Jobs
Interviews

843 Cissp Jobs - Page 18

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10.0 - 17.0 years

20 - 35 Lacs

Pune, Delhi / NCR, Mumbai (All Areas)

Work from Office

Job Description: Job Title: Project Manager. Experience: 10+ Years. Job Type: 12 month contract and extendable. Job Location: Offshore (Remote) Mandatory skills: Have over 10+ years of rich experience in data protection, information security domain and Project Management. Experience of managing enterprise Data Protection projects and of direct and in-direct relationship with senior and executive management. Familiarity with advanced Data Privacy and Protection technologies, risk, threat and vulnerability assessments, and security measures. Strong experience and knowledge across the Data Protection and Information Security domains including technical measures, policy procedures, compliance management, risk management and Incident Response etc. Extensive knowledge of data protection solutions and technologies for Data Loss and leakage Prevention (DLP). Experience implementing and managing (DLP) solutions. Strong experience in Banking environment with strong understanding on key data protection regulations and standards such as ISO 27001, NIST CSF, GDPR etc. Skills and Application: Leads the development and implementation of comprehensive Data Protection strategies that address identified risks and compliance requirements, incorporating advanced technologies and methodologies to enhance security posture. Manages cross-functional teams to execute Data Protection initiatives, ensuring that projects are completed on time, within budget, and achieve desired outcomes. Strategic Insight: Integrates Data Protection and Information Security considerations into broader banks strategies, recognizing the importance of Data Protection in achieving business objectives and competitive advantage. Communicates the strategic value of Data Protection and Information Security investments to executive leadership and key stakeholders, advocating for resources and support to strengthen the organization's capabilities. Cultivates an organizational culture that prioritizes Data Protection, encouraging proactive security practices and continuous improvement across all departments. Strong interpersonal, analytical, and technical skills with strong decision making and prioritization skills. Sound knowledge of evolving advanced tech stacks and related control and risk universe from a data protection perspective. Sound knowledge and expertise in conducting risk assessment and management. The ideal candidate will have a degree in Information Security, Computer Science, or a related field. Professional certifications: CISSP, PMP, CCSP, CompTIA Security+, CIPT , CISM etc

Posted 1 month ago

Apply

12.0 - 19.0 years

40 - 50 Lacs

Pune

Hybrid

Position Specification Global Information Security Architect Johnson Controls, Inc. Private and Confidential Johnson Controls Johnson Controls, Inc. (NYSE: JCI) is a global diversified industrial leader employing 170,000 employees serving customers in more than 150 countries with products, services and solutions on a B2B basis to a wide range of market segments. The company operates across three major business units: Automotive Experience; Power Solutions; and Building Efficiency. Automotive Experience generates approximately $20bn of revenue annually and designs and produces automotive seating and interiors systems that help make the driving experience more comfortable, safe and enjoyable. Building Efficiency provides products and services which enhance the comfort, safety and energy efficiency of buildings. Through its Power Solutions business, Johnson Controls is the worlds leading supplier of batteries used in automobiles, including conventional cars and trucks. In fiscal 2014, Johnson Controls generated $42 billion in revenues. The Role Hosted in Pune, India, Senior Cyber Security Engineer is a position, part of a global team, reporting into the Cyber Security Engineering Manager with responsibility of assisting in development of Processes, Standards, and Designs of JCIs Cyber Security Infrastructure Working closely with Project Managers, Global Operations and Technology groups, Business Unit IT delivery organizations, the identity management, and other infrastructure architecture members when creating and implementing Cyber Security Infrastructure. Ensures compliance with established architecture direction and standards. Works with Service Management and stakeholders to collect functional requirements and ensure the most effective solution is used. Maintains an understanding of relevant industry standards and directions to ensure key vendors, suppliers and service partners development plans include support for same. Primary Responsibilities The responsibilities of the Information Security Global Architecture Senior Manager include, but are not limited to: Provide team support with validating security controls Ensures that third party solutions used within Cyber Security follow all Johnson Controls standards. Acts as an internal consultant to business units and Infrastructure IT. Provides management with accurate and complete status information. Provide technical input into security related standards, technology roadmaps, support requirements and management of infrastructure designs Stay abreast of current and evolving technologies in Cyber Security. Adheres to all current changes and problem management policies and procedures. Candidate Profile The successful candidate will be a passionate information security professional with the ability to communicate to different business and Project managers. The candidate will be able to execute the Cyber Security Engineering management strategy defined by leaders. The candidate will demonstrate drive, intelligence, maturity, and energy and will be a proven team leader and security strategist. A minimum bachelors degree in computer engineering, computer security or computer science discipline or equivalent experience 10 years of Cyber Security related experience working with teams in security operations, incident analysis, developing applications, and security applications. Experience with validation security tools. Experience with Security features, assessments, and validation of security controls for both Linux and Windows based systems Familiarity with network security methodologies, tactics, techniques, and procedures. Experience performing security/vulnerability reviews of network environments. Experience of network security architecture, understanding of the TCP/IP protocol, and remote access security techniques/products. Experience with enterprise anti-virus/malware solutions, virus outbreak management, and the ability to differentiate virus activity from directed attack patterns. Candidate must be able to react quickly, decisively, and deliberately in high stress situations. Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, to technical and non-technical audiences at different seniority levels and interact with customers. Highly motivated individual with the ability to self-start, prioritize, multi-task and work in a global team setting. Ability to create and maintain good business relationships with counter parts, customers, and external entities to achieve the security operations management goals Ability to maintain a high level of discretion and personal integrity in the exercise of duties, including the ability to professionally address confidential matters Familiarity of regulatory compliance requirements (PCI-DSS, HIPAA, FISMA, SOX, etc.) Required Certifications 10+ years Certification Information Systems Security Professional (CISSP) At least 5+ years Certification (or similar) in one of: Certified Information Security Manager (CISM) Information Systems Security Architecture Professional (ISSAP) Certified Ethical Hacker (CEH) Cisco Certified Network Associate Security (CCNA Security) Certificate of Cloud Security Knowledge (CCSK) Certified Cloud Security Professional (CCSP) This job description indicates the general nature and level of work expected of the incumbent. It is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities required of the incumbent. Incumbent may be required to perform other related duties.

Posted 1 month ago

Apply

7.0 - 12.0 years

32 - 37 Lacs

Mumbai

Work from Office

: Job TitleInformation Security Risk Specialist , AVP LocationMumbai, India Role Description An Information Technology & Security Risk Specialist to join the 2nd LoD Information Security & Technology Risk Team. The team is global, this role is within the Mumbai team (currently 1 person) which is being built out to support the global team. Should have a proven depth of knowledge and keen interest of Information Security and Technology and their application in large financial institutions. Working with other team members the role will input subject matter expertise and drive innovative approaches in applying risk management in an evolving threat environment. The team has a global footprint in Frankfurt, Singapore, London, Mumbai and USA. What well offer you 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Provide data and analytics reporting to support the team in monitoring the Information Security and Technology Risk Appetite, breaches and remediation. Where required support the implementation of automated data and analytics reporting process. Support the team delivery of Non-Financial Risk Management (NFRM) priorities such as risk & control assessments, scenario analysis, risk appetite. Monitor and challenge 1LOD Risk and Control Assessments (including results of 1LOD control testing/assurance). Perform 2LOD control assurance through targeted reviews of areas of concern. Gain an understanding and be able to articulate key Information Security and Technology regulatory requirements across APAC/MEA and their impact and implementation into the Information Security and Technology Risk Framework. Your skills and experience University degree (Computer Science, Business Administration or equivalent). Majors in Information Security and / or Risk Management are a plus. Experience (4+ years) in Information Security or Information Technology with experience in the Finance industry and/or a major Technology or Consultancy company preferred. Some level of technical understanding and training either as a data analyst, developer, business analyst or project manager. Knowledge of Information Security and Technology industry regulatory standards and/or Risk Frameworks (e.g. EBA Guidelines ISO / 27000 Series, COBIT 2019, DORA) are a plus. Relevant professional certifications e.g. CISSP, CISA, CISM, CRISC, ITIL, ISO27001 Lead Auditor or similar are a plus. Experience of working in large global teams yet comfortable working independently without day-to-day oversight and steer. Strong communication skills (English required). How well support you About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm We strive for a culture in which we are empowered to excel together every day. This includes acting responsibly, thinking commercially, taking initiative and working collaboratively. Together we share and celebrate the successes of our people. Together we are Deutsche Bank Group. We welcome applications from all people and promote a positive, fair and inclusive work environment.

Posted 1 month ago

Apply

4.0 - 6.0 years

9 - 12 Lacs

Pune

Work from Office

1. Bachelors degree in Computer Science, Information Security, or a related field (Masters preferred). 2. 5+ years of hands-on experience in Identity and Access Management (IAM) architecture and solutions. 3. Expertise in IAM technologies such as Okta, Azure AD, SailPoint, ForgeRock, Ping Identity, or equivalent. 4. Strong knowledge of security architecture frameworks (e.g., SABSA, TOGAF, Zero Trust) and best practices. 5. In-depth understanding of authentication protocols such as SAML, OAuth, OpenID Connect, LDAP, Kerberos, etc. Experience with Privileged Access Management (PAM) solutions such as CyberArk, BeyondTrust, or similar tools. 6.Familiarity with cloud security architecture for IAM in environments like AWS, Azure, and GCP. 7.Proven experience in role-based access control (RBAC), identity governance, and directory services. 8. Solid understanding of compliance requirements and industry standards (e.g., NIST, ISO 27001) related to IAM.

Posted 1 month ago

Apply

7.0 - 8.0 years

0 - 0 Lacs

Lucknow

Remote

We are seeking a highly skilled and experienced Contract Security Auditor to join our team for a 1-year engagement. This critical role will be instrumental in enhancing our organization's security posture. The ideal candidate will be an unbiased expert, capable of meticulously assessing our current security controls against various global standards. If you thrive in an environment where you can make a significant impact and demonstrate exceptional performance, this contract offers a unique pathway to a permanent position within our core security team. Responsibilities: As our Contract Security Auditor, you will be responsible for: Comprehensive Security Assessments: Conducting in-depth security audits of our current systems, processes, and controls against established frameworks and regulations including, but not limited to, ISO 27001, SOC 2, HIPAA, and GDPR. Gap Analysis & Risk Identification: Identifying gaps, vulnerabilities, and non-compliance issues within our information security management system (ISMS) and operational procedures. Corrective Action Planning: Developing detailed, actionable recommendations for corrective actions and control improvements, collaborating with relevant teams to ensure practical and effective solutions. Implementation Oversight & Verification: Monitoring and confirming the successful implementation of corrective actions, ensuring that identified deficiencies are fully remediated and bring the organization into compliance. Documentation & Reporting: Creating clear, concise, and comprehensive audit reports, detailing findings, recommendations, and evidence of compliance or non-compliance. Preparation: Assisting in the preparation of documentation, evidence, and personnel for future internal and third party audits Stakeholder Communication: Effectively communicating audit findings, risks, and progress directly to senior management Policy & Procedure Review: Reviewing and providing input on the adequacy and effectiveness of existing security policies, standards, and procedures. Continuous Improvement: Contributing to the continuous improvement of the organization's overall security program and compliance efforts. Qualifications: Experience: Minimum of 7 years of dedicated experience in information security auditing, compliance, or risk management. Demonstrable experience leading and executing audits against multiple frameworks, specifically ISO 27001, SOC 2, HIPAA, and GDPR. Proven track record of successfully identifying control deficiencies and recommending effective remediation strategies. Technical Skills: Strong understanding of information security principles, technologies, and best practices (e.g., access control, network security, data encryption, incident response). Familiarity with common enterprise IT environments, cloud services, and BPO operational models. In depth understanding of US security best practices and requirements Certifications (Highly Preferred): Relevant industry certifications such as CISA, CISSP, CRISC, Lead Auditor certifications (ISO 27001, SOC 2), or similar. Soft Skills: Unbiased & Objective: Proven ability to conduct audits impartially and provide objective assessments. Analytical & Problem-Solving: Exceptional analytical skills with the ability to interpret complex data, identify root causes, and propose practical solutions. Communication: Excellent written and verbal communication skills, with the ability to articulate complex security concepts to both technical and non-technical audiences. Interpersonal: Strong interpersonal skills to build rapport and collaborate effectively with diverse teams. Project Management: Ability to manage multiple audit engagements concurrently, prioritize tasks, and meet deadlines. Contract Details: Term: 1-year contract with potential for conversion to a permanent full-time position. Location: Remote Start Date: Immediate availability preferred. Why Join Us? This is an exciting opportunity to play a pivotal role in strengthening the security foundation of a dynamic US based BPO. You will have the autonomy to drive significant change and see the direct impact of your work. For a high-performing individual, this contract serves as a direct pipeline to a long-term career with our growing security team, offering stability and continued professional development. Application Process: To apply, please submit your resume and a cover letter detailing your relevant experience along with your self-introduction video at Navnita.chakravarty@ardem.com About ARDEM Data Services ARDEM is a leading Business Process Outsourcing and Business Process Automation Service provider. For over twenty years ARDEM has successfully delivered business process outsourcing and business process automation services to our clients in USA and Canada. We are growing rapidly. We are constantly innovating to become a better service provider for our customers. We continuously strive for excellence to become the Best Business Process Outsourcing and Business Process Automation company.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Kochi

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: GRC Consulting. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: IDAM Security Consulting. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloudflare Security. Experience8-10 Years.

Posted 1 month ago

Apply

7.0 - 12.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

Posted 1 month ago

Apply

7.0 - 12.0 years

12 - 17 Lacs

Coimbatore

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Business Continuity. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Security Architecting. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: SOC Analyst. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.

Posted 1 month ago

Apply

10.0 - 15.0 years

13 - 18 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: IDAM Security Consulting. Experience>10 YEARS.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: SailPoint Identity Now. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: PKI - Certificate Management. Experience8-10 Years.

Posted 1 month ago

Apply

8.0 - 13.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Number of Openings 1 (TS-14298) ECMS ID in sourcing stage In Progress (some issues to create the ID) will be shared once it is created. Assignment Duration 6 Months Total Yrs. of Experience 8+ years Relevant Yrs. of experience 5 years Detailed JD (Roles and Responsibilities) Primary Skill: 5 years experience in security assessing application designs experience in working in a regulated industry. Experience in System Architecture, Cloud Security, and Security Overall. Job Description: This will be a security architect position. Under supervision, the candidate will evaluate the security of application architectures, identify control weaknesses, and provide mitigating measures. Naturally, knowledgeable security architects will help the candidate. Mandatory skills AWS Architect Basics of Cloud Architecture Desired/ Secondary skills CISSP, CCSP certification. Ability to explain security controls, vulnerabilities and control gaps to solution architects Solid diplomatic and communication skills in English Positive Attitude towards work and deliverable. Domain Cyber Design Enterprise Architect Max Vendor Rate in Per Day (Currency in relevance to work location) 12000 INR Work Location given in ECMS ID Bangalore/Pune WFO/WFH/Hybrid WFO Hybrid BG Check (Before OR After onboarding) As per Infosys Policy Is there any working in shifts from standard Daylight (to avoid confusions post onboarding) YES/ NO NO

Posted 1 month ago

Apply

7.0 - 15.0 years

0 - 20 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Roles and Responsibilities : Conduct regular security testing and vulnerability assessments to identify potential risks and threats to the organization's IT systems. Develop and implement effective mitigation strategies to address identified vulnerabilities, ensuring compliance with relevant regulations such as SOX, PCI DSS, GDPR, CCPA, etc. Collaborate with cross-functional teams to ensure seamless integration of security controls into software development lifecycle (SDLC) using tools like CCM/CSCF/OWASP. Provide expert guidance on cybersecurity best practices to stakeholders across the organization. Job Requirements : 7-15 years of experience in Cyber Security Testing & Vulnerability Assessment. Strong understanding of regulatory frameworks such as SOX, PCI DSS, GDPR, CCPA etc. . Proficiency in tools like Bis/CCM/CSCF/OWASP for conducting security tests. Certifications like CISSP/CISA/CEH are desirable.

Posted 1 month ago

Apply

8.0 - 13.0 years

5 - 12 Lacs

Chennai

Work from Office

VAPT, OCSP / CISSP Certified

Posted 1 month ago

Apply

7.0 - 12.0 years

35 - 37 Lacs

Bengaluru

Work from Office

Core Responsibilities Assist with technical control design, implementation and monitoring, support incident responses and assist with providing root cause analysis support for incidents. Monitor for attacks, intrusions, and un-usual, unauthorised or illegal activities when the Security Analysts are finding the instance challenging. Keep an eye on the alerts from systems including SEIM solutions and vulnerability monitoring services and check if the Analysts are able to handle the flow appropriately, if not then jump in and investigate if there are any abnormality in the inflow. Monitor identity and access management, including monitoring for abuse of permissions by authorised systems users if the stats are fluctuating or when you see a spike in the alerts. Assist with Information Security Reporting and metrics, providing input into improving information security reporting and metrics. Identify/recommend improvements on internal investigation capabilities via tool and process building/automation. Provide support to recovering from security breaches; participate in investigation and remediation of security incidents, which may include working as part of a team Assist in perform deep-dive incident analysis, determining if critical systems or data sets has been impacted. Assist with the definition and configuration of compliance policies for security technologies. Conduct research on emerging threats in support of security enhancement and development efforts; recommend security improvements, upgrades, and/or purchases. Support the incident response of minor incidents by advising on remediation actions, escalating major incidents to the designated parties. Recording lessons learnt whilst supporting on improving existing processes and procedures. Providing support of new analytic methods for detecting threats. Continuously seeking to identify potential service and process improvements. Participate in the implementation of technologies and platforms supporting the corporate infrastructure. Ensure that you fully understand and comply with the organisation’s Risk Management Policies as they relate to your area of responsibility. Ensure that you fully understand and comply with the organisation’s Data Governance Policies as they relate to your area of responsibility. Maintain the company’s compliance standards and ensure timely completion of all mandatory on-line training modules and attestations. Monitoring technical controls that are in place Addressing quires raised by the Security Analysts during investigation or other BAU. Assist Security Analysts in decision making and help in setting up standards. Will be responsible to suggest new fine tunings in the environment to the vendor or to the technical counterparts. Process review and upgradation recommendation when required. Setting up simplified and effective steps in BAU that in turn improves the quality of the work Implementation of new process based on business requirements and communicating the same with the team Team building and team management activities will be one of the key responsibility.

Posted 1 month ago

Apply

7.0 - 15.0 years

0 - 20 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Roles and Responsibilities : Conduct regular security testing and vulnerability assessments to identify potential risks and threats to the organization's IT systems. Develop and implement effective mitigation strategies to address identified vulnerabilities, ensuring compliance with relevant regulations such as SOX, PCI DSS, GDPR, CCPA, etc. Collaborate with cross-functional teams to ensure seamless integration of security controls into software development life cycles (SDLC) using tools like CCM/CSCF/BIS/SOC. Provide expert guidance on cybersecurity best practices to stakeholders across the organization. Job Requirements : 7-15 years of experience in IT services & consulting industry with a focus on cybersecurity testing and compliance. Strong understanding of regulatory frameworks such as SOX, PCI DSS, GDPR, CCPA etc. . Certifications like CISSP/CISA/CCM/CSCF are desirable but not mandatory.

Posted 1 month ago

Apply

8.0 - 13.0 years

15 - 25 Lacs

Mumbai

Work from Office

About ERGO Technologies and Services India ERGO Technology & Services India (ET&S India) is the newest part of the ERGO Technology & Services Management the main outsourcing provider of IT for ERGO worldwide. It is backed up by ERGO an 18 Billion Euro Organization with presence in 15+ countries has a charter to provide technology services to the ERGO countries in multiple countries. ETS India will be fueling the Digital aspirations of ERGO world in years to come. With ambitious plan to build a large offshore development centers in multiple cities of the country ETS India shall be at the forefront in developing capabilities and providing career opportunities to employees in diverse technologies across domains of Insurance. Key Accountabilities & Responsibilities: Role Description: Manages and ensures the identification, analysis and preparation of explicit and implicit stakeholder requirements and drives the functional support for business applications during deployment and 3rd level support. Key Accountabilities & Responsibilities: Design and Configuration: Support and participate in high-level and detail design and configuration sessions and workshops with other SMEs, Architects, and partners for ERGO central IT and Legal Entities. Functional Design: Work with product owners to support the functional design and configuration of solution in the relevant technology area (such as, Network Security, User Access Management (UAM), Cyber Threat Intelligence (CTI), IT Security Landscape, Logging and Monitoring), translation of specific regulation requirements to technical requirements Training and Knowledge Transfer: Conduct regulation training, handover, and knowledge transfer sessions Key Competencies & Skills required Technical: Good understanding of overall IT Infrastructure, Network Security & Cybersecurity tools, technologies and process. Must have deep understanding of various technologies and concept used in complex enterprises such as SIEM, PAM, Firewall, IPS, WAF, data security, 2FA, AAA, PKI, Encryption, DMZ, network segmentation, DLP, DDoS, Cloud security, CASB, secure file sharing, networking concept & protocols, security architectures, CTI Must have working experience with the Cybersecurity framework (such as NIST, RBI, SEBI, IRDAI, NCIIPC). Experience in working in agile teams Experience in working with distributed teams (off-shore, near-shore, on-site) Have CISSP or equivalent professional certification Nice to have: Experience in the use of policy administration systems in insurance Knowledge of insurance contract/administration processes Experience in German insurance Behavioural Skills: Excellent interpersonal and communication skills for working in a global environment Willingness to learn and adapt quickly Proactive approach to identifying issues and presenting solutions and options Professional and friendly presence when interacting with customers and other roles Willingness to ask questions for a better understanding Soft Skills: Ability to quickly get to grips with complex issues Quick comprehension and the ability to communicate knowledge in a comprehensible way Communicative, assertive and able to deal with conflicts Previous Experience & Qualifications Education/Qualification: College degree with a focus on insurance, mathematics, economics, business informatics, computer science or equivalent or related discipline or equivalent education or work experience Very good knowledge of English, both in writing and speaking Knowledge & Experience: 8+ years of relevant experience

Posted 1 month ago

Apply

15.0 - 20.0 years

2 - 4 Lacs

Mumbai

Work from Office

Roles & Responsibilities: Be part of Bank’s GRC program and handle regulatory characteristics focused in cybersecurity Identify and Drive improvement initiatives to Enhance Risk posture of the Bank Face off to Various regulators and drive programs for compliance to the Regulatory requirements Be a champion of ITGC initiatives Provide guidance to group companies to ensure consistency in risk governance, cyber risk management and compliance. Be the focal of Group companies for all IRM requirements Collaborate with group companies on IT governance, cybersecurity and control measures across Group’s IT landscape. Present cyber risk posture in quarterly IT Strategy meetings for group companies. Promote a strong risk culture within the bank and group companies fostering awareness of risk management principles. Validate Security Policies and Procedures in conjunction with IT controls Manage internal and external stakeholders Ability to endorse cyber risks through publication of dashboards and drive initiatives to Improve Risk posture Job Requirement: Experience required for the Job15+ years in information technology & security; Engineer / Post Graduate / MBA Strong understanding of IT governance frameworks, risk management practices and regulatory requirements. Industry acknowledged certifications like CISA / CISSP / CRISC Experience in Team handling / management is must Knowledge on Layered Security - Firewalls, Intrusion Detection, OS Hardening, Project Management, Security Training. Experience in handling regulatory matters will be an added advantage Strategic thinking and strong analytical skills Excellent communication and inter personal skills with focus on verbal, written communication & presentation skills

Posted 1 month ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

Pune

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : German Language Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and facilitating the transition to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud technologies and security threats. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular assessments of cloud security measures to identify areas for improvement.- Collaborate with cross-functional teams to ensure alignment of security practices with business objectives. Professional & Technical Skills: - Must To Have Skills: Proficiency in German Language.- Strong understanding of cloud security principles and frameworks.- Experience with security compliance standards such as ISO 27001 or NIST.- Familiarity with risk assessment methodologies and tools.- Ability to communicate complex security concepts to non-technical stakeholders. Additional Information:- The candidate should have minimum 3 years of experience in German Language.- This position is based at our Pune office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies