Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 5.0 years
7 - 11 Lacs
Pune
Work from Office
Join us as a Security Consultant at Barclays, responsible for supporting the successful delivery of Location Strategy projects to plan, budget, agreed quality and governance standards You'll spearhead the evolution of our digital landscape, driving innovation and excellence You will harness cutting-edge technology to revolutionise our digital offerings, ensuring unparalleled customer experiences, To be successful as a Security Consultant you should have experience with: Demonstrable understanding of security solutions and designs from a people, process and technology perspective; including security technologies, controls and assessment methodologies, Strong relationship, communication and stakeholder management skills, Knowledge of information security frameworks and standards such as ISO27001/2, NIST, PCI DSS and their application into diverse environments, Competent to discuss the underlying technology and security controls with product developers, Some Other Highly Valued Skills May Include Knowledgeable about existing best practices for integration of security controls, Understanding of cloud-based implementations and application security principles Understands core development methodologies and their associated technologies, Security qualification and / or proven track record in security consultancy and advisory, Good awareness and understanding of the Barclays business unit responsibilities and structure, You may be assessed on the key critical skills relevant for success in role, such as risk and controls, change and transformation, business acumen strategic thinking and digital and technology, as well as job-specific technical skills, This role is based in Pune, Purpose of the role To enable ?secure by design, supporting the banks change programmes, design and implement a secure systems and architecture across a broad set of security domains These include data security, security risk management, asset security, security architecture and engineering (incl cloud security), communications and networks, security operations, software development, security assurance testing, identity and access management (IAM), Accountabilities Control function or security guild responsible for technology change oversight and governance, Execution of security risk assessments and building threat models during the change & development lifecycle in order to identify vulnerabilities within the banks IT systems, applications and infrastructure, ensuring that compensating security controls and countermeasures are embedded in order to enhance security posture and resilience against cyber threats provision of timely communication of key findings and recommendations to stakeholders, Enablement of DevSecOps (and shift left), by providing engagement channels for customers and stakeholders who wish to engage early seeking security advice and input into their business plans and opportunities, or technology change designs, influencing key stakeholders in COO and CSO to create security strategies to enable business and technology evolution, Support and guidance to CISO, CIO and Product Team functions providing security reviews for prospective 3rd party technology products and services, Transfer of residual risks to the business/customer as required by the banks enterprise risk management framework, Collaboration with stakeholder and IT teams to support incident response and investigations using their knowledge of the banks technology systems sharing security insights, Participation in the development and maintenance of security policies, standards and procedures aligned to the banks risk tolerance, regulatory requirements and industry best practice, Assistant Vice President Expectations To advise and influence decision making, contribute to policy development and take responsibility for operational effectiveness Collaborate closely with other functions/ business divisions, Lead a team performing complex tasks, using well developed professional knowledge and skills to deliver on work that impacts the whole business function Set objectives and coach employees in pursuit of those objectives, appraisal of performance relative to objectives and determination of reward outcomes If the position has leadership responsibilities, People Leaders are expected to demonstrate a clear set of leadership behaviours to create an environment for colleagues to thrive and deliver to a consistently excellent standard The four LEAD behaviours are: L Listen and be authentic, E Energise and inspire, A Align across the enterprise, D Develop others, OR for an individual contributor, they will lead collaborative assignments and guide team members through structured assignments, identify the need for the inclusion of other areas of specialisation to complete assignments They will identify new directions for assignments and/ or projects, identifying a combination of cross functional methodologies or practices to meet required outcomes, Consult on complex issues; providing advice to People Leaders to support the resolution of escalated issues, Identify ways to mitigate risk and developing new policies/procedures in support of the control and governance agenda, Take ownership for managing risk and strengthening controls in relation to the work done, Perform work that is closely related to that of other areas, which requires understanding of how areas coordinate and contribute to the achievement of the objectives of the organisation sub-function, Collaborate with other areas of work, for business aligned support areas to keep up to speed with business activity and the business strategy, Engage in complex analysis of data from multiple sources of information, internal and external sources such as procedures and practises (in other areas, teams, companies, etc) to solve problems creatively and effectively, Communicate complex information 'Complex' information could include sensitive information or information that is difficult to communicate because of its content or its audience, Influence or convince stakeholders to achieve outcomes, All colleagues will be expected to demonstrate the Barclays Values of Respect, Integrity, Service, Excellence and Stewardship our moral compass, helping us do what we believe is right They will also be expected to demonstrate the Barclays Mindset to Empower, Challenge and Drive the operating manual for how we behave,
Posted 1 month ago
3.0 - 5.0 years
20 - 25 Lacs
Gurugram
Work from Office
Must Have Skills Data Loss Prevention (DLP) Administration & Implementation Experience : 3-5 years relevant Deploy, configure, and manage DLP solutions (eg, Forcepoint, Symantec, McAfee). Design and implement DLP policies for email, endpoints, cloud storage, and web traffic. Integrate DLP with SIEM, CASB, and other security tools for centralized monitoring. Conduct proof-of-concept (PoC) testing for new DLP features and updates. Work with IT teams and business units to align DLP configurations with organizational security policies. Regularly review and fine-tune DLP policies to reduce false positives and negatives. Conduct data classification and discovery scans to identify sensitive information. Establish role-based access controls (RBAC) to manage DLP policy enforcement. Investigate DLP alerts and incidents, identifying root causes and recommending corrective actions. Hands-on experience with DLP tools (eg, Symantec DLP, Forcepoint DLP, Microsoft Purview, McAfee DLP, Digital Guardian, Netskope). Strong understanding of data classification, encryption, and regulatory compliance frameworks. Expertise in network security, endpoint security, and cloud security. Experience in SIEM integration, CASB solutions, and data discovery tools. Knowledge of incident response frameworks and forensic investigation techniques.
Posted 1 month ago
6.0 - 11.0 years
18 - 22 Lacs
Hyderabad, Chennai, Bengaluru
Work from Office
Experience in software engineering role, with experience in DevOps and network administration. Experience with any Scripting languages such as PowerShell, Azure CLI or Batch files C++, C#, Python, Java, Cyber Security background, and medical device development experiences are a plus. Extensive experience with Virtual Machines in an R&D environment. Experience with Cloud platforms such as AWS or Azure. Demonstrated success in delivering results on technical challenges. Good understanding of Healthcare domain (regulations and standards) and Medical software development process is desired. Experience with Active Directory domain administration including group policies and certificate authorities is desired. Understanding of code signing certificates is desired. Bachelors degree in software engineering or related discipline. Experience in software engineering role, with experience in DevOps and network administration. Overall 5 to 12 years of experience in DevSecOps.
Posted 1 month ago
1.0 - 4.0 years
11 - 15 Lacs
Gurugram
Work from Office
Any technical graduate/post graduate, BE, B-tech, BCA, MCA, M-Tech etc Netskope Certified Cloud Security Administrator (NCCSA) Netskope Security Cloud Operation and Administration (NSCO&A) Zscaler Digital Transformation Administrator (ZDTA) Zscaler Technical Associate Exam (ZTA) Zscaler Certified Cloud professional (ZCCP) Define the cloud security framework and architecture, ensuring it meets the business requirements and goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Develop positive relationships with clients of varying size and complexity, ensuring customer satisfaction. As a Security professional, you will have the opportunity to work on multiple projects that help organizations manage and mitigate risk and maximize enterprise value. You have to closely work with client to implement/administrate the solution as we'll as create and update all supporting documentation for security solutions, Create and update all supporting documentation for security solutions. Configure and optimize policies to enforce security and compliance standards. Follow all security best practices while implementing security solutions. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Experience in designing and implementing infra security technology products (Secure Web Gateway, CASB, ZTNA, DLP) In depth Knowledge of SASE platform and its features. Familiar in networking protocols, including firewalls, proxies. Ability to investigate and respond to security incidents. Utilizing threat protection features to identify and mitigate security threats. Knowledge of cloud service providers (eg, AWS, Azure) and their security features. Ability to create and manage granular security policies for cloud services, users, and groups. Securing public cloud resources and ensuring compliance with security policies Managing Next Generation Secure Web Gateway (Netskope/Zscaler) Managing and directing traffic to ensure secure access to cloud applications. Administering user access controls and authentication mechanisms. Strong troubleshooting skills for identifying and resolving performance and connectivity issues. Integration of the SASE solution with other security solutions. Experience in multifactor Authentication (MFA) and Single Sign On (SSO)
Posted 1 month ago
3.0 - 8.0 years
3 - 7 Lacs
Mumbai, Hyderabad, Pune
Work from Office
Cybersecurity Event Triage Analyst Do you like working on identifying and preventing potential cybersecurity risks? Are you ready for the next step in your career? Join our Digital Technology Team! Our Digital Technology business provides intelligent, connected technologies to monitor and control our energy extraction assets. We provide customers with the peace of mind needed to reliably and efficiently improve their operations. Our team creates business value through continuous improvement in up-time, resilience, performance, time to market, security and compliance Partner with the best As an Event Triage Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Cybersecurity Event Triage Analyst You will be responsible for: Actively monitor and analyze cybersecurity events from various sources. Use analytical skills to identify, assess, and understand potential security incidents and trends. Playing a key role in the incident response process, focusing on the analysis and interpretation of threat data to guide response actions. Leveraging threat intelligence to enhance the understanding of potential security threats and inform the organizations cybersecurity posture. Preparing clear and detailed reports on security findings and trends. Communicate effectively with both technical and non-technical stakeholders. Ensuring adherence to regulatory standards and best practices in cybersecurity event analysis and reporting. Keeping abreast of the latest cybersecurity trends, threats, and technologies to continuously enhance analysis capabilities. Fuel your passion To be successful in this role you will: Have bachelor s degree in Cybersecurity, Information Technology, or related field, or equivalent experience. Have 3+ years of experience in cybersecurity, with a focus on security event analysis and incident response to complex cybersecurity incidents. Demonstrate knowledge of EDR, SIEM, SOAR and Cloud Security concepts. Have SOC experience . Have Certifications: Relevant certifications such as CompTIA Security+, CEH, GCIH, or similar are advantageous. Have solid verbal and written communication and team collaboration skills. Have Demonstrate problem solving skills and attention to detail, especially in event analysis and incident documentation. Have Demonstrate track record in staying updated with latest in cybersecurity, to continuously develop professional skills. Work in a way that works for you We recognize that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Working flexible hours - flexing the times when you work in the day to help you fit everything in and work when you are the most productive. Occasionally working remotely from home or any other work location Working with us Our people are at the heart of what we do at Baker Hughes. We know we are better when all of our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other. Working for you Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we have to push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect: Contemporary work-life balance policies and wellbeing activities Comprehensive private medical care options Safety net of life insurance and disability programs Tailored financial programs Additional elected or voluntary benefits
Posted 1 month ago
5.0 - 10.0 years
4 - 8 Lacs
Mumbai, Hyderabad, Pune
Work from Office
Senior Cybersecurity Event Triage Analyst Do you like working on identifying and preventing potential cybersecurity risks? Are you ready for the next step in your career? Join our Digital Technology Team! Our Digital Technology business provides intelligent, connected technologies to monitor and control our energy extraction assets. We provide customers with the peace of mind needed to reliably and efficiently improve their operations. Our team creates business value through continuous improvement in up-time, resilience, performance, time to market, security and compliance Partner with the best As an Event Triage Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Senior Cybersecurity Event Triage Analyst You will be responsible for: Actively monitor and analyze cybersecurity events from various sources. Use analytical skills to identify, assess, and understand potential security incidents and trends. Playing a key role in the incident response process, focusing on the analysis and interpretation of threat data to guide response actions. Leveraging threat intelligence to enhance the understanding of potential security threats and inform the organizations cybersecurity posture. Preparing clear and detailed reports on security findings and trends. Communicate effectively with both technical and non-technical stakeholders. Ensuring adherence to regulatory standards and best practices in cybersecurity event analysis and reporting. Keeping abreast of the latest cybersecurity trends, threats, and technologies to continuously enhance analysis capabilities. Required Qualifications Have Bachelor s degree in Cybersecurity, Information Technology, or a related field Have Technical Skills: Strong analytical skills in cybersecurity. In-depth knowledge of various Cloud security concepts, EDR, SIEM, and SOAR, and experience with responding to complex cybersecurity incidents is desirable. Have Certifications: Relevant certifications such as CompTIA Security+, CEH, GCIH, or similar are advantageous. Have Experience: 5+ years of SOC experience with focus on security event analysis and incident response is advantageous. Have a Communication Skills: Excellent verbal and written communication skills. Have Time Flexibility: This position may require working non-traditional hours . Work in a way that works for you We recognize that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Working flexible hours - flexing the times when you work in the day to help you fit everything in and work when you are the most productive. Occasionally working remotely from home or any other work location Working with us Our people are at the heart of what we do at Baker Hughes. We know we are better when all of our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other. Working for you Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we have to push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect: Contemporary work-life balance policies and wellbeing activities Comprehensive private medical care options Safety net of life insurance and disability programs Tailored financial programs Additional elected or voluntary benefits
Posted 1 month ago
5.0 - 10.0 years
9 - 14 Lacs
Mumbai, Hyderabad, Pune
Work from Office
As an Event Triage Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Senior Cybersecurity Event Triage Analyst You will be responsible for: Actively monitor and analyze cybersecurity events from various sources. Use analytical skills to identify, assess, and understand potential security incidents and trends. Playing a key role in the incident response process, focusing on the analysis and interpretation of threat data to guide response actions. Leveraging threat intelligence to enhance the understanding of potential security threats and inform the organizations cybersecurity posture. Preparing clear and detailed reports on security findings and trends. Communicate effectively with both technical and non-technical stakeholders. Ensuring adherence to regulatory standards and best practices in cybersecurity event analysis and reporting. Keeping abreast of the latest cybersecurity trends, threats, and technologies to continuously enhance analysis capabilities. Required Qualifications Have Bachelor s degree in Cybersecurity, Information Technology, or a related field Have Technical Skills: Strong analytical skills in cybersecurity. In-depth knowledge of various Cloud security concepts, EDR, SIEM, and SOAR, and experience with responding to complex cybersecurity incidents is desirable. Have Certifications: Relevant certifications such as CompTIA Security+, CEH, GCIH, or similar are advantageous. Have Experience: 5+ years of SOC experience with focus on security event analysis and incident response is advantageous. Have a Communication Skills: Excellent verbal and written communication skills. Have Time Flexibility: This position may require working non-traditional hours .
Posted 1 month ago
3.0 - 8.0 years
8 - 12 Lacs
Mumbai, Hyderabad, Pune
Work from Office
As an Event Triage Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Cybersecurity Event Triage Analyst You will be responsible for: Actively monitor and analyze cybersecurity events from various sources. Use analytical skills to identify, assess, and understand potential security incidents and trends. Playing a key role in the incident response process, focusing on the analysis and interpretation of threat data to guide response actions. Leveraging threat intelligence to enhance the understanding of potential security threats and inform the organizations cybersecurity posture. Preparing clear and detailed reports on security findings and trends. Communicate effectively with both technical and non-technical stakeholders. Ensuring adherence to regulatory standards and best practices in cybersecurity event analysis and reporting. Keeping abreast of the latest cybersecurity trends, threats, and technologies to continuously enhance analysis capabilities. Fuel your passion To be successful in this role you will: Have bachelor s degree in Cybersecurity, Information Technology, or related field, or equivalent experience. Have 3+ years of experience in cybersecurity, with a focus on security event analysis and incident response to complex cybersecurity incidents. Demonstrate knowledge of EDR, SIEM, SOAR and Cloud Security concepts. Have SOC experience . Have Certifications: Relevant certifications such as CompTIA Security+, CEH, GCIH, or similar are advantageous. Have solid verbal and written communication and team collaboration skills. Have Demonstrate problem solving skills and attention to detail, especially in event analysis and incident documentation. Have Demonstrate track record in staying updated with latest in cybersecurity, to continuously develop professional skills.
Posted 1 month ago
7.0 - 10.0 years
7 - 11 Lacs
Mumbai, Nagpur, Thane
Work from Office
Find what drives you on a team with a more than 75-year history of discovery, determination, and innovation. As a global leader in high-tech filtration, separation, and purification, Pall Corporation thrives on helping our customers solve their toughest challenges. Our products serve diverse, global customer needs across a wide range of applications to advance health, safety and environmentally responsible technologies. For the exponentially curious, Pall is a place you can thrive and amplify your impact on the world. Pall is one of 10 Life Sciences companies of Danaher. Together, we accelerate the discovery, development and delivery of solutions that safeguard and improve human health. Learn about the Danaher Business System which makes everything possible. The role of the requested candidate is for the position of SAP GRC Access Control and is responsible for the analysis, design, configuration, and support of the SAP GRC area to meet the user access and security needs of PALL Corporation. As an Authorization GRC Specialist, your goal is to timely handle requests of Business SAP Security - Users and authorization management with focus on GRC module enhancements via BRF+. This position is part of the IT Infrastructure team and will be located in Pune, India. This role will perform the following : SAP authorization concepts, including role design (Single/Composite/Derived roles), securing custom transactions, maintaining SU24, and ensuring compliance with SOX and IT general controls. SAP security across modules and Basis components, including ECC and S/4. Familiarity with at least one S/4 implementation cycle, along with GRC Access Control configuration (10/10.1/12), BRF+, and SAP GRC AC components (ARA, EAM, ARM, BRM). D eveloping and maintaining SAP roles to ensure Segregation of Duties, clear access controls, and adherence to security and audit requirements. Good understanding of SOX requirements and develop standard work in security space to enforce SOX standards. Participates in audits (SOX and others) and enforces effective control and monitoring processes. Thorough understanding of business processes and dependencies between SAP modules and systems, working cross-functionally with teams (Functional, Developers, BASIS) to support user access needs, issue resolution, and system monitoring. Develop and refines security processes, assists in testing and implementing system changes, and contributes to documentation, blueprinting, and user requirements gathering to enhance security efficiency and compliance. The essential qualifications of the job include: Bachelor s degree (prefer Computer Science or related field) 7+ years of SAP experience with SAP authorizations (ERP and HANA) as a consultant or worked in a customer facing environment (Internal or External) with at least 2 years of SAP GRC in Access control (12.x) Understanding of Business Rule Framework, BRF+. Knowledge and experience of initial GRC Access Control 10/10.1/12 configuration, knowledge and experience of configuring SAP GRC AC Components (ARA, EAM, ARM, BRM) Experience of working with Internal and External Audit - SAP security audit skills. Knowledge of SAP Public Cloud security integration (SAP BTP) and access risks. It would be a plus if you also possess previous experience in: Exposure to ITIL Framework. Understands and applies Best Practice methodologies and procedures. Awareness of Information Security principles. Pall Corporation, a Danaher company, offers a broad array of comprehensive, competitive benefit programs that add value to our lives. Whether it s a health care program or paid time off, our programs contribute to life beyond the job. Check out our benefits at danaherbenefitsinfo.com . This job is also eligible for bonus/incentive pay. Note: No amount of pay is considered to be wages or compensation until such amount is earned, vested, and determinable. The amount and availability of any bonus, commission, benefits, or any other form of compensation and benefits that are allocable to a particular employee remains in the Companys sole discretion unless and until paid and may be modified at the Company s sole discretion, consistent with the law. Join our winning team today. Together, we ll accelerate the real-life impact of tomorrow s science and technology. We partner with customers across the globe to help them solve their most complex challenges, architecting solutions that bring the power of science to life. For more information, visit www.danaher.com . At Danaher, we value diversity and the existence of similarities and differences, both visible and not, found in our workforce, workplace and throughout the markets we serve. Our associates, customers and shareholders contribute unique and different perspectives as a result of these diverse attributes.
Posted 1 month ago
4.0 - 9.0 years
6 - 11 Lacs
Bengaluru
Work from Office
Why This Role Matters We re looking for a driven DevOps Engineer to help scale and secure our infrastructure while enabling faster, more reliable software delivery. You ll play a key role in building automated, resilient systems and optimizing development workflows. If you re passionate about automation, cloud architecture, and continuous delivery we want to hear from you! The Hats You Will Wear Build and manage CI/CD pipelines to support fast and stable deployments. Automate infrastructure using tools like Terraform or Ansible. Maintain and optimize cloud environments (AWS/GCP/Azure) for performance and cost. Monitor system health and respond to incidents proactively. Work with engineering teams to improve release processes and deployment practices. The Perfect Fit 4+ years of experience in DevOps or infrastructure roles. Proficient in CI/CD tools (e.g., Jenkins, GitLab CI) and scripting (Python, Bash). Hands-on experience with Docker, Kubernetes, and cloud platforms. Familiar with infrastructure-as-code and system monitoring tools. Strong troubleshooting skills and a collaborative mindset. Your Edge Over the Rest AWS or Kubernetes certifications. Experience in fintech or B2B SaaS environments. Knowledge of GitOps, service meshes, or advanced cloud security practices.
Posted 1 month ago
7.0 - 12.0 years
20 - 35 Lacs
Hyderabad, Chennai, Bengaluru
Work from Office
Job Title: ============ Cyber Security Lead - BFSI Domain Job Location: -- Multiple Locations =============== Dubai - UAE Riyadh - Saudi Doha - Qatar Monthly Salary: ============= AED 10,000 - AED 15,000 per month [ Full TAX FREE Salary - Depending on Experience ] Type of job: ========= In office only, NO remote Project Duration: ============= 2 Years Desired Experience Level: ==================== 6- 10 Years Overall 5 Years or above Cyber security Experience Solid 5 Years or above with Cyber Security as Software Consultant Resposibilities ==================== Conducting audits to determine security violations or vulnerabilities Implementing security controls Upgrading networks to cohere with industry best practices Researching, testing, and implementing security technology Developing firewalls for network infrastructure Granting privileges to users based on their needs and use cases Monitoring network traffic for security incidents and events Investigating incidents and responding to events in real time You must be working as Cyber Security Consultant [ mandatory ] Certifications: =========== Any cyber security certificated is added for advantage No.of positions: ============== 03 Benefits: ======= - Long term (18 Months) Project - Good Salary - Full Tax Free Salary Job Ref code: ============ BFSI_CYBER_SEC_0525 Email: ===== spectrumconsulting1977@gmail.com ============================= If you are interested, please email your CV as ATTACHMENT with job ref. code [ BFSI_CYBER_SEC_0525 ] as subject
Posted 1 month ago
8.0 - 11.0 years
35 - 37 Lacs
Kolkata, Ahmedabad, Bengaluru
Work from Office
Dear Candidate, Were hiring a Cloud DevSecOps Engineer to embed security practices into DevOps pipelines and cloud environments. Key Responsibilities: Automate security testing in CI/CD. Implement policies for secrets management and compliance. Monitor for vulnerabilities and misconfigurations. Required Skills & Qualifications: Experience with tools like Aqua, Snyk, or Prisma Cloud. Deep knowledge of cloud IAM and encryption. Strong scripting and automation skills. Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Reddy Delivery Manager Integra Technologies
Posted 1 month ago
4.0 - 7.0 years
20 - 25 Lacs
Pune
Hybrid
Role Synopsis: BP has embarked on an ambitious plan and transform using digital technologies to drive efficiency, effectiveness, and new business models. The Information Security Engineer is responsible for delivering information security and risk activities. Using technical capabilities, you will lead changes to security processes and procedures, fix sophisticated security issues, review security architectures and manage security solutions from identification to implementation. You will see that we follow policies, standards and standard practices and provide technical expertise to collaborators. Its a chance to operate in a sophisticated and delivery-focused environment, with the resources of one of the world's most forward-thinking IT departments and leading IT vendors at your fingertips. Security Engineering Specialist builds, develops with active hands-on engagement in the continuous improvement of security engineering practises and the quality of Cyber advice, mentorship and standards used across bp. An SME in the AWS Security Engineering space for architecting and maintaining multiple AWS Products and their automation deployments. You are required to conduct security related architecture reviews based on standard methodology frameworks such as AWS Well Architected framework, conduct risk reviews In-depth knowledge of CICD process / Secure coding standard methodologies / experience of automation and development tooling such as ADO, GIT, AWS Code Pipeline and most significantly has the ability to learn other tools The successful candidate should be prepared to work in a sophisticated work environment with changing priorities and related work engagements You will work within an agile delivery squad directly contacting our customers, development teams, business product owners and 3rd party vendors. Key Accountabilities : Team: You will provide decent support in day to day InfoSec risk activities specific to your specialism. This could involve designing and developing security solutions to work across BP IT environments that are consistent with current policy; running investigations and incident response processes and providing a consistent response to cyber-based malicious activity; and acting as a work with various teams with information security in their segment/functions etc. You will drive the implementation and application of relevant operating processes and procedures, and ensure all activities follow relevant standards. You will also manage outreach for the wider Security Engineering Function to support them in Technology adoption. Relationships : You will develop and manage relationships with collaborators, delivering decent technical knowledge to support project delivery, identify key challenges and ensure that security solutions protect BP against cyber risks. You will be mentoring/training to members of within the team as well as consumers of AWS security services. You will also work across Security Engineering & Enterprise AliCloud Squads and other teams to align and optimize activities and provide backup as vital for incidents and projects. Technology: You will build awareness of internal and external technology developments, handling the delivery of process and system improvements, identifying, and implementing continuous improvement plans for the specialisation and ensuring standard methodology is shared across the team. Safety and Compliance: The safety of our people and customers is our highest priority. We provide a culture of operational safety and ensure our architectures, designs and processes enhance and improve our digital security. Required Skills:- Deep hands-on knowledge of Cloud Security Center, cloud firewall, WAF and other Security products in AWS. (AWS certification preferable) AWS CLI scripting. (Scripting: Python, Bash, PowerShell, Ruby, Lambda (NodeJS / Python) Detailed knowledge of Infrastructure as code: - ADO pipelines, Terraform, cloud automation and resource orchestration. Good understanding and hands-on implementation of Resource Access Management (RAM) and integration with industry identity providers. Demonstrate knowledge of Incident Management, Problem Management and Relationship Management Required Criteria / Experience Demonstrated ability with 4 years of experience in Architect technical solutions within AWS platform to improve the overall security posture. Develop and deploy security solutions using CloudFormation, terraform and other languages to automate the security capability within the platform using automation. Mentor and advice to the overall platform and customers regarding security risks by performing regular risk assessments, threat modelling and security testing. Develop Security knowledge base by publishing AWS security standards, architectural patterns to assist customers in developing secure solutions in the platform. Lead and support the security operations role to ensure operational responsibilities are met to secure the platform with formal reporting to Security Principal. Liaise with Cloud Security Engineering, Security Architecture, Enterprise architecture and Compute platform to ensure alignment to global standards. Support and respond to platform-based security incidents in a timely manner and support to the CTI and SoC where needed. Develop the security roadmap for future requirements for improvement of existing security capabilities and new capabilities to defend against new threats.
Posted 1 month ago
5.0 - 7.0 years
12 - 15 Lacs
Pune
Work from Office
Role Overview We are looking for experienced DevOps Engineers (4+ years) with a strong background in cloud infrastructure, automation, and CI/CD processes. The ideal candidate will have hands-on experience in building, deploying, and maintaining cloud solutions using Infrastructure-as-Code (IaC) best practices. The role requires expertise in containerization, cloud security, networking, and monitoring tools to optimize and scale enterprise-level applications. Key Responsibilities Design, implement, and manage cloud infrastructure solutions on AWS, Azure, or GCP . Develop and maintain Infrastructure-as-Code (IaC) using Terraform, CloudFormation, or similar tools. Implement and manage CI/CD pipelines using tools like GitHub Actions, Jenkins, GitLab CI/CD, BitBucket Pipelines, or AWS CodePipeline . Manage and orchestrate containers using Kubernetes, OpenShift, AWS EKS, AWS ECS, and Docker . Work on cloud migrations , helping organizations transition from on-premises data centers to cloud-based infrastructure. Ensure system security and compliance with industry standards such as SOC 2, PCI, HIPAA, GDPR, and HITRUST . Set up and optimize monitoring, logging, and alerting using tools like Datadog, Dynatrace, AWS CloudWatch, Prometheus, ELK, or Splunk . Automate deployment, configuration, and management of cloud-native applications using Ansible, Chef, Puppet, or similar configuration management tools . Troubleshoot complex networking, Linux/Windows server issues , and cloud-related performance bottlenecks. Collaborate with development, security, and operations teams to streamline the DevSecOps process. Must-Have Skills 3 + years of experience in DevOps, cloud infrastructure, or platform engineering. Expertise in at least one major cloud provider : AWS, Azure, or GCP . Strong experience with Kubernetes, ECS, OpenShift , and container orchestration technologies. Hands-on experience in Infrastructure-as-Code (IaC) using Terraform, AWS CloudFormation, or similar tools . Proficiency in scripting/programming languages like Python, Bash, or PowerShell for automation. Strong knowledge of CI/CD tools such as Jenkins, GitHub Actions, GitLab CI/CD, or BitBucket Pipelines . Experience with Linux operating systems (RHEL, SUSE, Ubuntu, Amazon Linux) and Windows Server administration . Expertise in networking (VPCs, Subnets, Load Balancing, Security Groups, Firewalls) . Experience in log management and monitoring tools like Datadog, CloudWatch, Prometheus, ELK, Dynatrace . Strong communication skills to work with cross-functional teams and external customers. Knowledge of Cloud Security best practices, including IAM, WAF, GuardDuty, CVE scanning, vulnerability management . Good-to-Have Skills Knowledge of cloud-native security solutions (AWS Security Hub, Azure Security Center, Google Security Command Center). Experience in compliance frameworks (SOC 2, PCI, HIPAA, GDPR, HITRUST). Exposure to Windows Server administration alongside Linux environments. Familiarity with centralized logging solutions (Splunk, Fluentd, AWS OpenSearch). GitOps experience with tools like ArgoCD or Flux . Background in penetration testing, intrusion detection, and vulnerability scanning . Experience in cost optimization strategies for cloud infrastructure. Passion for mentoring teams and sharing DevOps best practices.
Posted 1 month ago
4 - 5 years
5 - 7 Lacs
Hyderabad, Chennai, Bengaluru
Work from Office
Role & responsibilities Hands-on experience with implementation of Microsoft DLP technology across a large enterprise Experience in DLP security solutions covering DLP Endpoint, Discover, Web & Email. Design and implementation of AIP solution Expertise on design and implementation of Sensitivity labels, DLP policies Expertise in Cloud Data Protection using MCAS Expertise in configuration of AIP Scanner Expertise in Discovery and Classification of data across repositories using AIP solution Expertise to fine-tune DLP, AIP and MCAS policies to reduce false detection Provide advice on Data Secuirty compliance and regulations to reduce risk. Administration of the DLP tools to include configuration of policies, upgrading, patching etc. Experience to troubleshoot Microsoft DLP, AIP and MCAS issues Monitor and respond to alerts generated from the Microsoft DLP, AIP & MCAS technologies. Understand and follow the incident response process through event escalations. Collaborate with business groups to help them identify, classify and secure high value data. Implementation of proactive measures to enhance accuracy and effectiveness of Data Security tools. Create, review, maintain and update documentation including Documenting & Publishing fixes in central knowledge base. Work with global teams to provide consistent processes and solutions. Excellent presentation and written communication skills with strong interpersonal skills Good understanding on cloud security concepts Good understanding of organizational network architecture Experience in maintaining various metrices and SLAs
Posted 1 month ago
3 - 4 years
3 - 4 Lacs
Bengaluru
Work from Office
locationsBangalore RMZ-ECO WORLDposted onPosted Yesterday time left to applyEnd DateJune 14, 2025 (28 days left to apply) job requisition idR177746 , India Job Family Group: Information Technology (IT) Worker Type: Regular Posting Start Date: May 15, 2025 Business unit: Projects and Technology Experience Level Experienced Professionals About The Role Whats the role As a Cyber Threat Prevention Advisor in the CyberDefence SecOps team, you'll join the Vulnerability team to manage and oversee vulnerability processes, ensuring they are trackable and measurable with robust tool support. Your team will lead the implementation of these processes within ServiceNow Security Operations (SecOps), establishing standard workflows and integrating them with IT service management processes executed by Line of Defence 1 within IRM. This role leverages market-standard tools and practices to streamline the architecture by reducing dependency on Collective. What youll be doing Asset Discovery: Set-up and lead adequate discovery of new Shell IT assets in Shell's legacy IT network, RES & Portfolio companies, Cloud environments and PCD and Retail environments. Ensure visibility in new areas such as Internet of Things and Cloud and investigate possibilities to keep track of IT assets. Automated Vulnerability Scanning: Maintain a portfolio of tools for automated vulnerability scanning with a focus on Business-Critical systems and systems that are available from the public Internet. Set-up regular scanning and make results available for further analytics in IRM investigation platform. Take appropriate action on vulnerabilities where required. Security Posture Reporting: Use the results from asset discovery, vulnerability scanning, penetration testing and attack simulation to provide an overview of vulnerabilities in Shell IT landscapes for different stakeholders including IRM LT and IDSO LT. Create specific reports for Business, Business Critical applications, IDSO service lines, External perimeters etc. Act as a Subject Matter Expert on implications of a vulnerability in an IT system and establishing the priority of applying security patches. Help creating prioritized overviews of Cyber vulnerabilities and putting these in a context of IT services and Business applications. Take mitigating actions coming out of identified threats or vulnerabilities either directly by the team or agree the actions with other parties in Shell. What you bring Bachelors degree in Computer Science, Information Technology, or related field 5-8 years of total experience in IT Security including at least 3-4 years of experience in Vulnerability Assessment Proficient in analysing network traffic using tools such as tcpdump or wireshark Strong experience in using open-source scanning tools such as nmap, nessus, metasploit and/or commercial tools such as Rapid7 or Qualys Knowledge in integrating Vulnerability Management into modern CI/CD Pipelines with 'shift-left' strategy Understanding of Network Security, Cloud Security, Endpoint Security, Application Security Understanding Cyber Threat Landscape and analyzing Threats from various sources. Assess new threats, rate threat per Shell ratings and collaborate with Threat team on new threat criticality Understanding of CVE id / CVSS score and metrics Familiar with application of Cybersecurity Benchmarks, NIST controls, PCI controls Lead security research proposals and Proof Of Concepts for Emerging Technologies and assessing Fit-For-Purpose Tools. Understanding of Cloud Security Posture Management (CSPM) Expertise in operating Application security tools like Rapid7 Appspider, Netsparker Knowledge on CI/CD pipeline able to understand the integration of security tools and guide the developers Understanding of Application security design and providing guidance to developers on secure design. Good understating of SAST/DAST concepts and process Knowledge of Mobile DAST scanning and vulnerabilities and remediation consultation Knowledge of Splunk, SecOps VR, basic querying and creating dashboards Additional Skills (Good to have): PCI-DSS Compliance Scan. SecOps VR Module in ServiceNow. Linux environment experience. Azure/AWS Cloud Console. Wiz.io tool knowledge. Advanced Splunk skills. What we offer You bring your skills and experience to Shell and in return you work with talented, committed people on one of the most important challenges facing our planet. Youll have the opportunity to develop the skills you need to grow in an environment where we value honesty, integrity, and respect for one another. Youll be able to balance your priorities as you become the best version of yourself. Progress as a person as we work on the energy transition together. Continuously grow the transferable skills you need to get ahead. Work at the forefront of technology, trends, and practices. Collaborate with experienced colleagues with unique expertise. Achieve your balance in a values-led culture that encourages you to be the best version of yourself. Benefit from flexible working hours, and the possibility of remote/mobile working. Perform at your best with a competitive starting salary and annual performance related salary increase our pay and benefits packages are considered to be among the best in the world. Take advantage of paid parental leave, including for non-birthing parents. Join an organisation working to become one of the most diverse and inclusive in the world. We strongly encourage applicants of all genders, ages, ethnicities, cultures, abilities, sexual orientation, and life experiences to apply. Grow as you progress through diverse career opportunities in national and international teams. Gain access to a wide range of training and development programmes. We'd like you to know that Shell has a > click here . - Shell in India Shell is a diversified energy company in India with 13,000 employees, and presence in Integrated Gas, Downstream, Power, Renewable and Upstream. Additionally, we have deep capabilities in R&D, digitalisation, and business operations. Our global strategy, Powering Progress, is designed to generate value for our shareholders, customers, and the wider society, and focuses on creating more value with less emissions. The strategy supports our purpose of providing more and cleaner energy solutions, with the aim of profitably transforming Shell into a net-zero emissions energy business by 2050. As India moves towards its target of net-zero emissions by 2070, Shell India aims to play a leading role in securing vital energy for today, while investing in, and helping to build, the energy system of the future through strategic investments in the country. Our Lubricants business serves over 50,000 consumers through a strong network of over 200 distributors, and operates an end-to-end value chain that spans conceptualization, development, and production at a world-class blending plant at Taloja. Through our 350-plus retail stations, we offer an integrated mobility experience including fuels, cafes, and convenience stores, with a prominent network of EV recharging facilities. Shell owns and operates a LNG re-gasification terminal at Hazira, Surat, with a capacity of 5 MTPA and a LNG truck-loading unit that plays a crucial role in helping meet Indias growing demand for gas across sectors. In 2022, Shell acquired Sprng Energy in a $1.55 billion deal to build an integrated energy transition business in the country. Sprng is a leading renewable energy company in India which develops and manages solar, wind, and hybrid power generation facilities and infrastructure. Our three capability centres across Bangalore and Chennai serve as a technology and innovation powerhouse for Shell globally, working as a delivery engine for core technical, digital, and finance processespioneering digital innovation and cutting-edge technologies across the energy sector. We also have strong academic partnerships and collaborations with leading universities and technology institutes to accelerate decarbonization efforts within the energy sector. We are committed to positively contributing to the communities in which we operate through programmes on STEM Education, Skilling, and Livelihood across India. We nurture and invest in startups developing initiatives focused on accelerating energy innovation through programs such as Shell E4 and Shell Eco-marathon. We also have strategic investments in new energy companies such as Husk Power, d.light, Orb Energy, and Cleantech Solar. DISCLAIMER: Please noteWe occasionally amend or withdraw Shell jobs and reserve the right to do so at any time, including prior to the advertised closing date. Before applying, you are advised to read our data protection policy. This policy describes the processing that may be associated with your personal data and informs you that your personal data may be transferred to Shell/Shell Group companies around the world. The Shell Group and its approved recruitment consultants will never ask you for a fee to process or consider your application for a career with Shell. Anyone who demands such a fee is not an authorised Shell representative and you are strongly advised to refuse any such demand. Shell is an Equal Opportunity Employer.
Posted 1 month ago
6 - 10 years
12 - 17 Lacs
Gurugram
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
6 - 10 years
12 - 17 Lacs
Pune
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
7 - 12 years
12 - 16 Lacs
Noida
Work from Office
Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : SailPoint IdentityNow Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities: Expected to be an SME. Collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Lead the planning and execution of security projects. Ensure project milestones are met within the defined timelines. Provide guidance and mentorship to team members. Professional & Technical Skills: Must To Have Skills: Proficiency in SailPoint IdentityNow. Strong understanding of identity and access management principles. Experience with security tools and technologies. Knowledge of security frameworks and regulations. Hands-on experience in implementing security solutions. Good To Have Skills: Experience with cloud security solutions. Additional Information: The candidate should have a minimum of 7.5 years of experience in SailPoint IdentityNow. This position is based at our Noida office. A 15 years full time education is required. Qualifications 15 years full time education
Posted 1 month ago
7 - 12 years
9 - 14 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities: Minimum of 4 years of SailPoint development experience in identity governance and administration, specifically with SailPoint IdentityIQ. Strong understanding of identity management concepts, user lifecycle processes, access governance, role-based access control, and compliance reporting. Experience in SailPoint lifecycle Manager, Compliance Manager and Access Governance modules Proficient in Java, Bean Shell/JavaScript, SQL, and web services (REST/SOAP). Experience in different types of connectors like Delimited File, JDBC, LDAP, AD and custom connectors. Experience in developing API services to handle access requests and integrate with various applications. Experience in onboarding applications to the SailPoint Identity IQ platform using native connectors and custom connectors and APIs. Excellent problem-solving skills, with the ability to analyze complex requirements and define technical/functional advanced solutions. Strong communication and interpersonal skills, with the ability to engage effectively with technical and non-technical stakeholders. Professional & Technical Skills: Must To Have Skills:Proficiency in SailPoint IdentityIQ Strong understanding of cloud security principles Experience in designing and implementing security solutions Knowledge of security technologies and tools Hands-on experience with security architecture design Familiarity with regulatory compliance standards Additional Information: The candidate should have a minimum of 7.5 years of experience in SailPoint IdentityIQ This position is based at our Bengaluru office A 15 years full time education is required Qualifications 15 years full time education
Posted 1 month ago
7 - 12 years
9 - 14 Lacs
Coimbatore
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Your typical day will involve designing and implementing security solutions, collaborating with cross-functional teams, and ensuring the integrity and confidentiality of data. Roles & Responsibilities: Expected to be an SME, collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Design and implement security solutions to protect the organization's cloud infrastructure. Collaborate with cross-functional teams to ensure the integrity and confidentiality of data. Conduct risk assessments and develop strategies to mitigate security risks. Stay up-to-date with the latest security trends and technologies. Ensure compliance with industry standards and regulations. Train and educate employees on security best practices. Professional & Technical Skills: Must To Have Skills:Proficiency in Security Architecture Design. Strong understanding of cloud security principles and best practices. Experience with cloud security technologies and tools. Knowledge of network security protocols and technologies. Familiarity with security frameworks and standards such as ISO 27001 and NIST. Good To Have Skills:Experience with cloud platforms such as AWS or Azure. Experience with security incident response and management. Knowledge of threat intelligence and vulnerability management. Understanding of identity and access management concepts. Solid grasp of encryption and cryptographic techniques. Additional Information: The candidate should have a minimum of 7.5 years of experience in Security Architecture Design. This position is based at our Mumbai office. A 15 years full time education is required. Qualifications 15 years full time education
Posted 1 month ago
12 - 15 years
12 - 17 Lacs
Pune
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Job Title - Azure Security Architect Experience - 12-15 years Technical Qualification/ Knowledge Hands-on knowledge on Azure security technologies and associated components and variations Azure Security Center, Azure Monitor, Log Analytics, Sentinel or any other SIEM integration Azure NetworkingVNET, Network Security Group (NSG), VNet peering, Azure Firewall Azure Storage Securitystorage accounts, managed disks, blobs, encryption at rest and in-transit, Azure KeyVault, Azure Active Directory, RBAC, MFA, SAML, Conditional Access, Managed Identity. Azure Load Balancers, WAF, Application Gateway, Availability Sets/Scale Sets Knowledgeable about Windows Operating System, Server hardening, Group Policies, event and log management Design, implement and support Microsoft Defender for O365 with Azure Information Protection and MS DLP for O365 and Endpoint Experience in deploying MDATP for Servers Experience with multiple security tools and technologies including Next-Gen Firewalls (Palo Alto), McAfee ePO, DLP, CrowdStrike, ZScaler, Vulnerability Assessment (Tenable.io) Ability to lead to troubleshooting of cloud security issues, detect and confirm anomalies, identify risks, perform root cause analysis Skilled in Graph API, Azure CLI / PowerShell automation experience Should be able to create, update, retry and delete Azure AD objects via PowerShell, Azure CLI Understanding of the Azure Subscription and Migration activities will be added advantages. Additional Qualifications and Experience Cloud Security certifications Microsoft certificationsAZ-900, AZ-500 , MS-900, MS-500, AZ-30X, SC200 – 300. Familiarity with Zero Trust principles
Posted 1 month ago
8 - 12 years
13 - 18 Lacs
Mumbai
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation??s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP??s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client??s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management. Experience>10 YEARS. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
8 - 10 years
12 - 17 Lacs
Hyderabad
Work from Office
About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
5 - 8 years
9 - 14 Lacs
Bengaluru
Work from Office
About The Role Role Purpose The purpose of the role is to support process delivery by ensuring daily performance of the Production Specialists, resolve technical escalations and develop technical capability within the Production Specialists. ? Do Oversee and support process by reviewing daily transactions on performance parameters Review performance dashboard and the scores for the team Support the team in improving performance parameters by providing technical support and process guidance Record, track, and document all queries received, problem-solving steps taken and total successful and unsuccessful resolutions Ensure standard processes and procedures are followed to resolve all client queries Resolve client queries as per the SLA’s defined in the contract Develop understanding of process/ product for the team members to facilitate better client interaction and troubleshooting Document and analyze call logs to spot most occurring trends to prevent future problems Identify red flags and escalate serious client issues to Team leader in cases of untimely resolution Ensure all product information and disclosures are given to clients before and after the call/email requests Avoids legal challenges by monitoring compliance with service agreements ? Handle technical escalations through effective diagnosis and troubleshooting of client queries Manage and resolve technical roadblocks/ escalations as per SLA and quality requirements If unable to resolve the issues, timely escalate the issues to TA & SES Provide product support and resolution to clients by performing a question diagnosis while guiding users through step-by-step solutions Troubleshoot all client queries in a user-friendly, courteous and professional manner Offer alternative solutions to clients (where appropriate) with the objective of retaining customers’ and clients’ business Organize ideas and effectively communicate oral messages appropriate to listeners and situations Follow up and make scheduled call backs to customers to record feedback and ensure compliance to contract SLA’s ? Build people capability to ensure operational excellence and maintain superior customer service levels of the existing account/client Mentor and guide Production Specialists on improving technical knowledge Collate trainings to be conducted as triage to bridge the skill gaps identified through interviews with the Production Specialist Develop and conduct trainings (Triages) within products for production specialist as per target Inform client about the triages being conducted Undertake product trainings to stay current with product features, changes and updates Enroll in product specific and any other trainings per client requirements/recommendations Identify and document most common problems and recommend appropriate resolutions to the team Update job knowledge by participating in self learning opportunities and maintaining personal networks ? Deliver NoPerformance ParameterMeasure1ProcessNo. of cases resolved per day, compliance to process and quality standards, meeting process level SLAs, Pulse score, Customer feedback, NSAT/ ESAT2Team ManagementProductivity, efficiency, absenteeism3Capability developmentTriages completed, Technical Test performance Mandatory Skills: Cloud Security Engineering. Experience5-8 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6462 Jobs | Ahmedabad
Amazon
6351 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane