Home
Jobs
Companies
Resume

516 Cissp Jobs - Page 4

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 - 9.0 years

7 - 17 Lacs

Bengaluru

Hybrid

Naukri logo

Key Responsibilities: • Design and review secure systems and application architectures. • Lead threat modeling, risk assessment, and attack surface analysis. • Advise project teams on security best practices throughout SDLC. • Use SD Elements to capture risks, track remediation, and ensure traceability. • Contribute to architecture boards and governance processes. • Validate secure design for cloud, hybrid, and on-premises environments. Required Skills & Experience: • 7- 9 years in Information Security or related architecture roles. • Experience in VAPT (execution & remediation). • Strong knowledge of application security, secure SDLC. • Hands-on with SD Elements (mandatory). • Expertise in TOGAF, SABSA, or NIST architecture frameworks. • Cloud Security (preferably Azure), DevSecOps knowledge. Certifications (Mandatory/Preferred): • Mandatory: CISSP • Preferred: AZ-500, CCSP Tools/Frameworks Knowledge: • SD Elements, ThreatModeler, Microsoft Defender • TOGAF, SABSA, NIST CSF, OWASP Top 10, MITRE ATT&CK Email ID: akila.s@acesoftlabs.com

Posted 1 week ago

Apply

6.0 - 11.0 years

6 - 11 Lacs

Pune

Work from Office

Naukri logo

Job ID: 199874 Required Travel :Minimal Managerial - No LocationIndia- Pune (Amdocs Site) Who are we Amdocs helps those who build the future to make it amazing. With our market-leading portfolio of software products and services, we unlock our customers innovative potential, empowering them to provide next-generation communication and media experiences for both the individual end user and enterprise customers. Our employees around the globe are here to accelerate service providers migration to the cloud, enable them to differentiate in the 5G era, and digitalize and automate their operations. Listed on the NASDAQ Global Select Market, Amdocs had revenue of $5.00 billion in fiscal 2024. For more information, visit www.amdocs.com In one sentence We are seeking a highly skilled and experienced Senior Governance, Risk, and Compliance (GRC) Specialist to join our dynamic team. The ideal candidate will have a strong background in GRC, with a proven track record of managing and implementing comprehensive risk management and compliance programs, particularly within the EMEA (Europe, Middle East, and Africa) and IMEA (India, Middle East, and Africa) regions. What will your job look like Develop and maintain governance frameworks, policies, and procedures. Ensure compliance with industry standards, regulations, and contractual obligations. Identify, assess, and prioritize security risks, implementing mitigation strategies. Conduct regular risk assessments, audits, and maintain risk registers. Ensure adherence to GDPR, CRA, and other relevant security regulations. Monitor and enforce security compliance across EMEA and IMEA regions. Develop and deliver compliance training programs for employees. Prepare and present security reports to senior management and stakeholders. Collaborate with internal teams and liaise with external auditors and regulators. Communicate security risks and mitigation strategies effectively to stakeholders. All you need is... Bachelor's degree in Business Administration, or a related field. Professional certification (e.g., CISA, CRISC, CISSP) is preferred. Minimum of 6 years of experience in governance, risk management, and compliance. Strong knowledge of relevant laws, regulations, and industry standards, particularly in the EMEA and IMEA regions. Strong understanding of NIST CSF, CIS, ISO 27001, PCI DSS, and Data Protection frameworks. Excellent analytical, problem-solving, and decision-making skills. Strong communication and interpersonal skills, with experience in defending and explaining security risks and mitigations to customers and stakeholders. Ability to work independently and as part of a team. Proficiency in GRC software and tools. Why you will love this job: You will be able to demonstrates an understanding of key business drivers and ensures strategic directions are followed and the organization succeeds You will be able to gathers relevant data, identifies trends and root causes, and draws logical conclusions to develop solutions You will have ability to assess details, systems and other factors as part of a single and comprehensive picture We are a dynamic, multi-cultural organization that constantly innovates and empowers our employees to grow. Our people our passionate, daring, and phenomenal teammates that stand by each other with a dedication to creating a diverse, inclusive workplace! We offer a wide range of stellar benefits including health, dental, vision, and life insurance as well as paid time off, sick time, and parental leave Amdocs is an equal opportunity employer. We welcome applicants from all backgrounds and are committed to fostering a diverse and inclusive workforce

Posted 1 week ago

Apply

3.0 - 5.0 years

6 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

: Job Title - Information Security Analyst, Associate Location - Bangalore, India Role Description Information Security Risk Analyst - TDI CSO The Technology Data Innovation (TDI) Chief Security Office (CSO) comprises both Corporate Security and Information Security. We run security operations globally to protect the banks people, infrastructure, processes, and information. CSO Governance and Control conducts proactive Information Security (IS) controls assess ability and applicability reviews for the emerging technologies to design adaptable IS assessment framework to appropriately assess the security requirement for relevant applications and infrastructures. The Information Security Analyst role holder is responsible for supporting the execution of the Information Security strategy. The Information Security Analyst provides data and analysis to measure the effectiveness of Information Security controls across group wide products and services. The Information Security Analyst identifies and evaluates potential areas of Information Security threats by assessing the probability and impact and facilitates feedback for mitigation. Roles within Information Security may cover one or more areas of specialty, e.g. Identity & Access Management (which may include, for example, authentication; access management & control; recertification etc.); Information Security (IS) Operations (which may for example include, cyber threat operations; cyber forensics, protection against data leakage etc.) and IS Technology (which may include IS architecture, IS engineering, cryptographic services etc.) What we'll offer you As part of our flexible scheme, here are some of the benefits that you will enjoy. Best in class leave policy. Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Review Risk Assessment (Application/Technical Risk profile) and Assurance spot checks for Compliance evaluation of IS controls (e.g., IS/Cloud/SOx/MAS/Client Access Management/other regulatory controls) Analysis and verification of compliance issues. Analyze and identify root causes. Collect and review evidence (e.g., from de-centrally managed applications) Communicates openly with internal stakeholders; keeps them informed of potential findings and escalate problems/delays accordingly. Acts as a competent partner to stakeholders in the closure process of findings and remediation activities. Provide and prepare data / reports for stakeholders and management communication. Conduct application risk assessments and support business stakeholders to determine the CIA ratings. Focus on utilizing the capacity in an efficient and effective manner. Proactively develop and maintain professional working relationships with the CSO function and stakeholders Represent the process and provide inputs / suggestion with any challenges faced to improve the quality. Improvement and documentation of operational tracking activities Raise Business to Central Solutions run by other CSO teams. Your skills and experience Work experience in the Information Technology area / Information security area Practical experience in Governance or Compliance Monitoring beneficial. Knowledge about basic principles of Risk, Identity and Access Management beneficial Certifications in ISO 27001 or on information security (e.g., CISSP, CISA) would be beneficial. Effective communication and strong interpersonal skills in English (verbal and written). German language would be beneficial. Positive attitude and proactive behavior with diligence and precision Self-driven, eager to learn, well organized collaborator to integrate with heterogeneous teams. Structured way of thinking and working with good analytical and critical thinking skills Ability to monitor, track and clearly communicate progress, escalate issues when appropriate, not shunning to address issues to higher management levels. Experience in Excel (advanced), added advantage to languages such as Python/VB/SQL etc., How we'll support you Training and development to help you excel in your career. Coaching and support from experts in your team A culture of continuous learning to aid progression. A range of flexible benefits that you can tailor to suit your needs. About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm We strive for a culture in which we are empowered to excel together every day. This includes acting responsibly, thinking commercially, taking initiative and working collaboratively. Together we share and celebrate the successes of our people. Together we are Deutsche Bank Group. We welcome applications from all people and promote a positive, fair and inclusive work environment.

Posted 1 week ago

Apply

3.0 - 5.0 years

6 - 10 Lacs

Pune

Work from Office

Naukri logo

: Job Title - Information Security Analyst, NCT Location - Pune, India Role Description Information Security Risk Analyst - TDI CSO The Technology Data Innovation (TDI) Chief Security Office (CSO) comprises both Corporate Security and Information Security. We run security operations globally to protect the banks people, infrastructure, processes, and information. CSO Governance and Control conducts proactive Information Security (IS) controls assess ability and applicability reviews for the emerging technologies to design adaptable IS assessment framework to appropriately assess the security requirement for relevant applications and infrastructures. The Information Security Analyst role holder is responsible for supporting the execution of the Information Security strategy. The Information Security Analyst provides data and analysis to measure the effectiveness of Information Security controls across group wide products and services. The Information Security Analyst identifies and evaluates potential areas of Information Security threats by assessing the probability and impact and facilitates feedback for mitigation. Roles within Information Security may cover one or more areas of specialty, e.g. Identity & Access Management (which may include, for example, authentication; access management & control; recertification etc.); Information Security (IS) Operations (which may for example include, cyber threat operations; cyber forensics, protection against data leakage etc.) and IS Technology (which may include IS architecture, IS engineering, cryptographic services etc.) What we'll offer you As part of our flexible scheme, here are some of the benefits that you will enjoy. Best in class leave policy. Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Review Risk Assessment (Application/Technical Risk profile) and Assurance spot checks for Compliance evaluation of IS controls (e.g., IS/Cloud/SOx/MAS/Client Access Management/other regulatory controls) Analysis and verification of compliance issues. Analyze and identify root causes. Collect and review evidence (e.g., from de-centrally managed applications) Communicates openly with internal stakeholders; keeps them informed of potential findings and escalate problems/delays accordingly. Acts as a competent partner to stakeholders in the closure process of findings and remediation activities. Provide and prepare data / reports for stakeholders and management communication. Conduct application risk assessments and support business stakeholders to determine the CIA ratings. Focus on utilizing the capacity in an efficient and effective manner. Proactively develop and maintain professional working relationships with the CSO function and stakeholders Represent the process and provide inputs / suggestion with any challenges faced to improve the quality. Improvement and documentation of operational tracking activities Raise Business to Central Solutions run by other CSO teams. Your skills and experience Work experience in the Information Technology area / Information security area Practical experience in Governance or Compliance Monitoring beneficial. Knowledge about basic principles of Risk, Identity and Access Management beneficial Certifications in ISO 27001 or on information security (e.g., CISSP, CISA) would be beneficial. Effective communication and strong interpersonal skills in English (verbal and written). German language would be beneficial. Positive attitude and proactive behavior with diligence and precision Self-driven, eager to learn, well organized collaborator to integrate with heterogeneous teams. Structured way of thinking and working with good analytical and critical thinking skills Ability to monitor, track and clearly communicate progress, escalate issues when appropriate, not shunning to address issues to higher management levels. Experience in Excel (advanced), added advantage to languages such as Python/VB/SQL etc., How we'll support you Training and development to help you excel in your career. Coaching and support from experts in your team A culture of continuous learning to aid progression. A range of flexible benefits that you can tailor to suit your needs. About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm We strive for a culture in which we are empowered to excel together every day. This includes acting responsibly, thinking commercially, taking initiative and working collaboratively. Together we share and celebrate the successes of our people. Together we are Deutsche Bank Group. We welcome applications from all people and promote a positive, fair and inclusive work environment.

Posted 1 week ago

Apply

7.0 - 9.0 years

8 - 12 Lacs

Hyderabad

Work from Office

Naukri logo

Job Information Job Opening ID ZR_2405_JOB Date Opened 09/11/2024 Industry IT Services Job Type Work Experience 7-9 years Job Title Senior Cyber Security Consultant City Hyderabad Province Telangana Country India Postal Code 500001 Number of Positions 1 We are seeking a Senior Cyber Security Consultant with extensive experience in enterprise IT security, risk management, and cloud-based security solutions. The ideal candidate will have a deep understanding of managing cyber security risks during digital transformations and will be responsible for leading hands-on engagements and delivering results that address critical security concerns. This role involves working closely with both technical and business teams to identify and mitigate risks in complex environments. Key Responsibilities Leadership in Execution & DeliveryLead hands-on engagements, managing the development of deliverables from start to finish. Work with teams to analyze requirements and produce prioritized results aligned with client needs and risk profiles. Expert Cyber Security AdvisoryProvide expert advice on best practices for managing cyber security risks during digital transformation, including adoption of cloud, DevOps, containerization, microservices, and zero trust frameworks. Security Reviews & AssessmentsConduct security reviews and maturity assessments across technology and business teams to identify and address cyber risks. Provide clear, organized findings and actionable recommendations for risk mitigation. Trusted Engineer for ClientsAct as a trusted advisor and security engineer for customers' engineering teams, ensuring that security is integrated into every phase of digital transformation. Risk and Vulnerability AnalysisAssess and implement security measures to safeguard IT environments. Identify vulnerabilities, focusing on security protocols, cryptography, authentication, authorization, and performance. Security ImplementationLead the implementation of security solutions, including multi-factor authentication (MFA), single sign-on (SSO), identity management, and related technologies. Client Interaction & CommunicationEffectively communicate security measures and solutions to a broad audience, including both technical and executive teams. Manage client expectations with clear, concise verbal and written communication. Continuous Learning & InnovationStay updated with the latest security protocols, vulnerabilities, and best practices to ensure the adoption of the most effective security controls and technologies. Security MaturityWork with clients to evaluate and improve their security maturity, providing insights into the current cyber threat landscape. Minimum Qualifications8+ years of total IT experience. 5+ years of consulting experience in enterprise security environments. Expertise in information security, IT risk management, and performance reliability. Solid understanding of security protocols, cryptography, and authentication technologies. Experience in implementing multi-factor authentication, SSO, and identity management. Ability to explain and enforce security measures to a broad range of stakeholders. Excellent verbal and written communication skills. Degree in Information Technology, Computer Science, or related fields. Preferred QualificationsGoogle Cloud Security Engineer certification. Strong knowledge of infrastructure, OS, application vulnerabilities, security architecture, and controls. 5+ years of experience with cloud computing security concepts and solutions. Security-related certifications such as CISSP, CISM, or GCIH. This position is ideal for individuals with a strong technical background in security, a strategic mindset, and a passion for helping organizations secure their IT environments. check(event) ; career-website-detail-template-2 => apply(record.id,meta)" mousedown="lyte-button => check(event)" final-style="background-color:#2B39C2;border-color:#2B39C2;color:white;" final-class="lyte-button lyteBackgroundColorBtn lyteSuccess" lyte-rendered=""> I'm interested

Posted 1 week ago

Apply

4.0 - 8.0 years

8 - 13 Lacs

Chennai

Work from Office

Naukri logo

Network Profile A Network Subject Matter Expert (SME) with 4 to 6 years of experience in network governance plays a pivotal role in designing, implementing, and overseeing an organization's network infrastructure to ensure compliance, security, and optimal performance. Below is a comprehensive job description for this role: Job Title: Network Subject Matter Expert (SME) Network Governance Experience Level: 4 to 6 years Job Summary: The Network SME will be responsible for the strategic planning, design, implementation, and governance of the organization's network systems. This role requires a deep understanding of network architectures, security protocols, and compliance standards to ensure the network's integrity, availability, and confidentiality. Key Responsibilities: Network Design and Implementation: Develop and implement network architectures that align with organizational objectives and industry best practices. Configure and deploy network devices, including routers, switches, firewalls, and intrusion detection systems. Ensure network scalability, reliability, and security to support business operations. Network Governance and Compliance: Establish and enforce network policies and procedures to comply with industry standards and regulatory requirements. Conduct regular audits and assessments to ensure adherence to governance frameworks. Collaborate with compliance and risk management teams to address network-related regulatory issues. Security Management: Implement and manage network security measures, including firewalls, VPNs, and access controls. Monitor network traffic for unusual activity and potential threats. Respond to security incidents and implement corrective actions to prevent future occurrences. Performance Monitoring and Optimization: Utilize network monitoring tools to track performance metrics and identify areas for improvement. Optimize network configurations to enhance efficiency and reduce latency. Troubleshoot complex network issues and implement solutions promptly. Documentation and Reporting: Maintain comprehensive documentation of network configurations, policies, and procedures. Prepare reports on network performance, security incidents, and compliance status for management review. Qualifications: Education: Bachelor's degree in Computer Science, Information Technology, or a related field. Experience: 4 to 6 years of hands-on experience in network engineering, with a focus on network governance and security. Proven experience in designing and implementing complex network infrastructures. Certifications: Relevant certifications such as Cisco Certified Network Professional (CCNP), Certified Information Systems Security Professional (CISSP), or equivalent are highly desirable. Required Skills: Proficiency in configuring and managing network devices from vendors like Cisco, Juniper. Strong understanding of network protocols, including TCP/IP, MPLS, BGP, and OSPF. Experience with network security tools and technologies, such as firewalls, intrusion detection/prevention systems, and VPNs. Familiarity with network monitoring and performance tools. Excellent analytical and problem-solving abilities. Strong communication skills, both written and verbal. Ability to work collaboratively in a team environment and lead network-related projects.

Posted 1 week ago

Apply

11.0 - 14.0 years

27 - 42 Lacs

Chennai

Work from Office

Naukri logo

Job Summary The App Security Specialist will play a crucial role in ensuring the security and integrity of applications within the Hi-Tech domain. With a focus on Privileged Access Management the candidate will work in a hybrid model during day shifts. This position requires 11 to 14 years of experience emphasizing technical expertise and domain knowledge to safeguard company assets. Responsibilities Implement robust security measures to protect applications from unauthorized access and potential threats Collaborate with cross-functional teams to identify security vulnerabilities and develop effective mitigation strategies Conduct regular security assessments and audits to ensure compliance with industry standards and best practices Develop and maintain security policies and procedures tailored to the Hi-Tech domain Monitor and analyze security incidents providing timely responses and solutions to mitigate risks Utilize Privileged Access Management tools to control and monitor access to sensitive information Provide guidance and training to team members on security protocols and practices Stay updated with the latest security trends and technologies to enhance the companys security posture Ensure seamless integration of security solutions within the existing IT infrastructure Work closely with stakeholders to align security initiatives with business objectives Prepare detailed reports on security performance and present findings to management Support the development of secure application architectures and frameworks Contribute to the continuous improvement of security processes and systems. Qualifications Possess a strong understanding of Privileged Access Management and its application in securing sensitive data Demonstrate expertise in the Hi-Tech domain with a focus on application security Have a proven track record of implementing security solutions in a hybrid work environment Exhibit excellent problem-solving skills and the ability to work collaboratively with diverse teams Show proficiency in conducting security audits and assessments Be adept at developing and enforcing security policies and procedures Display strong communication skills to effectively convey security concepts and strategies Maintain a proactive approach to identifying and addressing security challenges Hold relevant certifications in application security and Privileged Access Management Be committed to continuous learning and staying abreast of industry developments Demonstrate the ability to balance security needs with business objectives Have experience in training and mentoring team members on security best practices Show a dedication to enhancing the companys security posture through innovative solutions. Certifications Required Certified Information Systems Security Professional (CISSP) Certified in Risk and Information Systems Control (CRISC)

Posted 1 week ago

Apply

7.0 - 9.0 years

7 - 9 Lacs

Chennai, Tamil Nadu, India

Remote

Foundit logo

Plan, identify, define, engineer, and monitor the security arrangements for the protection of the company s network and services. Identifies and analyzes gaps in the security of the BW on-premises and cloud network environments. Participate in implementation and integration projects such as conducting product research, overseeing proof of concept evaluations, coordinating with the infrastructure team during acquisition integrations and implementations, and overseeing the secure configuration and installation of infrastructure devices. Help optimize threat detection systems and processes. Design secure remote access practices and implementation plans to secure BW s footprint in BW and customer facilities. Assist the Infrastructure team with designing and documenting additional network segmentation and implementing/enhancing BW s Information Technology / Operational Technology (IT/OT) segregation. Develop, optimize, document, and maintain security standards, processes, operating procedures, and policies. Participate in the lifecycle management and day-to-day operations of relevant security tools . Responsible for developing standard configurations to ensure the security of firewalls, VPNs, web protocols and other networking equipment. Help investigate intrusion and hacking incidents, collect incident responses, and carry out forensic investigations. Use industry-standard analysis criteria to test the security level of the BW enterprise; test and check the BW enterprise for weaknesses in software and hardware by assisting with penetration tests, vulnerability assessments and then managing all findings to resolution. Assist with the implementation of regulatory systems in accordance with IT security. Modify, where needed, the technical, legal, and regulatory aspects of the enterprise s security. Implementation, configuration and maintenance of NAC configuration using Cisco ISE. Work as a champion for best cyber security practices within Barry-Wehmiller. Job Specifications: Expert knowledge of Cisco, Palo Alto and other vendor firewalls Expert knowledge of Cisco ISE and its capabilities and configuration. Expert knowledge of routing and switching capabilities. Knowledge of configuration and management of Cisco Meraki. Understanding of SASE/SSE products and capabilities such as Netskope or Zscaler. Strong logical ability, natural curiosity, problem solving ability, good oral and written communication skills, thorough, takes initiative, professional appearance/demeanor, dependable, flexible with schedule, loyal, organized, and courteous. Troubleshooting skills with networking and computer systems, can multitask, work in a fast-paced environment while providing excellent user experience. Ability to work independently with minimal guidance and to solve complex problems. A good understanding of OT environments and the challenges that these can present. API programming experience is highly desirable. Required Education and Experience: Senior level professional with in-depth knowledge of network security. Minimum 4-year degree in an IT field. Master s degree preferred. Equivalent work experience will be considered in lieu of a degree. Relevant certifications such as CCNP, CCIE, CISSP, or other comparable certifications are highly desirable. Minimum of five (7) years of experience serving in a network security engineer role and working with IP networks, firewalls, and the switch / route environment Three (3) years experience in identifying threats and developing appropriate protection measures

Posted 1 week ago

Apply

3.0 - 7.0 years

4 - 7 Lacs

Hyderabad / Secunderabad, Telangana, Telangana, India

On-site

Foundit logo

Qualifications Bachelors degree in Computer Science, Information Security, or a related field (Masters degree preferred). Industry-recognized certifications such as CISSP, CISM, or CISA are a strong plus. Demonstrated experience in data security, information security, or a related field. Proficiency in data encryption technologies, access controls, and security tools. Comprehensive knowledge of data protection regulations and industry best practices. Excellent problem-solving skills and effective communication abilities. Ability to work both independently and collaboratively in a team-oriented environment.

Posted 1 week ago

Apply

12.0 - 17.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities: Expected to be an SME Collaborate and manage the team to perform Responsible for team decisions Engage with multiple teams and contribute on key decisions Expected to provide solutions to problems that apply across multiple teams Develop and implement security solutions for cloud environments Conduct security assessments and audits to identify vulnerabilities Provide guidance on security best practices for cloud deployments Professional & Technical Skills: Must To Have Skills: Proficiency in SailPoint IdentityIQ Strong understanding of cloud security principles Experience with implementing security controls in cloud environments Knowledge of industry standards and regulations related to cloud security Hands-on experience with security tools and technologies Additional Information: The candidate should have a minimum of 12 years of experience in SailPoint IdentityIQ This position is based at our Bengaluru office A 15 years full time education is required Qualification 15 years full time education

Posted 1 week ago

Apply

5.0 - 10.0 years

10 - 15 Lacs

Pune

Work from Office

Naukri logo

Job Summary We are seeking a highly skilled and motivated Network Engineer with expertise in Electronic Security Projects to join our dynamic team. This role involves the design, implementation, and maintenance of sophisticated network infrastructures to support a wide range of electronic security systems, including Video Surveillance, Perimeter Intrusion Detection, Access Control, Fire Alarm Systems, and both active and passive networking components. The ideal candidate will demonstrate strong proficiency in network engineering, security protocols, and system integration, ensuring scalable, reliable, and secure network solutions for our clients. 1. System Design and Architecture: Collaborate with project stakeholders to gather technical requirements. Design scalable, redundant, and secure network architectures tailored to electronic security systems. Develop detailed system diagrams, network topologies, and technical specifications. 2. Network Implementation and Configuration: Deploy and configure critical network components, including routers, switches, firewalls, and access points. Implement VLANs, VPNs, ACLs, and security measures to ensure data integrity, confidentiality, and availability. Install and manage network monitoring tools to oversee performance and security incidents. 3. Integration of Security Systems: Integrate Video Surveillance, Perimeter Intrusion Detection, Access Control, and Fire Alarm Systems into the network infrastructure. Ensure seamless communication and interoperability between devices and platforms. 4. Firewall and Intrusion Detection Systems (IDS/IPS): Design and enforce firewall policies and rules to safeguard network assets. Deploy and manage IDS/IPS solutions for proactive threat detection and mitigation. 5. Access Control and Authentication: Implement secure access control mechanisms and authentication protocols to restrict unauthorized access. Integrate access control systems with identity management platforms for centralized administration. 6. Video Surveillance and Analytics: Configure IP-based video surveillance cameras and Video Management Systems (VMS). Implement video analytics and motion detection algorithms to automate event detection and alerts. 7. Perimeter Intrusion Detection: Design and deploy perimeter security solutions, including sensors, alarms, and monitoring systems. Configure geofencing, motion sensors, and other detection mechanisms to protect critical infrastructure. 8. Active and Passive Networking: Manage the installation and termination of network cabling, including Ethernet, fiber optics, and Power over Ethernet (PoE). Conduct cable testing, certification, and troubleshooting in compliance with industry standards. Required Skills and Qualifications Educational Qualification: Bachelors degree in Computer Science, Information Technology, or related fields. Experience: Minimum of 5 years in network engineering with a focus on electronic security systems. Certifications (Preferred): CCNA, CCNP, CompTIA Security+, CISSP Technical Skills: o Strong knowledge of network protocols (TCP/IP, VLANs, VPNs, SNMP, OSPF, BGP) o Hands-on experience with network hardware from Cisco, Juniper, Palo Alto Networks, Ubiquiti o Proficiency in server installation, configuration, and cybersecurity best practices Soft Skills: o Excellent problem-solving and analytical abilities o Strong written and verbal communication skills o Ability to manage multiple projects simultaneously and meet deadlines Key Competencies Network Architecture and Design Survey & Assessment for Electronic Security Systems Troubleshooting and Maintenance of Building Management Systems (BMS) System Integration and Implementation Security Best Practices and Compliance Project Management and Multitasking Technical Documentation and Reporting Fundamentals of Cybersecurity for Client System Management Server Installation and Troubleshooting

Posted 1 week ago

Apply

7.0 - 9.0 years

30 - 35 Lacs

Bengaluru

Work from Office

Naukri logo

Job Overview: We are seeking an experienced Hands-On Cloud Security Architect to secure the architecture and infrastructure of our enterprise product software deployed in the cloud. As a Cloud Security Architect, you will play a critical role in designing, implementing, and maintaining secure cloud environments for our enterprise software solutions. You will directly contribute to securing the product's cloud-based infrastructure, ensuring both security and compliance, while actively collaborating with development, DevOps, and IT teams to incorporate cloud security practices into the software development lifecycle (SDLC). This role requires a hands-on, technical approach, enabling us to maintain a secure, resilient, and scalable product platform. Key Responsibilities: Design & Implement Secure Cloud Architecture: Secure enterprise product software hosted in both public and private clouds (AWS, Azure, GCP) and integrate security controls into the architecture. Embed Security into SDLC: Collaborate with development and DevOps teams to integrate cloud security practices into the product development process, ensuring secure APIs, storage, and networking configurations. OWASP Integration: Ensure adherence to OWASP Top 10 for secure coding practices and mitigate risks like injection attacks and authentication flaws. Automate Security Controls: Configure and automate security tools for vulnerability management, patching, and incident response in cloud environments. Hybrid Cloud Security: Secure workloads across both public and private cloud resources, ensuring seamless integration and consistent security policies. Compliance & Risk Management: Ensure compliance with regulatory frameworks (SOC 2, HIPAA, GDPR) and manage security risks across the cloud infrastructure. Security Testing: Perform regular penetration testing, vulnerability assessments, and secure code reviews for cloud-hosted enterprise software. Incident Response & Monitoring: Lead monitoring efforts and respond to security incidents in real time, ensuring the security of the products cloud infrastructure. Qualifications: Education: Bachelors in Computer Science, Information Security, or related field. Advanced certifications (CISSP, CCSP, AWS Certified Security Specialty) are a plus. Experience: o 8+ years of experience in cloud security, with a focus on enterprise product software in the cloud. o At least 3+ years of hands-on experience with major cloud platforms (AWS, Microsoft Azure, or Google Cloud Platform). o Proven experience with securing enterprise software applications and cloud infrastructures. o Strong background in securing complex, large-scale software environments with a focus on infrastructure security, data security, and application security. o Hands-on experience with the OWASP Top 10 and integrating security measures into cloud applications. o Experience with Hybrid Cloud environments and securing workloads that span on-premises and public cloud platforms. Technical Skills: o In-depth experience with cloud service models (IaaS, PaaS, SaaS) and cloud security tools (e.g., AWS Security Hub, Azure Security Center, GCP Security Command Center). o Expertise in securing enterprise applications, including web services, APIs, and microservices deployed in the cloud. o Strong experience with network security, encryption techniques, IAM policies, security automation, and vulnerability management in cloud environments. o Familiarity with container security (Docker, Kubernetes) and serverless computing security. o Hands-on experience with Infrastructure as Code (IaC) tools such as Terraform, CloudFormation, or similar tools. o Knowledge of regulatory compliance requirements such as SOC 2, GDPR, HIPAA, and how they apply to enterprise software hosted in the cloud. Certifications: o Certified Information Systems Security Professional (CISSP) o Certified Cloud Security Professional (CCSP) o AWS Certified Security Specialty, Azure Security Engineer, or equivalent certifications. o Other relevant certifications (e.g., CISM, CISA) are a plus. Soft Skills: o Strong problem-solving and analytical skills with the ability to assess and mitigate cloud security risks. o Excellent written and verbal communication skills, with the ability to explain complex security concepts to technical and non-technical stakeholders. o Collaborative mindset, able to work cross-functionally with engineering, operations, and product teams. o Detail-oriented, with a commitment to maintaining high security standards in all aspects of the enterprise software. Additional Information: Work Environment: o This role can be based in Bangalore o Occasional travel may be required for client meetings or industry conferences. Compensation: o Competitive salary and benefits package, including health insurance. Additional Information: Work Environment: Based at the office in Bangalore. Occasional travel required. Compensation: Competitive salary and benefits

Posted 1 week ago

Apply

6.0 - 8.0 years

20 - 25 Lacs

Pune

Work from Office

Naukri logo

Roles & Responsibilities:- Design and implement secure AWS cloud architectures aligned with business and compliance requirements. Automate security controls and integrate them into CI/CD pipelines Manage and monitor AWS security tools such as GuardDuty, Security Hub, and CloudTrail Develop and enforce IAM policies using least privilege principles Conduct threat modeling, vulnerability assessments, and cloud security posture evaluations Ensure compliance with standards like SOC 2, ISO 27001, and NIST Support audit readiness and implement risk treatment plans Collaborate with DevOps teams to embed security in cloud deployments Promote DevSecOps culture across development and operations teams Create and maintain security-as-code using CloudFormation, Terraform, and scripting Automate detection, remediation, and incident response processes Provide security guidance during cloud migrations and new service adoptions Qualification:- Bachelors in Cybersecurity, Computer Science, or related field (Masters preferred) 7+ years in cybersecurity, with 5+ years in cloud security Strong expertise in AWS security tools (GuardDuty, Security Hub, IAM, KMS, CloudTrail) Familiar with cloud security frameworks (AWS Well-Architected, NIST CSF, CSA CCM) Experience in securing CI/CD pipelines and implementing IaC security (CloudFormation/Terraform) Hands-on with CSPM tools and automated security validation Deep understanding of IAM principles and DevSecOps practices Proficient in scripting (Python, Bash) for automation Strong knowledge of network, container, and serverless security Excellent communication skills (verbal and written) Certifications: AWS Security Specialty, CCSP, CISSP, or equivalent Preferred Qualifications :- Experience with multi-cloud (AWS, Azure, GCP) security Understanding of regulatory frameworks (e.g., GDPR, HIPAA, ISO) Hands-on with container security (Docker, Kubernetes, ECS/EKS) Experience with Zero Trust security models in cloud Familiarity with automated incident response and cloud-native tools Knowledge of Hashicorp Vault or similar tools for secrets management Experience securing data lakes and analytics platforms Worked with CWPP and serverless security best practices Cloud security experience in energy efficiency/sustainability domains Experience in cloud threat modeling and collaborating with global teams

Posted 1 week ago

Apply

3.0 - 5.0 years

12 - 15 Lacs

Hyderabad, Chennai

Work from Office

Naukri logo

Preferred Candidate Profile:- Bachelors degree in Computer Science, Information Security, or related field. 3-6 years of experience in DevOps or Security Engineering roles. Relevant certifications such as CISSP, CEH, Security+ (preferred). Hands-on experience with cloud security across AWS, Azure, or GCP . Proficiency in scripting languages such as Python, Java, or Bash . Strong understanding of DevSecOps practices , threat modeling, and risk assessment. Excellent problem-solving skills and the ability to work in a fast-paced, collaborative environment.

Posted 1 week ago

Apply

3.0 - 5.0 years

7 - 12 Lacs

Noida

Work from Office

Naukri logo

At CGM, the leading provider of software solutions in the healthcare sector, we are looking for a skilled Ethical Hacker (m/f/d) to join our growing cybersecurity team. We believe in innovation, teamwork, and the power of technology to drive change. With our vision that "No one should suffer or die because at some point medical information was missing", we aim to create a culture that contributes positively to the future of our healthcare system. You are a proactive problem-solver with a passion for cybersecurity and the desire to make a real difference! Join us on this exciting journey! Your contribution: Conduct penetration testing on applications, networks, and systems to identify vulnerabilities and provide actionable recommendations for improvement. Simulate real-world attacks and collaborate with IT and security teams to develop effective remediation strategies. Prepare detailed reports of findings, including risk assessments, and conduct security awareness training for staff to promote a culture of cybersecurity. Stay updated on the latest security threats and participate in incident response activities and forensic analysis in the event of a security breach. Maintain compliance with security policies, legal regulations, and industry best practices to ensure a robust cybersecurity framework.\ What you bring: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field, along with proven experience as an ethical hacker (m/f/d) or penetration tester (m/f/d) (HackerOne or Integrity Score preferred) Relevant certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information System Security Professional (CISSP) Proficiency in security testing tools (e.g. Metasploit, Wireshark, Burp Suite, Nmap) and strong knowledge of networking protocols, operating systems, and web applications. Experience with thick client penetration testing, along with programming or scripting skills (e.g. Python, Java, Bash) as an advantage Willingness to train and obtain certification in cloud penetration testing, combined with excellent analytical, problem-solving, and communication skills (German and English) to convey technical information to non-technical audiences What you can expect: Mobile Work: Work flexibly two days a week remotely and three days on-site. Attractive locations: Our offices feature fully equipped workspaces completed by regular events, including summer gatherings and Christmas parties. Health: We value health highly. Our in-house cafeteria offers a selection of delicious and healthy meals every day. Personal Development: Our in-house academy and portfolio of external partners support your professional growth. Diversity is part of CGM! We welcome your application regardless of disability, gender, nationality, ethnic and social origin, religion, age or sexual orientation and identity. Convinced? Apply now with your comprehensive documents (including your certificates, salary expectations, and earliest possible start date).

Posted 1 week ago

Apply

11.0 - 18.0 years

20 - 32 Lacs

Bengaluru

Work from Office

Naukri logo

Job Title Senior Manager - Cybersecurity and Cyber Defense Center Direct Supervisor VP - Cybersecurity and Cyber Defense Center Job Purpose To develop, manage, and execute cyber security project across Mashreq to Lead and oversee the strategic operations of the Cyber Defense Center (CDC) to ensure effective monitoring, detection, analysis, and response to advanced cybersecurity threats. Develop and implement security strategies, policies, and procedures to manage and mitigate risks across the organization. Guide and mentor the team in using SIEM platforms (Azure Sentinel & ArcSight preferred) and other security solutions to address complex and critical security events. Coordinate with senior leadership and external stakeholders to enhance the organization's security posture and ensure compliance with regulatory requirements. Dimensions Key Result Areas Strategic Security Management: Develop and implement strategies for monitoring and responding to security events from SIEM systems (Azure Sentinel & ArcSight preferred). Analyze and respond to security events from diverse data sources such as firewalls, IDS/IPS, antivirus solutions, DAM systems, web servers, proxies, and banking applications. Advanced Threat and Incident Management: Create and refine alert rules and logic in SIEM to detect significant events and threats. Perform precise, real-time analysis and correlation of logs/alerts from multiple sources. Utilize established policies, standards, and procedures to classify security alerts as incidents and guide incident response efforts. Leadership and Improvement: Improve incident response times and reduce false positives by refining detection capabilities and processes. Assist in the design, implementation, and execution of security awareness programs and risk-based security controls analysis. Update and enhance processes and policies (SOPs, playbooks, runbooks) with a deep understanding of cybersecurity best practices. Cross-Functional Collaboration: Collaborate with compliance, audit, and regulatory teams to provide necessary information, data, and evidence. Keep up-to-date with industry knowledge and trends to maintain a high level of security proficiency. Key Principles Strategic Leadership: Provide strategic direction and leadership to the Cyber Defense Center, ensuring alignment with organizational goals and cybersecurity best practices. Enhanced Threat Detection and Response: Drive improvements in threat detection and response capabilities, ensuring accurate identification and swift remediation of security incidents. Continuous Process Improvement: Continuously evaluate and enhance security processes and policies to adapt to evolving threats and improve operational efficiency. Effective Communication and Collaboration: Maintain strong communication with internal teams, senior management, and external stakeholders to ensure effective security management and compliance. Ethical and Professional Standards: Uphold high ethical standards in all security practices, ensuring compliance with regulations and protecting sensitive information. Operating Environment, Framework and Boundaries, Working Relationships Information Security / Cyber Security Regulations and Industry best practices. HO (Head Office) and International Regulators and Supervisors across the bank is operating. All business units including LOD 1-3 including LOD1 – Business, Tech GRC, Technology, LOD-2 Group Compliance, Fraud Prevention, Risk Management and LOD-3 Internal Audit. Problem Solving Proactive and Strategic Problem Solving: Lead proactive monitoring and root cause analysis of security incidents to address underlying issues effectively. Provide strategic guidance during incident response activities for complex security incidents. Log Source Management and Optimization: Oversee the onboarding and integration of new log sources, optimizing data accuracy and enhancing threat detection capabilities. Decision Making Authority & Responsibility Evaluation and Innovation: Lead evaluations and Proof of Concept (PoC) for new security solutions and technologies, driving innovation in security practices. Security Metrics and Architecture: Monitor and analyze key security metrics to ensure alignment with security standards and contribute to the development of Security Reference Architecture. Policy and Strategy Development: Guide the creation and refinement of security policies, including scope and control decisions, ensuring alignment with organizational and regulatory requirements. High-Level Collaboration: Collaborate with senior management, vendor personnel, and other teams to achieve security objectives with minimal supervision. Knowledge, Skills, and Experience Educational Background: Graduate/Postgraduate degree in Science, Engineering, or IT. Certifications: Minimum of 2 professional certifications from CISSP, CISM, CRISC, CISA, or equivalent. Experience: Extensive experience in SIEM design and implementation, with a strong background in Cyber Defense Center or Security Operations Center roles. Over 12 years of experience in SOC & CDC, with proven leadership skills and expertise in managing complex security operations. Skills: Proficiency in managing SIEM policies and enhancing security operations. Strong analytical skills for evaluating security requirements and implementing appropriate controls. Excellent documentation and report writing skills. Knowledge of the banking environment is advantageous.

Posted 1 week ago

Apply

3.0 - 10.0 years

3 - 9 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Foundit logo

What you bring Education and Qualifications/Skills and Competencies Bachelors or Master s degree in: Information Systems, Engineering, Computer Science or similar degree. Must be able to work as a team player, yet can work independently. Analytical, results-driven and have a solution oriented approach. Possess exceptional interpersonal and communication skills including verbal, written presentation and listening. Must be open to travel. Must be willing to relocate to Bangalore / Gurgaon. Certifications in SAP (Security Professional, GRC or a combination of either of them) Vendor Neutral Security certifications (Like ISO 27001/31000,CISSP, CISM, CISA, GSEC, CEH, Security+) will be a big plus Technical Skills Strong foundation on S/4HANA Security is a prerequisite. Should be able to identify and build portfolios in S/4HANA Security implementation and Conversion topics Strong in Technology security fundamentals and hands on experience on SAP specific products and solutions like SAP GRC suite of products including Access Control, Process Control, Risk Management, Audit Management, Business Integrity Screening, SAP Single Sign-On, SAP Identity Management Technical Knowledge and experience in SAP Business Technology Platform and related solutions like SAP Business Technology Platform Identity Authentication, Identity Access Governance, m Identity Provisioning is a big plus Technical Knowledge and Experience in working with SAP Application security including SAP SaaS and On-premise products Working knowledge of Operating Systems security and Database Security Secure Coding practices and Security Testing knowledge and experience in any capacity will be a big plus Technical coding skills in SQL, JavaScript and any one of programming language like JAVA or Python

Posted 1 week ago

Apply

14.0 - 20.0 years

25 - 40 Lacs

Hyderabad, Bengaluru

Hybrid

Naukri logo

We are Hiring Senior Consultant Cyber Security Solution Architect Location: Bangalore, Hyderabad Experience: 14+ years Are you passionate about designing secure, scalable cloud and enterprise security architectures? Join us as a Cyber Security Solution Architect and be at the forefront of helping clients secure their digital ecosystems. What You’ll Do: Design and deliver end-to-end cybersecurity solutions for enterprise clients Collaborate with infra/application architects to embed security in architecture Lead cloud security (Azure/AWS/GCP), DDoS, SIEM, WAF, and container security design Define KPIs and lead security assessments & compliance initiatives (ISO 27001, NIST) Build client-facing proposals and conduct solution defense with stakeholders What We’re Looking For: 14+ years of overall experience, with 5+ years in complex security engineering projects Strong hands-on with tools: Azure Security Center, GuardDuty, Palo Alto, Qualys, etc. Exposure to CASB, Zero Trust, IAM, and multi-cloud security Excellent communication, client interaction, and solutioning skills Preferred Certifications: CISSP | CISM | CEH | CCSP | TOGAF | AWS/Azure/GCP Security Ready to shape the future of enterprise security? Apply now / email at mary.nancy1@sonata-software.com

Posted 1 week ago

Apply

7.0 - 10.0 years

15 - 25 Lacs

Bengaluru

Work from Office

Naukri logo

Key Responsibilities • Coordinate and ensure that PenTests are conducted on schedule. • Work with Technical Security Consultants to get an approved pen test scope in place. • Collaborate with third-party penetration testers to facilitate the testing process. • Drive post-test remediation efforts to address identified vulnerabilities. • Develop and produce monthly Key Performance Indicator (KPI) and Key Risk Indicator (KRI) decks. • Work with the Risk team to log unresolved vulnerabilities as risks. • Communicate effectively with business stakeholders to manage expectations and provide updates. • Maintain comprehensive documentation of PenTest activities and outcomes. • Identify and mitigate potential risks associated with the PenTest process. • Stay updated with the latest trends and best practices in the security industry. • Provide support and expertise to improve the overall PenTest process and outcomes. Qualifications and Experience • 7-10 years of experience in the security industry. • Strong understanding of the end-to-end PenTest process. • Experience in business stakeholder management. • Familiarity with coordinating with third-party vendors and managing external relationships. • Proficiency in developing KPI and KRI reports. • Excellent communication and interpersonal skills. • Strong organizational and time-management abilities. • Detail-oriented with a focus on continuous improvement. • Ability to work independently and as part of a team. • Certifications such as CISSP, CEH, or equivalent are a plus.

Posted 1 week ago

Apply

5.0 - 10.0 years

18 - 22 Lacs

Mumbai, Navi Mumbai, Mumbai (All Areas)

Work from Office

Naukri logo

Looking for a candidate with 5+ years of experience in IT Audit, Risk Management, and Compliance within Banking/NBFCs. Must have expertise in COBIT, NIST, RBI guidelines, ISO standards, IT systems and risk assessments. CISA certification is must.

Posted 1 week ago

Apply

10.0 - 15.0 years

10 - 14 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

Job Title: Cyber Organization alignment Compliance Location: Remote Experience: 10 -15 Years Job Description: The Information Security Cyber Organization Alignment role is focused on the strategic alignment of information security practices with the bank s overall risk management strategy, compliance requirements, and governance frameworks. The role focuses on driving Information Security Governance, Risk, and Compliance (GRC) initiatives to strengthen the bank s security posture while ensuring alignment with regulatory and business objectives. through effective processes i.e., risk tracking, compliance monitoring, RCSA, evaluating exceptions, and ensuring accurate reporting. The role ensures the right level of governance is in place and drives continuous improvement in risk management processes. The role leverages automation to streamline processes and enhance risk visibility across Information Security Group through managing GRC solutions Key Responsibilites: Essential knowledge Have around 10+ years of experience in a Banking environment and over 3 years of experience in information security. Familiarity with information security technologies, risk, threat and vulnerability assessments, and security measures. Experience with governance, risk management, and compliance frameworks (e.g., ISO 27001, NIST, GDPR, PDPL). Hold professional certifications (e.g., CISA, CISM, CISSP, CRISC) Skills and Application Strong communication and interpersonal skills. Ability to manage multiple projects and priorities. Proficiency in security tools and technologies. Strategic Insight Foster a culture of security awareness and compliance within the organization. Continuously improve the information security posture of the organization. Ensure that information security risks are effectively managed and mitigated

Posted 1 week ago

Apply

4.0 - 8.0 years

4 - 8 Lacs

Hyderabad / Secunderabad, Telangana, Telangana, India

On-site

Foundit logo

Skills Needed: Ability to analyse an organisations enterprise information technology architecture Ability to apply secure network architectures and security controls into proposed solutions Ability to identify cybersecurity or privacy issues in external or partner connections Ability to design systems and apply security architecture guidelines across On-Premises and Hybrid Cloud environments Ability to partner with Infrastructure, Cloud and Application architects to perform user needs analysis and requirements gathering for large-scale projects. Ability to develop a cyber security strategy and input into detail-oriented operational planning including capability development (People, Processes, Technology, Data). Ability to perform Controls Assurance / Attestation and deliver comprehensive risk treatment plans. Technical depth and sound knowledge in networking, cloud, desktop, server, storage, software-defined-networking, virtualization and application domains Proven communication skills, able to write and verbally communicate complex concepts Proven collaboration skills and can adapt to changing organization changing business needs, technological advances and agile methodology Self-starter and shows empathy towards business requirements and able to influence changes to facilitate security Health Insurance or Health Care Industry experience is a plus Travel required, approximately 10% Qualifications: Bachelors or Masters in Cybersecurity, Computer Science, or Information Security. Qualified candidates will typically have 13+ of professional IT experience work experience, with 8+ years of experience in a security design and development role CISSP, CISM, CCSP, CRISC or similar certifications required Expertise in encryption, network security, cloud security, application security and endpoint protection. Deep knowledge of security risks, data privacy laws, and fraud prevention techniques relevant to Financial Services, FinTech and Health sectors. Experience in data security standards and best practices for Personally Identifiable Information (PII) and Personal Health Information (PHI)Experience and working knowledge of NIST, HIPPA, PCI DSS & ISO 27001 certification is a plus Strong written and spoken English skills, demonstrated ability to communicate at high levels, both verbally and in reporting Strong work ethic, high drive and ability to focus. High stamina. Shows optimism and determination when facing challenges Ability to work successfully with a minimum of supervision in a fast paced and sometimes pressured environment

Posted 2 weeks ago

Apply

10.0 - 16.0 years

18 - 32 Lacs

Gurugram, Delhi / NCR

Work from Office

Naukri logo

Experience in a combination of risk management, information security & and IT jobs. At least 8 years in a senior management role in an information security function. – (Added information security certification if any) (CISSP, CISM, etc.). Required Candidate profile Extensive knowledge and experience in information security and IT risk management. Strong leadership skills and the ability to work effectively with Department Head, IT engineering

Posted 2 weeks ago

Apply

6.0 - 11.0 years

15 - 30 Lacs

Bengaluru

Remote

Naukri logo

Exp: 5+ yrs Industry: only Fintech or Financial Institute Job Description: Cybersecurity Officer BB Bharat Pvt. Ltd. is an aspiring global financial services firm with presence in the Gift City in Gujarat, India. The entity is able to leverage the expertise of Policies, Brand, Expertise and clientele from other related on-going financial services entities head-quartered in Singapore. We facilitate the opening of bank accounts, enable their ongoing management, and ensure their reliable, secure, and efficient cross-border fund flows. We achieve this through an extensive network of global partner banks, a robust in-house open banking platform, and our competent team that delivers knowledgeable private banking experience of proactive, high quality customer service across time zones. We are looking for an experienced and enterprising Cybersecurity Officer to join an international team of experts in banking, compliance, and corporate account management to drive our growing operations. Job description and responsibilities: Key Responsibilities: * Develop, maintain, and enforce cybersecurity policies, procedures, and protocols. * Monitor systems, investigate threats, and manage incident response and recovery. * Conduct audits, vulnerability assessments, and penetration testing. * Implement and maintain firewalls, antivirus, encryption, and other security tools. * Collaborate with cross-functional teams to ensure organization-wide security. * Lead employee training and awareness on cybersecurity best practices. * Stay updated on emerging threats and evolving technologies. * Ensure compliance with frameworks (ISO 27001, NIST, GDPR, etc.). * Support risk assessments and business continuity planning. Required Skills & Qualifications: * Strong knowledge of NIST, GDPR, AWS Well-Architected Framework, CIS Benchmarks, ISO 27001, PCI-DSS, BCP/DR, MAS TRM, MAS Cyber Hygiene, and BNM-RMIT. * Certifications: CISSP, CISO, CEH, CISA, or CISM. * Experience in developing and reviewing IS policies, procedures, guidelines, and SOPs. * Over 5 years of experience in cybersecurity or IT security roles, including 2+ years focused on Information Security or Enterprise Risk (preferably within the financial services sector). * Background in IT Security, Cybersecurity, Governance, Risk, or Audit is a plus. * Familiarity with secure-by-design implementations. * Proficient in network/system security, firewalls, IDS, and encryption. * Strong analytical, communication, and project management skills. * Able to manage multiple priorities in high-pressure environments. * Experience with ISO 20022 (optional).

Posted 2 weeks ago

Apply

2.0 - 4.0 years

15 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

locationsBangalore, Indiaposted onPosted 14 Days Ago job requisition id30476 FICO (NYSEFICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity " The Security Engineer is a highly visible and critical role, collaborating on complex cloud and corporate service edge protection technologies and oversight. With your proven history of technical knowledge of identity and access management systems and services you will be working on a variety of different challenges facing the organization. You will provide both guidance and direct input to help ensure a secure, well-protected environment that complies with all applicable security standards ". Director, Cyber Security. What Youll Contribute Assist with implementation of security tools and services to enhance the oversight and governance of all company identities. Assist with implementation of identity governance and administration (IGA) solutions for the company. Implement identity security detections using next-gen Identity Threat Detection and Response (ITDR) and Non-Human Identity (NHI) platforms and tools. Create automated tooling to test identity systems to ensure detections work as designed. Create automation to produce automated policy and posture collection and reporting, to allow for identity-specific proofs managed within Infrastructure as Code. Create pipelines to deploy and manage IAM solutions and tooling. Provide engineering and technical guidance for supporting the automation of interacting with security tools and services that support the IAM program within the company. Keep current on emerging security technologies and tools and provide recommendations. Support our compliance and certification initiatives and design with those in mind. Collaborate with other engineers on design, analysis, architecture, implementation, pen-testing, security reviews and process enhancements. What Were Seeking 2-4 years in a security role, preferably in financial services or technology. Experience in securing hybrid network infrastructure services. Expertise in security, identity, architecture, and design. Hands-on experience with AWS, Azure, or other cloud platforms and IAM best practices. 2-4 years of experience with privileged access management tools (CyberArk, SailPoint, Delinea). Experience with Okta preferred. Proficiency in identity-related technologies and protocols (LDAP, SAML, OAuth, OIDC). Experience with identity provider services (Active Directory, AWS IAM, Okta). Familiarity with Zero Trust security models (Zscaler, AWS networking). Knowledge of Identity Governance Administration services. Experience with automation scripting and API integrations. Familiarity with DevOps concepts, IaC tools, and CI/CD pipelines. Proficiency in at least one high-level language (e.g., Python). Understanding of compliance frameworks (PCI-DSS, ISO 27001, NIST). Certifications like CISSP, AWS Security Specialty, or Azure SC-300 preferred. Our Offer to You An inclusive culture strongly reflecting our core valuesAct Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. Why Make a Move to FICO At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today Big Data analytics. Youll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide Credit Scoring FICO Scores are used by 90 of the top 100 US lenders. Fraud Detection and Security 4 billion payment cards globally are protected by FICO fraud systems. Lending 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICOs solutions, placing us among the worlds top 100 software companies by revenue. We help many of the worlds largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people just like you who thrive on the collaboration and innovation thats nurtured by a diverse and inclusive environment. Well provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and were proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they dont meet all stated qualifications. While our qualifications are clearly related to role success, each candidates profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to theFICO Privacy policy at

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies