thinking skills in order to evaluate control adequacy and operating effectiveness Should possess a Bachelor degree related to Computer Engineering, Information Technology or equivalent Should possess good communication skills (verbal and written) in English Must be able to work independently as well as in a team Escalation procedures/protocols Excellent understanding of technologies, operating systems, networking, anti-virus, back-ups, systems and firewalls Ability to multi-task Additional Requirement: Self-motivated achiever who gains satisfaction in providing excellent Customer Support Empathize with Customers and prioritize their needs Accept assignments with open cooperative, positive, team-oriented attitude Actively participate in Team meetings & provide suggestions for improvement Ability to research and analysis for any new issues and to provide solutions

Posted 3 months ago

Apply

8 - 13 years

35 - 50 Lacs

Bengaluru

Hybrid

Naukri logo

Who We Are: Hewlett Packard Enterprise is the global edge-to-cloud company advancing the way people live and work. We help companies connect, protect, analyze, and act on their data and applications wherever they live, from edge to cloud, so they can turn insights into outcomes at the speed required to thrive in todays complex world. Our culture thrives on finding new and better ways to accelerate whats next. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. If you are looking to stretch and grow your career our culture will embrace you. Open up opportunities with HPE. Job Description: In the HPE Hybrid Cloud, we lead the innovation agenda and technology roadmap for all of HPE. This includes managing the design, development, and product portfolio of our next-generation cloud platform, Green Lake. Working with customers, we help them reimagine their information technology needs to deliver a simple, consumable solution that helps them drive their business results. Join us redefine what’s next for you. What you’ll do: We are seeking a Software Engineer with strong coding expertise and a solid background in systems engineering and security . The ideal candidate should have experience working with security tools and processes, possess in-depth knowledge of system architecture, and demonstrate the ability to identify and resolve security vulnerabilities. This role involves contributing to the design, implementation, and maintenance of secure systems and applications while ensuring adherence to the best practices in security. This roles involves in Identification and evaluating new technologies, innovations, to ensure alignment with the technology roadmap and business value; creates plans for integration and update into architecture Reviews and evaluates designs and project activities for compliance with development guidelines and standards; provides tangible feedback to improve product quality and mitigate failure risk. Key Responsibilities Coding and Development Write clean, efficient, and secure code using modern programming languages (C# (preferred)). Collaborate with teams to design and develop secure systems and applications. Implement and integrate security tools and frameworks into the development lifecycle. Security Practices Perform security assessments and identify vulnerabilities in existing systems and applications. Deep expertise in software systems design, development methodologies, and integration across diverse platforms and technologies Proficient in cloud-based security concepts like using Identity and Access Management, firewalls, VPN and in-plane switching (IPS) systems Integrate and configure security tools (e.g., static and dynamic code analysis, vulnerability scanners, penetration testing tools). Define and enforce security policies, processes, and best practices across development and deployment. Monitor, analyze, and respond to security incidents and events. System Background Work with system-level components to ensure security in software, operating systems, and networks. Optimize performance and security in multi-threaded, distributed, or cloud-based systems. Collaborate with infrastructure and DevOps teams to enhance the overall system security posture. History of innovation with multiple patents or deployed solutions in the field of software design Collaboration and Documentation Collaborate with cross-functional teams, including product management, DevOps, and QA, to embed security in all stages of the SDLC. Create and maintain detailed documentation of security processes, tools, and guidelines. Provide technical guidance and mentoring to junior team members. Implement Agile practices to ensure continuous delivery and incremental progress. Promote and apply the left-shift strategy by identifying and addressing potential issues early in the development process. Actively participate in daily stand-ups, sprint planning, retrospectives, and backlog grooming sessions. What you need to bring: 10+ years of experience Strong coding skills in C# (.NET) (preferred) programming languages. Solid understanding of security tools (e.g., OWASP, SonarQube, Burp Suite, Nessus, Metasploit) and their integration. Familiarity with secure coding standards and best practices (e.g., OWASP Top 10). Experience with system-level programming and debugging. Knowledge of system security principles , including authentication, authorization, encryption, and secure protocols. Hands-on experience with cloud platforms (AWS, Azure, or GCP) and securing cloud infrastructure. Strong understanding of operating systems, networking, and system architecture. Experience in performing threat modeling , vulnerability management , and risk assessment . Familiarity with DevSecOps practices and integrating security into CI/CD pipelines. Preferred Skills Certifications like CISSP , CEH , OSCP , or equivalent are a plus. Experience with container security (e.g., Docker, Kubernetes). Knowledge of compliance standards (e.g., GDPR, HIPAA, PCI-DSS). Experience in cryptographic libraries and protocols. Educational Qualifications Bachelor’s/Master’s degree in Computer Science, Cybersecurity, Systems Engineering, or a related field. What We Can Offer You: Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have — whether you want to become a knowledge expert in your field or apply your skills to another division. Diversity, Inclusion & Belonging We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Let's Stay Connected: Follow @HPECareers on Instagram to see the latest on people, culture and tech at HPE. Job: Engineering HPE is an Equal Employment Opportunity/ Veterans/Disabled/LGBT and Affirmative Action employer. We are committed to diversity and building a team that represents a variety of backgrounds, perspectives, and skills. We do not discriminate and all decisions we make are made on the basis of qualifications, merit, and business need. Our goal is to be one global diverse team that is representative of our customers, in an inclusive environment where we can continue to innovate and grow together. Please click here: Equal Employment Opportunity. Hewlett Packard Enterprise is EEO F/M/Protected Veteran/ Individual with Disabilities. HPE will comply with all applicable laws related to employer use of arrest and conviction records, including laws requiring employers to consider for employment qualified applicants with criminal histories.

Posted 3 months ago

Apply

14 - 24 years

35 - 75 Lacs

Bengaluru

Hybrid

Naukri logo

Who We Are: Hewlett Packard Enterprise is the global edge-to-cloud company advancing the way people live and work. We help companies connect, protect, analyze, and act on their data and applications wherever they live, from edge to cloud, so they can turn insights into outcomes at the speed required to thrive in todays complex world. Our culture thrives on finding new and better ways to accelerate whats next. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. If you are looking to stretch and grow your career our culture will embrace you. Open up opportunities with HPE. Job Description: In the HPE Hybrid Cloud, we lead the innovation agenda and technology roadmap for all of HPE. This includes managing the design, development, and product portfolio of our next-generation cloud platform, Green Lake. Working with customers, we help them reimagine their information technology needs to deliver a simple, consumable solution that helps them drive their business results. Join us redefine whats next for you. What you’ll do: We are seeking a Software Engineer with strong coding expertise and a solid background in systems engineering and security . The ideal candidate should have experience working with security tools and processes, possess in-depth knowledge of system architecture, and demonstrate the ability to identify and resolve security vulnerabilities. This role involves contributing to the design, implementation, and maintenance of secure systems and applications while ensuring adherence to the best practices in security. This roles involves in Identification and evaluating new technologies, innovations, to ensure alignment with the technology roadmap and business value; creates plans for integration and update into architecture Reviews and evaluates designs and project activities for compliance with development guidelines and standards; provides tangible feedback to improve product quality and mitigate failure risk. Key Responsibilities Coding and Development Write clean, efficient, and secure code using modern programming languages C#/.Net (preferred). Collaborate with teams to design and develop secure systems and applications. Implement and integrate security tools and frameworks into the development lifecycle. Security Practices Perform security assessments and identify vulnerabilities in existing systems and applications. Deep expertise in software systems design, development methodologies, and integration across diverse platforms and technologies Proficient in cloud-based security concepts like using Identity and Access Management, firewalls, VPN and in-plane switching (IPS) systems Integrate and configure security tools (e.g., static and dynamic code analysis, vulnerability scanners, penetration testing tools). Define and enforce security policies, processes, and best practices across development and deployment. Monitor, analyze, and respond to security incidents and events. System Background Work with system-level components to ensure security in software, operating systems, and networks. Optimize performance and security in multi-threaded, distributed, or cloud-based systems. Collaborate with infrastructure and DevOps teams to enhance the overall system security posture. History of innovation with multiple patents or deployed solutions in the field of software design Collaboration and Documentation Collaborate with cross-functional teams, including product management, DevOps, and QA, to embed security in all stages of the SDLC. Create and maintain detailed documentation of security processes, tools, and guidelines. Provide technical guidance and mentoring to junior team members. Implement Agile practices to ensure continuous delivery and incremental progress. Promote and apply the left-shift strategy by identifying and addressing potential issues early in the development process. Actively participate in daily stand-ups, sprint planning, retrospectives, and backlog grooming sessions. What you need to bring: 14+ years of expereinceStrong coding skills in C# (.NET) (preferred) programming languages. Solid understanding of security tools (e.g., OWASP, SonarQube, Burp Suite, Nessus, Metasploit) and their integration. Familiarity with secure coding standards and best practices (e.g., OWASP Top 10). Experience with system-level programming and debugging. Knowledge of system security principles , including authentication, authorization, encryption, and secure protocols. Hands-on experience with cloud platforms (AWS, Azure, or GCP) and securing cloud infrastructure. Strong understanding of operating systems, networking, and system architecture. Experience in performing threat modeling , vulnerability management , and risk assessment . Familiarity with DevSecOps practices and integrating security into CI/CD pipelines. Preferred Skills Certifications like CISSP , CEH , OSCP , or equivalent are a plus. Experience with container security (e.g., Docker, Kubernetes). Knowledge of compliance standards (e.g., GDPR, HIPAA, PCI-DSS). Experience in cryptographic libraries and protocols. Educational Qualifications Bachelor’s/Master’s degree in Computer Science, Cybersecurity, Systems Engineering, or a related field. What We Can Offer You: Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have — whether you want to become a knowledge expert in your field or apply your skills to another division. Diversity, Inclusion & Belonging We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Let's Stay Connected: Follow @HPECareers on Instagram to see the latest on people, culture and tech at HPE. Job: Engineering HPE is an Equal Employment Opportunity/ Veterans/Disabled/LGBT and Affirmative Action employer. We are committed to diversity and building a team that represents a variety of backgrounds, perspectives, and skills. We do not discriminate and all decisions we make are made on the basis of qualifications, merit, and business need. Our goal is to be one global diverse team that is representative of our customers, in an inclusive environment where we can continue to innovate and grow together. Please click here: Equal Employment Opportunity. Hewlett Packard Enterprise is EEO F/M/Protected Veteran/ Individual with Disabilities. HPE will comply with all applicable laws related to employer use of arrest and conviction records, including laws requiring employers to consider for employment qualified applicants with criminal histories. Explore Location

Posted 3 months ago

Apply

2 - 7 years

8 - 18 Lacs

Bengaluru

Work from Office

Naukri logo

DESCRIPTION AWS Sales, Marketing, and Global Services (SMGS) is responsible for driving revenue, adoption, and growth from the largest and fastest growing small- and mid-market accounts to enterprise-level customers including public sector. As a member of the AWS Support team you will be at the forefront of this transformational technology, assisting a global list of companies and developers that are taking advantage of a growing set of services and features to run their mission-critical applications. As a Cloud Support Engineer, you will act as the Cloud Ambassador’ across all the cloud products, arming our customers with required tools & tactics to get the most out of their Product and Support investment. Would you like to use the latest cloud computing technologies? Do you have an interest in helping customers understand application architectures and integration approaches? Are you familiar with best practices for applications, servers and networks? Do you want to be part of a customer facing technology team helping to ensure the success of Amazon Web Services (AWS) as a leading technology organization? If you fit the description, you might be the person we are looking for! We are a group of smart people, passionate about cloud computing, and believe that world class support is critical to customer success. Key job responsibilities First and foremost this is a customer support role – in The Cloud. On a typical day, a Support Engineer will be primarily responsible for solving customer’s cases through a variety of customer contact channels which include telephone, email, and web/live chat. You will apply advanced troubleshooting techniques to provide tailored solutions for our customers and drive customer interactions by thoughtfully working with customers to dive deep into the root cause of an issue. Apart from working on a broad spectrum of technical issues, an AWS Support Engineer may also coach/mentor new hires, develop & present training, partner with development teams on complex issues or contact deflection initiatives, participate in new hiring, write tools/script to help the team, or work with leadership on process improvement and strategic initiatives to ensure better customer experience and compliance with global AWS standards, practices and policies. As we operate on a follow-the-sun model, with Support Engineering sites located globally, there is no after hours on-call or mandated overtime in this role. A day in the life Every day will bring new and exciting challenges on the job while you: • Learn and use new technologies. • Apply advanced troubleshooting techniques to provide unique solutions to our customers' individual needs. • Interact with leading technologists around the world and resolve customer issues. • Partner with Amazon teams in India to help reproduce and resolve customer issues. • Leverage your extensive customer support experience to provide feedback to internal Amazon teams in India on how to improve our services. • Drive customer communication during critical events. • Drive projects that improve support-related processes and our customers’ technical support experience. • Write tutorials, how-to videos, and other technical articles for the developer community. • Work on critical, highly complex customer problems that may span multiple AWS services. About the team Diverse Experiences AWS values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn’t followed a traditional path, or includes alternative experiences, don’t let it stop you from applying. Why AWS? Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating — that’s why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses. Inclusive Team Culture AWS values curiosity and connection. Our employee-led and company-sponsored affinity groups promote inclusion and empower our people to take pride in what makes us unique. Our inclusion events foster stronger, more collaborative teams. Our continual innovation is fueled by the bold ideas, fresh perspectives, and passionate voices our teams bring to everything we do. Mentorship & Career Growth We’re continuously raising our performance bar as we strive to become Earth’s Best Employer. That’s why you’ll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional. Work/Life Balance We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there’s nothing we can’t achieve in the cloud. BASIC QUALIFICATIONS - Bachelor’s degree OR equivalent experience in a technical position. - 2+ years of security and operating system support and distributed systems experience; - Experience to information security and compliance experience. PREFERRED QUALIFICATIONS - Experience Deploying Identity and Access Management systems to secure production and corporate access, such as: SSO, SAML. - Understanding of Cloud Security across realms of Identity, Monitoring Auditing and Cryptography. - Knowledge or experience with broad array of security technologies, such as NextGen FW, WAF, SIEM, Endpoint Security and more. Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit https://amazon.jobs/content/en/how-we-hire/accommodations for more information. If the country/region you’re applying in isn’t listed, please contact your Recruiting Partner.

Posted 3 months ago

Apply

Exploring CISSP Jobs in India

The demand for CISSP (Certified Information Systems Security Professional) professionals in India has been on the rise as companies recognize the importance of securing their digital assets. CISSP jobs offer lucrative career opportunities in various industries ranging from IT to finance. If you are a job seeker looking to enter this field, here is a comprehensive guide to help you navigate the CISSP job market in India.

Top Hiring Locations in India

  1. Bangalore
  2. Mumbai
  3. Delhi
  4. Pune
  5. Hyderabad

These cities are known for their thriving IT sectors and are hotspots for CISSP job opportunities.

Average Salary Range

The average salary range for CISSP professionals in India varies based on experience levels. Entry-level positions can expect to earn around INR 6-8 lakhs per annum, while experienced professionals with 5+ years of experience can command salaries upwards of INR 15 lakhs per annum.

Career Path

A typical career progression in the CISSP field may involve starting as a Security Analyst, moving on to roles such as Security Consultant, Security Manager, and eventually reaching a Chief Information Security Officer (CISO) position.

Related Skills

In addition to CISSP certification, employers often look for professionals with skills in network security, risk management, penetration testing, and knowledge of regulatory compliance such as GDPR and HIPAA.

Interview Questions

  • What is the difference between symmetric and asymmetric encryption? (medium)
  • Can you explain the CIA triad in information security? (basic)
  • How do you stay updated with the latest cybersecurity threats and trends? (basic)
  • Describe a time when you had to handle a security breach incident. How did you respond? (medium)
  • What is the importance of encryption in data security? (basic)
  • Explain the concept of least privilege in access control. (medium)
  • How do you conduct a security risk assessment for an organization? (medium)
  • What is the difference between IDS and IPS? (basic)
  • How would you secure a wireless network from potential attacks? (medium)
  • Can you explain the concept of zero-day vulnerability? (advanced)
  • How would you handle a situation where an employee violates security policies? (medium)
  • What is the role of a firewall in network security? (basic)
  • Describe the process of incident response in cybersecurity. (medium)
  • How do you ensure compliance with data protection laws in your organization? (medium)
  • What is the importance of security awareness training for employees? (basic)
  • How would you secure a web application from common vulnerabilities? (medium)
  • Explain the concept of multi-factor authentication. (basic)
  • Can you discuss the challenges of implementing a BYOD policy in an organization? (medium)
  • What are the key components of a security policy framework? (medium)
  • How do you approach the design of a secure network architecture? (medium)
  • Explain the role of encryption in securing data at rest and data in transit. (medium)
  • How would you prioritize security vulnerabilities for remediation? (medium)
  • What are the differences between a vulnerability assessment and a penetration test? (medium)
  • How do you handle security incidents involving third-party vendors or partners? (medium)
  • Can you discuss the importance of regular security audits in an organization? (medium)

Closing Remark

As you prepare for CISSP job interviews in India, remember to showcase your expertise in information security, stay updated with industry trends, and demonstrate your problem-solving skills. With the right combination of technical knowledge and experience, you can embark on a successful career in the exciting field of cybersecurity. Good luck with your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies