Home
Jobs

1798 Cyber Security Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 - 10.0 years

10 - 18 Lacs

Bengaluru

Hybrid

Naukri logo

Were Hiring: Information Security Risk Specialist | 79 Years Experience | Bengaluru Location: Bengaluru Experience Required: 7 to 9 years Employment Type: Full-Time We’re looking for a seasoned Information Security Risk Specialist to lead and strengthen our enterprise-wide risk management framework. If you’re passionate about cybersecurity, thrive on identifying and mitigating risks, and have hands-on experience with global standards like ISO 27001 and NIST. Key Responsibilities: Design and implement enterprise-wide InfoSec risk management programs. Conduct risk assessments, vulnerability analyses, and compliance evaluations. Collaborate across IT, engineering, legal, and external partners to drive mitigation strategies. Lead security awareness initiatives and incident response planning. Track and report KPIs and security metrics to senior stakeholders. What We’re Looking For: 5+ years in cybersecurity, risk, or compliance roles. In-depth knowledge of ISO 27001, NIST, COBIT, COSO frameworks. Strong analytical, communication, and stakeholder management skills. Preferred certifications: CISSP, CRISC, CISM, CEH. Why Join Us? Be a key player in building secure systems powering global transport solutions. Work with cutting-edge technologies and global teams. Drive meaningful change in a high-impact, high-autonomy role.

Posted 11 hours ago

Apply

4.0 - 6.0 years

16 - 25 Lacs

Gurugram

Work from Office

Naukri logo

Purpose of the Role The Risk Analyst supports the validation and resolution of risk issues, working closely with system owners and the Crown Jewels Program Manager. This role involves monitoring treatment plans, validating issue closures, and recommending compensating controls. The Risk Analyst plays a crucial role in identifying, assessing, and mitigating cybersecurity risks to safeguard organizational assets. Responsibilities Validate issues and coordinate resolutions with system owners. Monitor and track the progress of treatment plans, ensuring timely remediation. Evaluate and recommend compensating controls to effectively mitigate risk. Conduct risk assessments and analysis to identify emerging threats. Provide risk insights to enhance security posture and compliance efforts. Collaborate with cross-functional teams to improve risk management strategies. Minimum Requirements: BE-BTECH / Bachelors degree in Cybersecurity, Risk Management, or a related field. 4-6 years of experience in risk analysis, cybersecurity, or related discipline. Experience in risk frameworks such as NIST, ISO 27001, CIS, or FAIR. Familiarity with compliance standards and regulatory requirements. Strong analytical and problem-solving skills with attention to detail. Effective communication skills to articulate risk findings and recommendations. Ability to remain calm under pressure organization in high-pressure situations Excellent problem solving and analytical skills Preferred Requirements Successful closure and validation of critical risk issues. Ensuring treatment plans progress on schedule with minimal delays. Maintaining high issue closure rates and timely remediation. Proactive identification and mitigation of emerging cybersecurity risks. Clear and effective collaboration with internal stakeholders

Posted 11 hours ago

Apply

10.0 - 15.0 years

8 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

PF Detection is mandatory Primary Skills: 10+ years in penetration testing, 4+ years in stakeholder management, attack surface management tool (Crowdstrike Falcon, Darktrace, Qualsys etc) Job details: Lead and plan attack surface detection for NAB group Provide direction for NAB in usage of Attack surface scanning Promote the usage of ASM scanning

Posted 11 hours ago

Apply

8.0 - 13.0 years

15 - 27 Lacs

Chennai, Coimbatore

Work from Office

Naukri logo

About the Role As a Sr. Information Security Officer, you'll join growing Global Corporate Security Office diverse international team bridging divisions, central services, and global entities. Ideal for career changers or early cybersecurity enthusiasts, this role offers a hands-on learning experience with room to grow. What Youll Do: Provide day-to-day operational security support, advising on policies, controls, and best practices. Analyze security queries across the organization and recommend mitigating or compensating solutions. Collaborate in developing and enhancing the Information Security Management System (ISMS) and policies. Drive continuous improvement of security processes and controls. Perform risk analysis, logging risk indicators, and ensuring effective follow-up. Act as a security advocate: deliver awareness training, and support project teams and management. Investigate and manage internal security incidents, ensuring timely resolution. Engage in diverse security initiatives based on your skills and interests. Conduct security induction sessions for new hires. What Youll Bring Bachelors or masters degree in a relevant fieldor equivalent practical experience. Excellent communication capabilities with both technical and business stakeholders (e.g., CISO, IT, engineering). Familiarity with frameworks like NIST or ISO 27001. CISSP and/or CISM certifications. Fluent in English (verbal and written)

Posted 11 hours ago

Apply

4.0 - 9.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

Must have skills- Cybersecurity, Cloud, CyberArk, Infrastructure, Onboarding, SaaS, Cyber Security, LDAP, Linux, Windows, Configuration, Error Messages, Patching, Safes Exp 3+ yr 15 LPA 0-15 days ONLY Hybrid - 3 days work from office Required Candidate profile Exp managing CyberArk SaaS Privilege Cloud & the Components Infrastructure

Posted 11 hours ago

Apply

10.0 - 20.0 years

9 - 19 Lacs

Pune, Mumbai (All Areas)

Work from Office

Naukri logo

IT Audit Manager At Smith+Nephew, we design and manufacture technology that takes the limits off living. As a key member of the Internal Audit team, the IT Audit Manager will be responsible for: leading IT Reviews; supporting the Director to develop the end-to-end IT Audit Plan; developing stakeholder relationships across the Group; coaching and mentoring more junior team members; and acting as an ambassador for the Internal Audit Function across the Group. What will you be doing? Leads and conducts assigned audit engagements (specifically IT audits consisting of complex cyber security, IT, and programme assurance reviews) successfully in accordance with the Global Internal Audit Methodology and professional standards. Represents Group Internal Audit in global steering committees and IT leadership forums to provide governance, risk and control related input. Drafts the Terms of Reference, develops audit programs and testing procedures relevant to risk and audit / test objectives. Supervises senior auditors and co-source staff assigned to engagements providing guidance and overall review of deliverables. Communicates assigned tasks to engagement team in a manner that is clear and concise ensuring high quality, accurate, and efficient results. Obtains and reviews evidence ensuring audit conclusions are well-documented. Identifies and communicates issues, offering recommended solutions relevant to business and risk. Drafts the closing meeting presentation. Prepares draft audit reports, ensuring that audit conclusions are based on a complete understanding of the process, circumstances, and risk. Assesses and monitors managements progress in implementing agreed upon actions. Provides technical expertise in emerging digital risk areas and GBS SOX and MAPS control efficiency and effectiveness improvements. Provides data analytics thought leadership and support to the Group Internal Audit team to enable continuous assurance. Assists in preparation of Annual Audit plan for IT and audit committee papers Ensures adequate focus on personal professional growth relevant to taking on more challenging assignments, in line with standard audit career progression proactively seeks relevant education and training opportunities. Acting as an ambassador for Internal Audit across the business. Performs other related duties as assigned. What will you need to be successful? Education: Graduate + CISA certified Preferred - Qualified Accountant (i.e; ACA / ACCA / CA / CPA / CMA) or CISM, CISSP or equivalent preferred. Min 10-12 years post qualified experience gained in either the profession and / or a large corporate internal audit / risk management department. Experience auditing cybersecurity, cloud and digital technologies. Experience auditing IT General Controls or SOX IT controls. Significant experience auditing SAP or another ERP. Experience of auditing large scale international systems implementations and / or project management of international systems implementations. Thorough knowledge of audit procedures, including the IIA standards and guidelines and risk-based auditing techniques. Strong understanding of IT and Cyber Security risks and controls Ability to lead audits, present findings to senior management and resolve conflict. Ability to write audit reports and maintain comprehensive audit papers. Experience in Teammate ( or similar Audit Management software) administration. PowerBI certifications and /or Data Analytics qualifications an advantage (preferred). Strong Data Analytics skills and proven experience in using tools such as PowerBI, Alteryx, MS Fabric etc. Excellent communication skills; oral and written. Able to communicate audit findings and negotiates with others to agree audit findings and recommendations often requiring them to adopt a different point of view. You Unlimited. We believe in crafting the greatest good for society. Our strongest investments are in our people and the patients we serve. Inclusion, Diversity and Equity- Committed to Welcoming, Celebrating and Thriving on Diversity. Learn more about it on our website: https://www.smith-nephew.com/. Other reasons why you will love it here! Your Future: Major medical coverage + policy exclusions and insurance non-medical limit. Educational Assistance. Work/Life Balance: Flexible Personal/Vacation Time Off, Privilege Leave, Floater Leave. Flexibility: Hybrid Work Model (For most professional roles)

Posted 12 hours ago

Apply

10.0 - 12.0 years

12 - 13 Lacs

Mumbai

Work from Office

Naukri logo

Job Summary: We are looking for a Senior Operations Manager to oversee and optimize business operations, ensuring efficiency, cost-effectiveness, and compliance. The ideal candidate will be responsible for streamlining processes, improving productivity, managing cross-functional teams, and implementing best practices to achieve operational excellence. Key Responsibilities: 1. Strategic Leadership: Develop and implement strategic plans for the service and operations department in alignment with overall organizational goals. Provide vision and direction to achieve excellence in service delivery. 2. Team Management: Lead, mentor, and manage teams across regions, fostering a culture of collaboration, innovation, and continuous improvement. Ensure effective communication and coordination among team members. 3. Service Delivery: Oversee the operation and maintenance of Electronic Security, Fire Detection/Suppression, IBMS & allied systems solutions. Ensure service quality, responsiveness, and timely issue resolution. 4. Client Relationship Management: Build and maintain strong relationships with clients to understand their evolving needs and expectations. Address client concerns promptly and ensure high levels of customer satisfaction. 5. Regional Operations: Efficiently manage service and operations activities across multiple regions. Implement standardized processes while considering regional variations and requirements. 6. Performance Metrics: Establish and monitor key performance indicators (KPIs) to evaluate team and individual performance. Regularly assess and improve operational efficiency based on metrics. 7. Resource Planning: Plan and allocate resources effectively to meet service demands. Optimize staffing levels, skill sets and equipment to ensure efficient operations. 8. Training and Development: Implement training programs to enhance the technical skills and knowledge of service teams. Keep the team updated on industry advancements and best practices. 9. Budget Management: Develop and manage budgets for service and operations. Monitor expenses and implement cost-effective measures without compromising service quality. 10.Continuous Improvement: Identify opportunities for process improvement and implement best practices. Foster a culture of continuous learning and innovation within the service and operations teams. 11.Health and Safety Compliance: Ensure compliance with health and safety regulations. Implement and enforce safety protocols to create a secure working environment. 12.Emergency Response Planning: Develop and implement effective emergency response plans to address critical situations promptly. Conduct regular drills and assessments to ensure preparedness.

Posted 12 hours ago

Apply

9.0 - 14.0 years

9 - 19 Lacs

Bengaluru

Work from Office

Naukri logo

We are seeking a highly experienced Cybersecurity Solutions Specialist to drive technical engagements and solution design for enterprise clients. This role combines strategic presales leadership with hands-on cybersecurity expertise, including L3 support, SOC operations, and threat intelligence. You will act as a trusted advisor to clients, guiding them through complex security challenges and aligning solutions with business needs. Lead technical discovery sessions and design tailored cybersecurity solutions. Deliver product presentations, demos, and Proof of Concepts (PoCs). Respond to RFPs/RFIs and develop comprehensive technical proposals. Evaluate new technologies, tools, and processes for inclusion in solution offerings. Manage and operate security tools including SIEM, IDS/IPS, EDR, DLP, and firewalls. Implement and maintain SOC and ISMS frameworks aligned with ISO 27001. Conduct threat intelligence analysis and stay updated on emerging threats. Perform vulnerability assessments, penetration testing, and system hardening. Analyze and respond to software/hardware vulnerabilities and security log data. Conduct security audits and document incident response procedures. Hands-on experience with EDR, Anti-Virus, Vulnerability Management, Forensics, and Encryption. Experience in cybersecurity presales, solution architecture, or consulting. Strong knowledge of security domains including: Network Security (Firewalls, IPS/IDS) Endpoint Security (EPP, EDR, XDR) Cloud Security (Azure, AWS, GCP) Identity & Access Management (IAM, PAM) Data Protection (DLP, encryption) Security Operations (SIEM, SOAR) Strong scripting skills (Python, PowerShell, Bash) for automation and analysis. Familiarity with MITRE ATT&CK framework and threat intelligence platforms. Experience in cybersecurity, including L3 support and presales roles. Advanced certifications preferred: CISSP, CISM, CEH, OSCP, GCIA, GCIH, CASP, CompTIA Security+ or vendor-specific certifications (e.g., Palo Alto, Fortinet, Microsoft Security). Strong understanding of cyber-attacks, threat vectors, risk management, and incident response. Flexible to work in 24x7 operations and rotational shifts.

Posted 12 hours ago

Apply

4.0 - 9.0 years

12 - 16 Lacs

Bengaluru

Work from Office

Naukri logo

About us As a Fortune 50 company with more than 400,000 team members worldwide, Target is one of the worlds most recognized brands and one of Americas leading retailers. Target as a tech companyAbsolutely. We are the behind-the-scenes powerhouse that fuels Targets passion and commitment to cutting-edge innovation. We anchor every facet of one of the worlds best-loved retailers with a strong technology framework that relies on the latest tools and technologiesand the brightest peopleto deliver incredible value to guests online and in stores. Behind the brand our guests love, is a culture of continual innovation and right now, we are up to big things. The Cyber Fusion Centre is the heart of Targets security team and a place where innovation happens daily. Interested in a culture that combines invention and creative freedom, ongoing learning, engineering excellence, and stellar outcomesWe are, too thats why we work here. Join our team to take new enterprise security solutions from concept to release, collaborating with both software & security engineers to innovate on helping defend Targets network using cutting-edge technologies.We are seeking a Senior Threat Detection Engineer to join our world class cybersecurity-cyber defence team. The ideal candidate will be responsible for designing, implementing, and optimizing threat detection mechanisms to protect the organization from advanced cyber threats.About The Role/Key Responsibilities: Threat Detection Development : Design and implement detection rules, signatures, and analytics to identify malicious activities in real-time. Develop use cases and correlation rules in SIEM and other detection platforms. Create automated processes to improve detection efficiency and reduce response times. Security Monitoring & Optimization : Continuously monitor and tune rules to reduce false positives by improving rule fidelity and ensuring actionable alerts. Stay updated with emerging threat landscapes to enhance detection capabilities. Incident Support : Collaborate with Incident Response (IR) and Threat Hunting teams to provide context and insights during investigations. Participate in post-incident reviews to refine detection strategies based on lessons learned. Collaboration & Reporting : Work with Cyber Threat Intelligence (CTI) teams to integrate threat intelligence into detection mechanisms. Document and present detection engineering activities, findings, and recommendations to stakeholders. About You/Qualifications: Bachelors degree in Cybersecurity, Computer Science, or related field (or equivalent experience). 4+ years of experience in threat detection, incident response or related roles. Demonstrates a deep subject matter expertise with threat detection, response, and mitigation Capable of identifying detection opportunities sourced from threat data Exhibits an understanding of concepts such as Pyramid of Pain, MITRE ATT&CK, and other organizing frameworks Hands-on experience with security tools such as SIEM (Splunk, ElasticSearch, Zeek, SIGMA, Suricata and YARA technologies) Host based detection experience leveraging Sysmon, CrowdStrike Falcon, etc. Cloud based detection within GCP and AWS Proficiency in scripting and automation (Python, PowerShell, etc.) Deep knowledge of network protocols, operating systems, and attack techniques. Excellent problem-solving and communication skills. Stays current with new technologies via formal training and self-directed education Why Join Us Be part of a forward-thinking world class cybersecurity team. Opportunities for professional growth and continuous learning. Useful Links- Life at Target- https://india.target.com/ Benefits- https://india.target.com/life-at-target/workplace/benefits Culture- https://india.target.com/life-at-target/diversity-and-inclusion

Posted 12 hours ago

Apply

5.0 - 7.0 years

7 - 10 Lacs

Pune, Chennai, Bengaluru

Work from Office

Naukri logo

Immediate Openings on SIEM Engineer _Contract_Pan India Notice Period :Immediate. Type : Contract Key Accountabilities Building, maintaining, and operating Splunk Enterprise and Splunk Enterprise Security SaaS Solution Building Co-relation searches for Cyber Operation requirements Evaluating and analysing business requirements and designing suitable solutions, challenging requirements where necessary Managing, co-ordinating and implementing technical project activities and enhancements to services Conducting Incident/ Problem/ Recovery activities Supporting the Joint Operations Centre and incident response teams for detected security events. Creating and maintaining accurate and high-quality documentation Supporting Operational effectiveness audit Structure phased deliverables to link long term vision with time-boxed activities. Support the project delivery phase including testing and training, to ensure the agreed business solutions are delivered successfully. Work closely with developers and testers, to ensure delivery of the functionality on time and with quality. Stakeholder Management and Leadership Negotiate and solicit engagement and support at all levels of the organisation, particularly where support is low or challenging. Communicate clearly and regularly. Typically faces off to AVP VP level stakeholders. Considers the impact of their actions and decisions on key stakeholders, seeking to deliver a positive outcome for those involved. Decision-making and Problem Solving Apply evaluative judgement and analytical skills to operate effectively within a complex and changing environment. Understand the requirements and perspectives of stakeholders and integrate into their understanding of complex situations. Demonstrates a broad understanding of how the bank operates and the metrics used to measure performance Analyses problems and evaluates options in a logical and systematic way. Seeks the advice of stakeholders to better create clarity in complex situations, understand problems, evaluate options and make decisions What were looking for: Knowledge of Splunk Enterprise architecture, distributed components (indexer clusters, forwarders, search head clusters, deployment servers) , knowledge of Splunk Cloud Knowledge of Splunk Enterprise Security at administration and use case level Knowledge on on-boarding new data into Splunk, Splunk Forwarders - data ingestion, extraction. Knowledge of the Common Information Model, data models, enrichment, and automation Good experience on Splunk add-Ons installation configuration to bring security logs into Splunk. Good understanding of the Security Domain. Documentation skills in order to provide high quality documentation for internal customers and technical teams.

Posted 12 hours ago

Apply

15.0 - 20.0 years

30 - 40 Lacs

Bengaluru

Work from Office

Naukri logo

Role & responsibilities Functional Validation Automation Cyber security Networking

Posted 13 hours ago

Apply

2.0 - 7.0 years

2 - 6 Lacs

Mumbai

Work from Office

Naukri logo

B2 Role L1/ L2 Support resource ( 2 years experience in DLP) Daily Summary Report with list of activities to be shared on daily. Configure Client tasks Purge events on frequent basis Help Desk Support Support in Troubleshooting during Agent installation Providing VPN evidences Support user in installation or uninstallation of Agents Support in resolving Agent Communication issues Support in Agent Upgrade Generate and share MIS reports with end user Troubleshooting Policy related issues Whitelisting of IPs, PF IDs Sharing of granular details of Infringements. Provide Root cause analysis documents

Posted 13 hours ago

Apply

6.0 - 11.0 years

8 - 18 Lacs

Hyderabad

Hybrid

Naukri logo

Immediate Openings on Trellix Endpoint Security PAN INDIA - Contract Skills:Trellix Endpoint Security LOCATION : PAN INDIA Period :Immediate Employment Mode : Contract Description Evaluation Criteria Description Job Title Email security Analyst L2 Skill Name PGP email encryption Personal Qualities - Excellent written and verbal communication skills - Ability to multi-task, prioritize, coordinate, work well under pressure and meet deadlines Key Responsibilities PGP Key Management: Generate, store, and distribute public/private key pairs for email encryption. Manage key lifecycle, including key rotation, revocation, and expiration. Encryption Implementation: Implement PGP encryption on company email systems (e.g., Outlook, Thunderbird).

Posted 13 hours ago

Apply

6.0 - 8.0 years

8 - 14 Lacs

Bengaluru

Work from Office

Naukri logo

6-8 Years experience on creating Design documents, Implementation/ Change Management Plans or Optimization of reports (beyond day-to-day routine operations) is a must. Expertise in Implement &/or design (design is must) of one of the following - Priority is Firewall and good if candidates have hands on exp on Identity solutions, Email Security, Web Security/Proxy, Cloud Security. Cisco ISE is a plus

Posted 13 hours ago

Apply

6.0 - 11.0 years

4 - 8 Lacs

Hyderabad

Work from Office

Naukri logo

Immediate Openings on Security Consultants with Vulnerability _Contract_Pan India 6+ Years Security Consultants with Vulnerability Pan India Period :Immediate. Type Contract Description 7 + Years Security Consultants with Vulnerability tools exp like Qualys or Tenable (prefer Qualys) and ServiceNow. Experience with Vulnerability tools such as Qualys or Tenable (prefer Qualys) and ServiceNow .

Posted 13 hours ago

Apply

5.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Naukri logo

Project description Do you have the expertise to manage cyber security productsAre you a committed and visionary team player with a logical mind-setAre you motivated to work in a complex, diverse and global environment Security is a global organization within Group Technology Infrastructure and Security Engineering. Our services focus on preventing and detecting cyber threats and securing our IT systems. We provide consolidated and reliable security services that implement secure design principles and create best-fit solutions. You will be working in the Cyber Hygiene Technology team, providing security products and services for the Cyber Hygiene space - specifically for Application Security and Penetration testing. We provide consolidated and reliable security hygiene controls to our clients using the latest technology. As a Tech Cyber Security Engineer, you will play a vital role in creating Infrastructure, determining required IT business solutions, and assisting in implementing them. Responsibilities Evaluate, plan, build and maintain the infrastructure for Application Security Testing and Penetration testing tools Ensure the performance, uptime, and security of tools across cloud and on-premises environments Ensure operational workflows and the day-to-day operations, including tool updates, troubleshooting, and reported issues Collaborate with cross-functional teams to ensure smooth functioning of the tools and the related systems Contribute to the reduction of all security and operational risks, in line with policies and standards Ensure the product stays accurate, up-to-date and complaint in all bank's systems Analyse issues within applications/systems and define corrective measures Skills Must have Ideally 5+ years of experience in IT Security engineering capacity with experience in integration, automation, development efforts Very good knowledge of the Azure cloud ecosystem and its native capabilities Solid scripting experience (e.g. PowerShell, bash, python) and version control basics (e.g. Git) Sound experience of automation pipelines and DevOps tooling Sound experience with Windows and Linux operating systems Technical experience in infrastructure setup for Application security and Penetration testing tools Good knowledge on Network and Infrastructure Good knowledge of Infra as Code (e.g. ARM, Terraform) Previous experience with container technologies is a plus (e.g. Kubernetes) Previous experience with deploying complex cybersecurity enterprise solutions is a plus (e.g. vulnerability scanning suites, pen-testing software, application security tools) Solid understanding of agile methodologies within a large organization Inquisitive, able to challenge effectively and manage conflicting stakeholder needs Technical communication and documentation skills Nice to have N/A Other Languages EnglishC1 Advanced Seniority Senior

Posted 13 hours ago

Apply

6.0 - 10.0 years

13 - 18 Lacs

Bengaluru

Work from Office

Naukri logo

Project description The project is focused on ensuring data privacy and compliance in the client environment by implementing and managing data masking solutions using the Delphix platform. This role involves collaboration with cross-functional teams to secure sensitive data while maintaining data integrity for development, testing, and analytics. Responsibilities Key Responsibilities: Design and Implementation: Develop and implement robust data masking solutions using the Delphix platform. Analyze data sets to identify sensitive information that requires masking. Create and maintain masking rules, algorithms, and templates for various data environments. Data Security & Compliance: -Ensure sensitive data complies with regulatory requirements, such as GDPR, HIPAA, PCI-DSS, and CCPA. -Collaborate with security and compliance teams to establish masking policies and standards. Testing & Validation: Conduct thorough testing to validate the effectiveness of masking solutions. Troubleshoot and resolve issues related to data masking processes. Collaboration & Support: Work closely with database administrators, developers, and QA teams to integrate masking into workflows. Provide training and documentation on the Delphix platform and data masking techniques. Monitoring & Optimization: Continuously monitor and optimize data masking performance. Stay updated on the latest trends and updates in data masking technologies. Skills Must have Required Skills and Qualifications: -Bachelor's degree in Computer Science, Information Technology, or a related field. -10+ years of experience in mainframe environments with expertise of 1 year in Hogan applications. -Strong knowledge of COBOL, JCL, VSAM, DB2, and CICS. Knowledge of ---IMS is an added advantage. -Experience with Hogan modules such as IDS, CIS, or Loans. -Familiarity with banking processes and financial services. -Excellent problem-solving, debugging, and analytical skills. -Strong communication skills, with the ability to collaborate across technical and business teams. Nice to have Preferred Qualifications: -Experience with mainframe modernization or migration projects. -Knowledge of automation tools for mainframe systems. -Familiarity with Agile and DevOps methodologies in a mainframe environment. -Certification in mainframe technologies and Hogan systems. Other Languages EnglishC2 Proficient Seniority Senior

Posted 13 hours ago

Apply

5.0 - 10.0 years

12 - 16 Lacs

Hyderabad

Work from Office

Naukri logo

Project description Luxoft DXC Technology Company is an established company focusing on consulting and implementation of complex projects in the financial industry. At the interface between technology and business, we convince with our know-how, well-founded methodology and pleasure in success. As a reliable partner to our renowned customers, we support them in planning, designing and implementing the desired innovations. Together with the customer, we deliver top performance! For one of our Clients in the Insurance Segment we are searching for a CyberArk Engineer. Responsibilities 1.Work with business units and IT team to onboard privileged accounts to CyberArk 2.Perform CyberArk patching, upgrades, and platform stability. 3.Troubleshoot and resolve CyberArk related issues for privileged accounts and service accounts. 4.Lead the implementation and support of CyberArk Secrets Management initiatives. 5.Assist in periodic audits, compliance, assurance reviews and reporting related to privileged access management. 6.Onboard, configure, and migrate service accounts from basic vaulting to password rotation with full automation. 7.Configure CyberArk workflows, safes, and access controls for privileged account management. 8.Work with application teams to secure credentials for applications, scripts, and automation processes. 9.Maintain and optimize CyberArk policies and manage credential lifecycle. 10.Automate privileged account onboarding workflows to reduce manual effort. Client is in the USA: Mexico candidateswork from 9am EST time zone. India candidatesCandidate should be able to work until 11.00 am EST to overlap a few hours with the client and be able to attend meetings. Skills Must have This role requires a strong L3 engineer. L2 and L1 operational candidate profiles are not suitable for this role. Minimum 5 years of hands-on experience in CyberArk Engineering. Familiarity with CyberArk components such as PVWA, CPM, PSM, PTA etc. Nice to have Insurance industry experience Other Languages EnglishC1 Advanced Seniority Senior

Posted 13 hours ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Mumbai, Pune, Bengaluru

Work from Office

Naukri logo

Your role Drive and ensure business, IT and Security teams are compliant to applicable IAM policy, IAM .standards and instructions. Work closely with IAM team ( Run and Project) to design and deploy monitoring and control systems based on IAM policy and instructions. Ensure critical applications are well integrated with the good level of IAM control and governance ( access review, good approval workflow) based on policy and instruction. Develop and maintain measurable IAM security metrics; ensure metrics provide actionable insights to the applicable stakeholders. Maintain IAM policy & instruction awareness of business, technical, architecture, infrastructure, and end user support Develop and maintain measurable KPIs to showcase IAM governance performance Analyse internal and external threats and recommend remediation actions based on IAM capability. Your profile Maintain IAM policy & instruction awareness of business, technical, architecture, infrastructure, and end user support Develop and maintain measurable KPIs to showcase IAM governance performance Analyse internal and external threats and recommend remediation actions based on IAM capability. Perform IAM audit / gap assessments of internal systems and processes and provide recommendations to mitigate the same Deliverables: PAM Audit compliance Dashboard, reporting Analysis, Identity Health Check & governance

Posted 14 hours ago

Apply

5.0 - 10.0 years

7 - 17 Lacs

Hyderabad

Work from Office

Naukri logo

Immediate Job Openings on # Splunk Admin _ Pan India_Contract #Experience: 5 Years #Skill : Splunk Admin #Location: Pan India #Notice Period: Immediate . #Employment Type: Contract #Job Description : Splunk Admin Installations, Configuration and troubleshooting of Splunk Interested candidates share profiles at #Email:

Posted 14 hours ago

Apply

5.0 - 8.0 years

4 - 8 Lacs

Hyderabad

Work from Office

Naukri logo

1. Conduct vulnerability scan using Prisma's cloud vulnerability scanning features to identify vulnerabilities in cloud resources . 2. Assess and monitor security posture of Kubernetes clusters, including network policies, pod configurations and container runtime security. 3. Leverage Prisma cloud's automated vulnerability risk scoring to evaluate severity of vulnerabilities 4. Work with teams to prioritize vulnerabilities based on severity, exploitability & potential business impact. 5. Ensure organization's cloud infrastructure complies with industry standards 6. Use Prisma cloud to scan Kubernetes clusters and container registries for known vulnerabilities and misconfigurations 7. Create vulnerability reports that detail discovered vulnerabilities, risk analysis and remediation actions.

Posted 15 hours ago

Apply

4.0 - 7.0 years

11 - 17 Lacs

Jaipur

Work from Office

Naukri logo

Experience Required: 4+ years in Cybersecurity, with 2+years hands-on Imperva DAM Reports To: Security Operations Lead / SOC Manager Job Summary: We are seeking an experienced ITSM and CIS Benchmarking Specialist to drive service management excellence and ensure systems are hardened according to industry best practices. The ideal candidate will have deep knowledge of ITIL-based ITSM practices and hands-on experience applying CIS Benchmarks for endpoint and server security compliance. Key Responsibilities: ITSM: Oversee the implementation and continuous improvement of ITSM processes aligned with ITIL framework (e.g., Incident, Change, Problem, Asset, and Configuration Management). Ensure accurate and timely incident/ticket management via ITSM tools (e.g., ServiceNow, BMC Remedy, Fresh service). Develop ITSM dashboards and reports to track SLAs, service availability, and operational KPIs. Collaborate with technical and business teams to streamline service workflows and automate manual tasks. Provide training and guidance on ITSM processes across teams. CIS Benchmarking: Perform security baseline assessments of servers, endpoints, and cloud environments using CIS Benchmarks. Coordinate with IT infrastructure and application teams to implement and validate CIS hardening steps. Use tools such as CIS-CAT Pro, SCAP, Tenable, or Qualys for benchmark scanning and reporting. Maintain a central repository of system configurations, benchmark reports, and deviation justifications. Support internal and external audits by providing CIS compliance evidence and remediation plans. Required Skills and Qualifications: 2+ years of experience in implementing and managing ITSM processes and tools. 2+ years of experience applying CIS Benchmarks across Windows, Linux, databases, or cloud platforms. Strong understanding of ITIL v3 or v4, with certification preferred. Familiarity with endpoint/server hardening, system configuration management, and patching. Experience using configuration and compliance management tools (e.g., Ansible, Chef, SCCM, GPO). Ability to document policies, procedures, and control deviations. Preferred Qualifications: ITIL Foundation or Practitioner certification. Experience in audit/compliance functions, particularly in regulated industries (BFSI, healthcare, government). Familiarity with ISO 27001, NIST 800-53, or other security frameworks. Education Requirements : BE, B.Tech in IT/CS/ECE, BCA, BSc CS and MCA Certification : Any ITSM Certification/CEH

Posted 16 hours ago

Apply

12.0 - 19.0 years

40 - 50 Lacs

Pune

Hybrid

Naukri logo

Position Specification Global Information Security Architect Johnson Controls, Inc. Private and Confidential Johnson Controls Johnson Controls, Inc. (NYSE: JCI) is a global diversified industrial leader employing 170,000 employees serving customers in more than 150 countries with products, services and solutions on a B2B basis to a wide range of market segments. The company operates across three major business units: Automotive Experience; Power Solutions; and Building Efficiency. Automotive Experience generates approximately $20bn of revenue annually and designs and produces automotive seating and interiors systems that help make the driving experience more comfortable, safe and enjoyable. Building Efficiency provides products and services which enhance the comfort, safety and energy efficiency of buildings. Through its Power Solutions business, Johnson Controls is the worlds leading supplier of batteries used in automobiles, including conventional cars and trucks. In fiscal 2014, Johnson Controls generated $42 billion in revenues. The Role Hosted in Pune, India, Senior Cyber Security Engineer is a position, part of a global team, reporting into the Cyber Security Engineering Manager with responsibility of assisting in development of Processes, Standards, and Designs of JCIs Cyber Security Infrastructure Working closely with Project Managers, Global Operations and Technology groups, Business Unit IT delivery organizations, the identity management, and other infrastructure architecture members when creating and implementing Cyber Security Infrastructure. Ensures compliance with established architecture direction and standards. Works with Service Management and stakeholders to collect functional requirements and ensure the most effective solution is used. Maintains an understanding of relevant industry standards and directions to ensure key vendors, suppliers and service partners development plans include support for same. Primary Responsibilities The responsibilities of the Information Security Global Architecture Senior Manager include, but are not limited to: Provide team support with validating security controls Ensures that third party solutions used within Cyber Security follow all Johnson Controls standards. Acts as an internal consultant to business units and Infrastructure IT. Provides management with accurate and complete status information. Provide technical input into security related standards, technology roadmaps, support requirements and management of infrastructure designs Stay abreast of current and evolving technologies in Cyber Security. Adheres to all current changes and problem management policies and procedures. Candidate Profile The successful candidate will be a passionate information security professional with the ability to communicate to different business and Project managers. The candidate will be able to execute the Cyber Security Engineering management strategy defined by leaders. The candidate will demonstrate drive, intelligence, maturity, and energy and will be a proven team leader and security strategist. A minimum bachelors degree in computer engineering, computer security or computer science discipline or equivalent experience 10 years of Cyber Security related experience working with teams in security operations, incident analysis, developing applications, and security applications. Experience with validation security tools. Experience with Security features, assessments, and validation of security controls for both Linux and Windows based systems Familiarity with network security methodologies, tactics, techniques, and procedures. Experience performing security/vulnerability reviews of network environments. Experience of network security architecture, understanding of the TCP/IP protocol, and remote access security techniques/products. Experience with enterprise anti-virus/malware solutions, virus outbreak management, and the ability to differentiate virus activity from directed attack patterns. Candidate must be able to react quickly, decisively, and deliberately in high stress situations. Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, to technical and non-technical audiences at different seniority levels and interact with customers. Highly motivated individual with the ability to self-start, prioritize, multi-task and work in a global team setting. Ability to create and maintain good business relationships with counter parts, customers, and external entities to achieve the security operations management goals Ability to maintain a high level of discretion and personal integrity in the exercise of duties, including the ability to professionally address confidential matters Familiarity of regulatory compliance requirements (PCI-DSS, HIPAA, FISMA, SOX, etc.) Required Certifications 10+ years Certification Information Systems Security Professional (CISSP) At least 5+ years Certification (or similar) in one of: Certified Information Security Manager (CISM) Information Systems Security Architecture Professional (ISSAP) Certified Ethical Hacker (CEH) Cisco Certified Network Associate Security (CCNA Security) Certificate of Cloud Security Knowledge (CCSK) Certified Cloud Security Professional (CCSP) This job description indicates the general nature and level of work expected of the incumbent. It is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities required of the incumbent. Incumbent may be required to perform other related duties.

Posted 16 hours ago

Apply

2.0 - 4.0 years

5 - 7 Lacs

New Delhi, Gurugram

Work from Office

Naukri logo

Key Responsibilities • Design, implement, and manage email security solutions. • handle Trend Micro CAS & Cisco Umbrella, monitor threats. • respond to incidents, update policies, collaborate with teams • stay updated on email & DNS security trends.

Posted 17 hours ago

Apply

3.0 - 5.0 years

9 - 13 Lacs

Noida

Work from Office

Naukri logo

Key Responsibilities: Perform in-depth penetration testing, vulnerability assessments, and security reviews of applications, infrastructure, and networks. Identify, exploit, and document security vulnerabilities across systems and provide remediation recommendations. Simulate sophisticated attacks to test the strength of security controls and identify potential areas of compromise. Collaborate with development, infra, and DevOps teams to integrate security into the development lifecycle and Infrastructure-as-Code (IaC) security. Develop comprehensive security test plans, methodologies, and tools to ensure effective assessment of systems. Create detailed reports that outline vulnerabilities, risks, and recommended mitigations. Perform threat modeling and risk assessments to prioritize testing efforts. Monitor network traffic for threats and respond to security incidents. Ensure security best practices in Cloud environments, security controls for cloud workloads, IAM policies, and network security. Monitor and respond to cloud security incidents using SIEM and cloud-native security tools. Integrate and automate security testing and compliance checks into CI/CD pipelines using tools like SAST, DAST, and IAST . Experience Range: 3 - 5 years Educational Qualifications: -B.Tech/B.E in Computers , -B.Tech/B.E in IT Job Responsibilities: Required Skills & Qualifications: Bachelor's degree in Computer Science, Cybersecurity, or related field . 2-3 years of experience in cybersecurity with a focus on Penetration testing or Ethical Hacking , Application Security, Cloud Security, and DevSecOps . Experience with security tools such as Burp Suite, Metasploit, Nessus, Wireshark, SonarQube, AWS WAF, Google WAF, Kali Linux, and other vulnerability scanning tools, etc. Knowledge of SIEM , EDR , NIST, CIS, and OWASP security frameworks. Proficiency in scripting (Python, Bash, PowerShell) for security automation. Industry certifications like CEH, Security+, AWS/GCP Security, or any DevSecOps-related certification (preferred but not mandatory). Excellent written and verbal communication skills to effectively report vulnerabilities and collaborate with stakeholders.Qualifications: Bachelors degree in computer science . Skills Required: DevOps , Linux , PHP , Python

Posted 17 hours ago

Apply

Exploring Cyber Security Jobs in India

With the increasing digitization of businesses and the rise in cyber threats, the demand for cyber security professionals in India has been on the rise. Organizations across various industries are actively looking to hire skilled individuals who can protect their digital assets and information from cyber attacks.

Top Hiring Locations in India

If you are looking to kickstart your career in cyber security in India, consider exploring job opportunities in the following major cities:

  1. Bangalore
  2. Delhi/NCR
  3. Mumbai
  4. Hyderabad
  5. Pune

These cities have a high concentration of tech companies, financial institutions, and government organizations that are constantly looking to bolster their cyber security teams.

Average Salary Range

The salary range for cyber security professionals in India varies based on experience and expertise. On average, entry-level positions such as Cyber Security Analysts can expect to earn between INR 4-6 lakhs per annum, while experienced professionals in roles like Chief Information Security Officer (CISO) can earn upwards of INR 20 lakhs per annum.

Career Path

A typical career progression in cyber security may involve starting as a Security Analyst or Engineer, moving on to roles like Security Consultant or Penetration Tester, and eventually advancing to positions such as Security Architect or Chief Information Security Officer (CISO).

Related Skills

In addition to expertise in cyber security, professionals in this field are often expected to have knowledge of:

  • Network security
  • Information security
  • Risk management
  • Security compliance
  • Incident response

Interview Questions

Here are 25 interview questions you may encounter when applying for cyber security roles:

  • What is a firewall and how does it work? (basic)
  • Explain the concept of encryption. (basic)
  • What is the difference between symmetric and asymmetric encryption? (medium)
  • How do you stay updated with the latest cyber security threats and trends? (basic)
  • What is a DDoS attack and how can it be mitigated? (medium)
  • Describe the steps involved in a typical penetration testing process. (advanced)
  • How would you respond to a security breach in real-time? (medium)
  • Explain the concept of least privilege access. (basic)
  • What is the role of a Security Information and Event Management (SIEM) system? (medium)
  • How do you conduct a security risk assessment? (advanced)
  • What are the common methods used for authentication in cyber security? (medium)
  • How can you secure a wireless network? (medium)
  • What is the difference between vulnerability assessment and penetration testing? (medium)
  • Describe the differences between a virus, worm, and trojan horse. (medium)
  • How would you secure a web application from common security threats? (advanced)
  • What is the importance of patch management in cyber security? (basic)
  • How can you prevent social engineering attacks in an organization? (medium)
  • Explain the concept of zero-day vulnerability. (advanced)
  • How do you ensure compliance with data protection regulations like GDPR? (medium)
  • What is the role of a security policy in an organization? (basic)
  • How do you handle incident response during a cyber attack? (advanced)
  • What are the key components of a disaster recovery plan? (medium)
  • How can you secure IoT devices from potential cyber threats? (medium)
  • Explain the concept of end-to-end encryption. (medium)
  • How would you conduct a forensic investigation in case of a security breach? (advanced)

Closing Remark

As you embark on your journey to pursue a career in cyber security in India, remember to continuously upskill, stay informed about the latest trends in the industry, and showcase your problem-solving abilities during interviews. With dedication and perseverance, you can excel in this exciting and rewarding field. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies