Jobs
Interviews

51 Cyber Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 7.0 years

5 - 5 Lacs

Pune

Work from Office

Role Proficiency: Maintain and improve security posture by identifying scoping and prioritizing vulnerabilities in our systems. Provide guidance and drive accountability of risk-based vulnerability remediation across business and technology teams. Outcomes: Identification of vulnerabilities in the organization's network and IT infrastructure. Identification of risk for the company and the required remediation performed. Perform gap analysis of current vulnerability remediation policies and processes versus industry best practices for the client and identify opportunities for improvement. Vulnerabilities prioritization based on their severity and impact. Accountable for the identification and subsequent use of remedial methods to improve the outcome Measures of Outcomes: Average time to action Mean time to remediation Rate Of Recurrence Total Risk Remediated Average Vulnerability Age Provide 3-5 reports and analysis follow-up on a weekly basis Provide at least 2 vulnerability analysis Produce 2 reports for management in each quarter Own and manage at least 2 identified threats & vulnerabilities Outputs Expected: Daily Activities : Daily/Weekly/Monthly Reports on the status of the Platform Execute the latest 1 threat variants to test detection and prevention capabilities. Priority assistance in agent upgrades (scenarios include - Agent update patching) Creating one Standard policy recommendation and configuration according to environment each month. IOC & IOA management. Security research community: Stay on top of the security research community. Will be up to date on current attacks campaigns and trends to initiate innovative research activities. Continuous Learning innovation and optimization: Ensure completion of the learning program suggested by Managers Suggest ideas that will help innovation and optimization of processes Skill Examples: Experience in IT optimally in Security with exposure to infrastructure and application vulnerability scan configurations vulnerability assessments and vulnerability management Good understanding of network protocols design and security operations Strong analytical skills and efficient problem solving Proficient in scripting languages such as Python Security hardening techniques and hardening standards patching Ability to design and document security operational procedures Understanding of attacker behaviors and techniques is required. Knowledge Examples: Knowledge Examples A strong understanding of the current threat landscape including the latest tactics tools and procedures common malware variants and effective techniques for detecting this malicious activity. Familiarity with basic security concepts in vulnerability management network security systems administration or other areas of technology is required. Hands-on experience with Vulnerability management tools such as Spotlight Rapid7 Nessus Tenable or Qualys. Knowledge of security principles techniques and technologies Knowledge in exploit development. Security certifications such as CEH GPEN GSEC CISSP. Additional Comments: # Areas Must to Have 1 Vulnerability Operations The candidate should have hands-on experience in vulnerability handling within large-scale or regulated environments (preferably financial services). strong understanding of theVulnerability management process including vulnerability lifecycle, including asset discovery, scanning, CVSS-based prioritization, remediation. Experience implementing or improving vulnerability lifecycle workflows Ability to interpret threat feeds (e.g., CISA KEV, AlienVault OTX, ThreatConnect) and map those threats to assets. Oversee vulnerabiliy consolidation system and promptly report any operational issues Monitor the health of interconnected environments updating the central planning platform,escalate and resolve failures, and coordinate with the internal engineering team. Ensure clear and concise senior management reporting Coordinating and leading regular meeting with internal business team focussed on vulnerability management 3 Stakeholder Management & Soft skills Experience in influencing and managing stakeholder with strong interpersonal skills to build relationships and collaborate within teams Strong communication skills to effectively coordinate with global infrastructure, application, and compliance teams. Skillled in preparing reports and presentations for senior management and delivering them to large audience 4 Tools and Technologies Experience in using Microsoft teams,JIRA Skilled in MS Excel for data analysis, including filtering, pivoting, and dashboarding Experience in analyzing large datasets to identify issues and gaps Proficient in Servicenow and Confluence 5 Education and experience Bachelor's degree in Computer Science, Engineer or Related field Minimum of 5 years in cybersecurity, specifically in vulnerability management, risk management, or cyber operations Good to have Knowledge of API, python Scripting Prior experience in handling JIRA tickets Expertize in Advanced excel or any other reporting tools Required Skills Advanced Excel,Vulnerability Management,Patch Management

Posted 2 days ago

Apply

5.0 - 7.0 years

5 - 5 Lacs

Kochi, Thiruvananthapuram

Work from Office

Role Overview The Anti-Phishing Specialist leads the organization's efforts to detect, prevent, and respond to phishing attacks and other email-based threats. This role is pivotal in developing robust anti-phishing strategies, managing email security technologies, responding to incidents, and educating users to enhance organizational resilience against cyber threats. Key Responsibilities - Identify and facilitate takedown of phishing websites and rogue applications. - Proactively address a broad spectrum of cyber threats including DDoS, ransomware, business email compromise (BEC), spear phishing, whaling, vishing, and other social engineering attacks. - Monitor and analyze inbound emails to detect malicious content and recommend rule adjustments to reduce email-borne threats. - Design, implement, and maintain anti-phishing strategies, policies, and procedures. - Manage and optimize anti-phishing tools and platforms, including DMARC, DKIM, SPF, and secure email gateways. - Develop advanced detection rules and filters to counter evolving phishing tactics. - Lead phishing-related incident response efforts--containment, eradication, recovery, and post-incident review. - Deliver regular employee training and awareness programs on phishing prevention. - Collaborate with security teams to provide guidance on email security best practices. - Evaluate emerging anti-phishing technologies and recommend improvements. - Stay abreast of current phishing trends, attack methods, and mitigation techniques. - Produce detailed reports on phishing incidents, metrics, and defensive performance. Qualifications - Bachelor's degree in Computer Science, Information Security, or a related field. - 5+ years of hands-on experience in anti-phishing, email security, or a similar domain. - Strong expertise in email protocols (SMTP, etc.) and security standards (DMARC, DKIM, SPF). - Proven experience with enterprise email security solutions (e.g., Proofpoint, Mimecast, Ironscales). - Deep understanding of phishing tactics, social engineering, and email-based threat vectors. - Strong analytical, problem-solving, and communication skills. - Demonstrated leadership in mentoring or guiding security teams. - Preferred certifications: CISSP, Certified Email Security Manager (CESM), or equivalent. Required Skills SOC L2, Cyber Security, Phishing

Posted 3 days ago

Apply

0.0 years

0 - 0 Lacs

Gurugram

Work from Office

About the Team: The Fraud Preventions & LEA management team under Risk Operations manages the LEA queries and resolutions through immediate responses and gathering requisite response from different business units within PayU. The team consists of 8-10 members ranging Execs to Sr.Manager level employees who reports in to Head of Investigations. About the Role: The role requires a person to be well versed with the nodal functions of financial sectors and should be able to handle the LEA (Law Enforcement Agencies) queries and represenatations and enhance internal processes to manage the LEA requirements within timlines and develop cordial relationship with multiple LEA’s/Regulatory(MHA, RBI, CBI, CID, Cyber Crime, Stae Police etc.) across india. Responsibilities: Handling daya to day LEA/regulatory enquiries received by Payu through multiple channels/sources and resolve within the timelines as per regulations. Liaising internally within the PayU India organization for collection of data, documents and factual inputs for providing timely and accurate responses within timelines. Good Knowledge about Cybercrime / Financial frauds with Banks/Cards etc. Exp. in handling RBI and Regulatory enquiries/cases. Handling cases relted to Acquiring and issuing banks. Risk monitoring for merchants and suspicion reporting. Dealing with Cyber Police Officials & Banks over phone call and assisting them as per the requirement as point of contact (case to case basis). Dealing with merchants to fetch the details or reolve disputes received through LEA/Regulatory. Daily case closure and reporting tracker update/upload. Requirements: Graduate with experience in same field is preferred. Experience in handling of Cyber crime and other financial frauds of cards misuses etc. Team player, who is eager to develop/learn and work towards team objectives. What we offer? A positive, get-things-done workplace A dynamic, constantly evolving space (change is par for the course – important you are comfortable with this) An inclusive environment that ensures we listen to a diverse range of voices when making decisions. Ability to learn cutting edge concepts and innovation in an agile start-up environment with a global scale Access to 5000+ training courses accessible anytime/anywhere to support your growth and development (Corporate with top learning partners like Harvard, Coursera, Udacity) About us: At PayU, we are a global fintech investor and our vision is to build a world without financial borders where everyone can prosper. We give people in high growth markets the financial services and products they need to thrive. Our expertise in 18+ high-growth markets enables us to extend the reach of financial services. This drives everything we do, from investing in technology entrepreneurs to offering credit to underserved individuals, to helping merchants buy, sell, and operate online. Being part of Prosus, one of the largest technology investors in the world, gives us the presence and expertise to make a real impact. Find out more at www.payu.com Our Commitment to Building A Diverse and Inclusive Workforce As a global and multi-cultural organization with varied ethnicities thriving across locations, we realize that our responsibility towards fulfilling the D&I commitment is huge. Therefore, we continuously strive to create a diverse, inclusive, and safe environment, for all our people, communities, and customers. Our leaders are committed to create an inclusive work culture which enables transparency, flexibility, and unbiased attention to every PayUneer so they can succeed, irrespective of gender, color, or personal faith. An environment where every person feels they belong, that they are listened to, and where they are empowered to speak up. At PayU we have zero tolerance towards any form of prejudice whether a specific race, ethnicity, or of persons with disabilities, or the LGBTQ communities.

Posted 6 days ago

Apply

8.0 - 12.0 years

20 - 27 Lacs

Ahmedabad

Work from Office

We are seeking a highly skilled Cybersecurity Officer with a strong background in information security, cyber risk management, and technical infrastructure protection.As a global provider of financial and data clearing applications for mobile network operators, we understand the critical importance of robust cybersecurity measures.This role is specifically focused on the digital security of enterprise systems, cloud infrastructure, application environments, and customer data. Nextgen Clearing is the market leading provider of global roaming services. We operate internationally across 20 global locations, employing over 300 talented people. We offer Award-winning Data and Financial Clearing services, along with unique value-added features on a single flexible online platform. Nextgen Clearing serves more than 160 operators worldwide, giving them a 24/7 holistic overview of their full roaming business Key Responsibilities: Define and implement security policies and controls to protect the company's digital assets and ensure regulatory compliance. Continuously monitor the company's security posture and quickly respond to security incidents. Develop security strategies and plans for preventing and responding to security breaches. Provide expert guidance and support to software teams on implementing secure development practices, security requirements, and conducting security testing. Foster secure application deployment and configuration, ensuring the protection of data integrity and confidentiality. Conduct regular training and awareness sessions for the company's staff to promote security best practices. Assist in the response to security incidents, including the management of communications and recovery efforts. Work collaboratively with customer service teams to safeguard customer data, enhance data privacy, and ensure secure customer interactions. Contribute to the company's efforts to prevent fraud and manage security incident communications to maintain trust with customers. Stay up-to-date on the latest cybersecurity trends, threats, and security technologies to continuously improve the organization's security stance. Collaborate with IT and other departments to establish a security-focused culture across the company. Develop and maintain documentation related to security policies, procedures, and incident response plans. Stay up to date on emerging cybersecurity threats and vulnerabilities and proactively recommend and implement countermeasures to mitigate risks. Foster security awareness and monitor security policy implementation Requirements Bachelor's degree in Computer Science, Information Security, or a related field. Master's degree or cybersecurity certifications (e.g., CISSP, CISM, CEH, TOGAF) are a plus. A minimum of 5 years of experience in information security or cybersecurity. Strong understanding of information security principles, best practices, and industry standards. Experience with implementing and managing security protocols, cybersecurity tools, and technologies. Familiarity with compliance requirements and standards such as ISO 27001, GDPR, and PCI DSS. Ability to identify security vulnerabilities and risks, as well as implement preventive and corrective measures. Knowledge of secure software development life cycle (SDLC) practices. Excellent problem-solving skills and the ability to work in a fast-paced, high-pressure environment. Strong communication and interpersonal skills to collaborate with diverse teams and educate non-technical stakeholders on security-related matters. Incident response and crisis management experience. Working Conditions: The role may require availability outside of standard business hours to respond to security incidents and maintain critical security measures. Benefits A supportive, dynamic, and collaborative work environment. Exceptional opportunities for professional and career advancement. Engagement with the leading provider of roaming services, catering to global Mobile Network Operators as clients. For more information, please visit www.nextgenclearing.com. Private Health Insurance Training & Development

Posted 1 week ago

Apply

5.0 - 10.0 years

12 - 24 Lacs

Kochi

Work from Office

Responsibilities: * Design cybersecurity architecture for cloud environments * Ensure application & product security compliance * Collaborate with cross-functional teams on risk management strategies Work Location - Remote Clients - Saudi Arabia Health insurance Annual bonus

Posted 1 week ago

Apply

21.0 - 31.0 years

17 - 21 Lacs

Bengaluru

Work from Office

What we’re looking for In this dynamic Information Security Analyst III role, you'll be at the forefront of protecting SurveyMonkey by crafting sophisticated threat detections and staying ahead of emerging threats within the security operations team. You will be reporting to the Information Security Manager. Leveraging your expertise in SIEM query languages, you'll play a key role in identifying and mitigating risks, ensuring the company's security posture remains robust. We are looking for someone who has experience in automation and is constantly challenged to expand their knowledge of the latest security trends while contributing to the defense of a widely trusted service. What you’ll be working on Monitor and triage security events, identify vulnerabilities, and respond to security incidents. Develop and refine security automation playbooks. Expertise in creating threat detections and staying abreast of new and evolving threats. Ability to conduct research and log analysis into IT security issues and products as required. Deploy, manage and maintain all security tools and ensure strong security posture of corporate devices. We’d love to hear from people with Bachelor degree in Information Security, Cybersecurity, Information Technology, or a related field. 8+ years of hands-on experience in IT security, compliance or incident response. Strong familiarity with SIEMs, EDR, SOAR platforms (e.g.,CrowdStrike, LogScale, XSOAR) Working experience with MITRE ATT&CK and Cyber Kill Chain frameworks Experience with AWS cloud security monitor and detection tools. (e.g, AWS GuardDuty, AWS Cloudwatch or AWS CloudTrail or similar) Ability to effectively prioritize and execute tasks in a high-pressure environment. Certifications preferred: Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), CompTIA Security+, Certified Information Security Manager (CISM), or similar. SurveyMonkey believes in-person collaboration is valuable for building relationships, fostering community, and enhancing our speed and execution in problem-solving and decision-making. As such, this opportunity is hybrid and requires you to work from the SurveyMonkey office in Bengaluru 3 days per week. #LI - Hybrid

Posted 2 weeks ago

Apply

7.0 - 11.0 years

0 Lacs

noida, uttar pradesh

On-site

At EY, youll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture, and technology to become the best version of you. And were counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Managing the global workforce in todays fast-changing and highly disrupted environment is becoming increasingly complex. As a member of our People Consulting (PC) practice, you will be part of a team that supports clients in aligning their HR function with the organizational plans while keeping employee experience as one of the core considerations. When you join us, you will gain cross-functional, multi-industry, and a truly global work experience to take your career in the right direction. We are looking for Managers with expertise in Change Management to join the PC team. This is a fantastic opportunity to be part of a leading global professional services organization while being instrumental in the growth of the PC team. Your Key Responsibilities - Enable delivery and execution of change management strategy for global large transformation programs in partnership with global EY offices. - Establish change management expertise within the practice, grow and lead a team of change and learning design specialists. - Provide advice and guidance as a subject matter expert and work effectively as part of a large, distributed program team. - Ensure high-quality deliverables are produced for the project by exhaustive internal reviews and obtain excellent feedback from the client and global project counterparts. - Manage engagement risk, project economics, manage escalations, and ensure effective planning and budgeting. - Lead development of thought leadership, collateral, tools, techniques, methodologies to enhance change management and broader capability offering within the practice. - Support leadership in developing the practice through collaboration with EY global offices and demand generation for change management projects. - Perform the role of a counselor and coach, define and set goals, conduct performance reviews, and ensure ongoing learning and development of the team. - Collaborate with subject matter experts across the HR service areas (learning and development, staffing, talent management, diversity, compliance) to provide insights on overall strategic and operational performance. Skills And Attributes For Success - High integrity and commitment to work in a new and challenging environment. - Ability to manage ambiguity and be proactive. - Strong communication and presentation skills. - Cross-cultural awareness and sensitivity. - High energy levels, agility, and adaptability. - Open to travel for client projects that are approved as per EY and country-specific travel advisory guidelines. To qualify for the role, you must have - Postgraduate degree or equivalent with a specialization in Human Resources (India or abroad). - 7 -10+ years of relevant experience. - Experience leading change management efforts on global client projects. - A track record of designing and implementing medium-large scale change programs including HR Transformation, Human-Centered Design, Digital Strategy, and ERP Transformation. - Experience in advising and guiding clients on complex transformation programs with key domain expertise in business readiness, business adoption, change strategy, visioning, execution, stakeholder management, benefits management, and communication. - Experience in managing a delivery team of at least 5+ individuals, providing advice and guidance on career development, L&D, and performance management. - Experience in learning design and content development using techniques of instructional design and application of it to enable a change program. - Experience in selling and delivering work that spans across the full project lifecycle. - Must have a JLPT Certification (N1-N2 Level). Ideally, you will also have - APMG, PROSCI, or equivalent certification. - Experience in creating project budget and resource estimates for several domains within HR and technology transformations. - Experience facilitating solution workshops and design sessions across multiple industry verticals and geographies. - Experience in identifying and deploying leading-edge communication and stakeholder engagement tools and techniques. - Experience in leading and supporting a network of Change practitioners to work in a cross-functional and client-facing environment. - Expertise in recommending and leveraging new age/digital solutions to enable change such as automation, gamification, advanced analytics/visualization, day-in-life-of workshops. - Experience in identifying and leveraging data-driven change management techniques to drive the transformation. - Knowledge of one or more HCM cloud - Oracle, SAP, Service Now, Blue Yonder, or other out-of-box HR technologies. - Domain understanding of Cyber and Supply Chain is a plus. - Experience in Pharma, Healthcare, Life Sciences, Energy, Public sector, Manufacturing, and TMT (Technology, Media, and Telecom) sectors is preferred. - Working knowledge of Project management. What We Look For Technical experts with commercial acumen, relevant experience, and a high degree of enthusiasm to adapt and learn in a fast-moving environment. Knowledge and experience of working in a cross-cultural setup. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies, and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: - Support, coaching, and feedback from some of the most engaging colleagues around. - Opportunities to develop new skills and progress your career. - The freedom and flexibility to manage your role in a way that's right for you. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people, and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform, and operate. Working across assurance, consulting, law, strategy, tax, and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.,

Posted 2 weeks ago

Apply

3.0 - 8.0 years

3 - 12 Lacs

Pune

Work from Office

Responsibilities: Deliver structured training sessions (online or in-person) based on the provided 4-month CEH-aligned syllabus Teach tools such as Nmap, Burp Suite, Metasploit, Wireshark, SQLMap, John the Ripper, Aircrack-ng, etc.

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

pune, maharashtra

On-site

As a Cyber Assurance Assistant Vice President (AVP) at Barclays in Pune, you will play a crucial role in partnering with the bank to provide independent assurance on control processes and offer advice on enhancements to ensure the efficiency and effectiveness of the bank's internal controls framework. Your responsibilities will include collaborating across the bank to maintain a robust control environment by conducting ad-hoc assessments and testing the design and operational effectiveness of internal controls aligned with the bank's policies and standards. You will develop detailed test plans and procedures to identify weaknesses in internal controls and other initiatives within the bank's control framework to mitigate potential risks and issues that could disrupt bank operations, lead to losses, or impact reputation. In this role, you will communicate key findings and observations to relevant stakeholders and business units to enhance overall control efficiency and provide corrective actions to senior managers. You will work closely with other control professionals to address complex issues and ensure consistent testing methodologies across the bank. Additionally, you will establish a knowledge center containing detailed documentation of control assessments, testing results, findings, and distribute material on internal controls to train and upskill colleagues within the bank. As an Assistant Vice President, you are expected to advise and influence decision making, contribute to policy development, and take responsibility for operational effectiveness. You will lead a team in performing complex tasks, set objectives, coach employees, appraise performance, and determine reward outcomes. If the position involves leadership responsibilities, you will demonstrate a clear set of leadership behaviors to create an environment for colleagues to excel. Your role may involve collaborating on assignments, guiding team members, identifying new directions for projects, and consulting on complex issues. You will identify ways to mitigate risks, develop new policies and procedures to support the control and governance agenda, and take ownership of managing risk and strengthening controls related to your work. Furthermore, you will engage in complex data analysis, communicate complex information effectively, and influence stakeholders to achieve desired outcomes. It is essential for all colleagues to uphold the Barclays Values of Respect, Integrity, Service, Excellence, and Stewardship, as well as demonstrate the Barclays Mindset of Empower, Challenge, and Drive in their behavior.,

Posted 2 weeks ago

Apply

1.0 - 3.0 years

0 - 3 Lacs

Mumbai, Mumbai Suburban, Navi Mumbai

Work from Office

Hi, We have an opening for Cyber Butler role for Mumbai location,(Trident & Oberio hotel) - on partners payroll PFB JD and confirm on the same. If you’re interested then please share your resume and let me know. Key Responsibilities : Responsibilities: • L0 Support for Jio CPE infra in Hotel. • L0 Support for Resident, Non-Resident Guests & Belvedere • L0 Support for Hotel Staff for “Team Internet” • Wi-Fi assistance for Events/Conferences. • First point of contact for Troubleshooting WiFi network related Incidents. • Escort Field/Jio engineers during incident/Project Work. • Ensure Periodic Wi-Fi Audits for Guest Rooms. Qualification and Work Experience Qualification : B.Sc. / BE /B Tech Work experience : 1-3 Years • CCNA trained Preferred • Excellent communications skill to handle premium users • Promptness and Discipline Excellent interpersonal and communication skills. • Well Groomed as per Hospitality industry standard If you’re interested please share below mention details for the same. Location Preferred location Current Co Experience Current CTC Expected CTC Notice Period Offer in Hand Highest Education SSC % HSC % Graduation % University Name Please share the details on below mail ID: ashwini.chakor@ril.com Regards, Ashwini Chakor

Posted 2 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

Meet the Team We are a team of 450+ Legal and Compliance professionals in 25+ countries committed to fostering an inclusive and collaborative environment as we work together to drive Ciscos success. We serve as trusted advisors to the business problem solving, navigating complexities, and enabling transformation along the way. We use technology to make life easier leveraging Ciscos innovative networking and collaboration tools to enable flexible, hybrid work. And we embrace the responsibility to be a force for good donating our time and expertise through pro bono and community impact initiatives. We are Cisco Legal. You will join Cisco Legals Regulatory Affairs Trade Legal & Compliance (TLC) team. The Regulatory Affairs team is comprised of lawyers, operational specialists, program managers, engineers, and subject matter experts focused on topics including data and privacy, global trade and telecom, ESG, and cyber and national security regulations. You will partner with your colleagues in Legal and numerous other functions across the company to have an immediate impact with your analytic rigor, business judgment, and ability to get things done. Your Impact You will join the Cisco TLCs Screening Operations team supporting our transaction screening program. This team is responsible for global trade regulations globally and across the business. We are looking for a curious, creative teammate. You will be responsible for: Working as part of the team reviewing and conducting due-diligence reviews, specifically denied party, location and end-use/end-user screening for wide variety of sales, service and other transactions Handling regional and global caseload that consists of reviewing transactions and validating the appropriate export license and/or export license exceptions for transactions Monitoring internal tools to ensure transactions are compliant and reviewed at the speed of business and determining when escalation is appropriate to senior management and/or trade counsel Representing the team, developing and maintaining relationships with various internal functional groups to understand and execute business support against Ciscos sanctions risk-assessment process, including participating in periodic reviews of screening procedures, reports, and systems to identify risk or deficiencies and ensure effectiveness of our compliance screening program Supporting ongoing adoption and implementation of new and/or updated screening tools, including technology software and systems, training programs and support developing associated processes Staying up to date with regulatory evolutions pertaining to sanctions screening and business transaction monitoring Minimum Qualifications: BA/BS and/or Masters degree 3 or more years experience reviewing conducting due diligence reviews of sanctions alerts, including record keeping of analysis and alert disposition Knowledge of U.S. sanctions regulations (geographic and list-based), EU sanctions regulations, the BIS Entity List and other applicable denied party regimes and associated risks and prohibited activities Familiarity with Enterprise Resource Planning screening software tools (e.g., Oracle Global Trade Management, Global Trade Solution, other) Has knowledge of export license requirements Excellent English written and verbal communication skills Ability to balance quality of work with deadlines, in a fast-paced, results-oriented culture Experience collaborating closely virtual teams and with cross-functional partners Ability to identify risk issues affecting work progress and to recommend solutions Preferred Qualifications: ACAMS or similar sanctions certification Ability to conduct due diligence and open-source research in Mandarin #WeAreCisco #WeAreCisco where every individual brings their unique skills and perspectives together to pursue our purpose of powering an inclusive future for all. Our passion is connectionwe celebrate our employees diverse set of backgrounds and focus on unlocking potential. Cisconians often experience one company, many careers where learning and development are encouraged and supported at every stage. Our technology, tools, and culture pioneered hybrid work trends, allowing all to not only give their best, but be their best. We understand our outstanding opportunity to bring communities together and at the heart of that is our people. One-third of Cisconians collaborate in our 30 employee resource organizations, called Inclusive Communities, to connect, foster belonging, learn to be informed allies, and make a difference. Dedicated paid time off to volunteer80 hours each yearallows us to give back to causes we are passionate about, and nearly 86% do! Our purpose, driven by our people, is what makes us the worldwide leader in technology that powers the internet. Helping our customers reimagine their applications, secure their enterprise, transform their infrastructure, and meet their sustainability goals is what we do best. We ensure that every step we take is a step towards a more inclusive future for all. Take your next step and be you, with us!,

Posted 3 weeks ago

Apply

2.0 - 4.0 years

4 - 9 Lacs

Hyderabad

Hybrid

Role & responsibilities : Ability to read, write and communicate proficiently in Chinese Mandarin Language Work experience required from Fraud Monitoring, Fraud Investigations, Transactional Frauds, Risk Investigation, Social Media Fraud Investigation, Cybercrime, Cybersecurity Investigation, SOC Analyst, Chinese Marketplaces) Preferred candidate profile Ability to read, write and communicate proficiently in Chinese Mandarin Language Good English communication (written & verbal), good analytical skills, ability to work

Posted 3 weeks ago

Apply

6.0 - 11.0 years

9 - 14 Lacs

New Delhi, Hyderabad

Work from Office

Company Name- CIPL (www.cipl.org.in) We have opening for our one government client Ministry of Home Affairs. Client Name- I4C (Indian Cybercrime Coordination Centre) Designation- Cybercrime Threat Intelligence Analyst - Hyderabad , Vacancy -1 Cybercrime Investigator/ Cyber Crime Investigation Researcher - Delhi , Vacancy- 2 Detect emerging Cybercrime threats based upon analysis, data feeds crime reporting and sources (internal & external intelligence sources). Working within the team and the wider Inf-ormation Security group to build new tools for intelligence gathering. * Knowledge of innovative technologies like block-chain, Artificial Intelligence/Machine Learning, IOT Security, Cloud Security will be an added advantage. * Knowledge of cryptography protocols. * Ability to derive intelligence out of data and reports generated and ability to conduct research in that direction and development of tools to handle such threats and overcome such risks. * Building and maintaining senior management dashboards to provide a clear understanding of team activities and threat landscape. * Identify and suggest appropriate infrastructure with suitable mitigation strategies for cyber crime * Evaluate target systems to analyze results of scans, identify and recommend resolutions * Producing periodic Cybercrime threat analysis reports with mitigation measures. * Programming skills with proficiency in one or more of the following, Python, Java, C++. * Excellent knowledge of digital hardware, computer programming, cyber security practices, databases & operating systems artifacts. * Review unlawful and suspicious content in open source and escalate violations to the appropriate govt. department. * Collect, organize, analyze and develop reliable actionable intelligence about cybercrime, criminals, criminal infrastructure from open sources. Must have advanced understanding of how to use open-source including social media for intelligence. * Ability to draft Sop's/ RFP/ Advisory Manuals/ Reports pertaining to Cyber Security/Inf-ormation Security/Cybercrime Investigation. * Proven ability to work both independently and as a team and present/develop ideas. * Ability to work effectively with technical and non-technical stakeholders. * Ability to communicate (verbal and written) with stakeholders in non-technical terms. * Experience with multiple social media platf-orms. * Using data from social media, open sources, search engines, public records, and the deep web to compile detailed reports on cybercrime, criminals and criminal infrastructure.

Posted 3 weeks ago

Apply

5.0 - 10.0 years

20 - 32 Lacs

Pune, Bengaluru, Mumbai (All Areas)

Hybrid

Note : Please do not apply if you are not comfortable with contract based work. IRM Developer Experience level 5 + yrs. of ServiceNow Development experience Mandatory and good to have skill set 1. Mandatory ServiceNow development experience with hands on experience on IRM . developing and implementing IT, GRC, Cyber, Risk processes,Indicator tasks 2. Good to have skills -Working Knowledge in more than one of the following disciplines: operational risk management, enterprise risk management, business continuity and disaster recovery, vendor management, audit management, corporate compliance, and policy management. Working Knowledge in working in a governance, risk, and compliance role, such as; external auditor, control owner, audit manager, or internal audit. Keywords – ServiceNow Integrated Risk Management Roles and responsibility – Design, Develop and implement in ServiceNow IRM. Provide software coding and customization including, but not limited to: screen tailoring, workflow administration, report setup, data imports, integration, scripting, third party software integrations, and custom application development. Create and maintain ATF

Posted 3 weeks ago

Apply

10.0 - 14.0 years

27 - 42 Lacs

Pune

Work from Office

Job Summary As a Cyber Security Specialist you will play a critical role in safeguarding our organizations digital assets. With a focus on Cyber Threat Intelligence Services you will work to identify and mitigate potential threats. Your expertise in Cyber Security and Cloud along with experience in CrowdStrike will be essential in ensuring the security of our systems. This hybrid role offers the flexibility of working both remotely and on-site during day shifts. Responsibilities Lead the development and implementation of advanced cyber threat intelligence strategies to protect organizational assets. Oversee the monitoring and analysis of security threats using CrowdStrike and other advanced tools. Provide expert guidance on cloud security best practices to ensure data integrity and confidentiality. Collaborate with cross-functional teams to design and implement robust security architectures. Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements. Develop and maintain incident response plans to effectively manage and mitigate security breaches. Coordinate with external partners and stakeholders to enhance threat intelligence capabilities. Implement security policies and procedures to comply with industry standards and regulations. Analyze security incidents and provide detailed reports to senior management. Train and mentor junior security team members to build a strong security culture within the organization. Stay updated with the latest cyber security trends and technologies to proactively address emerging threats. Support the integration of security solutions into existing IT infrastructure to enhance overall protection. Drive continuous improvement initiatives to optimize security operations and reduce risk exposure. Qualifications Possess a deep understanding of cyber threat intelligence services and their application in a corporate environment. Demonstrate proficiency in using CrowdStrike for threat detection and response. Exhibit strong knowledge of cloud security principles and practices. Have a proven track record of conducting security assessments and audits. Show experience in developing and implementing incident response plans. Display excellent communication skills for effective collaboration with cross-functional teams. Hold a relevant degree in Cyber Security Information Technology or a related field. Certifications Required Certified Information Systems Security Professional (CISSP) Certified Cloud Security Professional (CCSP)

Posted 3 weeks ago

Apply

0.0 - 1.0 years

0 - 2 Lacs

Mumbai, Mumbai Suburban, Thane

Work from Office

!!Hiring for CMM5 Level Organization!!Collaborate with IT security teams to develop and implement effective security policies and procedures, SOP and supporting documents.Create and deliver cyber security awareness training programs Required Candidate profile Designation: Cyber Security awareness Experience:6 Month to 1 Year Location:Ghansoli Qualification:Graduation Contact:snehapawar@peshr.com/7021769496

Posted 4 weeks ago

Apply

4.0 - 9.0 years

15 - 25 Lacs

Hyderabad

Work from Office

We are looking for UI Developer & DevOps - Cybersecurity Engineer for Hyderabad Location, if interested share your profiles to sushma.p@s9tech.in Required Technical Skills - *Frontend Development*: Proficiency in Angular (latest versions preferred) - *DevOps*: Experience with CI/CD pipelines, containerization (Docker/Kubernetes), and cloud platforms - *Security Tools Experience*: Hands-on development experience with any of the following: - *SIEM Tools*: Security Information and Event Management platforms - *XDR Tools*: Extended Detection and Response solutions - *MDR Tools*: Managed Detection and Response platforms ## Preferred Experience - Previous work experience at leading cybersecurity product companies such as: - *Splunk* - Security and observability platforms - *IBM QRadar* - SIEM and security analytics - *Stellar Cyber* - Open XDR platform - Other established cybersecurity product vendors ## Additional Qualifications - Strong understanding of cybersecurity concepts and threat landscapes - Experience with security data visualization and analytics dashboards - Knowledge of security compliance standards (SOC 2, ISO 27001, etc.) - Familiarity with threat intelligence and security orchestration workflows - Experience working in agile development environments

Posted 1 month ago

Apply

6.0 - 10.0 years

10 - 20 Lacs

Gurugram

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role At Kyndryl, our Security Consultants are game-changers, constantly pushing the boundaries of what's possible and transforming the way our customers do business. We're looking for a talented individual who thrives in a dynamic environment and is ready to take on the challenge of protecting organizations from threats both known and unknown – being the defender of tomorrow’s digital world. As a Security Consultant, you'll be the guardian of confidentiality, integrity, and availability, ensuring organizations are shielded from the ever-evolving threat landscape. Your expertise will be sought after as you assess, analyze, and implement effective security measures in customer environments, leaving no stone unturned when it comes to safeguarding their most sensitive data. Collaboration will be your forte, as you work closely with clients to understand their unique security requirements and assess their current security posture. Armed with this knowledge, you'll provide expert guidance and recommendations on the best security practices, risk management strategies, and robust security policies that will fortify their defenses. You won't stop at providing advice; you'll roll up your sleeves and get hands-on. Designing and implementing security controls, policies, and procedures will be your playground. You'll work alongside cross-functional teams to deploy state-of-the-art technologies, including firewalls, intrusion detection/prevention systems, access controls, and encryption technologies, ensuring a comprehensive security framework. The thrill of uncovering vulnerabilities and risks is what motivates you. Armed with your extensive knowledge, you'll conduct thorough security assessments, leaving no stone unturned in identifying potential security breaches. Your findings will serve as the foundation for meticulous security audits and reviews, ensuring adherence to policies and procedures. Your reports and findings will be the catalyst for management decisions and actions. In the fast-paced world of cybersecurity, staying ahead of the game is crucial. That's why you'll continuously immerse yourself in the latest security threats, technologies, and best practices. Your recommendations will drive enhancements to the organization's security posture, ensuring it remains at the cutting edge of defense. Your influence won't be limited to systems alone. You'll lend your expertise to the design and review of IT infrastructure, systems, and applications, ensuring they are secure by design from inception. Not only will you make an impact within our organization, but you'll also collaborate with customers and vendors on security assessments, audits, and due diligence activities. Your knowledge and experience will be instrumental in shaping secure collaborations and partnerships. Our consultants are restless for innovation. They are at the edge of technology, changing the way our customers implement business solutions – so, if you’re a problem-solver, an innovative thinker, and a self-starter with a passion high impact assignments which align technology to business outcomes, then we want to hear from you! Apply today to join our team that has a host of exciting projects and customers waiting for you to work with them to solve complex transformation puzzles through technology. Your Future at Kyndryl As a Security Consultant at Kyndryl you will join the Kyndryl Consultant Profession, working with other Kyndryl Consultants, Architects, Project Managers, and cross-functional Technical Subject Matter Experts – presenting unlimited opportunities with unmatched support through our investment in your learning, training, and career growth Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience 5+ years in IT security profile. Education : MCA / B.E. / B. Tech Project Experience : Minimum of 3+ years in security requirements, cyber security, IT security audits, certifications, etc., in at least 2 IT projects Certifications : ISO 27001 & CISSP (Certified Information Systems Security Professional) Responsibilities Facilitate review of the data security architecture as per the requirements. Facilitate review of the configuration of the required IT security infrastructure as per the law or as requested by the client against the acceptance criteria. Monitor activities related to periodic security testing/audits as per client requirements. Implement any new or existing guidelines/policies/acts issued by the Government of India on IT Security. Location : Requires working from Client location in Delhi Preferred Technical and Professional Experience CISSP (Certified Information Systems Security Professional) certification. ISO 27001 Certification. Other relevant certifications like CISM (Certified Information Security Manager) or CEH (Certified Ethical Hacker) can be beneficial. Excellent communication skills to effectively interact with stakeholders and educate employees on security best practices. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 1 month ago

Apply

12.0 - 20.0 years

35 - 40 Lacs

Bengaluru

Work from Office

Have over 12+ years of rich experience in information security domain and at least 8-10 years of dedicated experience in Cyber Security and resilience• Knowledge of cyber resilience frameworks (e.g., NIST CSF, ISO 27001)• Experience in defining and reporting metrics, KPIs and KRAs for cyber resilience.• Experience of managing enterprise Cyber Resilience and of direct and in-direct relationship with senior management.• Familiarity with advanced resilience solutions, risk, threat and security measures.• Knowledge across the Cyber Resilience domains including governance, control frameworks, policies, compliance management, risk management and incident response etc.• Comprehensive knowledge of regulatory and compliance requirements across various industries and how they influence the bank's Information Security strategy.• Having worked in BFSI domain with proven experience in Cyber Resilience.• Understanding of key security standards and regulations such as NIST 800-160, CERT/CC, PCI, ISO 27001:22• Sound knowledge of evolving advanced tech stacks and related control and risk universe from a cyber resilience perspective.• Sound knowledge and expertise in conducting risk assessment and management.• The candidate should have a technical or computer science degree.Preferred certifications : CISA, CCRF, CCRP

Posted 1 month ago

Apply

6.0 - 10.0 years

15 - 25 Lacs

Gurugram

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all – at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science – taking information that has been gathered and looking for areas to have that “Ah Ha” moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity – governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are Required Technical and Professional Experience 5+ years in IT security profile. Education : MCA / B.E. / B. Tech Project Experience : Minimum of 3+ years in security requirements, cyber security, IT security audits, certifications, etc., in at least 2 IT projects Certifications : ISO 27001 & CISSP (Certified Information Systems Security Professional) Responsibilities Facilitate review of the data security architecture as per the requirements. Facilitate review of the configuration of the required IT security infrastructure as per the law or as requested by the client against the acceptance criteria. Monitor activities related to periodic security testing/audits as per client requirements. Implement any new or existing guidelines/policies/acts issued by the Government of India on IT Security. Location : Requires working from Client location in Delhi Preferred Technical and Professional Experience CISSP (Certified Information Systems Security Professional) certification. ISO 27001 Certification. Other relevant certifications like CISM (Certified Information Security Manager) or CEH (Certified Ethical Hacker) can be beneficial. Excellent communication skills to effectively interact with stakeholders and educate employees on security best practices. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 1 month ago

Apply

5.0 - 7.0 years

7 - 9 Lacs

Mumbai

Work from Office

Position Purpose The candidate for the Third Party Risk Management role within the BNPParibas Operational risk team is responsible for providing independent oversight and strategic 2LOD guidance on the Third Party Risk Management domains across both direct and indirect areas of responsibility for the CIB APAC operating entities. Responsibilities Direct Responsibilities Be responsible for supporting the development and implementation of a CIB wide Third Party risk management program including ICT and non-ICT third parties. Successful candidate will have exposure to developing and implementing risk management programs in global organizations, with robust knowledge of technology, risks, architectures and related tools. Prior third party risk experience (IT, Cyber, Vendor management etc.) and exposure to the Financial Services industry is a must. Experience with GRC tools and other risk management information systems is preferred. Effectively challenge all aspects of the Risk and Control Self-Assessment (RCSA) of the business units under our remit, provide recommendations and follow up on their implementation Analyze risk data from various sources (e.g. external events, control deficiencies, risk register) to identify and measure levels of risk, concentration, trends and patterns and use it to assess the current control environment and recommend improvements where applicable Perform check and challenge of 1LOD mitigation plans, risk acceptances, permanent control action and audit recommendations, produce and communicate risk opinions and maintain working papers to substantiate and ensure objective basis for the risk opinions Collaborate with other 2LOD functions and teams across the Americas and Group on common priorities/projects Contribute to the successful execution of independent testing missions that are designed to evaluate TPRM risk identification and effective and sustainable mitigation. Perform independent testing controls and support the wider RISK ORM community globally in defining better maturity models for independent testing. The individual will lead this effort from an independent risk assessment of these projects and will support vendor assessment and reporting the findings. Excellent presentation skills are necessary. Experience interacting with regulatory agencies is a plus. Implement the wider Enterprise Risk Management framework (HI, PI, RCSA, Recommendations and action plan follow-up) on the third party risks area. Contributing Responsibilities Technical & Behavioral Competencies Essential 5+ experience specifically in third party assessments. Bachelor degree in Business or Risk Management (or equivalent professional qualification). Team player focus on the success of the whole team. Working well both with others, as well as individually. Excellent stakeholder management skills. Experience in a Vendor risk management, Outsourcing risk management, Technology Risk, Information Security or an IT Audit role. Good listening and analytical skills being able to come to a thoughtful and business focused conclusion quickly. Ability to co-operate and work well with others adopting an approachable style Important as we work closely with a large and diverse set of suppliers and customers. Ability to see the customer perspective, i.e. from a business point of view, the most secure solution is not always workable or realistic considering costs and benefits. Demonstrating a calm professional approach, with a good understanding of delivery within time constraints and the need to escalate/inform departmental management as appropriate. Adapting personal approach to suit situations, individuals, groups and cultures. Is flexible in relation to getting the job done. Taking accountability for their actions and be open and honest when things have gone wrong, and celebrating successes when things have gone well. Being rigorous and thorough especially when logging and tracking issues through to conclusion. Ability to manage their workload as to meet the realistic targets and priorities set in conjunction with management. Demonstrating a high-level of commitment and self-motivation, combined with enthusiasm and a genuine interest in the role of Risk Assessment in business. Ability to express views clearly and fluently, both orally and in writing. Considers the audience, avoiding technical jargon wherever necessary and appropriate. Competencies Good knowledge of Information Security, Business Continuity, and IT Audit methodology and concepts. Understanding of the banking industry's regulatory requirements for managing of third parties Ability to articulate risk management concepts in business language. Excellent written and verbal communication skills. Proficient with Microsoft Office Suite. Prior experience documenting tool requirements to support risk management. Proven ability to manage issues through to resolution; skilled at making judgment calls. Ability to successfully multitask and complete difficult assignments within deadlines which may have short lead times. Works iteratively, delivering quickly and frequently to produce high quality documents and outputs which require little to no rework. Knowledge of the English is required Knowledge of data analysis and visualization tools such as Tableau, Power BI, VBA is a plus Conduct Be a role model, supporting and fostering a culture of good conduct. Demonstrate proactivity, transparency and accountability for identifying and managing conduct risks. Consider the implications of your actions on colleagues, partners and clients before making decisions, and escalate issues to your manager when unsure.

Posted 1 month ago

Apply

6.0 - 10.0 years

11 - 15 Lacs

Bengaluru

Work from Office

Responsibilities for the position: • Subject Matter Expert on cyber security domain for our engine power plant automation & control systems (OT) • Own the development of plant automation & control systems product features towards agreed certifications or standards • Further develop cyber security guidelines, control system access policies, compliance related processes for engine power plants • Ensure cyber compliance and market competitiveness of the power plant automation & controls. Capture and translate global regulations / contract requirements to the development roadmap • Implement and ensure applicable security lifecycle controls to the products in accordance with SDL framework and IEC 62443 • Train and educate key stakeholders on cyber security requirements, internal guidelines, processes and access policies • Guide and support technical, sales, and engineering teams in validating project related cyber security requirements • Participate in customer negotiations and assurance activities Qualifications Master’s or bachelor’s degree in computer science, electrical engineering, information technology, automation engineering or a related field • In-depth understanding of operational technology related Purdue Enterprise Reference Architecture and product security requirements • Expertise in cyber legislations and standards for example IEC 62443, NERC CIP, NIS2, SOC2, AESCSF, SOCI and EU CRA • Experience in working with product security, vulnerability handling and cyber security in an industrial company context • Team player and collaborator mindset • Excellent presentation skills, as well as written, and verbal communication skills • Fluent language skills in English • Cyber security certifications are beneficial • Experience in agile methodologies is seen as a plus

Posted 1 month ago

Apply

16.0 - 20.0 years

35 - 60 Lacs

Hyderabad

Work from Office

Job Summary The Sr. Cyber Security Architect will play a pivotal role in designing and implementing robust security solutions to protect our digital assets. Candidate should have expertise in governance risk management compliance and operational technology security to protect against cyber threats and ensure the uninterrupted functioning of essential operations. Design secure system architectures for OT environments including network segmentation and access controls.mplement security controls and intru Responsibilities Lead the design and implementation of comprehensive security solutions to safeguard digital assets. Oversee the integration of Azure Sentinel for enhanced threat detection and response capabilities. Provide expert guidance on deploying Proofpoint Enterprise Email Protection to secure email communications. Implement Windows Defender ATP to ensure endpoint protection across the organization. Manage Checkpoint Firewall configurations on AWS/Azure to maintain network security. Collaborate with cross-functional teams to align security architecture with business objectives. Conduct regular security assessments to identify vulnerabilities and recommend improvements. Develop and maintain security policies and procedures to ensure compliance with industry standards. Monitor security systems and respond to incidents promptly to minimize impact. Design user-centric security solutions that enhance the overall user experience. Stay updated with the latest security trends and technologies to inform strategic decisions. Facilitate training sessions to educate employees on security best practices. Support the development of security strategies that contribute to the companys mission and societal impact. Qualifications Possess extensive experience in solution design and architecture with a focus on security. Demonstrate proficiency in Azure Sentinel and its application in threat detection. Have a strong background in deploying and managing Proofpoint Enterprise Email Protection. Show expertise in configuring and maintaining Windows Defender ATP. Exhibit knowledge of Checkpoint Firewall operations on AWS/Azure platforms. Understand user experience services and their integration with security solutions. Hold a degree in Computer Science Information Technology or a related field. Certifications Required Not Required

Posted 1 month ago

Apply

10.0 - 12.0 years

35 - 50 Lacs

Chennai

Work from Office

Job Summary The Cyber Security Architect will play a crucial role in designing and implementing security solutions to protect the companys digital assets. With a focus on Fortigate Next Gen Firewalls the candidate will ensure robust security measures are in place. The role involves collaborating with various teams including Sales & Marketing to align security strategies with business objectives. This hybrid position offers a dynamic work environment with a day shift schedule. Responsibilities Develop comprehensive security architecture strategies to safeguard digital assets and ensure compliance with industry standards. Implement Fortigate Next Gen Firewalls to enhance network security and protect against cyber threats. Collaborate with cross-functional teams to integrate security measures into business processes ensuring seamless operations. Analyze security systems and identify areas for improvement to optimize protection and efficiency. Conduct regular security assessments and audits to maintain the integrity of the companys digital infrastructure. Provide expert guidance on security best practices to internal teams fostering a culture of security awareness. Monitor emerging cyber threats and develop proactive strategies to mitigate risks effectively. Design and deploy security solutions that align with the companys objectives and enhance overall resilience. Oversee incident response activities ensuring swift resolution and minimal impact on business operations. Evaluate new security technologies and recommend implementations that enhance the companys security posture. Collaborate with Sales & Marketing teams to ensure security measures support business goals and customer trust. Lead training sessions to educate employees on security protocols and the importance of data protection. Maintain documentation of security policies and procedures ensuring accessibility and compliance. Qualifications Possess extensive experience in Fortigate Next Gen Firewalls demonstrating expertise in configuration and management. Have a strong understanding of cybersecurity principles and practices with a focus on network security. Experience in Sales & Marketing domain is advantageous providing insight into aligning security with business strategies. Demonstrate excellent analytical skills with the ability to identify vulnerabilities and propose effective solutions. Exhibit strong communication skills capable of conveying complex security concepts to non-technical stakeholders. Show proficiency in conducting security audits and assessments ensuring compliance with industry standards. Display a proactive approach to threat detection and mitigation staying ahead of potential risks.

Posted 1 month ago

Apply

7.0 - 9.0 years

27 - 42 Lacs

Bengaluru

Work from Office

Job Summary As a Cyber Security Specialist you will play a crucial role in safeguarding our organizations digital assets. With a focus on LDAP Ping Directory and a hybrid work model you will ensure the integrity and confidentiality of sensitive information. Your expertise will contribute to maintaining a secure environment supporting our mission to protect data and enhance trust in our services. Responsibilities Develop and implement security measures to protect the organizations digital infrastructure. Monitor and analyze security alerts to identify potential threats and vulnerabilities. Collaborate with IT teams to integrate security protocols into existing systems. Conduct regular security audits and assessments to ensure compliance with industry standards. Provide guidance and support to staff on security best practices and protocols. Investigate security breaches and incidents to determine root causes and implement corrective actions. Maintain and update security policies and procedures to reflect current threats and technologies. Utilize LDAP expertise to manage and secure directory services effectively. Work closely with stakeholders to address security concerns and implement solutions. Ensure the confidentiality integrity and availability of sensitive information. Stay informed about the latest cybersecurity trends and technologies to enhance security measures. Contribute to the development of security awareness programs for employees. Support the organizations mission by ensuring a secure and trustworthy digital environment. Qualifications Possess strong experience in LDAP and its application in cybersecurity. Have a solid understanding of cybersecurity principles and practices. Demonstrate proficiency in conducting security audits and assessments. Exhibit excellent problem-solving skills to address security challenges. Show ability to work collaboratively with cross-functional teams. Display knowledge of industry standards and compliance requirements. Have experience in developing and implementing security policies. Be familiar with security incident response and investigation techniques. Possess strong communication skills to convey security concepts effectively. Have a proactive approach to identifying and mitigating security risks. Show commitment to continuous learning and staying updated on cybersecurity trends. Demonstrate ability to manage and secure directory services using LDAP.

Posted 1 month ago

Apply
Page 1 of 3
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies