Jobs
Interviews

1383 Cloud Security Jobs - Page 49

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 8.0 years

3 - 7 Lacs

Mumbai, Hyderabad, Pune

Work from Office

Cybersecurity Event Triage Analyst Do you like working on identifying and preventing potential cybersecurity risks? Are you ready for the next step in your career? Join our Digital Technology Team! Our Digital Technology business provides intelligent, connected technologies to monitor and control our energy extraction assets. We provide customers with the peace of mind needed to reliably and efficiently improve their operations. Our team creates business value through continuous improvement in up-time, resilience, performance, time to market, security and compliance Partner with the best As an Event Triage Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Cybersecurity Event Triage Analyst You will be responsible for: Actively monitor and analyze cybersecurity events from various sources. Use analytical skills to identify, assess, and understand potential security incidents and trends. Playing a key role in the incident response process, focusing on the analysis and interpretation of threat data to guide response actions. Leveraging threat intelligence to enhance the understanding of potential security threats and inform the organizations cybersecurity posture. Preparing clear and detailed reports on security findings and trends. Communicate effectively with both technical and non-technical stakeholders. Ensuring adherence to regulatory standards and best practices in cybersecurity event analysis and reporting. Keeping abreast of the latest cybersecurity trends, threats, and technologies to continuously enhance analysis capabilities. Fuel your passion To be successful in this role you will: Have bachelor s degree in Cybersecurity, Information Technology, or related field, or equivalent experience. Have 3+ years of experience in cybersecurity, with a focus on security event analysis and incident response to complex cybersecurity incidents. Demonstrate knowledge of EDR, SIEM, SOAR and Cloud Security concepts. Have SOC experience . Have Certifications: Relevant certifications such as CompTIA Security+, CEH, GCIH, or similar are advantageous. Have solid verbal and written communication and team collaboration skills. Have Demonstrate problem solving skills and attention to detail, especially in event analysis and incident documentation. Have Demonstrate track record in staying updated with latest in cybersecurity, to continuously develop professional skills. Work in a way that works for you We recognize that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Working flexible hours - flexing the times when you work in the day to help you fit everything in and work when you are the most productive. Occasionally working remotely from home or any other work location Working with us Our people are at the heart of what we do at Baker Hughes. We know we are better when all of our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other. Working for you Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we have to push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect: Contemporary work-life balance policies and wellbeing activities Comprehensive private medical care options Safety net of life insurance and disability programs Tailored financial programs Additional elected or voluntary benefits

Posted 1 month ago

Apply

5.0 - 10.0 years

4 - 8 Lacs

Mumbai, Hyderabad, Pune

Work from Office

Senior Cybersecurity Event Triage Analyst Do you like working on identifying and preventing potential cybersecurity risks? Are you ready for the next step in your career? Join our Digital Technology Team! Our Digital Technology business provides intelligent, connected technologies to monitor and control our energy extraction assets. We provide customers with the peace of mind needed to reliably and efficiently improve their operations. Our team creates business value through continuous improvement in up-time, resilience, performance, time to market, security and compliance Partner with the best As an Event Triage Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Senior Cybersecurity Event Triage Analyst You will be responsible for: Actively monitor and analyze cybersecurity events from various sources. Use analytical skills to identify, assess, and understand potential security incidents and trends. Playing a key role in the incident response process, focusing on the analysis and interpretation of threat data to guide response actions. Leveraging threat intelligence to enhance the understanding of potential security threats and inform the organizations cybersecurity posture. Preparing clear and detailed reports on security findings and trends. Communicate effectively with both technical and non-technical stakeholders. Ensuring adherence to regulatory standards and best practices in cybersecurity event analysis and reporting. Keeping abreast of the latest cybersecurity trends, threats, and technologies to continuously enhance analysis capabilities. Required Qualifications Have Bachelor s degree in Cybersecurity, Information Technology, or a related field Have Technical Skills: Strong analytical skills in cybersecurity. In-depth knowledge of various Cloud security concepts, EDR, SIEM, and SOAR, and experience with responding to complex cybersecurity incidents is desirable. Have Certifications: Relevant certifications such as CompTIA Security+, CEH, GCIH, or similar are advantageous. Have Experience: 5+ years of SOC experience with focus on security event analysis and incident response is advantageous. Have a Communication Skills: Excellent verbal and written communication skills. Have Time Flexibility: This position may require working non-traditional hours . Work in a way that works for you We recognize that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Working flexible hours - flexing the times when you work in the day to help you fit everything in and work when you are the most productive. Occasionally working remotely from home or any other work location Working with us Our people are at the heart of what we do at Baker Hughes. We know we are better when all of our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other. Working for you Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we have to push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect: Contemporary work-life balance policies and wellbeing activities Comprehensive private medical care options Safety net of life insurance and disability programs Tailored financial programs Additional elected or voluntary benefits

Posted 1 month ago

Apply

5.0 - 10.0 years

9 - 14 Lacs

Mumbai, Hyderabad, Pune

Work from Office

As an Event Triage Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Senior Cybersecurity Event Triage Analyst You will be responsible for: Actively monitor and analyze cybersecurity events from various sources. Use analytical skills to identify, assess, and understand potential security incidents and trends. Playing a key role in the incident response process, focusing on the analysis and interpretation of threat data to guide response actions. Leveraging threat intelligence to enhance the understanding of potential security threats and inform the organizations cybersecurity posture. Preparing clear and detailed reports on security findings and trends. Communicate effectively with both technical and non-technical stakeholders. Ensuring adherence to regulatory standards and best practices in cybersecurity event analysis and reporting. Keeping abreast of the latest cybersecurity trends, threats, and technologies to continuously enhance analysis capabilities. Required Qualifications Have Bachelor s degree in Cybersecurity, Information Technology, or a related field Have Technical Skills: Strong analytical skills in cybersecurity. In-depth knowledge of various Cloud security concepts, EDR, SIEM, and SOAR, and experience with responding to complex cybersecurity incidents is desirable. Have Certifications: Relevant certifications such as CompTIA Security+, CEH, GCIH, or similar are advantageous. Have Experience: 5+ years of SOC experience with focus on security event analysis and incident response is advantageous. Have a Communication Skills: Excellent verbal and written communication skills. Have Time Flexibility: This position may require working non-traditional hours .

Posted 1 month ago

Apply

3.0 - 8.0 years

8 - 12 Lacs

Mumbai, Hyderabad, Pune

Work from Office

As an Event Triage Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Cybersecurity Event Triage Analyst You will be responsible for: Actively monitor and analyze cybersecurity events from various sources. Use analytical skills to identify, assess, and understand potential security incidents and trends. Playing a key role in the incident response process, focusing on the analysis and interpretation of threat data to guide response actions. Leveraging threat intelligence to enhance the understanding of potential security threats and inform the organizations cybersecurity posture. Preparing clear and detailed reports on security findings and trends. Communicate effectively with both technical and non-technical stakeholders. Ensuring adherence to regulatory standards and best practices in cybersecurity event analysis and reporting. Keeping abreast of the latest cybersecurity trends, threats, and technologies to continuously enhance analysis capabilities. Fuel your passion To be successful in this role you will: Have bachelor s degree in Cybersecurity, Information Technology, or related field, or equivalent experience. Have 3+ years of experience in cybersecurity, with a focus on security event analysis and incident response to complex cybersecurity incidents. Demonstrate knowledge of EDR, SIEM, SOAR and Cloud Security concepts. Have SOC experience . Have Certifications: Relevant certifications such as CompTIA Security+, CEH, GCIH, or similar are advantageous. Have solid verbal and written communication and team collaboration skills. Have Demonstrate problem solving skills and attention to detail, especially in event analysis and incident documentation. Have Demonstrate track record in staying updated with latest in cybersecurity, to continuously develop professional skills.

Posted 1 month ago

Apply

7.0 - 10.0 years

7 - 11 Lacs

Mumbai, Nagpur, Thane

Work from Office

Find what drives you on a team with a more than 75-year history of discovery, determination, and innovation. As a global leader in high-tech filtration, separation, and purification, Pall Corporation thrives on helping our customers solve their toughest challenges. Our products serve diverse, global customer needs across a wide range of applications to advance health, safety and environmentally responsible technologies. For the exponentially curious, Pall is a place you can thrive and amplify your impact on the world. Pall is one of 10 Life Sciences companies of Danaher. Together, we accelerate the discovery, development and delivery of solutions that safeguard and improve human health. Learn about the Danaher Business System which makes everything possible. The role of the requested candidate is for the position of SAP GRC Access Control and is responsible for the analysis, design, configuration, and support of the SAP GRC area to meet the user access and security needs of PALL Corporation. As an Authorization GRC Specialist, your goal is to timely handle requests of Business SAP Security - Users and authorization management with focus on GRC module enhancements via BRF+. This position is part of the IT Infrastructure team and will be located in Pune, India. This role will perform the following : SAP authorization concepts, including role design (Single/Composite/Derived roles), securing custom transactions, maintaining SU24, and ensuring compliance with SOX and IT general controls. SAP security across modules and Basis components, including ECC and S/4. Familiarity with at least one S/4 implementation cycle, along with GRC Access Control configuration (10/10.1/12), BRF+, and SAP GRC AC components (ARA, EAM, ARM, BRM). D eveloping and maintaining SAP roles to ensure Segregation of Duties, clear access controls, and adherence to security and audit requirements. Good understanding of SOX requirements and develop standard work in security space to enforce SOX standards. Participates in audits (SOX and others) and enforces effective control and monitoring processes. Thorough understanding of business processes and dependencies between SAP modules and systems, working cross-functionally with teams (Functional, Developers, BASIS) to support user access needs, issue resolution, and system monitoring. Develop and refines security processes, assists in testing and implementing system changes, and contributes to documentation, blueprinting, and user requirements gathering to enhance security efficiency and compliance. The essential qualifications of the job include: Bachelor s degree (prefer Computer Science or related field) 7+ years of SAP experience with SAP authorizations (ERP and HANA) as a consultant or worked in a customer facing environment (Internal or External) with at least 2 years of SAP GRC in Access control (12.x) Understanding of Business Rule Framework, BRF+. Knowledge and experience of initial GRC Access Control 10/10.1/12 configuration, knowledge and experience of configuring SAP GRC AC Components (ARA, EAM, ARM, BRM) Experience of working with Internal and External Audit - SAP security audit skills. Knowledge of SAP Public Cloud security integration (SAP BTP) and access risks. It would be a plus if you also possess previous experience in: Exposure to ITIL Framework. Understands and applies Best Practice methodologies and procedures. Awareness of Information Security principles. Pall Corporation, a Danaher company, offers a broad array of comprehensive, competitive benefit programs that add value to our lives. Whether it s a health care program or paid time off, our programs contribute to life beyond the job. Check out our benefits at danaherbenefitsinfo.com . This job is also eligible for bonus/incentive pay. Note: No amount of pay is considered to be wages or compensation until such amount is earned, vested, and determinable. The amount and availability of any bonus, commission, benefits, or any other form of compensation and benefits that are allocable to a particular employee remains in the Companys sole discretion unless and until paid and may be modified at the Company s sole discretion, consistent with the law. Join our winning team today. Together, we ll accelerate the real-life impact of tomorrow s science and technology. We partner with customers across the globe to help them solve their most complex challenges, architecting solutions that bring the power of science to life. For more information, visit www.danaher.com . At Danaher, we value diversity and the existence of similarities and differences, both visible and not, found in our workforce, workplace and throughout the markets we serve. Our associates, customers and shareholders contribute unique and different perspectives as a result of these diverse attributes.

Posted 1 month ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Bengaluru

Work from Office

Why This Role Matters We re looking for a driven DevOps Engineer to help scale and secure our infrastructure while enabling faster, more reliable software delivery. You ll play a key role in building automated, resilient systems and optimizing development workflows. If you re passionate about automation, cloud architecture, and continuous delivery we want to hear from you! The Hats You Will Wear Build and manage CI/CD pipelines to support fast and stable deployments. Automate infrastructure using tools like Terraform or Ansible. Maintain and optimize cloud environments (AWS/GCP/Azure) for performance and cost. Monitor system health and respond to incidents proactively. Work with engineering teams to improve release processes and deployment practices. The Perfect Fit 4+ years of experience in DevOps or infrastructure roles. Proficient in CI/CD tools (e.g., Jenkins, GitLab CI) and scripting (Python, Bash). Hands-on experience with Docker, Kubernetes, and cloud platforms. Familiar with infrastructure-as-code and system monitoring tools. Strong troubleshooting skills and a collaborative mindset. Your Edge Over the Rest AWS or Kubernetes certifications. Experience in fintech or B2B SaaS environments. Knowledge of GitOps, service meshes, or advanced cloud security practices.

Posted 1 month ago

Apply

7.0 - 12.0 years

20 - 35 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Job Title: ============ Cyber Security Lead - BFSI Domain Job Location: -- Multiple Locations =============== Dubai - UAE Riyadh - Saudi Doha - Qatar Monthly Salary: ============= AED 10,000 - AED 15,000 per month [ Full TAX FREE Salary - Depending on Experience ] Type of job: ========= In office only, NO remote Project Duration: ============= 2 Years Desired Experience Level: ==================== 6- 10 Years Overall 5 Years or above Cyber security Experience Solid 5 Years or above with Cyber Security as Software Consultant Resposibilities ==================== Conducting audits to determine security violations or vulnerabilities Implementing security controls Upgrading networks to cohere with industry best practices Researching, testing, and implementing security technology Developing firewalls for network infrastructure Granting privileges to users based on their needs and use cases Monitoring network traffic for security incidents and events Investigating incidents and responding to events in real time You must be working as Cyber Security Consultant [ mandatory ] Certifications: =========== Any cyber security certificated is added for advantage No.of positions: ============== 03 Benefits: ======= - Long term (18 Months) Project - Good Salary - Full Tax Free Salary Job Ref code: ============ BFSI_CYBER_SEC_0525 Email: ===== spectrumconsulting1977@gmail.com ============================= If you are interested, please email your CV as ATTACHMENT with job ref. code [ BFSI_CYBER_SEC_0525 ] as subject

Posted 1 month ago

Apply

8.0 - 11.0 years

35 - 37 Lacs

Kolkata, Ahmedabad, Bengaluru

Work from Office

Dear Candidate, Were hiring a Cloud DevSecOps Engineer to embed security practices into DevOps pipelines and cloud environments. Key Responsibilities: Automate security testing in CI/CD. Implement policies for secrets management and compliance. Monitor for vulnerabilities and misconfigurations. Required Skills & Qualifications: Experience with tools like Aqua, Snyk, or Prisma Cloud. Deep knowledge of cloud IAM and encryption. Strong scripting and automation skills. Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Reddy Delivery Manager Integra Technologies

Posted 1 month ago

Apply

4.0 - 7.0 years

20 - 25 Lacs

Pune

Hybrid

Role Synopsis: BP has embarked on an ambitious plan and transform using digital technologies to drive efficiency, effectiveness, and new business models. The Information Security Engineer is responsible for delivering information security and risk activities. Using technical capabilities, you will lead changes to security processes and procedures, fix sophisticated security issues, review security architectures and manage security solutions from identification to implementation. You will see that we follow policies, standards and standard practices and provide technical expertise to collaborators. Its a chance to operate in a sophisticated and delivery-focused environment, with the resources of one of the world's most forward-thinking IT departments and leading IT vendors at your fingertips. Security Engineering Specialist builds, develops with active hands-on engagement in the continuous improvement of security engineering practises and the quality of Cyber advice, mentorship and standards used across bp. An SME in the AWS Security Engineering space for architecting and maintaining multiple AWS Products and their automation deployments. You are required to conduct security related architecture reviews based on standard methodology frameworks such as AWS Well Architected framework, conduct risk reviews In-depth knowledge of CICD process / Secure coding standard methodologies / experience of automation and development tooling such as ADO, GIT, AWS Code Pipeline and most significantly has the ability to learn other tools The successful candidate should be prepared to work in a sophisticated work environment with changing priorities and related work engagements You will work within an agile delivery squad directly contacting our customers, development teams, business product owners and 3rd party vendors. Key Accountabilities : Team: You will provide decent support in day to day InfoSec risk activities specific to your specialism. This could involve designing and developing security solutions to work across BP IT environments that are consistent with current policy; running investigations and incident response processes and providing a consistent response to cyber-based malicious activity; and acting as a work with various teams with information security in their segment/functions etc. You will drive the implementation and application of relevant operating processes and procedures, and ensure all activities follow relevant standards. You will also manage outreach for the wider Security Engineering Function to support them in Technology adoption. Relationships : You will develop and manage relationships with collaborators, delivering decent technical knowledge to support project delivery, identify key challenges and ensure that security solutions protect BP against cyber risks. You will be mentoring/training to members of within the team as well as consumers of AWS security services. You will also work across Security Engineering & Enterprise AliCloud Squads and other teams to align and optimize activities and provide backup as vital for incidents and projects. Technology: You will build awareness of internal and external technology developments, handling the delivery of process and system improvements, identifying, and implementing continuous improvement plans for the specialisation and ensuring standard methodology is shared across the team. Safety and Compliance: The safety of our people and customers is our highest priority. We provide a culture of operational safety and ensure our architectures, designs and processes enhance and improve our digital security. Required Skills:- Deep hands-on knowledge of Cloud Security Center, cloud firewall, WAF and other Security products in AWS. (AWS certification preferable) AWS CLI scripting. (Scripting: Python, Bash, PowerShell, Ruby, Lambda (NodeJS / Python) Detailed knowledge of Infrastructure as code: - ADO pipelines, Terraform, cloud automation and resource orchestration. Good understanding and hands-on implementation of Resource Access Management (RAM) and integration with industry identity providers. Demonstrate knowledge of Incident Management, Problem Management and Relationship Management Required Criteria / Experience Demonstrated ability with 4 years of experience in Architect technical solutions within AWS platform to improve the overall security posture. Develop and deploy security solutions using CloudFormation, terraform and other languages to automate the security capability within the platform using automation. Mentor and advice to the overall platform and customers regarding security risks by performing regular risk assessments, threat modelling and security testing. Develop Security knowledge base by publishing AWS security standards, architectural patterns to assist customers in developing secure solutions in the platform. Lead and support the security operations role to ensure operational responsibilities are met to secure the platform with formal reporting to Security Principal. Liaise with Cloud Security Engineering, Security Architecture, Enterprise architecture and Compute platform to ensure alignment to global standards. Support and respond to platform-based security incidents in a timely manner and support to the CTI and SoC where needed. Develop the security roadmap for future requirements for improvement of existing security capabilities and new capabilities to defend against new threats.

Posted 1 month ago

Apply

5.0 - 7.0 years

12 - 15 Lacs

Pune

Work from Office

Role Overview We are looking for experienced DevOps Engineers (4+ years) with a strong background in cloud infrastructure, automation, and CI/CD processes. The ideal candidate will have hands-on experience in building, deploying, and maintaining cloud solutions using Infrastructure-as-Code (IaC) best practices. The role requires expertise in containerization, cloud security, networking, and monitoring tools to optimize and scale enterprise-level applications. Key Responsibilities Design, implement, and manage cloud infrastructure solutions on AWS, Azure, or GCP . Develop and maintain Infrastructure-as-Code (IaC) using Terraform, CloudFormation, or similar tools. Implement and manage CI/CD pipelines using tools like GitHub Actions, Jenkins, GitLab CI/CD, BitBucket Pipelines, or AWS CodePipeline . Manage and orchestrate containers using Kubernetes, OpenShift, AWS EKS, AWS ECS, and Docker . Work on cloud migrations , helping organizations transition from on-premises data centers to cloud-based infrastructure. Ensure system security and compliance with industry standards such as SOC 2, PCI, HIPAA, GDPR, and HITRUST . Set up and optimize monitoring, logging, and alerting using tools like Datadog, Dynatrace, AWS CloudWatch, Prometheus, ELK, or Splunk . Automate deployment, configuration, and management of cloud-native applications using Ansible, Chef, Puppet, or similar configuration management tools . Troubleshoot complex networking, Linux/Windows server issues , and cloud-related performance bottlenecks. Collaborate with development, security, and operations teams to streamline the DevSecOps process. Must-Have Skills 3 + years of experience in DevOps, cloud infrastructure, or platform engineering. Expertise in at least one major cloud provider : AWS, Azure, or GCP . Strong experience with Kubernetes, ECS, OpenShift , and container orchestration technologies. Hands-on experience in Infrastructure-as-Code (IaC) using Terraform, AWS CloudFormation, or similar tools . Proficiency in scripting/programming languages like Python, Bash, or PowerShell for automation. Strong knowledge of CI/CD tools such as Jenkins, GitHub Actions, GitLab CI/CD, or BitBucket Pipelines . Experience with Linux operating systems (RHEL, SUSE, Ubuntu, Amazon Linux) and Windows Server administration . Expertise in networking (VPCs, Subnets, Load Balancing, Security Groups, Firewalls) . Experience in log management and monitoring tools like Datadog, CloudWatch, Prometheus, ELK, Dynatrace . Strong communication skills to work with cross-functional teams and external customers. Knowledge of Cloud Security best practices, including IAM, WAF, GuardDuty, CVE scanning, vulnerability management . Good-to-Have Skills Knowledge of cloud-native security solutions (AWS Security Hub, Azure Security Center, Google Security Command Center). Experience in compliance frameworks (SOC 2, PCI, HIPAA, GDPR, HITRUST). Exposure to Windows Server administration alongside Linux environments. Familiarity with centralized logging solutions (Splunk, Fluentd, AWS OpenSearch). GitOps experience with tools like ArgoCD or Flux . Background in penetration testing, intrusion detection, and vulnerability scanning . Experience in cost optimization strategies for cloud infrastructure. Passion for mentoring teams and sharing DevOps best practices.

Posted 1 month ago

Apply

4 - 5 years

5 - 7 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Role & responsibilities Hands-on experience with implementation of Microsoft DLP technology across a large enterprise Experience in DLP security solutions covering DLP Endpoint, Discover, Web & Email. Design and implementation of AIP solution Expertise on design and implementation of Sensitivity labels, DLP policies Expertise in Cloud Data Protection using MCAS Expertise in configuration of AIP Scanner Expertise in Discovery and Classification of data across repositories using AIP solution Expertise to fine-tune DLP, AIP and MCAS policies to reduce false detection Provide advice on Data Secuirty compliance and regulations to reduce risk. Administration of the DLP tools to include configuration of policies, upgrading, patching etc. Experience to troubleshoot Microsoft DLP, AIP and MCAS issues Monitor and respond to alerts generated from the Microsoft DLP, AIP & MCAS technologies. Understand and follow the incident response process through event escalations. Collaborate with business groups to help them identify, classify and secure high value data. Implementation of proactive measures to enhance accuracy and effectiveness of Data Security tools. Create, review, maintain and update documentation including Documenting & Publishing fixes in central knowledge base. Work with global teams to provide consistent processes and solutions. Excellent presentation and written communication skills with strong interpersonal skills Good understanding on cloud security concepts Good understanding of organizational network architecture Experience in maintaining various metrices and SLAs

Posted 1 month ago

Apply

3 - 4 years

3 - 4 Lacs

Bengaluru

Work from Office

locationsBangalore RMZ-ECO WORLDposted onPosted Yesterday time left to applyEnd DateJune 14, 2025 (28 days left to apply) job requisition idR177746 , India Job Family Group: Information Technology (IT) Worker Type: Regular Posting Start Date: May 15, 2025 Business unit: Projects and Technology Experience Level Experienced Professionals About The Role Whats the role As a Cyber Threat Prevention Advisor in the CyberDefence SecOps team, you'll join the Vulnerability team to manage and oversee vulnerability processes, ensuring they are trackable and measurable with robust tool support. Your team will lead the implementation of these processes within ServiceNow Security Operations (SecOps), establishing standard workflows and integrating them with IT service management processes executed by Line of Defence 1 within IRM. This role leverages market-standard tools and practices to streamline the architecture by reducing dependency on Collective. What youll be doing Asset Discovery: Set-up and lead adequate discovery of new Shell IT assets in Shell's legacy IT network, RES & Portfolio companies, Cloud environments and PCD and Retail environments. Ensure visibility in new areas such as Internet of Things and Cloud and investigate possibilities to keep track of IT assets. Automated Vulnerability Scanning: Maintain a portfolio of tools for automated vulnerability scanning with a focus on Business-Critical systems and systems that are available from the public Internet. Set-up regular scanning and make results available for further analytics in IRM investigation platform. Take appropriate action on vulnerabilities where required. Security Posture Reporting: Use the results from asset discovery, vulnerability scanning, penetration testing and attack simulation to provide an overview of vulnerabilities in Shell IT landscapes for different stakeholders including IRM LT and IDSO LT. Create specific reports for Business, Business Critical applications, IDSO service lines, External perimeters etc. Act as a Subject Matter Expert on implications of a vulnerability in an IT system and establishing the priority of applying security patches. Help creating prioritized overviews of Cyber vulnerabilities and putting these in a context of IT services and Business applications. Take mitigating actions coming out of identified threats or vulnerabilities either directly by the team or agree the actions with other parties in Shell. What you bring Bachelors degree in Computer Science, Information Technology, or related field 5-8 years of total experience in IT Security including at least 3-4 years of experience in Vulnerability Assessment Proficient in analysing network traffic using tools such as tcpdump or wireshark Strong experience in using open-source scanning tools such as nmap, nessus, metasploit and/or commercial tools such as Rapid7 or Qualys Knowledge in integrating Vulnerability Management into modern CI/CD Pipelines with 'shift-left' strategy Understanding of Network Security, Cloud Security, Endpoint Security, Application Security Understanding Cyber Threat Landscape and analyzing Threats from various sources. Assess new threats, rate threat per Shell ratings and collaborate with Threat team on new threat criticality Understanding of CVE id / CVSS score and metrics Familiar with application of Cybersecurity Benchmarks, NIST controls, PCI controls Lead security research proposals and Proof Of Concepts for Emerging Technologies and assessing Fit-For-Purpose Tools. Understanding of Cloud Security Posture Management (CSPM) Expertise in operating Application security tools like Rapid7 Appspider, Netsparker Knowledge on CI/CD pipeline able to understand the integration of security tools and guide the developers Understanding of Application security design and providing guidance to developers on secure design. Good understating of SAST/DAST concepts and process Knowledge of Mobile DAST scanning and vulnerabilities and remediation consultation Knowledge of Splunk, SecOps VR, basic querying and creating dashboards Additional Skills (Good to have): PCI-DSS Compliance Scan. SecOps VR Module in ServiceNow. Linux environment experience. Azure/AWS Cloud Console. Wiz.io tool knowledge. Advanced Splunk skills. What we offer You bring your skills and experience to Shell and in return you work with talented, committed people on one of the most important challenges facing our planet. Youll have the opportunity to develop the skills you need to grow in an environment where we value honesty, integrity, and respect for one another. Youll be able to balance your priorities as you become the best version of yourself. Progress as a person as we work on the energy transition together. Continuously grow the transferable skills you need to get ahead. Work at the forefront of technology, trends, and practices. Collaborate with experienced colleagues with unique expertise. Achieve your balance in a values-led culture that encourages you to be the best version of yourself. Benefit from flexible working hours, and the possibility of remote/mobile working. Perform at your best with a competitive starting salary and annual performance related salary increase our pay and benefits packages are considered to be among the best in the world. Take advantage of paid parental leave, including for non-birthing parents. Join an organisation working to become one of the most diverse and inclusive in the world. We strongly encourage applicants of all genders, ages, ethnicities, cultures, abilities, sexual orientation, and life experiences to apply. Grow as you progress through diverse career opportunities in national and international teams. Gain access to a wide range of training and development programmes. We'd like you to know that Shell has a > click here . - Shell in India Shell is a diversified energy company in India with 13,000 employees, and presence in Integrated Gas, Downstream, Power, Renewable and Upstream. Additionally, we have deep capabilities in R&D, digitalisation, and business operations. Our global strategy, Powering Progress, is designed to generate value for our shareholders, customers, and the wider society, and focuses on creating more value with less emissions. The strategy supports our purpose of providing more and cleaner energy solutions, with the aim of profitably transforming Shell into a net-zero emissions energy business by 2050. As India moves towards its target of net-zero emissions by 2070, Shell India aims to play a leading role in securing vital energy for today, while investing in, and helping to build, the energy system of the future through strategic investments in the country. Our Lubricants business serves over 50,000 consumers through a strong network of over 200 distributors, and operates an end-to-end value chain that spans conceptualization, development, and production at a world-class blending plant at Taloja. Through our 350-plus retail stations, we offer an integrated mobility experience including fuels, cafes, and convenience stores, with a prominent network of EV recharging facilities. Shell owns and operates a LNG re-gasification terminal at Hazira, Surat, with a capacity of 5 MTPA and a LNG truck-loading unit that plays a crucial role in helping meet Indias growing demand for gas across sectors. In 2022, Shell acquired Sprng Energy in a $1.55 billion deal to build an integrated energy transition business in the country. Sprng is a leading renewable energy company in India which develops and manages solar, wind, and hybrid power generation facilities and infrastructure. Our three capability centres across Bangalore and Chennai serve as a technology and innovation powerhouse for Shell globally, working as a delivery engine for core technical, digital, and finance processespioneering digital innovation and cutting-edge technologies across the energy sector. We also have strong academic partnerships and collaborations with leading universities and technology institutes to accelerate decarbonization efforts within the energy sector. We are committed to positively contributing to the communities in which we operate through programmes on STEM Education, Skilling, and Livelihood across India. We nurture and invest in startups developing initiatives focused on accelerating energy innovation through programs such as Shell E4 and Shell Eco-marathon. We also have strategic investments in new energy companies such as Husk Power, d.light, Orb Energy, and Cleantech Solar. DISCLAIMER: Please noteWe occasionally amend or withdraw Shell jobs and reserve the right to do so at any time, including prior to the advertised closing date. Before applying, you are advised to read our data protection policy. This policy describes the processing that may be associated with your personal data and informs you that your personal data may be transferred to Shell/Shell Group companies around the world. The Shell Group and its approved recruitment consultants will never ask you for a fee to process or consider your application for a career with Shell. Anyone who demands such a fee is not an authorised Shell representative and you are strongly advised to refuse any such demand. Shell is an Equal Opportunity Employer.

Posted 1 month ago

Apply

6 - 10 years

12 - 17 Lacs

Gurugram

Work from Office

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 2 months ago

Apply

6 - 10 years

12 - 17 Lacs

Pune

Work from Office

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 2 months ago

Apply

7 - 12 years

12 - 16 Lacs

Noida

Work from Office

Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : SailPoint IdentityNow Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities: Expected to be an SME. Collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Lead the planning and execution of security projects. Ensure project milestones are met within the defined timelines. Provide guidance and mentorship to team members. Professional & Technical Skills: Must To Have Skills: Proficiency in SailPoint IdentityNow. Strong understanding of identity and access management principles. Experience with security tools and technologies. Knowledge of security frameworks and regulations. Hands-on experience in implementing security solutions. Good To Have Skills: Experience with cloud security solutions. Additional Information: The candidate should have a minimum of 7.5 years of experience in SailPoint IdentityNow. This position is based at our Noida office. A 15 years full time education is required. Qualifications 15 years full time education

Posted 2 months ago

Apply

7 - 12 years

9 - 14 Lacs

Bengaluru

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities: Minimum of 4 years of SailPoint development experience in identity governance and administration, specifically with SailPoint IdentityIQ. Strong understanding of identity management concepts, user lifecycle processes, access governance, role-based access control, and compliance reporting. Experience in SailPoint lifecycle Manager, Compliance Manager and Access Governance modules Proficient in Java, Bean Shell/JavaScript, SQL, and web services (REST/SOAP). Experience in different types of connectors like Delimited File, JDBC, LDAP, AD and custom connectors. Experience in developing API services to handle access requests and integrate with various applications. Experience in onboarding applications to the SailPoint Identity IQ platform using native connectors and custom connectors and APIs. Excellent problem-solving skills, with the ability to analyze complex requirements and define technical/functional advanced solutions. Strong communication and interpersonal skills, with the ability to engage effectively with technical and non-technical stakeholders. Professional & Technical Skills: Must To Have Skills:Proficiency in SailPoint IdentityIQ Strong understanding of cloud security principles Experience in designing and implementing security solutions Knowledge of security technologies and tools Hands-on experience with security architecture design Familiarity with regulatory compliance standards Additional Information: The candidate should have a minimum of 7.5 years of experience in SailPoint IdentityIQ This position is based at our Bengaluru office A 15 years full time education is required Qualifications 15 years full time education

Posted 2 months ago

Apply

7 - 12 years

9 - 14 Lacs

Coimbatore

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Your typical day will involve designing and implementing security solutions, collaborating with cross-functional teams, and ensuring the integrity and confidentiality of data. Roles & Responsibilities: Expected to be an SME, collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Design and implement security solutions to protect the organization's cloud infrastructure. Collaborate with cross-functional teams to ensure the integrity and confidentiality of data. Conduct risk assessments and develop strategies to mitigate security risks. Stay up-to-date with the latest security trends and technologies. Ensure compliance with industry standards and regulations. Train and educate employees on security best practices. Professional & Technical Skills: Must To Have Skills:Proficiency in Security Architecture Design. Strong understanding of cloud security principles and best practices. Experience with cloud security technologies and tools. Knowledge of network security protocols and technologies. Familiarity with security frameworks and standards such as ISO 27001 and NIST. Good To Have Skills:Experience with cloud platforms such as AWS or Azure. Experience with security incident response and management. Knowledge of threat intelligence and vulnerability management. Understanding of identity and access management concepts. Solid grasp of encryption and cryptographic techniques. Additional Information: The candidate should have a minimum of 7.5 years of experience in Security Architecture Design. This position is based at our Mumbai office. A 15 years full time education is required. Qualifications 15 years full time education

Posted 2 months ago

Apply

12 - 15 years

12 - 17 Lacs

Pune

Work from Office

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Job Title - Azure Security Architect Experience - 12-15 years Technical Qualification/ Knowledge Hands-on knowledge on Azure security technologies and associated components and variations Azure Security Center, Azure Monitor, Log Analytics, Sentinel or any other SIEM integration Azure NetworkingVNET, Network Security Group (NSG), VNet peering, Azure Firewall Azure Storage Securitystorage accounts, managed disks, blobs, encryption at rest and in-transit, Azure KeyVault, Azure Active Directory, RBAC, MFA, SAML, Conditional Access, Managed Identity. Azure Load Balancers, WAF, Application Gateway, Availability Sets/Scale Sets Knowledgeable about Windows Operating System, Server hardening, Group Policies, event and log management Design, implement and support Microsoft Defender for O365 with Azure Information Protection and MS DLP for O365 and Endpoint Experience in deploying MDATP for Servers Experience with multiple security tools and technologies including Next-Gen Firewalls (Palo Alto), McAfee ePO, DLP, CrowdStrike, ZScaler, Vulnerability Assessment (Tenable.io) Ability to lead to troubleshooting of cloud security issues, detect and confirm anomalies, identify risks, perform root cause analysis Skilled in Graph API, Azure CLI / PowerShell automation experience Should be able to create, update, retry and delete Azure AD objects via PowerShell, Azure CLI Understanding of the Azure Subscription and Migration activities will be added advantages. Additional Qualifications and Experience Cloud Security certifications Microsoft certificationsAZ-900, AZ-500 , MS-900, MS-500, AZ-30X, SC200 – 300. Familiarity with Zero Trust principles

Posted 2 months ago

Apply

8 - 12 years

13 - 18 Lacs

Mumbai

Work from Office

About The Role Role Purpose The purpose of this role is to design the organisation??s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP??s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client??s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management. Experience>10 YEARS. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 2 months ago

Apply

8 - 10 years

12 - 17 Lacs

Hyderabad

Work from Office

About The Role Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management. Experience8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 2 months ago

Apply

5 - 8 years

9 - 14 Lacs

Bengaluru

Work from Office

About The Role Role Purpose The purpose of the role is to support process delivery by ensuring daily performance of the Production Specialists, resolve technical escalations and develop technical capability within the Production Specialists. ? Do Oversee and support process by reviewing daily transactions on performance parameters Review performance dashboard and the scores for the team Support the team in improving performance parameters by providing technical support and process guidance Record, track, and document all queries received, problem-solving steps taken and total successful and unsuccessful resolutions Ensure standard processes and procedures are followed to resolve all client queries Resolve client queries as per the SLA’s defined in the contract Develop understanding of process/ product for the team members to facilitate better client interaction and troubleshooting Document and analyze call logs to spot most occurring trends to prevent future problems Identify red flags and escalate serious client issues to Team leader in cases of untimely resolution Ensure all product information and disclosures are given to clients before and after the call/email requests Avoids legal challenges by monitoring compliance with service agreements ? Handle technical escalations through effective diagnosis and troubleshooting of client queries Manage and resolve technical roadblocks/ escalations as per SLA and quality requirements If unable to resolve the issues, timely escalate the issues to TA & SES Provide product support and resolution to clients by performing a question diagnosis while guiding users through step-by-step solutions Troubleshoot all client queries in a user-friendly, courteous and professional manner Offer alternative solutions to clients (where appropriate) with the objective of retaining customers’ and clients’ business Organize ideas and effectively communicate oral messages appropriate to listeners and situations Follow up and make scheduled call backs to customers to record feedback and ensure compliance to contract SLA’s ? Build people capability to ensure operational excellence and maintain superior customer service levels of the existing account/client Mentor and guide Production Specialists on improving technical knowledge Collate trainings to be conducted as triage to bridge the skill gaps identified through interviews with the Production Specialist Develop and conduct trainings (Triages) within products for production specialist as per target Inform client about the triages being conducted Undertake product trainings to stay current with product features, changes and updates Enroll in product specific and any other trainings per client requirements/recommendations Identify and document most common problems and recommend appropriate resolutions to the team Update job knowledge by participating in self learning opportunities and maintaining personal networks ? Deliver NoPerformance ParameterMeasure1ProcessNo. of cases resolved per day, compliance to process and quality standards, meeting process level SLAs, Pulse score, Customer feedback, NSAT/ ESAT2Team ManagementProductivity, efficiency, absenteeism3Capability developmentTriages completed, Technical Test performance Mandatory Skills: Cloud Security Engineering. Experience5-8 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 2 months ago

Apply

3 - 8 years

11 - 13 Lacs

Pune

Work from Office

Knowledge of operating systems, system administration, and application security. Proficiency in security tools and technologies Experience with incident response methodologies. Strong knowledge of IT security protocols, data privacy standards Required Candidate profile Certified Information Systems Security Professional (CISSP) Vulnerability Scanner/Nessus, CrowdStrike, Cisco Meraki, Forcepoint One. Experience with cloud security and network security.

Posted 2 months ago

Apply

10 - 15 years

22 - 37 Lacs

Bengaluru

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Infrastructure Architects are the key link between Kyndryl and our clients. You’re in a technical leadership role, uniting and guiding stakeholders from clients, governance, and project executives to delivery and sometimes even the vendors who work with the client. You’ll be there from the start of a project — understanding what’s needed and figuring out the best technical solution. And you’ll be there at the finish, delivering the right product on time and within budget. As an Infrastructure Architect, you’ll draw upon the full breadth of your talent and experience. This is a technical leadership role, so we want you to bring your vision, knowledge, and leadership to each project. To the client, you’re the subject matter expert – consulting early, gathering inputs, understanding what they need from our solution. You define what Kyndryl can do to meet this solution. You design the best solution for the job. And finally, you’re the tech leader for implementation. At Kyndryl we support all major cloud platforms, so you’ll get the chance to use everything you know – and then some. You’ll also become expert at knowing when and how to call on other SMEs outside your wheelhouse. Thinking your way around pre-existing limitations will grow your creativity and flexibility. You’ll learn a lot here, and if you want to work toward certifications there are plenty of opportunities.The rewards for all this are many. You’ll get to influence, create, and deliver something from start to finish. You will have the power to delight our clients. Your future at Kyndryl This role opens the door to many career paths, both vertical and horizontal, and there may be opportunity to travel. It’s a great chance for database administrators or other techs to break into the cloud. It’s also a solid path to become enterprise or chief architect or a distinguished engineer! Whatever you see for yourself, you’ll find the opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience 8+ years of experience in enterprise network engineering, with at least 3+ years focused on Azure networking and cloud security. Design and hands-on implement secure network architectures in Azure, including virtual networks, subnets, routing, firewalls, and hybrid connectivity. Plan and execute deployment of third-party firewall appliances in Azure such as Palo Alto VM-Series, Cisco ASA/Firepower, Fortinet FortiGate, etc. Deploy and configure Azure-native network security solutions, including Azure Firewall, NSGs, ASGs, WAFs, Application Gateway, and Private Endpoints. Design secure connectivity solutions, including ExpressRoute, VPNs, Azure Virtual WAN, and hybrid cloud scenarios. Deep hands-on expertise with:Azure etworking: VNETs, VPN Gateways, ExpressRoute, Route Tables, VNET Peering, Virtual WAN Firewall Solutions: Palo Alto, Cisco ASA/Firepower, Fortinet, Check Point in Azure environments Azure Security Tools: Azure Firewall, NSGs, ASGs, Azure WAF, Private Link, Azure Bastion Experience designing and deploying hybrid cloud networks with secure interconnects and failover strategies. Proficiency with Infrastructure as Code tools: Terraform, Bicep, ARM Templates, scripting with Azure CLI/PowerShell. Strong understanding of network security principles, NAT, firewall rules, east-west and north-south traffic controls. Ability to produce detailed technical diagrams (e.g., using Visio or Draw.io) and comprehensive documentation. Familiarity with SIEM/SOAR integrations, IDS/IPS, and next-gen firewall capabilities in Azure. Excellent troubleshooting and performance tuning skills for cloud networks. Preferred Technical and Professional Experience Microsoft Certified: Azure Solutions Architect Expert (AZ-305) Palo Alto Networks Certified Network Security Engineer (PCNSE) Cisco Certified Network Professional (CCNP) or Cisco Certified CyberOps Associate Azure Network Engineer Associate (AZ-700) Experience with automation and CI/CD integration of networking tasks via Azure DevOps, GitHub Actions, or Jenkins. Familiarity with Zero Trust Architecture (ZTA) principles and NIST 800-207 frameworks. Lead and execute firewall rule configuration, segmentation strategies, policy enforcement, and advanced threat protection mechanisms. Collaborate with customers to gather security and network requirements, develop network diagrams, and produce HLD/LLD documentation. Implement network architecture and security controls using Infrastructure as Code (Terraform, Bicep, ARM Templates). Integrate Azure networking with on-premises data centers, SD-WAN, and existing firewall stacks. Assist in building and securing Azure Landing Zones with a heavy focus on networking, perimeter control, and traffic flow analysis. Conduct security assessments and design network segmentation, microsegmentation, and zero trust architectures. Troubleshoot and optimize network performance, latency, and throughput issues across hybrid environments. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 2 months ago

Apply

3 - 8 years

20 - 25 Lacs

Bengaluru

Work from Office

Hello Visionary! We empower our people to stay resilient and relevant in a constantly evolving world. We"™re looking for people who are always searching for creative ways to grow and learn. People who want to make a real impact, now and in the future. Does that sound like you? Then it seems like you"™d make a great addition to our vibrant team. We are looking for DevOps / Platform Architect . Before our software developers write even a single line of code, they have to understand what drives our customers. What is the environment? What is the user story based on? Implementation means trying, testing, and improving outcomes until a final solution emerges. Knowledge means exchange discussions with colleagues from all over the world. Join our Digitalization Technology and Services (DTS) team based in Bangalore. You"™ll make a difference by: Building and delivering high-performance scalable applications (along with the development team) in accordance to the partners"™ quality requirements. Ensuring quality of the developed part of component(s) / work product(s) (conformance with development process) and its technical delivery. Ensuring that the project deliverable is completed based on project schedule. Being the technical thought leader , keeping abreast of new/emerging technology and sharing the same across the team. Performing regular internal technical coordination / review to ensure risk identification and to support the initiation of risk mitigation by Project Manager and all relevant project stakeholders. 1. Platform Architecture and Design Establish architectural principles and patterns that guide platform evolution and ensure technical coherence. Design modular, reusable, and scalable platform components (service templates, pipelines, SDKs, developer tools). Create a vision and roadmap for platform capabilities (e.g., CI/CD as a service, infrastructure automation, self-service portals). Define and design the internal developer platform Architect for extensibility through plugin systems, middleware hooks, and well-defined extension points. Design open APIs and interfaces that enable teams to customize and extend platform capabilities. Implement composable architecture patterns that allow teams to assemble platform components to suit their specific needs. Create extension frameworks that enable controlled customization without forking the core platform. Establish contribution guidelines for teams to extend the platform in alignment with architectural standards. Develop abstraction layers that shield developers from underlying infrastructure complexity while maintaining necessary flexibility. Define decision frameworks for technology selection and architectural trade-offs within the platform ecosystem. Create architectural decision records (ADRs) to document key platform design choices and their rationales. Architect for interoperability with existing and future tools through standardized interfaces and protocols. 2. Developer Experience Enablement Build and maintain self-service experiences for developers (e.g., service creation, deployments, environment setup). Create and handle Developer Portals (like Backstage) to expose platform capabilities cleanly and intuitively. Simplify access to cloud, CI/CD, monitoring, and operational tools. 3. Infrastructure and Automation Define Infrastructure-as-Code (Terraform, Pulumi, CloudFormation) standards and best practices. Architect multi-cloud or hybrid-cloud strategies if needed. Automate environment provisioning, scaling, and operational tasks. 4. CI/CD and Software Delivery Optimization Design and standardize CI/CD pipelines across teams. Ensure the platform supports safe, fast, and reliable deployments (e.g., blue/green deployments, canary releases). Integrate security, quality gates, and compliance checks into pipelines ("shift left"). 5. Governance, Security, and Compliance Define guardrailsenforce best practices without blocking innovation. Architect platform security (identity management, network security, role-based access control). Ensure compliance with audit, data privacy, and regulatory requirements where applicable. 6. Observability and Operational Excellence Provide out-of-the-box observabilitymetrics, logging, tracing, alerting. Set standards for application monitoring, reliability, and incident response. Embed SRE/DevOps principles into the platform itself. 7. Collaboration and Evangelism Partner with product engineering teams, SREs, security, and leadership. Act as a bridge between infrastructure and application developers. Mentor engineers on platform usage and platform-first thinking. Advocate for platform adoption and improvement based on feedback. 8. Continuous Improvement Continuously evolve platform offerings based on Changing business needs Developer feedback Emerging technologies (e.g., AI-assisted development, serverless, platform engineering best practices) Promote "Platform as a Product" mindset "” treating internal developers as customers. Job Requirements/ Skills: B.E. / B. Tech / MCA/ M. Tech (Computer Science/Electronics & Communication/Electrical). 3+ years of Project experience as a Software Architect preferably in real time distributed applications and total 10-13 years of development experience. Strong project experience in implementation of architectural patterns and in at least one of the programming languagesJava, Python. Good knowledge of web development frameworks & micro services. AWS cloud Services including VPCs, EBS, ALBs, NLBs, EC2, S3, Cognito & IoT Core In-depth knowledge of cloud security concepts and technologies Good knowledge of concepts like authentication, authorization, caching, load balancing. In-depth knowledge of DevOps and deployment technologies such as Docker (and/or Kubernetes). Experience in at least one operating systemLinux, Unix, Solaris, Ubuntu, Windows. Knowledge of relational databases and experience in database designing. Excellent communication skillsinterpersonal, written, visual (presentations), and verbal. Desirable: Certifications such as AWS Solutions Architect or equivalent. Exposure to Front-end development technologies such as Angular/JavaScript/HTML. Exposure to Big Data technologies & No-SQL databases. Exposure to Mobile development, Agile/LEAN principles and EDGE Technologies. Create a better #TomorrowWithUs! This role is in Bangalore, where you"™ll get the chance to work with teams impacting entire cities, countries and the craft of things to come. We"™re Siemens. A collection of over 312,000 minds building the future, one day at a time in over 200 countries. We're dedicated to equality, and we encourage applications that reflect the diversity of the communities we work in. All employment decisions at Siemens are based on qualifications, merit and business need. Bring your curiosity and creativity and help us craft tomorrow. At Siemens, we are always challenging ourselves to build a better future. We need the most innovative and diverse Digital Minds to develop tomorrow "˜s reality. Find out more about the Digital world of Siemens herewww.siemens.com/careers/digitalminds

Posted 2 months ago

Apply

7 - 15 years

16 - 18 Lacs

Bengaluru

Work from Office

Required Skills Behavioral | Aptitude | Communication Technology | Cybersecurity | SOC Alert Management Technology | Cybersecurity | Vulnerability Management Technology | Cybersecurity | SOC Monitoring Technology | Cybersecurity | Cloud Security Education Qualification : Any Graduate Certification Mandatory / Desirable : Technology | IT Security Certifications | EC-Council Certifications | EC-Council Certified Ethical Hacker (CEH) Details: Need to both keep an eye out for attacks in progress and try to figure out ways to beef up defenses to prevent or mitigate future attacks. To that end, you need to install security tools, investigate the suspicious activities those tools detect, support audit and compliance initiatives, and participate in developing security strategies 1. Escalate validated and confirmed incidents to designated incident response team. 2. Notify Client of incident and required mitigation works. 3. Fine-tune SIEM rules to reduce false positive and remove false negatives. 4. Collect global threat intelligence and internal threats then inject actions based on analysis and recommendation. 5. Proactively research and monitor security information to identify potential threats that may impact the organisation. 6. Develop and distribute information and alerts on required corrective actions to the organisation. 7. Learn new attack patterns, actively participate in security forums. 8. Work closely with Vulnerability Management and designated incident response team. 9. Understand the structure and the meaning of logs from different log sources. 10. Perform threat intel research. 11. Ability to run and understand Sandbox Static Analysis. 12. Analyst should know how to include details related to the logs, alarms and other indicators identified in accordance with the intervention protocol of each client and the SLA.

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies