Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
2 - 6 years
8 - 10 Lacs
Bengaluru
Work from Office
Company Name: Inflow Technologies Company Website: https://inflowtechnologies.com/ Company details: Founded in 2005, Inflow Technologies is a niche player in the IT Infrastructure Distribution Services industry providing Value Added Distribution in Networking, Cyber Security, Unified Communications and Collaboration, AIDC, Surveillance, Server, Storage & Software related Products & Services in India/South Asia. Inflow is headquartered in Bangalore with presence across 20+ locations, enabling resellers to design, deploy and adopt IT Infrastructure solutions to facilitate their customer needs. This initiative, supported by a strong technical team of 120+ certified resources, assists channel partners throughout their sales cycle. Inflow has an annual run-rate revenue of USD 700+ Million. Location: Bangalore Role Overview: The Forcepoint Presales Technical Consultant works closely with the sales team to provide technical expertise throughout the sales cycle. This role involves engaging with prospects to understand their technical requirements, presenting Forcepoints cybersecurity solutions, and ensuring alignment with client needs. Key Responsibilities: Technical Expertise: Provide in-depth technical knowledge of Forcepoint's products and solutions to prospective clients. Sales Support: Collaborate with the sales team to define customer requirements and demonstrate how Forcepoint solutions can address these needs. Solution Demonstrations: Deliver tailored product presentations, demos, and workshops to prospects and clients. Proof of Concept (POC): Lead or assist in creating and running proof of concepts to showcase the value of Forcepoint products. Technical Proposals: Assist in creating and reviewing technical content for proposals, RFPs, and RFIs. Customer Engagement: Address technical queries, troubleshoot, and provide solutions during the sales process. Solution Customization: Work with clients to understand their specific requirements and help design customized solutions. Training & Support: Provide training to customers and internal teams on Forcepoint products and solutions. Market Trends: Stay current with industry trends, competitors, and new technology developments in cybersecurity. Qualifications: Strong technical knowledge in cybersecurity, specifically in network security, data protection, and threat intelligence. Familiarity with forcepoints product portfolio is a plus. Excellent communication and presentation skills. Experience working in a presales or technical consultant role. Ability to work collaboratively in a sales environment. Strong problem-solving and customer relationship-building skills. Preferred Skills: Certifications in cybersecurity (e.g., CISSP, CCSP). Previous experience in a technical sales role or customer-facing consulting role. Knowledge of cloud security, endpoint protection, and threat defense. This role requires an individual who is both technically proficient and able to effectively communicate complex solutions to non-technical stakeholders.
Posted 3 months ago
5 - 10 years
5 - 10 Lacs
Hyderabad
Work from Office
Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Managed Services Information Security Analyst is a seasoned subject matter expert, responsible for working with security tools and other security teams to monitor, analyze, interpret and report on the incoming client data for the purpose of delivering security information and recommendations to the clients, enabling the organization to deliver the contracted security services. This role includes performing tasks such as security incident detection and response, security event reporting, threat hunting, content maintenance (tuning) and interacting with clients to ensure their understanding of the information generated, recommending client system changes as well as answering security related queries from the clients. What you'll be doing Key Responsibilities: Works as part of a global Cyber Defense Centre (CDC) team that works 24/7 on rotational shifts. Works with client stakeholders and relevant internal teams to tune the MSSP platform and client SIEM to enable more efficient detection, analysis and reporting. Monitors security tools to review and analyze security logs from client environments. Generates continuous improvement ideas for supported security tools/technologies, to enable improvements to the company services, employee experience and client experience. Adheres to SOPs, customer Run Books and standard processes to ensure a globally consistent delivery whilst also proposing changes and improvements to these standards. Utilizes and documents best practices and amends existing documentation as required. Identifies opportunities to make automations which will help the clients and security delivery teams. Performs security incident handling and response from several vectors including End Point Protection and Enterprise Detection and response tools, attack analysis, malware analysis, network forensics, computer forensics., Utilizes a broad range of skills in LAN technologies, Windows and Linux O/S’s, and general security infrastructure. Ensures usage of knowledge articles in incident diagnosis and resolution and assists with updating as and when required. Performs defined tasks to inform and monitor service delivery against service level agreements and maintain records of relevant information. Undertakes threat hunting activities across both individual client estates, as well as cross client hunting. Manages unresolved incidents and follows up until incidents are resolved. Works closely with client delivery teams to support their activities related to client delivery. Cooperates closely with colleagues to share knowledge and build a cohesive and effective team environment, benefiting the individual, the business and the client. Performs any other related task as required. Knowledge and Attributes: Seasoned knowledge on implementation and monitoring of a company supported SIEM or security tools/technologies/concepts. Seasoned knowledge on security architecture, worked across different security technologies. Seasoned knowledge and understanding of the operation of modern computer systems and networks and how they can be compromised. Displays excellent customer service orientation and pro-active thinking. Displays problem solving abilities and is highly driven and self-organized. Excellent attention to detail. Excellent analytical and logical thinking. Excellent spoken and written communication abilities. Team player with the ability to work well with others and in group with colleagues and stakeholders. Ability to remain calm in pressurized situations. Ability to keep current on emerging trends and new technologies in area of specialization. Academic Qualifications and Certifications: Bachelor's degree or relevant qualification in Information Technology or Computing or a related field. Security certifications such as (but not limited to) AZ-500, SC-200, Security+, CEH, CISSP, CISM or similar Certification in different networking technologies such as CCNA, JNCIA, ACCA, PCNSA, CCSA is advantageous. Required Experience: Seasoned experience in SOC Analysis Operations. Seasoned experience in SIEM usage for investigations. Seasoned experience in Security technologies such as (but not limited to) Firewall, IPS, IDS, Proxy. Seasoned experience in dealing with technical support to clients. Seasoned experience in handling security incidents end to end. Seasoned experience in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots and other security tools. Seasoned experience in Security Analysis or Engineering preferably gained within a global services organization. Workplace type : Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Posted 3 months ago
6 - 10 years
5 - 10 Lacs
Hyderabad
Work from Office
Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Managed Services Cross Technology Engineer (L3) is a seasoned engineering role, responsible for providing a service to clients by proactively identifying and resolving technical incidents and problems. Through pre-emptive service incident and resolution activities, as well as product reviews, operational improvements, operational practices, and quality assurance this role will maintain a high level of service to clients. The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions. The Managed Services Cross Technology Engineer (L3) is responsible for managing tickets of high complexity, conducts advanced and complicated tasks, and provides resolution to a diverse range of complex problems. This position uses considerable judgment and independent analysis within defined policies and practices and applies analytical thinking and deep technical expertise in achieving client outcomes, while coaching and mentoring junior team members across functions. The Managed Services Cross Technology Engineer (L3) focusses across two or more technology domains such as (but not limited to) Cloud, Security, Networking, Applications and / or Collaboration and may also contribute to / support on project work as and when required. What you'll be doing Key Responsibilities: Ensures that assigned infrastructure at the client site is configured, installed, tested, and operational. Performs necessary checks, apply monitoring tools and respond to alerts. Identifies problems and errors prior to or when it occurs and logs all such incidents in a timely manner with the required level of detail. Assists in analyzing, assigning, and escalating support calls. Investigates third line support calls assigned and identify the root cause of incidents and problems. Reports and escalates issues to 3rd party vendors if necessary. Provides continuous feedback to clients and affected parties and update all systems and/or portals as prescribed by the company. Proactively identifies opportunities for work optimization including opportunities for automation of work. Coaches L2 teams for advance technical troubleshooting and behavioral skills. May manage and implement projects within technology domain, delivering effectively and promptly per client agreed upon requirements and timelines. May work on implementing and delivering Disaster Recovery functions and tests. Performs any other related task as required. Knowledge and Attributes: Ability to communicate and work across different cultures and social groups. Ability to plan activities and projects well in advance, and takes into account possible changing circumstances. Ability to maintain a positive outlook at work. Ability to work well in a pressurized environment. Ability to work hard and put in longer hours when it is necessary. Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information, and refraining from interrupting. Ability to adapt to changing circumstances. Ability to place clients at the forefront of all interactions, understanding their requirements, and creating a positive client experience throughout the total client journey. Academic Qualifications and Certifications: Bachelor's degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience). Certifications relevant to the services provided (certifications carry additional weightage on a candidate’s qualification for the role). Relevant certifications include (but not limited to) - CCNP or equivalent certification. CCNP in Security or PCNSE certification or Firewall Vendor related certification is good to have along with advance technical certification like CCIE, CISSP. VMware certified Professional: Data Centre Virtualization. VMware Certified Specialist – Cloud Provider. VMware Site Recovery Manager: Install, Configure, Manage. Microsoft Certified: Azure Architect Expert. AWS Certified: Solutions Architect Associate. Veeam Certified Engineer (VMCE). Rubrik Certified Systems Administrator. Zerto, pure, vxrail. Google Cloud Platform (gcp). Oracle Cloud Infrastructure (oci). SAP Certified Technology Associate - OS DB Migration for SAP NetWeaver 7.4. SAP Technology Consultant. SAP Certified Technology Associate - SAP HANA 2.0. Oracle Cloud Infrastructure Architect Professional. IBM Certified System Administrator - WebSphere Application Server Network. Required Experience: Seasoned Managed Services experience handling complex cross technology infrastructure. Seasoned experience required in Engineering function within a medium to large ICT organization. Seasoned working knowledge of ITIL processes. Seasoned experience working with vendors and/or 3rd parties. Workplace type : Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Posted 3 months ago
7 - 12 years
12 - 14 Lacs
Pune
Work from Office
Job Title: Cyber Engineer Consultant Overview : We are seeking an experienced Cyber Engineer Consultant to provide expert-level consulting support to our customer-facing teams. The ideal candidate will have a strong background in cybersecurity with at least 7 years of hands-on experience, and a proven ability to help design and implement security solutions while also shaping business requirements. This is a client-facing role where the consultant will bridge the gap between technical capabilities and customer needs to build tailored cybersecurity solutions that meet complex business and security requirements. Key Responsibilities: Consulting Expertise: Provide subject matter expertise in cybersecurity, helping the team define security requirements and ensure the development of effective security solutions that align with customer needs. Solution Design: Work closely with internal teams and clients to design, architect, and implement security solutions that meet business requirements, regulatory compliance, and risk management objectives. Requirements Gathering: Collaborate with business stakeholders and customers to gather security and technical requirements, translating them into comprehensive solution specifications and implementation plans. Customer Engagement: Engage with clients to understand their cybersecurity challenges and provide guidance on best practices, security architectures, and threat mitigation strategies. Risk Assessment & Mitigation: Conduct risk assessments, identify vulnerabilities, and recommend mitigations to strengthen clients' security posture. Proposal Support: Assist in crafting RFP responses, proposals, and solution documentation, ensuring that the technical solutions meet both security and business needs. Cross-Functional Collaboration: Work alongside business development, sales, and technical teams to ensure that security requirements and solutions are properly integrated into client projects. Qualifications: Experience: Minimum of 7 years in cybersecurity engineering, with hands-on experience in security architecture, solution design, and implementation across a variety of industries. Technical Skills: Proficient in a wide range of cybersecurity tools, frameworks, and technologies, including firewalls, intrusion detection/prevention systems, encryption, vulnerability scanning, and SIEM tools. Business Acumen: Ability to work with non-technical stakeholders to gather business and security requirements and translate them into effective solutions. Experience with risk management, compliance (GDPR, HIPAA, NIST, etc.), and security audits is a plus. Security Certifications: Relevant certifications such as CISSP, CISM, CISA, or similar are strongly preferred. Problem-Solving: Strong analytical and problem-solving skills with the ability to design solutions that address complex security challenges. Communication Skills: Excellent verbal and written communication skills. Experience presenting complex security concepts to both technical and non-technical audiences. Consulting Experience: Experience working in a consulting environment, providing advisory services to clients in cybersecurity, and guiding them through security challenges. Desirable Skills: Experience with cloud security (AWS, Azure, Google Cloud) and securing hybrid environments. Familiarity with DevSecOps practices and tools. Knowledge of cybersecurity frameworks and standards (NIST, ISO 27001, etc.). Ability to lead or assist in security audits and assessments. This is important- Security Certifications: Relevant certifications such as CISSP, CISM, CISA, or similar are strongly preferred. This is an exciting opportunity for a results-driven professional. If you have a passion, we encourage you to apply. Apply Now: Drop your resume on 8308907577 . References are highly appreciated!
Posted 3 months ago
4 - 7 years
14 - 18 Lacs
Bengaluru
Work from Office
Position Summary... We are looking for an experienced and versatile Full Stack Developer to join our dynamic team. The ideal candidate will be responsible for designing, developing, and maintaining both the front-end and back-end components of our applications. You will collaborate with cross-functional teams to deliver scalable, high-quality solutions that meet business needs and provide a seamless user experience. What youll do... The platforms you build will be used for creating OMNI pricing platform for Walmart, across both eCommerce store channel across multiple countries with each of them being a multi-billion dollar business for Walmart. You will be challenged with unparalleled complex business problems that span across multiple countries and a large number of users, and data. This team enables our stores and eCommerce operations across the world. The platforms that we build are used in most of the markets where Walmart has its presence (US, Canada, Mexico, Chile, Central America). The pricing platform in Walmart focuses on setting EDLP for stores least price for the eCommerce channel among all the competitors. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelors degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 2years experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 4 years experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, Network+, GISF, GSEC, CISSP, or CCSP, Master s degree in Computer Science, Information Technology, Engineering, Information Systems, Cybersecurity, or related area Primary Location... Pardhanani Wilshire Ii, Cessna Business Park, Kadubeesanahalli Village, Varthur Hobli , India
Posted 3 months ago
5 - 7 years
15 - 25 Lacs
Pune
Work from Office
Minimum of 10 years of experience in Identity and Access Management, with a focus on requirement gathering, solution design, and project leadership. Extensive hands-on experience (minimum 5 years) with the Saviynt Identity Governance and Administration (IGA) platform, including implementation, configuration, and customization. Strong understanding of IAM concepts, including access control, authentication, authorization, and identity lifecycle management. Industry certifications such as CISSP, and Saviynt certifications are desirable.
Posted 3 months ago
2 - 5 years
18 - 20 Lacs
Bengaluru
Work from Office
*Bachelors degree in computer science, Information Technology, Information Security, or related field (or equivalent experience) *Knowledge on Splunk, Firewall, and any Security tools along with CloudFlare WAF *Knowledge on Cloud Security * Experience working in a technical support or helpdesk role is preferred * Familiarity with enterprise security tools such as SIEM, IDS/IPS, EDR, web application firewall, identity and access management solutions, etc. * Basic understanding of networking concepts and protocols (TCP/IP, DNS, DHCP, etc.) * Proficiency in at least one scripting language (e.g., Python, PowerShell) is a plus * Certifications such as CompTIA Security+, CISSP, CCSP or GIAC are advantageous but not required * Ability to prioritize and manage multiple tasks simultaneously * Strong problem-solving skills and a methodical approach to troubleshooting * Adaptability and willingness to learn new technologies and processes * Commitment to providing exceptional customer service and support
Posted 3 months ago
2 - 5 years
18 - 20 Lacs
Bengaluru
Work from Office
*Bachelors degree in computer science, Information Technology, Information Security, or related field (or equivalent experience) *Knowledge on Splunk, Firewall, and any Security tools along with CloudFlare WAF *Knowledge on Cloud Security * Experience working in a technical support or helpdesk role is preferred * Familiarity with enterprise security tools such as SIEM, IDS/IPS, EDR, web application firewall, identity and access management solutions, etc. * Basic understanding of networking concepts and protocols (TCP/IP, DNS, DHCP, etc.) * Proficiency in at least one scripting language (e.g., Python, PowerShell) is a plus * Certifications such as CompTIA Security+, CISSP, CCSP or GIAC are advantageous but not required * Ability to prioritize and manage multiple tasks simultaneously * Strong problem-solving skills and a methodical approach to troubleshooting * Adaptability and willingness to learn new technologies and processes * Commitment to providing exceptional customer service and support
Posted 3 months ago
2 - 5 years
15 - 20 Lacs
Bengaluru
Work from Office
*Bachelors degree in computer science, Information Technology, Information Security, or related field (or equivalent experience) *Knowledge on Splunk, Firewall, and any Security tools along with CloudFlare WAF *Knowledge on Cloud Security * Experience working in a technical support or helpdesk role is preferred * Familiarity with enterprise security tools such as SIEM, IDS/IPS, EDR, web application firewall, identity and access management solutions, etc. * Basic understanding of networking concepts and protocols (TCP/IP, DNS, DHCP, etc.) * Proficiency in at least one scripting language (e.g., Python, PowerShell) is a plus * Certifications such as CompTIA Security+, CISSP, CCSP or GIAC are advantageous but not required * Ability to prioritize and manage multiple tasks simultaneously * Strong problem-solving skills and a methodical approach to troubleshooting * Adaptability and willingness to learn new technologies and processes * Commitment to providing exceptional customer service and support
Posted 3 months ago
4 - 9 years
15 - 25 Lacs
Mumbai
Work from Office
We are seeking an experienced Cybersecurity Analyst to join our Security Operations Center (SOC) team. The SOC provides 24x7 security operations monitoring for the Russell Investments environment. Youll use various tools and dashboards to monitor the environment, triage events to detect legitimate security concerns, and respond according to established processes. Youll interact regularly with other members of the Cybersecurity team as well as other IT support teams. Interested candidates please share your updated resume to vdias@russellinvestments.com Job Location: Goregaon East Role Responsibilities Monitor and analyze security events and incidents using advanced security tools to identify potential threats, vulnerabilities, and suspicious activities. Recognize potential, successful, and unsuccessful intrusion attempts Conduct in-depth analysis of security incidents, leveraging various sources of threat intelligence, to determine the scope and impact of security threats and incidents. Stay up to date with the latest cybersecurity news and trends, and provide insights and recommendations to enhance our security posture. Engage with various teams to expand your knowledge of the environment Research new and evolving threats that have the potential to impact the environment Serve on the incident response team for major or high-profile security incidents in tandem with external providers. Propose procedural updates and process improvements Be an escalation point for the SOC analysts Preferred candidate profile Minimum 4 years experience in Cybersecurity or related field Due to the nature of 24x7 SOC monitoring requirements, this position requires, subject to compliance with applicable laws, occasional weekend work and alternate shifts as needed to ensure adequate coverage and meet the demands of our operations. Certifications such as CISSP and CEH are desirable Knowledge of cybersecurity principles, concepts, and practices Knowledge of networks, firewalls, and operating systems Strong analytical and problem solving skills, with the ability to collate and interpret data from various sources, assess complex security issues, and propose effective solutions. Experience with security incident detection and response Familiarity with security technologies, such as SIEM, IDS/IPS, firewalls, endpoint protection, and vulnerability scanners. Familiarity with industry standards and frameworks, such as NIST Cybersecurity Framework and ISO 27001. Core Values Strong interpersonal, oral, and written communication and collaboration skills Strong organizational skills including the ability to adapt to shifting priorities and meet frequent deadlines, Proactive approach to problem-solving with strong judgment and decision-making capability. Highly resourceful and collaborative team-player, with the ability to also be independently effective and exude initiative and a sense of urgency. Exemplifies our customer-focused, action-oriented, results-driven culture. Forward looking thinker, who actively seeks opportunities, has a desire for continuous learning, and proposes solutions. Ability to act with discretion and maintain complete confidentiality. Dedicated to the firms values of non-negotiable integrity, valuing our people, exceeding client expectations, and embracing intellectual curiosity and rigor.
Posted 3 months ago
8 - 12 years
10 - 14 Lacs
Gurgaon
Work from Office
About The Role : Role Main point of contact for all security related matters within Business Unit. Consult with the BU Security SME / Group Cyber Security SME for any advice and questions as required pertaining to BU or Capgemini Organization as a whole Ensure every product release has a documented security plan and plan executed during the release cycle. Security plan template S-SDLC Activity Tracker sheet and other secure engineering process templates, Guidance, policies etc. are available on the SharePoint repository. These templates may need updates from time to time. Manage pen testing team and coordinate with the product teams to create pen testing schedules for the year and assign pen testing resource for execution. Work with the product team to ensure pen testing team has required resources and environment to execute the tests. Skills Program and multiple project/team management skills Good communication and team leadership skills Experience working for complying with one or more security standards and certifications such ISO 27001, ISO 20243, NIST, Federal standards etc. Works in the area of Software Engineering, which encompasses the development, maintenance and optimization of software solutions/applications.1. Applies scientific methods to analyse and solve software engineering problems.2. He/she is responsible for the development and application of software engineering practice and knowledge, in research, design, development and maintenance.3. His/her work requires the exercise of original thought and judgement and the ability to supervise the technical and administrative work of other software engineers.4. The software engineer builds skills and expertise of his/her software engineering discipline to reach standard software engineer skills expectations for the applicable role, as defined in Professional Communities.5. The software engineer collaborates and acts as team player with other software engineers and stakeholders. Skills (competencies) Verbal Communication
Posted 3 months ago
15 - 24 years
30 - 40 Lacs
Pune
Work from Office
Manage & improve network system SD-WAN connecting different locations Design, implement, manage SD-WAN solution Smooth & secure operation wide-area network WAN, optimizing performance & security Troubleshoot, maintain, improve SD-WAN infrastructure Required Candidate profile Exp in network security Skills: Strong knowledge of SD-WAN technologies, particularly Cisco Catalyst SD-WAN, understanding of network protocols like BGP and OSPF Certifications: CISSP, CCNP Security
Posted 3 months ago
10 - 14 years
37 - 45 Lacs
Bengaluru
Work from Office
Project Role :Security Architect Project Role Description :Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills :Risk Management Good to have skills :Governance Risk Compliance (GRC)
Posted 3 months ago
3 - 7 years
5 - 9 Lacs
Bengaluru
Work from Office
Job Title - Security Assessor + Analyst/Sr Analyst + CISO(Corporate Function) Management Level :11/10- Analyst/Sr Analyst Location:Bangalore Must have skills:ISO27001, Conducted security assessment Good to have skills:other security standard such as NIST, COBIT etc. Job Summary : Resource will be responsible for conducting (Third-party audits)supplier security assessments. These assessments will verify the effective implementation of security controls in suppliers organization Roles & Responsibilities: Work directly with supplier contacts and business supplier management team to schedule and conduct the security assessment. Monitor the supplier on supplier risk management tools to analysis the risk and share action plan with supplier team for closure. Perform the assessment using customized work plan to address key risks of the Accenture suppliers (vendors) (Customized ISO27001 Controls) Identify assessment findings and recommend remediation Draft assessment report and submit for manager signoff Track and confirm closure of observations/findings Assessors will be part of a globally distributed team, and assess Accenture suppliers Professional & Technical Skills: Security+, CISA, CISSP or CISM certifications (optional) ISO 27001 Lead Auditor/Implementor (optional) Good technical writing skills Good communication skills Experience of managing Interaction with team management or senior management would be plus. Ability to think out of the box. Ability to be flexible and work creatively and analytically in a problem-solving environment Strong interpersonal, organizational and analytical skills Additional Information: Qualifications Experience:+2 years Educational Qualification:Graduation (10+2+3/4) / Bachelors Degree
Posted 3 months ago
5 - 10 years
7 - 12 Lacs
Hyderabad
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : ServiceNow Governance, Risk, and Compliance (GRC) Good to have skills : Security Architecture Design Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Your typical day will involve designing and implementing security solutions, collaborating with cross-functional teams, and ensuring compliance with governance and risk management policies. Roles & Responsibilities: Expected to be an SME, collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Design and implement security solutions to protect the organization's cloud infrastructure. Collaborate with cross-functional teams to ensure the security architecture meets business requirements. Ensure compliance with governance and risk management policies. Conduct risk assessments and develop mitigation strategies. Stay up-to-date with the latest security trends and technologies. Professional & Technical Skills: Must To Have Skills:Proficiency in ServiceNow Governance, Risk, and Compliance (GRC). Good To Have Skills:Experience with Security Architecture Design. Strong understanding of cloud security principles and best practices. Experience in designing and implementing security controls for cloud environments. Knowledge of industry standards and regulations related to cloud security. Familiarity with security frameworks such as ISO 27001 and NIST. Excellent problem-solving and analytical skills. Strong communication and collaboration abilities. Additional Information: The candidate should have a minimum of 5 years of experience in ServiceNow Governance, Risk, and Compliance (GRC). This position is based at our Hyderabad office. A 15 years full time education is required. Qualifications 15 years full time education
Posted 3 months ago
8 - 12 years
8 - 12 Lacs
Bengaluru
Work from Office
About the Role: Manager of Detection and Response will play a key role in leading our SOC efforts, coordinating with external SOC vendors, and internal stakeholders to ensure a robust and timely response to security incidents. This role requires hands-on experience with AWS incident response and a deep understanding of modern threat landscapes, detection techniques, and response processes. You will not focus on basic security analysis but will rather bring strategic leadership in responding to and managing security incidents. Key Responsibilities: Lead and manage SOC operations in collaboration with external vendors and internal teams. Drive the incident detection and response lifecycle, including monitoring, triage, containment, eradication, recovery, and post-incident analysis. Serve as the primary point of contact for SOC incident response activities, leveraging your expertise to mitigate risks and resolve threats. Ensure that all incidents are thoroughly documented, analyzed, and communicated to stakeholders with actionable recommendations. Develop, refine, and enforce incident response playbooks, procedures, and reporting structures. Collaborate with security engineering, DevOps, and cloud teams to continuously improve detection capabilities and incident response readiness. Conduct regular threat hunting and ensure visibility into emerging threat vectors, particularly in the cloud environment. Stay up-to-date on the latest attack vectors, vulnerabilities, and incident response technologies. Foster a culture of continuous improvement in incident response by providing feedback, conducting post-incident reviews, and implementing lessons learned. Manage and communicate with executive stakeholders during high-severity incidents. Key Qualifications: Bachelors degree in Cybersecurity, Information Technology, or a related field; advanced certifications (such as CISSP, AWS Certified Security - Specialty, GCIH, GCIA) are a plus. 7+ years of experience in information security, with at least 3 years in a leadership role Strong experience in incident detection and response, particularly in AWS environments In-depth knowledge of leading incident response efforts for cloud-based infrastructures. Proven ability to manage relationships with external vendors and coordinate joint efforts for SOC operations. In-depth knowledge of detection technologies, including SIEM, IDS/IPS, and EDR solutions. Familiarity with common security frameworks (e.g., NIST, ISO 27001, CIS) Excellent communication and stakeholder management skills, particularly in high-pressure situations. Ability to work collaboratively with cross-functional teams including engineering, DevOps, and product teams in a fast-paced environment. Experience with SIEM tools, log analysis, and security automation Experience in managing and improving SOC processes and ensuring continuous monitoring of advanced threats. Strong analytical and problem-solving skills Excellent communication and leadership abilities Required Skills: Proven experience in managing threat detection and response operations and vendor relationships Expert-level knowledge of AWS security services and incident response procedures Proficiency in scripting languages (e.g., Python, PowerShell) for security automation Experience with threat hunting and advanced persistent threat (APT) detection Strong knowledge of the MITRE framework In-depth knowledge of cyber kill chain and their stages to identify early indicators of compromise Strong understanding of network protocols and common attack vectors Has experience in Datadog Preferred Qualifications: Relevant security certifications (e.g., CISSP, CISM, GCIA, GCIH) Experience in cloud security beyond basic security concepts in AWS Knowledge of DevSecOps practices and tools Experience in a multi-cloud or hybrid-cloud environment About Liminal: Liminal is a compliant and insured digital asset custody and wallet infrastructure provider. Launched in April 2021, Liminal Custody is a CCSS Level 3, SOC Type 2, and ISO 27001 27701 certified organization. Based in Singapore, Liminal has operations spread across APAC, MENA, and Europe, along with offices in Singapore, India, and UAE. The company has received an FSP license from FSRA in ADGM and initial approval from VARA. Liminal takes pride in supporting businesses with its qualified and insured custody (self and institutional) that enables stress-free safekeeping of digital assets for institutions. It also provides a cutting-edge wallet infrastructure platform that is secure, compliant, and automated and comes with a plug-and-play architecture for faster onboarding of developers, business partners, and government agencies. Our website - https://www.liminalcustody.com/
Posted 3 months ago
4 - 9 years
6 - 11 Lacs
Chennai
Work from Office
What youll be doing... Youll be finding the right technology to help ensure our customers keep their systems secure and spot risks before they become real threats. But youll be doing more than just providing SOX and IT securityyoull help customers prepare for the unexpected, defend their systems, and protect their business, brand, and bottom line. Designing solutions to mitigate risk and close security gaps and reduce vulnerability. Managing SOX Audit. PM/Engineering effort for tracking Security vulnerabilities. Working closely with VCG Application Development, App Security teams and other Key stakeholders in strategizing SOX and Security Engineering Practices and mitigating the Security Vulnerabilities. Adhering to industry standards and best practices and understanding emerging technologies and trends to continuously improve the systems, application, infrastructure, and processes. Performing SOX QA Support for Controls to ensure minimal SOX findings by auditors. Conducting quarterly Lesson Learned with SOX POCs/Directors/Performers to prevent the same issues from happening quarter over quarter. Supporting SOX BOT automation enhancements and testing in partnership with Control Performers. Supporting SOX Ops - Maintain and enhance SOX SOP documents for effective QA reviews by team. Where you'll be working... In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. What were looking for... Application Security Skills: Secure Coding Practices: Deep understanding of secure coding principles and common vulnerabilities (OWASP Top 10, SANS 25) in various languages (e.g., Java, Python, .NET, JavaScript). SAST/DAST/IAST Expertise: Proficiency in using and interpreting results from Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and ideally Interactive Application Security Testing (IAST) tools. Open Source Software (OSS) Security: Knowledge of common OSS vulnerabilities, license compliance issues, and tools for managing OSS risks. Threat Modeling: Ability to perform threat modeling exercises to identify potential security weaknesses in application architectures and designs. Cloud Security (for Cloud-Native Apps): Familiarity with cloud security concepts, including secure configuration of cloud services (e.g., AWS, Azure, GCP), identity and access management (IAM), and cloud-native security tools. Logging and Monitoring: Experience with implementing and analyzing security logs, setting up security information and event management (SIEM) systems, and using intrusion detection/prevention systems (IDS/IPS). DevSecOps Practices: Understanding of integrating security into the software development lifecycle (SDLC) using DevSecOps methodologies and tools. Platform Security Skills: Cloud Security: Strong knowledge of cloud security best practices, including securing cloud infrastructure (compute, storage, network), managing cloud access, and implementing security monitoring in cloud environments. Container Security: Expertise in securing containerized applications and their underlying infrastructure (e.g., Docker, Kubernetes), including image scanning, runtime security, and container orchestration security. Vulnerability Management: Proficiency in using vulnerability scanning tools (like Tenable) for both network and application layers, prioritizing vulnerabilities, and coordinating remediation efforts. Hardware Security: Understanding of hardware security concepts, including firmware security, hardware-based encryption, and physical security measures. Incident Response: Experience with incident response processes, including detection, containment, eradication, and recovery, as well as post-incident analysis. SOX Auditing Exposure/ Experience: We are seeking a highly motivated and detail-oriented SOX Audit person to join our growing team. In this role, you will play a crucial part in ensuring the effectiveness of our internal control environment and compliance with the Sarbanes-Oxley Act (SOX). Plan, execute, and document SOX testing procedures for key financial and IT controls. Identify and assess the design and operating effectiveness of internal controls. Evaluate control deficiencies and recommend remediation strategies. Collaborate with process owners to remediate control deficiencies and enhance the control environment. Stay abreast of SOX compliance requirements and industry best practices. Assist with the development and maintenance of SOX documentation, including process narratives, flowcharts, and risk control matrices. Participate in special projects and other duties as assigned Additional Important Skills: Automation and Scripting: Proficiency in scripting languages (e.g., Python, Bash, PowerShell) for automating security tasks and integrating security tools. Communication and Collaboration: Excellent communication skills to effectively convey security findings to technical and non-technical audiences and collaborate with development and operations teams. Problem-Solving and Analytical Skills: Strong analytical and problem-solving abilities to investigate security issues, identify root causes, and develop effective solutions. Youll need to have: Bachelors degree or four or more years of work experience. Four or more years of relevant experience required, demonstrated through work experience and/or military experience. Worked as a consultant. Four or more years of relevant experience in Application Security Skills, Platform Security Skills & SOX Auditing Exposure/ Experience. Even better if you have one or more of the following: A degree in engineering or computer science. Experience with security risk procedures, security patterns, authentication technologies and security attack pathologies. Certifications in one or more of the following: Security: CISSP, CISM, CEH, GCIH, GPEN, CCSK, Security+, Cisco, F5, BlueCoat, Check Point. Network: Cisco, Juniper, Palo Alto. Architecture: TOGAF. Service Delivery/Governance: ITILv2/3.
Posted 3 months ago
6 - 8 years
8 - 10 Lacs
Bengaluru
Work from Office
OVERALL PURPOSE OF THE ROLE: The primary responsibility of the specialist security Operationsis to ensure security risks are identified and managed within acceptable limits. The Security specialist will work closely with Design Authority, Solution Architects, IS Design,IS&T operations and Business teams to manage security of the organization RESPONSIBILITIES: To analyse and update critical and non critical log sources and their health status check for redundant log sources and take necessary steps working with right stake holders daily health check and monitoring of SOC infra Co-relationship, framework management for SOC use cases responsible for analytics and data crunching or data analysis and represenation of outcome for leadeship to make next decisions KPI definition, revision and imprvement for SOC infra, health and use cases TECHNICAL COMPETENCIES & EXPERIENCE To be considered for this role, candidate need to demonstrate the following skills experience and attributes: Bachelors/Masters degree in Engineering/Technology or related field Minimum 6-8 years of relevant IT experience Professional industry standard certifications like CISSP, CEH, GIAC, CISM, ISO 27002 etc. will be an added advantage Experience with various IT / Security technologies including, Active Directory, DNS, Messaging, Firewalls/ VPN Gateways, IPS, Proxy, WAF, PKI, IAM,etc. Good understanding of tools like CyberArk, PingIdentity, Sailpoint, Qualys, Veracode Proficient handson experience and understanding of various security tools and technologies. Experience in an operational role working directly with internal and external customers, trouble ticketing systems, and incident management Solid understanding of ITIL process framework Must understand and have worked in an operational environment such as a NOC or SOC for 2 4 years Demonstrated leadership experience in the area of Security Operations Proven planning, prioritization, and organizational skills Demonstrated drive for continuous learning, results orientation, and teamwork Ability to drive change through innovation & process improvement Ability to manage projects and drive action items with customers and crossfunctional peers Proven crisis management skills Professional & concise communication (written & verbal) Ability and flexibility to adapt to change, including shifting and competing priorities Demonstrated ability to be a big picture thinker, strategist, and long term planner Strong analytical skills with demonstrated problem solving ability Project management skills with a proven ability to design workable solutions will be an added advantage Exposure to ISO 27002 and ISO 27005
Posted 3 months ago
10 - 15 years
37 - 45 Lacs
Mumbai
Work from Office
ROLE SUMMARY: The Associate Director of Technology Risk Advisory (TRA) will lead and oversee the development and growth of a high-performing Technology Risk Advisory practice. The role involves strategic planning, team building, client engagement, and service delivery while ensuring excellence in Cybersecurity, Governance, Risk, and Compliance (GRC), Technology Operations (TechOps), Security Operations (SecOps), and Global Privacy Regulations. This leader will focus on delivering client-centric solutions and building a robust practice. JOB DESCRIPTION : Practice Management : Operations : Develop a strategic roadmap to build and scale the Technology Risk Advisory practice. Design service offerings in Cybersecurity GRC, TechOps, SecOps, and Privacy Advisory. Establish robust frameworks, methodologies, and tools for delivering advisory services. Develop and implement cybersecurity frameworks based on ISO 27001, NIST CSF, COBIT, and other standards. Guide security operations, including SIEM, threat intelligence, and incident response. Offer advisory on technology operations, including IT infrastructure optimization and Dev SecOps integration. Ensure compliance with global privacy regulations (GDPR, CCPA, HIPAA, etc.). Design privacy programs, data protection mechanisms, and compliance monitoring systems. Maintain a strong understanding of emerging regulations and their impact on clients. Sign off on client cybersecurity strategies, encompassing threat management, incident response planning, business continuity, and disaster recovery. Ensure the effective execution of multiple projects simultaneously, adhering to project timelines, scope, and budget requirements. Profitability/Revenue Management : Increase topline revenue for the Practice as per predefined goals, while maintaining the practice gross margin. Budget management & optimization. Take responsibility for the IT Governance, Risk Management and Compliance budget. Business Relationship Management for IT Governance and Risk - this role will be a critical interface between the Firm's Leadership and the TRA team and will be required to present to the Leadership and the Executive teams periodically. Identify, prioritize, define and refine the Information Security strategy through the evaluation of new approaches and solutions in collaboration with the Managing Committee. Sales & Marketing Support : Drive growth through business development, partnerships, and client acquisition strategies. Identify market trends and position the practice as a thought leader in the industry. Develop marketing strategies, including whitepapers, webinars, and industry events. Support the Sales teams for deal closures Create visibility for the practice on various platforms and among a larger network Provide technical support to the sales & marketing team on practice service verticals Support the business development process, including proposal development, client pitches, and contribution to marketing efforts. Development of the Practice and promotion of the the Firm's brand name via articles in publications, regular update management for clients, speaker at seminars, etc. People Management: Ensure that personal and team objectives and strategy are aligned to departmental and organizational goals, and actively tracked and reported on across the year. Build and manage a team including recruitment, appraisals, developing training material, providing training to team members, and technically guiding the teams in completing their assigned deliverables Review of efficient and effective planning, selection and team management of all resources throughout the year including temporary resource redeployment within team/with other departments, Build and mentor a high-performing team with a blend of technical and advisory expertise. Retention of existing employees and measurable attrition management Address issues at emotional/infrastructural level at work being faced by teams, take responsibility for team building and career development of the team. Identify training needs of teams and assist in skill building wherever required. Ensure strategic resource planning, coupled to long term forecasting via the Annual Business Plan and 3/5 year plans, and in collaboration with HR. Succession planning for all critical roles within the team. Client Management & Quality Client Management: Act as a trusted advisor to clients, providing expert insights into technology risk management. Develop solutions aligned with client needs, industry standards, and regulatory requirements. Drive impactful outcomes, engage with senior client stakeholders, including CXOs and board members. Serve as the primary point of contact for key clients, managing expectations, building long-term relationships, and understanding their evolving technology risk needs. Provide thought leadership and expert guidance to clients on industry trends, regulatory developments, and emerging cybersecurity threats. Be part of critical client presentations and discussions to communicate project outcomes, cybersecurity vulnerabilities, and remediation strategies in a clear and actionable manner. Proactively identify opportunities to expand service offerings and assist clients in achieving their cybersecurity objectives. Manage current and developing new relationships and alliances. Quality: Maintain quality across all projects and seek active feedback on the same from all internal/external stakeholders. DESIRED CANDIDATE PROFILE: To be tailor-fit for the above skillsets, you need to have the following, Qualifications: Bachelors/masters degree in computer science, Information Security, or a related field. Professional certifications (CISSP, CISM, CRISC, CISA, or equivalent). Advanced certifications in privacy (CIPM, CIPT, or equivalent) preferred. Experience : 12-14 years of experience in Cybersecurity GRC, TechOps, and SecOps, with at least 5 years in a leadership role. Proven track record of building and scaling advisory practices, preferably in a global context. Intermediate knowledge of global privacy regulations and related compliance requirements. Experience in performing/overseeing IT audits, control assessments, and developing cybersecurity strategies and risk management frameworks. Knowledge of ethical hacking techniques, threat modelling, and exploitation of security vulnerabilities. Prior business development, sales, client management and practice management experience. Experience of handling a large client portfolio with a strong professional network/presence. Strong experience in leading large teams and managing complex client engagements. Skills : Advanced expertise in Cybersecurity frameworks, risk management, and operational security. Deep understanding of regulatory environments and privacy laws globally. Excellent leadership, communication, and stakeholder management skills. Strong business acumen, with the ability to identify and capitalize on market opportunities. In-depth knowledge of IT Governance, Risk, and Compliance (ITGRC) frameworks such as ISO 27001, NIST, COBIT, PCI DSS, and GDPR.
Posted 3 months ago
2 - 7 years
4 - 9 Lacs
Hyderabad
Work from Office
Job Area: Information Technology Group, Information Technology Group > Cyber Security Engineering General Summary: This role will be responsible for supporting 24x7 operations, requiring night and weekend shifts on a rotational basis to meet the organization's business needs. The primary responsibilities include monitoring and triaging all security events coming into the SOC/CDC from multiple sources, with a significant focus on malware reversing.Responsibilities:24x7 Operations:Working night and weekend shifts on a rotational basis.Monitoring and Triaging Security Events:Handling incidents such as social engineering attacks, malware, DDoS, data exfiltration, and ransomware.Initial Triage:Managing the first 20 minutes of an incident as per SOP, then escalating to Tier 2 if needed.Incident Analysis:Using orchestration tools and knowledge bases to analyze security events.Malware Analysis:Analyzing malware samples to support ongoing investigations.Reverse Engineering:Disassembling, deconstructing, and reverse engineering malicious code to understand its behavior and impact.Malware Intelligence:Compiling and presenting malware intelligence and research to business leaders and stakeholders.Staying Current:Keeping up to date with the latest malware trends and updating software defenses accordingly.Ticketing System:Keeping the system updated thoroughly and promptly.Stakeholder Communication:Making recommendations on mitigation and prevention techniques.Issue Resolution:Ensuring timely follow-up and resolution of issues per SLAs.Collaboration:Working closely with Tier 2 and Tier 3 teams.Continuous Learning:Staying updated with new use cases and process changes.Participation:Actively engaging in brown bag sessions. 'The individual must also have a good awareness of current and developing security threats and technologiesStrong proficiency in security event investigations, also in written and spoken EnglishStrong interpersonal skills and a good team playerPrior professional services experience in 24x7 SOC or CDC operations is desiredBachelors degree or Masters Degree in Computer Sciences or in Cyber Security Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 2+ years of cybersecurity-relevant work experience. OR High school diploma or equivalent and 4+ years of cybersecurity-relevant work experience. Physical Requirements: Frequently transports and installs equipment up to 40 lbs. Applicants :Qualcomm is an equal opportunity employer. If you are an individual with a disability and need an accommodation during the application/hiring process, rest assured that Qualcomm is committed to providing an accessible process. You may e-mail disability-accomodations@qualcomm.com or call Qualcomm's toll-free number found here. Upon request, Qualcomm will provide reasonable accommodations to support individuals with disabilities to be able participate in the hiring process. Qualcomm is also committed to making our workplace accessible for individuals with disabilities. (Keep in mind that this email address is used to provide reasonable accommodations for individuals with disabilities. We will not respond here to requests for updates on applications or resume inquiries). Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law. To all Staffing and Recruiting Agencies :Our Careers Site is only for individuals seeking a job at Qualcomm. Staffing and recruiting agencies and individuals being represented by an agency are not authorized to use this site or to submit profiles, applications or resumes, and any such submissions will be considered unsolicited. Qualcomm does not accept unsolicited resumes or applications from agencies. Please do not forward resumes to our jobs alias, Qualcomm employees or any other company location. Qualcomm is not responsible for any fees related to unsolicited resumes/applications. If you would like more information about this role, please contact Qualcomm Careers.
Posted 3 months ago
10 - 15 years
30 - 37 Lacs
Chennai, Bengaluru, Mumbai (All Areas)
Work from Office
Experience: 8-12 years of experience in infrastructure compliance, patch management, and security, with a focus on banking and financial sector regulations. RBI Knowledge: Strong understanding of RBI guidelines and compliance requirements for infrastructure and IT systems, particularly related to cybersecurity and risk management. Security & Patching Expertise: Proven experience in vulnerability management, zero-day patching, security patching, and patch deployment across enterprise IT environments. Technical Skills: Proficiency in patch management tools, security assessment platforms, and infrastructure management tools. Risk & Compliance Management: Strong background in assessing and managing risk within IT infrastructure, with a focus on security vulnerabilities and compliance. Audit Experience: Experience with supporting audits, especially in regulated environments, with an emphasis on complying with regulatory standards such as those set by RBI. Certifications: Relevant certifications like CISSP, CISM, CISA, or equivalent are highly desirable. Communication Skills: Excellent verbal and written communication skills, with the ability to communicate technical concepts clearly to non-technical stakeholders and present to senior leadership. Analytical Thinking: Strong problem-solving skills, with the ability to think critically and make data-driven decisions for infrastructure security and compliance. Collaboration Skills: Proven ability to work cross-functionally with IT, security, operations, and regulatory teams to ensure compliance and security standards are met.
Posted 3 months ago
2 - 5 years
16 - 20 Lacs
Bengaluru
Work from Office
*Bachelors degree in computer science, Information Technology, Information Security, or related field (or equivalent experience) *Knowledge on Splunk, Firewall, and any Security tools along with CloudFlare WAF *Knowledge on Cloud Security * Experience working in a technical support or helpdesk role is preferred * Familiarity with enterprise security tools such as SIEM, IDS/IPS, EDR, web application firewall, identity and access management solutions, etc. * Basic understanding of networking concepts and protocols (TCP/IP, DNS, DHCP, etc.) * Proficiency in at least one scripting language (e.g., Python, PowerShell) is a plus * Certifications such as CompTIA Security+, CISSP, CCSP or GIAC are advantageous but not required * Ability to prioritize and manage multiple tasks simultaneously * Strong problem-solving skills and a methodical approach to troubleshooting * Adaptability and willingness to learn new technologies and processes * Commitment to providing exceptional customer service and support
Posted 3 months ago
18 - 22 years
50 - 100 Lacs
Bengaluru
Work from Office
Hiring, Head of Information Security Job Purpose The Head of Information Security is tasked with creating and sustaining the enterprise vision, strategy, and program to safeguard the integrity, availability, and confidentiality of the organization's information assets. This involves implementing and maintaining comprehensive security measures and practices. This leadership position includes overseeing the development and execution of a strong cybersecurity framework, leading a team of security professionals, and working collaboratively with other departments to mitigate risks. Roles and responsibilities Strategy & Governance Development and implement a comprehensive information security strategy aligned with the organization goals and leading industry practices. Establish and maintain information security policies, standards and procedures to ensure compliance with relevant regulations and frameworks. Manage budget for IT security related activities and initiatives, ensure ROI on the same. Establish IT security governance frameworks, policies and procedures to ensure integrity and availability of information assets. Security Architecture Design Oversee design and implementation of a robust and resilient security architecture including network security, infrastructure and information security, and application security. Evaluate and select appropriate security technologies, tools and vendors to protect the organizations information assets. Review and assess the security controls and configurations of existing systems and applications and provide recommendations for improvement. Collaborate with enterprise architects/ technology partners to ensure security is integrated into the design and development of new systems and applications. Security Operations & Incident response Oversee the day-to-day operations of the organizations security infrastructure and develop incident response plans to address and mitigate security incidents effectively. Drive regular security, risk & vulnerability assessments to identify vulnerabilities and weaknesses in the organizations systems and infrastructure. Manage and resolve security incidents and lead incident response efforts, including investigations, containment, eradication and recovery in case of cyber attack Security incident & Threat Intelligence Stay updated on the latest security threats, vulnerabilities, and industry trends through continuous benchmarking and research. Proactively identify emerging threats and vulnerabilities and develop strategies to mitigate their impact. Collaborate with internal and external stakeholders to conduct penetration testing, vulnerability assessment and security audits. Develop standard operating procedures for incident response during ransomware attacks Vendor & Third-Party Risk Management Assess and manage security risks associated with third-party vendors and service providers. Provide input during vendor evaluation and selection based on their security capabilities and compliances with security standards. Compliance & Regulatory Requirements Ensure organization’s compliance with relevant laws, regulations and industry standards pertaining to information security. Monitor and interpret changes in security regulations and standards and assess their impact on the IT landscape. Lead and coordinate audits, assessments and certification processes related to information security. Collaboration Work closely with IT, legal, compliance, and business units to integrate security practices into daily operations. Act as the primary point of contact for security-related matters with external partners, vendors, and regulatory bodies Security awareness and Training Collaborate with learning & development team to implement security awareness and training programs about information security risks, leading practices and policies. Conduct regular security awareness campaigns, monitor and evaluate the effectiveness of security awareness efforts. Conduct Cyber War game drills with business users to enhance preparedness for handling ransomware attacks. People Management Provide direction and guidance to the team and foster a collaborative and high-performance environment. Qualification and Experience : A post-graduate or bachelor's degree in engineering with 18-22 years of work experience, including 7-10 years in leading a cybersecurity organization, is required. The role demands extensive experience in identifying and mitigating information & cyber security risks and a comprehensive understanding of regulatory requirements. Professional security certifications like CISA, CISSP, CISM, ISO 27001:2013 LA, etc., are highly desirable. Familiarity with security technologies is crucial, including firewalls, network access control, IDAM & ITDR, EDR, secure web gateways, email security gateways, data leak prevention (DLP), MFA, WAF, DDoS, PAM, SIEM & SOAR, and micro-segmentation. Other Skills: Excellent Communication, Presentation & inter-personal Skills Should possess knowledge of various Security Solutions (Endpoint Protection, Advanced Threat Protection, Data Leak Prevention), Network Security, Databases, OS, etc. Knowledge of the industry's standards and regulations in the Healthcare or Pharma industry is preferred.
Posted 3 months ago
10 - 20 years
1 - 2 Lacs
Delhi NCR, Gurgaon, Mumbai (All Areas)
Work from Office
About Vara: The Vara Group is the front runner in embracing innovation and leveraging world-class Infra tech to deliver maximum business value to organizations and the government. For over 7 years, Vara has been helping businesses to adopt new technologies to stay ahead of change. Our rigorous attempts to build platforms that are futuristic and need-based are backed by our research, design thinking-driven approach, and unmatched solutions in technology and operations. This creates an innovative roadmap to help Indian enterprises transit from conventional technology to smarter and quicker means. Vara excels in delivering niche solutions in the following domains: Blockchain | Cyber Security | Tolling Platform & Logistics | 3D Printing | IoT | Data Science Our offices are currently in Mumbai, Kolkata and Delhi. Please Visit www.varainfrovate.com / www.varatechnology.com for more details. Designation Manager / Senior Manager Major roles : End to end sales cycle. New client acquisition. Developing pipeline and sourcing strategic accounts with field sales, partners, marketing, technical and operational resources to create sales strategies and execute revenue goals. Enterprise Sales of Cyber Security Software. Develop and maintain commercially productive relationships. Develop and execute sales strategy and tactics that maximize Cyber Security opportunity within the customer environment. Demonstrated ability to manage solution based sales at multiple levels in our customers organization. Work closely with CXOs of the top enterprises across India. The person should have industry connects with CIOs/CTOs/CISOs across various verticals. The person should have sales & account management experience in Cyber Security services / IT Software / Hardware /Service Demonstrated ability to meet/exceed sales quotas. Roles and Responsibilities Lead presales efforts for cybersecurity solutions, focusing on application security. Collaborate with cross-functional teams to design and deliver comprehensive security architectures for clients. Develop and maintain strong relationships with key decision-makers at target accounts to drive business growth. Conduct product demonstrations, presentations, and workshops to showcase our cybersecurity offerings. Identify new sales opportunities through market research, competitive analysis, and industry trends.
Posted 3 months ago
6 - 8 years
10 - 12 Lacs
Pune
Work from Office
1. IT Infrastructure & Network Management – Maintain servers, storage, firewalls, routers, switches, and ensure stable network performance. 2. System Administration & User Support – Manage Active Directory, email servers, software installations, Required Candidate profile 3. Security & Compliance – Implement firewall policies and ensure compliance with IT security standards (ISO 27001). 4.Backup & Disaster Recovery. 5. Software Licensing & Audit Compliance
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The demand for CISSP (Certified Information Systems Security Professional) professionals in India has been on the rise as companies recognize the importance of securing their digital assets. CISSP jobs offer lucrative career opportunities in various industries ranging from IT to finance. If you are a job seeker looking to enter this field, here is a comprehensive guide to help you navigate the CISSP job market in India.
These cities are known for their thriving IT sectors and are hotspots for CISSP job opportunities.
The average salary range for CISSP professionals in India varies based on experience levels. Entry-level positions can expect to earn around INR 6-8 lakhs per annum, while experienced professionals with 5+ years of experience can command salaries upwards of INR 15 lakhs per annum.
A typical career progression in the CISSP field may involve starting as a Security Analyst, moving on to roles such as Security Consultant, Security Manager, and eventually reaching a Chief Information Security Officer (CISO) position.
In addition to CISSP certification, employers often look for professionals with skills in network security, risk management, penetration testing, and knowledge of regulatory compliance such as GDPR and HIPAA.
As you prepare for CISSP job interviews in India, remember to showcase your expertise in information security, stay updated with industry trends, and demonstrate your problem-solving skills. With the right combination of technical knowledge and experience, you can embark on a successful career in the exciting field of cybersecurity. Good luck with your job search!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2