Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 10.0 years
15 - 27 Lacs
Pune
Remote
Position: Cyber Security Engineer Location: Remote Experience Level: 5+ Years Job Type: Full-time Job Summary: We are looking for a highly skilled Cyber Security Engineer with strong expertise in Splunk and a solid understanding of data engineering principles . The ideal candidate will have experience in designing and implementing Splunk dashboards, managing large-scale data ingestion, performing data integrity checks, and transforming raw data into actionable insights to support cyber defense initiatives. Key Responsibilities: Design, implement, and maintain Splunk dashboards, alerts, and reports for monitoring and incident response. Develop and optimize Splunk SPL (Search Processing Language) queries to support detection use cases. Lead and manage data ingestion pipelines , ensuring reliable and secure data flow from multiple sources into Splunk. Perform data transformation, normalization, and enrichment to enable efficient security analytics. Conduct regular data integrity and quality checks , and troubleshoot ingestion issues. Collaborate with security analysts, incident responders, and threat intelligence teams to improve detection and response capabilities. Implement and maintain security monitoring tools and integrations across hybrid cloud environments. Ensure data governance and compliance with internal policies and regulatory requirements. Required Skills & Experience: Strong hands-on experience with Splunk Core and Splunk Enterprise Security . Proficiency in SPL (Search Processing Language) for developing complex queries and use cases. Experience with dashboard creation, reporting, and visualization in Splunk. Background in data engineering understanding of data pipelines, ETL processes, and big data frameworks is preferred. Expertise in data ingestion methodologies , including onboarding logs and event data from various systems. Knowledge of data transformation techniques , such as field extractions, lookups, and macros. Familiarity with security concepts such as SIEM, threat detection, incident response, and compliance. Working knowledge of scripting languages like Python or Shell for automation and integration.
Posted 2 weeks ago
7.0 - 12.0 years
11 - 16 Lacs
Mumbai
Work from Office
SUMMARY Our client is IT MNC part of one of the major insurance groups based out of Germany and Europe. The Group is represented in around 30 countries worldwide, with Over 40,000 people worldwide, focusing mainly on Europe and Asia. Our client offers a comprehensive range of insurances, pensions, investments and services by focusing on all cutting edge technologies majorly on Could, Digital, Robotics Automation, IoT, Voice Recognition, Big Data science, advanced mobile solutions and much more to accommodate the customers future needs around the globe thru supporting millions of internal and external customers with state of-the-art IT solutions to everyday problems & dedicated to bringing digital innovations to every aspect of the landscape of insurance. Job Location: Hiranandani Gardens, Powai, Mumbai Mode: Work from Office Requirements Key Responsibilities: : Business-Cybersecurity Alignment: o Work closely with business stakeholders, IT security teams, and cross-functional teams to ensure cybersecurity initiatives align with the organization’s broader business goals. o Translate business needs into technical security requirements that can be effectively executed by the security and IT teams. Risk Analysis & Security Assessments: o Conduct risk assessments in the context of hybrid IT environments (cloud, on-premises, and edge) to identify security gaps and vulnerabilities. o Collaborate with security teams to evaluate existing security controls and recommend solutions to mitigate identified risks, balancing business needs with security requirements. Cybersecurity Frameworks & Compliance: o Ensure that all business and technical security requirements comply with relevant regulatory compliance frameworks (e.g., NIST CSF, ISO 27001, GDPR, HIPAA). o Support audits and compliance assessments, identifying any gaps between current practices and regulatory standards. (must have) Security Process Improvement: o Identify opportunities for process improvements within the cybersecurity function, including streamlining security incident response, access management processes, and threat detection workflows. o Develop business cases for proposed security improvements, including cost-benefit analyses and risk assessments. The Business Analyst will have comprehensive responsibilities spanning multiple cybersecurity domains, and should have expertise in at least 5 of the following areas o SIEM Sentinel & Security Operations: Manage and optimize SIEM solutions, particularly Sentinel, for effective monitoring, incident detection, and security event correlation across hybrid environments. Collaborate with security operations teams to ensure proper configuration, tuning, and reporting within SIEM platforms to support proactive threat management. o Security Tools & Technology Integration: Work with security teams to implement and optimize security tools such as SIEM (e.g., Splunk, Microsoft Sentinel), EDR (e.g., CrowdStrike, MS Purview/Defender), SOAR platforms, CASB (Cloud Access Security Broker), and Threat Intelligence systems. Help define and document requirements for the integration of cybersecurity tools into the broader security ecosystem. o User Access Management (UAM) & RBAC: Work closely with identity and access management teams to ensure the implementation of UAM and RBACsystems that align with the organization's security policy and business requirements. Support the development of processes for managing user roles, privileges, and access rights across enterprise systems. o Cloud & Encryption Security: Ensure that security policies and controls are applied across both on-premises and cloud environments(AWS, Azure, Google Cloud), addressing challenges related to cloud security, data encryption, and access management. Collaborate with technical teams to implement strong encryption methods for data - in - transit, data-at-rest, and data-in-use in line with organizational security policies. o AI & ML in Cybersecurity: (Good to have) Contribute to the use of AI/ML technologies to enhance threat detection, anomaly identification, and predictive analytics within the organization’s security operations. Collaborate with data scientists and security teams to define requirements for AI/ML-based security models and incident response automation. o SOAR Integration & Incident Response: Assist with the integration of Security Orchestration, Automation, and Response (SOAR) solutions into the incident response lifecycle to streamline response times and automate repetitive tasks. Support the continuous improvement of incident response procedures and playbooks, ensuring a consistent, rapid, and efficient approach to security incidents. Benefits
Posted 2 weeks ago
2.0 - 9.0 years
9 Lacs
Mumbai, Nagpur, Thane
Work from Office
Inspira Enterprise India Pvt. Ltd. is looking for Senior Analyst to join our dynamic team and embark on a rewarding career journey The Senior Analyst plays a crucial role in driving data-driven decision-making processes within the organization This position involves analyzing complex data sets, generating actionable insights, and providing strategic recommendations to support key business initiatives Key Responsibilities:Data Analysis:Conduct in-depth analysis of large and complex datasets to extract meaningful insights Utilize statistical and data visualization tools to present findings in a clear and concise manner Strategic Planning:Collaborate with cross-functional teams to understand business objectives and provide analytical support for strategic initiatives Develop and maintain models to support forecasting, budgeting, and other planning processes Reporting and Dashboards:Design and create comprehensive reports and dashboards to track key performance indicators (KPIs) and metrics Automate reporting processes to improve efficiency and accuracy Trend Analysis:Identify trends and patterns in data to help anticipate opportunities and challenges Provide insights on market trends, competitor analysis, and industry benchmarks Decision Support:Assist senior management in making informed decisions by providing data-driven recommendations Evaluate the impact of proposed strategies on business outcomes Process Improvement:Identify areas for process improvement and efficiency gains based on data analysis Collaborate with teams to implement changes and measure the impact
Posted 2 weeks ago
17.0 - 22.0 years
35 - 40 Lacs
Pune, Chennai
Work from Office
We re seeking a future team member for the role of Vice President to join our Information Security team. This role is located in Pune, Maharashtra -HYBRID BNYM is seeking an initiative-taking professional to join its Cyber Security Third Party Governance (CTPG) team. The successful candidate will work in a technically diverse and dynamic environment with a team of Cyber Security professionals responsible for the assessment, analysis and governance of cyber security for third party vendors. The successful candidate will have deep technical and assessment skills to identify vendor cyber vulnerabilities that puts the BNYM at risk. The individual works closely with the Cyber TPG Security Leader, Business Sourcing Leads (BSL), enterprise sourcing, technology risk management, engagement managers, business teams and vendors on identified cyber risks in vendor environments. This requires both good oral and written communications skills and the ability to negotiate. Must be able to keep sensitive information confidential and know how to use appropriately. In this role, you ll make an impact in the following ways: Assess the cyber security risk of third party vendors with an appropriate level of detail Travel to vendor locations for on-site assessments Interface with enterprise sourcing, technology risk management, business teams and engagement management on vendor cyber security issues identified Review and challenge vendor evidence for issue closure Assist in the design and implementation Cyber TPG related processes and tools Define and create relevant metrics, presentations and reports Review the cyber related attestations by third parties such as SOC2 and ISO 27001 and report any observations for further review and tracking Review vendor risk reports created by internal and external entities for impacts to cyber security Keep up to date on the latest trends, methodologies and tools related to third party Interface with industry coalitions working on third party cybersecurity issues To be successful in this role, we re seeking the following: Bachelors degree in computer science or a related discipline, or equivalent work experience required, advanced degree preferred. Industry certifications such as CISSP or CISM a plus 17+ years of experience in cyber security related activities required Firsthand experience in performing control-level technical cyber risk assessments In-depth technical knowledge in 1-2 cyber domains Experience in the securities or financial services industry is a plus Experience in third party governance and related tools is strongly desired but not required Ability to manage multiple projects and priorities Familiarity with various global regulations and industry standards concerning cyber security Strong verbal and written communication skills
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Python Developer Position: Python Developer Grade B2/C1 (5- 8 years) Location: Bangalore Technical Proficiency: Programming: Data Python (must avoid Application Python). Should be able to solve the medium and complex programs. OS: UNIX/LINUX. Candidate should have working knowledge of UNIX/LINUX. Should be able to monitor the tasks/process. Debug the issues by checking the logs. Database: SQL . Candidate should be good in SQL functions, sub-quires, joins. Tools: Knowledge of version control (Git), CI/CD tools, should be aware of deployment process. Exposure to Agile methodologies. Candidate must be quick learner. Good to have: Candidates from BFSI domain. Candidates having Cyber Security background. Python, Sql, Unix & Linux
Posted 2 weeks ago
6.0 - 10.0 years
20 - 25 Lacs
Mumbai, Mumbai Suburban, Mumbai (All Areas)
Work from Office
Minimum 6+yrs experience in Information Technology Infrastructure, Information Security, IT Audits etc Experience in managing Information Security Management, GRC, Cyber, System & ISO Audits. Good knowledge of SEBI Cyber Security & NCIIPC guidelines. Required Candidate profile Exposure on ISO 27001, ISO 22301, ISO 9001, NIST framework. Good interpersonal,communication, documentation & presentation skills. Track compliance /regulatory requirements & ensure on time reporting. Perks and benefits To be disclosed post interview
Posted 2 weeks ago
4.0 - 9.0 years
20 - 25 Lacs
Mumbai, Mumbai Suburban, Mumbai (All Areas)
Work from Office
Minimum 4+yrs experience in Information Technology Infrastructure, Information Security, IT Audits etc Experience in managing Information Security Management, GRC, Cyber, System & ISO Audits. Good knowledge of SEBI Cyber Security & NCIIPC guidelines. Required Candidate profile Exposure on ISO 27001, ISO 22301, ISO 9001, NIST framework. Good interpersonal,communication, documentation & presentation skills. Track compliance /regulatory requirements & ensure on time reporting. Perks and benefits To be disclosed post interview
Posted 2 weeks ago
5.0 - 10.0 years
32 - 37 Lacs
Bengaluru
Work from Office
Total of 10+ years of relevant IT experience with 10 + years in Security implementations Scope of role is to assess a project s compliance with Oracle policies and suggest remediation. Must have: -Plan, Configure and Deploy a cloud solution -Create a well-informed cloud strategy and manage the adaption process. -Understanding Customer s business requirements and leading technical solution development using Oracle s cloud capabilities -Experience in implementation of cyber security solutions for the Azure/AWS/Oracle/GCP cloud environments -Experience in developing customer solutions using Oracles offerings: Oracle Autonomous Database, Oracle Fusion Middleware and Oracle PaaS products. -Strong experience in Terra form and Python. -Be able to define Technical Design - High level and low level -Niche skills like IDCS, OCI IAM, Data Safe and Cloud Guard is a plus -Cloud (OCI/AWS/Azure/GCP) Architect Associate level certification is a must -Strong knowledge of Java, Unix and experience in shell scripting -Good communication skills - verbal and written Total of 10+ years of relevant IT experience with 10 + years in Security implementations Scope of role is to assess a project s compliance with Oracle policies and suggest remediation. Must have: -Plan, Configure and Deploy a cloud solution -Create a well-informed cloud strategy and manage the adaption process. -Understanding Customer s business requirements and leading technical solution development using Oracle s cloud capabilities -Experience in implementation of cyber security solutions for the Azure/AWS/Oracle/GCP cloud environments -Experience in developing customer solutions using Oracles offerings: Oracle Autonomous Database, Oracle Fusion Middleware and Oracle PaaS products. -Strong experience in Terra form and Python. -Be able to define Technical Design - High level and low level -Niche skills like IDCS, OCI IAM, Data Safe and Cloud Guard is a plus -Cloud (OCI/AWS/Azure/GCP) Architect Associate level certification is a must -Strong knowledge of Java, Unix and experience in shell scripting -Good communication skills - verbal and written
Posted 2 weeks ago
10.0 - 15.0 years
37 - 45 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
Design, develop, troubleshoot and debug software programs for databases, applications, tools, networks etc. As a member of the software engineering division, you will take an active role in the definition and evolution of standard practices and procedures. You will be responsible for defining and developing software for tasks associated with the developing, designing and debugging of software applications or operating systems. Work is non-routine and very complex, involving the application of advanced technical/business skills in area of specialization. Leading contributor individually and as a team member, providing direction and mentoring to others. BS or MS degree or equivalent experience relevant to functional area. 10 years of software engineering or related experience. The Oracle Cloud Infrastructure (OCI) team can provide you the opportunity to build and operate a suite of massive scale, integrated cloud services in a broadly distributed, multi-tenant cloud environment. OCI is committed to providing the best in cloud products that meet the needs of our customers who are tackling some of the world s biggest challenges. We offer unique opportunities for smart, hands-on engineers with the expertise and passion to solve difficult problems in distributed highly available services and virtualized infrastructure. At every level, our engineers have a significant technical and business impact designing and building innovative new systems to power our customer s business critical applications. What is Access Governance at OCI? Access Governance service offering to the next level on Oracle Cloud Infrastructure. Access Governance is a cloud service that provides visibility into access rights across both cloud and on-premises environments, and across infrastructure and applications. It helps administrators to automate access provisioning, analyze access permissions, manage access policies, identify anomalies, and remediate security risks. Who are we seeking? We are looking for engineers with distributed systems experience. You should have experience with the design of major features and launching them into production. You ve operated high-scale services and understand how to make them more resilient. You work on most projects and tasks independently. You have experience working with services that require data to travel long distances, but have to abide by compliance and regulations. You stay up at night thinking about how to protect the service from upstream dependencies. The ideal candidate will be technically strong and get a lot done - you ve worked on services that are highly available, scalable, and redundant. You understand that simple systems are easier to operate and troubleshoot. You can balance speed and quality with iteration and incremental improvements. You ve made life easier for other developers and have motivated your teams to make both process and service improvements with your ability to automate and instrument properly to get the right data. You understand operational excellence and how to instil a culture of being proactive with your teammates. You find anomalies in graphs that didn t trip any alarms and root cause problems before they become real problems. The person in this role will get a lot done on a daily basis, drive tactical execution of features and projects, and own feature design. What are the biggest challenges for the team? The biggest challenges for the team are reliability and performance. The growth of the business is driving us to improve the ability of our systems to scale out and handle traffic patterns that are several orders of magnitude greater than what we can support today. We understand that software is living and needs investment. The challenge is making the right trade-offs, communicating those decisions effectively, and crisp execution. We need engineers who can build services that handle millions of requests per second. We need engineers who can figure out how we can survive regional data centre outages and protect our customers. We need engineers who can build services that enable us to offer even more options to customers and contribute to the overall growth of Oracle Cloud. Required Qualifications Hands-on experience building and operating entire systems and services Experience driving security reviews, documentation, UX reviews, and working with Product Managers through the entire launch process Experience developing service-oriented architectures and RESTful web services Strong development experience in Java, C++, C#, or similar OO languages Experience with at least one scripting language for automating tasks, proof of concept work, or command line tools SSL Handshakes, Certificates along with their components, RSA Algorithms, Symmetric/Asymmetric keys, Hashing , Signing, Encryption/Decryption , Cyber Security, Cryptography Preferred Qualifications Hands-on experience developing services on a public cloud platform (e.g., AWS, Azure, Oracle) Experience and understanding of multi-AD/AZ and regional data centers Building continuous integration/deployment pipelines with robust testing and deployment schedules Experience with Docker Experience working with internal customers and translating requests into prioritised work or features Expertise in applying threat modeling or other risk identification techniques to develop security solutions FedRAMP, PCI DSS, or similar compliance and auditing experience Experience working with large enterprise customers
Posted 2 weeks ago
5.0 - 10.0 years
14 - 18 Lacs
Noida, Kanpur, Bengaluru
Work from Office
We are currently seeking a dynamic and results-driven Cyber Security Sales Manager to lead our sales team. As a Sales Manager, you will be responsible for driving revenue growth and developing new business opportunities in the Cybersecurity market. You will work closely with our clients to understand their security needs and provide solutions that meet their requirements. Responsibilities: Developing and executing sales strategies to achieve revenue growth targets Managing and coaching the sales team to achieve individual and team sales goals Building and maintaining relationships with clients to understand their security needs Collaborating with our technical team to develop and deliver customized security solutions Tracking and reporting sales metrics and trends Staying up-to-date with the latest Cybersecurity trends and technologies Requirements: Bachelors degree in Business Administration, Marketing, or related field At least 5 years of experience in Cybersecurity sales or related field Proven track record of exceeding sales targets Strong leadership and coaching skills Excellent communication and negotiation skills Familiarity with Cybersecurity solutions and technologie
Posted 2 weeks ago
7.0 - 12.0 years
10 - 20 Lacs
Hyderabad, Pune
Work from Office
Role:Cyber Security with BA Exp: 7 to 12 years Location: Pan India Notice Period: Immediate to 15 days Engage with Cyber, business and functional stakeholders to identify business requirements for control lifecycle management with a focus on regulatory assessments, and provide support during the analysis of the banks compliance with new regulations Support internal and external assessments on behalf of Cybersecurity teams Support the build of regulatory evidence collection process and documentation Role: The role sits in Cybersecurity Risk and Controls’ Strategy, Team supporting Group Cybersecurity Control Owners in the effective controls management and governance. The Cybersecurity Business Analyst will work closely with various stakeholders to ensure that the cybersecurity control processes are effective, efficient, and aligned with organizational standards. This is a dynamic role that involves oversight of the control management lifecycle and providing support during regulatory assessments (internal and external).
Posted 2 weeks ago
1.0 - 4.0 years
2 - 4 Lacs
Chennai
Work from Office
Roles and Responsibilities Provide desktop support to end-users, troubleshooting hardware and software issues. Configure LAN, WAN, VPN and Outlook configurations for seamless connectivity. Perform root cause analysis (RCA) to resolve complex technical problems. Collaborate with team members to ensure timely resolution of customer queries. Maintain accurate records of all incidents and actions taken during support calls. Desired Candidate Profile 1-4 years of experience in desktop support or related field. Strong knowledge of Microsoft operating systems, CCNA certification preferred. Proficiency in Linux operating systems, Mac OS, PC components, cyber security best practices. Excellent communication skills with ability to work independently as well as part of a team.
Posted 2 weeks ago
5.0 - 8.0 years
9 - 12 Lacs
Chennai
Work from Office
Job Description: Conduct regular risk assessment to identify key IT and Cybersecurity risk areas and ensure those are appropriately covered in the annual IT audit plan. Advanced Networking principles/ software engineering principles/ information security principles, Additional knowledge and domain expertise specific to the job profile. (knowledge of information security management, auditing skills, network/systems/application security). Ensure that all audit work is thorough, complete, and has been performed in accordance with TVS Credit's Internal Audit standards, Regulatory guidelines (RBI) and other relevant industry standards, depending on the focus area of the review. Build strong working relationships with TVS Credit's leadership and their respective teams. Execute various IT/IS audit engagements including risk assessments, audit planning, audit testing, control evaluation, audit report drafting, and follow-up and verification of issue closure. Be accountable for meeting deliverable deadlines, adhering to department and professional standards and utilizing consistent methodology. Communicate audit findings to management and identify opportunities for improvement in the design and effectiveness of key controls. Required Qualifications, Capabilities And Skills: At least 5 years of relevant experience Must have experience with core cybersecurity operations and one or more cyber security tools/process areas (e.g. network security, end point security, email security, cloud security, attack simulation, cyber threat modelling etc.) Must have demonstrated knowledge of technology processes, such as change management, security operations, technology operations, and business resiliency, as well as application and infrastructure controls. Knowledge of various cybersecurity functions such as cybersecurity operations, attack simulation (red team, blue team), vulnerability management, cybersecurity tools/processes across network, endpoints, cloud environments, cyber threat modeling (knowledge of MITRE ATT&CK framework), etc. Analytical skills and a thirst for knowledge and new experiences. Ability to effectively manage multiple, concurrent projects and meet deadlines while working both independently and in a team environment. Good verbal and written communication; and presentation skills. Ability to adapt to a fast-paced culture, changes in the environment and shifts in priorities. Highest professional standards, integrity, and ethical behavior. Enthusiastic, self-motivated, effective under pressure and willing to take personal responsibility/accountability. Rigor in tracking and follow up of IS audit open points Basic knowledge of AL-ML models and the embedded risks and the audit testing procedures to be carried out for testing the controls. Data Analysis skills on complex and voluminous data.
Posted 2 weeks ago
2.0 - 6.0 years
8 - 12 Lacs
Mumbai
Work from Office
This position is responsible for day-to-day administration of NextGen AV, EDR DLP. Troubleshooting experience on various NextGen AV EDR products like MS Defender , CrowdStrike and SentinelOne. .Apply investigation techniques to document root cause and impact of security incidents. Hands-on implementation experience of DLP technology across large enterprises. Troubleshooting expertise on various DLP OEMs; Symantec, Forcepoint MacAfee. Monitor and respond to alerts generated from the DLP systems and other technologies. Collaborate with business groups to help them identify, classify, and secure high value data. Implementation of proactive measures to enhance accuracy and effectiveness of DLP tools. Provides 24x7 on-call support, which has roaster that is rotated. Utilizes existing tools and leverage innovative solutions to automate tasks with an emphasis on scalability and reliability. Provides technical support for activities that improve the security posture of client networks. Updates incident, request and change management records. Participate in problem management and RCA analysis.
Posted 2 weeks ago
3.0 - 4.0 years
3 - 4 Lacs
Noida
Work from Office
Position: Cyber Security Engineer Experience: 3 to 4 Yrs Location: Noida Education: B.E./ B.Tech. MCA Mandatory Skills Candidate Profile Must have experience in Governance - Security Operational Tasks support governance. Compliance and Risk Management. Vulnerability Management - vulnerability (infra and app) scans and remediation plans SMP (Security Management Plan) - preparing, reviewing and managing Authorisation management - should have managed the accounts controls in the Infra scope Security Patch management - end-to-end coordination and implementation Security product management - Antivirus Management, like TrendMicro, Defender, etc... Security incident management - Managing the end-to-end security incident lifecycle with corrective measures Audit support - support auditors mandate on the security system and artefacts Mitigation - thinking analytically and executing efficiently. Analyse and optimise orchestration and automation between security tools Vendor Management, Collaboration, Facilitation - Excellent customer-facing skills and significant experience building strong client relationships Communication Skills - Communicate security and technology needs effectively Security Reporting, Meetings Communication - Prepare and develop security report as contractually required, attend client and Sopra Steria meetings to provide security expertise and advice Certification: CISM ISO 27001 certification is a must
Posted 2 weeks ago
8.0 - 10.0 years
25 - 30 Lacs
Hyderabad, Bengaluru
Work from Office
Job Title: Senior Cybersecurity Engineer Location: Bangalore Department: Engineering & Product Development Experience: 8-10 Years Compensation: 25-30 LPA Job Description: AutoSec Innovation is building next-generation Automotive cybersecurity solutions and products. Were looking for a technically strong and self-motivated Engineer who can drive the design, implementation, and mentoring activities across CyberSecurity, AUTOSAR, Functional Safety, and Embedded domains for ECUs like IVI, Telematics, and Infotainment, ADAS. This role is for a hands-on leader who will own technical architecture decisions, oversee a Engineering team and collaborate closely with business and delivery to help build customer-ready solutions and products from scratch. Key Responsibilities: 1. Team Leadership & Mentoring • Lead and mentor a team of engineers. • Create structured onboarding and training plans in: o AUTOSAR (Classic & Adaptive) o ISO 21434 Cybersecurity o ISO 26262 Functional Safety • Promote best coding practices, peer reviews, and agile methodologies. • Act as the technical coach and first line of problem-solving support. 2. Technical Leadership & Execution • Define system architecture and software integration flow for: o AUTOSAR stacks o Security mechanisms (Secure boot, Secure diagnostics, HSM) o FOTA, VKSM, IDPS, and key management systems • Take ownership of end-to-end delivery of platform or customer ECUs. • Participate in cybersecurity assessments, threat analysis (TARA), and compliance to CSMS/ISO 21434. 3. Product & Platform Development • Work closely with Product Management to define platform features. • Develop and own reusable components and security layers for IVI/Telematics ECUs. • Drive prototype development and customer PoC delivery. • Support software toolchain integration (Vector tools, CANoe, DaVinci, EB tresos, etc.) 4. Cybersecurity & Functional Safety Ownership • Implement and review cybersecurity mechanisms like: o Secure communication (SecOC) o Secure Flash & Diagnostics o HSM firmware integration o IDPS o Penetration Testing • Support functional safety design (ASIL-B/D) in software modules. • Ensure traceability between requirements, architecture, and testing (ASPICE/ISO 26262/ISO 21434) Required Skills & Experience: 1. Core Technical Expertise: • 810 years experience in automotive embedded systems with: o Strong AUTOSAR (Classic/Adaptive) Hands on o Cybersecurity stack (ISO 21434, HSM, IDPS, FOTA, Secure Boot) o Functional Safety principles (ISO 26262) o Penetration Testing to make the compliance ISO 21434 o Strong understanding of Infotainment or Telematics system architecture 2. Software & Tools: • AUTOSAR stack tools (Vector DaVinci, EB tresos, ETAS ISOLAR) • Diagnostic tools (CANoe, CANalyzer, UDS stacks) • Static & dynamic code analysis (Polyspace, QAC, etc.) • Requirement tools (DOORS, Polarion, Jama) • Version control: Git, SVN, Jenkins Education: • B.E/B.Tech or M.Tech in ECE, CSE, or Electrical Engineering
Posted 2 weeks ago
3.0 - 8.0 years
4 - 9 Lacs
Hyderabad, Bengaluru
Work from Office
Roles and Responsibilities Conduct regular vulnerability assessments and penetration testing to identify potential security risks. Collaborate with cross-functional teams to ensure seamless integration of security solutions into existing infrastructure. Stay up-to-date with industry trends and best practices in cybersecurity. Design, implement, and maintain security solutions using various technologies such as NextGen IDS/IPS, Web Application Firewall (WAF), DLP, CASB Netskope, NAC, Email Security. Develop and enforce incident response plans to mitigate the impact of security breaches or incidents.
Posted 2 weeks ago
5.0 - 8.0 years
10 - 20 Lacs
Bengaluru
Work from Office
1. Certification Activities in the DHU ( certified candidate ) not mandatory. 2. Test reports for self-test items (i.e. FMVSS / KMVSS ) 3. Support the DHU Engineer with Cyber Security and stakeholder engagement (Knowledge)
Posted 2 weeks ago
5.0 - 10.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Responsibilities A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to get to the heart of customer issues, diagnose problem areas, design innovative solutions and facilitate deployment resulting in client delight. You will develop a proposal by owning parts of the proposal document and by giving inputs in solution design based on areas of expertise. You will plan the activities of configuration, configure the product as per the design, conduct conference room pilots and will assist in resolving any queries related to requirements and solution design You will conduct solution/product demonstrations, POC/Proof of Technology workshops and prepare effort estimates which suit the customer budgetary requirements and are in line with organizations financial guidelines Actively lead small projects and contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Ability to develop value-creating strategies and models that enable clients to innovate, drive growth and increase their business profitability Good knowledge on software configuration management systems Awareness of latest technologies and Industry trends Logical thinking and problem solving skills along with an ability to collaborate Understanding of the financial processes for various types of projects and the various pricing models available Ability to assess the current processes, identify improvement areas and suggest the technology solutions One or two industry domain knowledge Client Interfacing skills Project and Team management Technical and Professional Requirements: Primary skills:Domain->Retail->Vendor Managed Inventory->Food & Beverages,Process->Pre-Sales->Processes,Technology->Cloud Platform->Cloud Platform - ALL,Technology->Learning Technology->Instructional Design Preferred Skills: Technology->Cloud Platform->Cloud Platform - ALL Technology->Learning Technology->Instructional Design->Pre-sales Solutioning Foundational->Pre-Sales->Processes Technology->Cloud Platform->Azure Devops Educational Requirements Master Of Science,Master Of Technology,MCA,Bachelor Of Science,Bachelor of Engineering,BCA Service Line Cyber Security
Posted 2 weeks ago
4.0 - 8.0 years
8 - 14 Lacs
Bengaluru
Work from Office
Job Title : Cybersecurity Test Engineer About the Role : Looking for Cybersecurity Test Engineer who will be working closely with Hardware, Software and Systems engineering teams to deliver the next generation of Automotive SOC's. Ideal candidate is someone who has strong knowledge and hands on experience with Cybersecurity ISO 21434 standards. He/she should be able to Validate Cybersecurity features for Automotive SOC's and its applications. Responsibilities : - Perform penetration testing of SoC Automotive products. - Establish the Security goals and requirements. - Verification strategies in compliance with ISO 21434. - Develop test specifications, test cases, and test plans for security vulnerability testing. - Scan vulnerabilities with regards to CVSS levels and patch fixing from NIST database. - Perform code-level fuzz testing using open source tools. - Support documentation of test results and collaborate with the development team. - Participate in automating test process within CI/CD environments. - Setup and maintain traceability in compliance with Automotive SPICE requirements. - Experience in tools like OpenVAS, Nmap , wireshark, penetration testing for embedded systems. - Experience in Automotive domain is a must. - Practical experience performing TARA, security concepts and other Cybersecurity Artefacts mentioned in IS021434.
Posted 2 weeks ago
4.0 - 6.0 years
8 - 14 Lacs
Pune
Work from Office
Role : IGA (Identity Governance Administrator) Engineer Job Description : We are seeking a skilled Identity Governance And Administration(IGA) /Identity And Access Management (IAM) Engineer to design, implement, and maintain our organization's IGA solutions. The ideal candidate will have a strong background in engineering, with specific expertise in IGA solutions and best security practices. Total Exp 4 to 6 years. Responsibilities : - Design and deploy robust IGA solutions. - Securely integrate IGA systems with existing infrastructure and applications. - Develop custom solutions to utilize Java or SCIM APIs to automate access review and Identity/Account/Access lifecycle management processes and workflows. - Familiar with integrating Sailpoint with Active Directory, SQL/Oracle Database and other out of box supported systems, and disconnected systems. - Troubleshoot and resolve issues related to IGA integration issue. - Monitor and report on privileged security risks identified through IGA system. - Continuously improve IGA systems and processes for enhanced security and efficiency. Requirements Requirements : - Bachelor's degree in Computer Science, Information Technology, or related field. - 3+ years of experience in IT or Security, with a focus on IGA. - Design and Hands-on experience with Saviynt or Sailpoint IdentityNow as the minimal. - Strong knowledge of identity and access management principles and best practices. - Proficiency in one of these programing languages: Java, web service development. - Familiarity with one of these scripting languages :PowerShell/ Python/Ruby for automation. - Excellent problem-solving and analytical skills IGA Engineer. - Ability to work independently and as part of a team. - Attention to detail and commitment to maintaining high security standards. - Willingness to stay updated on emerging technologies and security leading practice.
Posted 2 weeks ago
7.0 - 12.0 years
8 - 14 Lacs
Hyderabad
Work from Office
GMR Group is a global Infrastructure Conglomerate with interests in Airports, Energy, Transportation and Urban Infrastructure. With over 12000 employees the Group turnover exceeds 10000 Crores and has an asset base of 67000 crores. GMR Group has developed & operates the Delhi & Hyderabad International Airports in India. In partnership with Megawide Construction Corporation, GMR is developing the Mactan Cebu International Airport in the Philippines. It has recently bagged the rights to develop and operate Goa's new airport at Mopa. The Group has 15 power generation projects of which 10 are operational and 5 are under develeopment. It has 9 operatiing road assets and a double rail track line under develeopment between Mughasarai and Kanpur on the Eastern Dedicated Freight Corridor. The Group is also developing India's largest smart Airport City near Hyderabad airport and two Special Investment Regions at Krishnagiri and Kakinada. The Group has an elite security service business , with presence in 80 locations across 15 states. The Group's Corporate Social Responsibility arm, GMR Varalakshmi Foundation, carries out community based development initiatives at 27 different locations across India and abroad. JOB PURPOSE To Manage Information Security activities and ITSM processes related to Airport IT Operations. To ensure Security, Quality and Compliance of Systems, Services , Processes . To ensure IT Process Alignment with Business and Stakeholder Requirements To manage Information Security activities and Information Technology Services processes governance relating to IT Operations to ensure confidentiality, integrity and availability of systems, services and associated information are in tune with business and stakeholders needs and adhering to regulatory & statutory requirements ORGANISATION CHART Accountabilities Key Performance Indicators Strategy and Governance Reducing gap between current state and desired state to acceptable risks. Roll out corporate Initiatives as per corporate guidelines Propose, Review and Recommend cost-effective solutions Design and review Security Architecture Design and review Security Performance metricsReview Policy effectiveness No of Reviews No of Architectural Changes Information Risk Management Asset Classification Business Impact Assesments Threat and Vulnerability evalautions Risk Assesment and Risk Management Evaluate information security controls and countermeasures Integrate risk, threat and vulnerability identification and management into information management life cycle Vulnerabilities ManagementFormulate and Review Risk Acceptance Criteria No of Risks Identified/Mitigated No of Critical Incidents Information Security Program Development and management Identify and evaluate information security technologies, emerging trends Align information security architectures with changing business needs Develop information security standards, procedures and guidelines implement and communicate information security policies, standards, procedures and guidelines Design controls and review controls effectiveness Information security requirements are embedded into contracts and third-party management processes Design, implement and report security metrics for testing the effectiveness and applicability of information security controls No of deviations from Policy % compliance KEY ACCOUNTABILITIES Accountabilities Key Performance Indicators Strategy and Governance, Reducing gap between current state and desired state to acceptable risks., Roll out corporate Initiatives as per corporate guidelines, Propose, Review and Recommend cost-effective solutions, Design and review Security Architecture Design and review Security Performance metrics Review Policy effectiveness No of Reviews, No of Architectural Changes• Information Risk Management, Asset Classification, Business Impact Assessments, Threat and Vulnerability evaluations, Risk Assessment and Risk Management, Evaluate information security controls and countermeasures, Integrate risk, threat and vulnerability identification and management into information management life cycle, Vulnerabilities Management Formulate and Review Risk Acceptance Criteria,No of Risks Identified/Mitigated, No of Critical Incidents• Information Security Program Development and management, Identify and evaluate information security technologies, emerging trends, Align information security architectures with changing business needs, Develop information security standards, procedures and guidelines implement and communicate information security policies, standards, procedures and guidelines ,Design controls and review controls effectiveness, Information security requirements are embedded into contracts and third-party management processes Design, implement and report security metrics for testing the effectiveness and applicability of information security controls.No of deviations from Policy,% compliance Information Security Incident Management, Manage Security operations center, Escalate unresolved issues, Schedule and Conduct Vulnerability, Penetration and Configuration tests and report findings and track findings to closure, Evaluate incident and problem related security incidents,, Security Log alerts review, Co-ordinate for forensics and analysis with vendor SLA, % Critical Incidents, Impact on CIA• IT Service Delivery and Support, Implement Plan, do check and act management System, Design of ITIL compliant Process and Procedures, Rollout of ITIL compliant Process and Procedures, Design of Metrics and KPIs, Design of SLAs, Support IT services in floating RFPs and Proposals, Review Effectiveness of Metrics and KPIs, Awareness and Training, Customer Satisfaction Surveys, IT Services Complaints Management, Vendor and Supplier Performance Feedback, Configuration Audits, Change Manager / Service Delivery Manager (Governance),Asset Management ,Service Improvement Management No of Service Improvements, %Backlogs(Problem/Change),Adherence to BCP IS / IT Audit Process Management, ISO 20000/270001: ,Schedule Internal and External Audits, Internal auditor /management representative, Review audit findings, Conduct Management Review meetings, Corrective and preventive actions, Improve management systems,Compliance to respective Standards,, No of NCs,) KEY ACCOUNTABILITIES - Additional Details EXTERNAL INTERACTIONS External - Roles you need to interact with outside the organization to enable success in your day to day workConcessionaires/Regulatory Agencies /Airlines: Information Security Approvals for new service requests. Non-disclosure Agreements MDI Acceptance and awareness on Information Security Policy Regulatory and Legal Compliance Data privacy and Protections Incidents/Breaches Quality assurance •Vendors Information Security Policy Compliance Physical and Environmental controls in use of facilities Review of Incidents/ Breaches Regulatory and Legal compliance Contracts and Procurement Info security guidelines Upgrades / Releases/Patches Security Bulletins Awareness and Training Vulnerability and Security Assessment tailored to business needs SLA Reviews Audits Event and log correlation Quality Assurance •Implementation Partners: (Dubai Technology Partners, TCL, TTSL, BSNL, Pathfinder, IBM, KRONOS). Review for security policy compliance with Data and Privacy regulations Quality Assurance •Implementation Partners: (Dubai Technology Partners, TCL, TTSL, BSNL, Pathfinder, IBM, KRONOS). Review for security policy compliance with Data and Privacy regulations Quality Assurance •OEMs (UFIS, RESA, IER, SAFEGATE, BOSE, SIEMENS COMMUNICATION, SITA) : Performance Review SLA review Incidents and Problem review Legal and Regulatory compliance Security Policy compliance Quality Assurance INTERNAL INTERACTIONS Internal - Roles you need to interact with inside the organization to enable success in your day to day workBusiness units Aligning Business Requirements with security policy Awareness Programs Compliance and Regulatory Requirements Contractual requirements Human Resources Pre entry, entry and exit Physical and Environmental Requirements Business Continuity Tests Access Controls Quality Assurance Joint Venture Partners (HMACPL, HDFRL, NOVOTEL, FUEL FARM) : Security policy alignment with business requirements Security Awareness Regulatory and Legal compliance SLA Reviews Quality Assurance GHIAL employees Policy awareness Policies compliance Trainings Incident Reporting and Management Quality Assurance DIAL IT & Corporate IT: Share best practices CISO: Ensure corporate requirements are rolled out to business unit-GHIAL Review technological and business unit security requirements Quality Assurance FINANCIAL DIMENSIONS •OPEX AOP SIEM Log monitoring and Compliance •Cost optimization and Revenue maximizations assurance activities OTHER DIMENSIONS •Team size: 1 •Customers : 130 •End users : 1000+ (staff across HIAL, GADL & Other companies inside the campus using IT services) EDUCATION QUALIFICATIONS •Required B.E (Computers / Electronics /IT) •Required Postgraduate in computer/ IT •Required CRISC (Certified in Risk and Information Systems Control) / or CISA/ or CISM •Desirable MBA RELEVANT EXPERIENCE Minimum 9-11 Years in IT with at least 8 Years in Information security, quality and assurance functions COMPETENCIES Personal Effectiveness Social Awareness Entrepreneurship Problem Solving & Analytical Thinking Planning & Decision Making Capability Building Strategic Orientation Stakeholder Focus Networking Execution & Results Teamwork & Interpersonal influence To Manage Information Security activities and ITSM processes related to Airport IT Operations. To ensure Security, Quality and Compliance of Systems, Services , Processes . To ensure IT Process Alignment with Business and Stakeholder Requirements To manage Information Security activities and Information Technology Services processes governance relating to IT Operations to ensure confidentiality, integrity and availability of systems, services and associated information are in tune with business and stakeholders needs and adhering to regulatory & statutory requirements
Posted 2 weeks ago
4.0 - 9.0 years
10 - 16 Lacs
Gurugram
Work from Office
Key Responsibilities: 1. IT Control Testing and Evaluation: Plan and execute control testing of ITGCs and automated application controls. Evaluate design and operating effectiveness of controls related to: User access management (IAM) Change management System development lifecycle (SDLC) Backup & recovery IT operations and infrastructure security Document testing procedures, results, and exceptions in line with ERM standards. 2. Risk and Control Self-Assessments (RCSA): Support IT RCSA activities across technology platforms and infrastructure. Identify and assess IT risks, including cybersecurity threats and third-party/vendor risks. Collaborate with IT stakeholders to remediate identified control gaps and improve IT control posture. 3. Regulatory and Framework Compliance: Ensure alignment with regulatory requirements and industry frameworks such as: SOX (Sarbanes-Oxley) FFIEC, OCC, NIST, COBIT, ISO 27001 Monitor compliance with internal IT policies, procedures, and enterprise risk tolerance. 4. Stakeholder Engagement & Collaboration: Work closely with IT, Information Security, Compliance, and Internal Audit teams. Serve as the subject matter expert (SME) on IT control testing and risk identification. Communicate findings, risks, and recommendations clearly to technical and non-technical stakeholders. 5. Reporting and Documentation: Develop testing scripts, risk-control matrices, and evidence documentation. Prepare executive-level reports highlighting key findings, trends, and remediation status. Track control testing progress and report deviations from expected timelines or outcomes. 6. Continuous Improvement: Stay current with technology risk trends, emerging threats, and evolving compliance standards. Recommend enhancements to IT control testing methodologies, tooling, and governance processes. Key Qualifications: Education: Bachelors degree in Information Technology, Computer Science, Cybersecurity, Risk Management, or related fields. Advanced certifications are a plus. Certifications (preferred): CISA (Certified Information Systems Auditor) CRISC (Certified in Risk and Information Systems Control) CISSP, CGEIT, or ITIL certifications Experience: 810 years in IT risk management, internal audit, or control testing within financial services or technology-driven environments. Technical Skills: Strong knowledge of ITGCs, application controls, and system security principles Hands-on experience with GRC platforms (e.g., Archer, MetricStream, ServiceNow GRC) Familiarity with scripting or automation tools for testing/reporting is a plus Proficient in Excel, Power BI, or Tableau for data analysis and reporting Please share your cv at surbhi.malhotra@nlbtech.com
Posted 2 weeks ago
10.0 - 15.0 years
22 - 37 Lacs
Mumbai
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Join our dynamic team as a Customer Technology Advisor and become an integral part of our cutting-edge Go-To-Market team. As a certified expert in your field, you will be at the forefront of revolutionizing technology solutions for our valued customers. Working hand in hand with our Kyndryl Consult Partners and customer partners, you will leverage your technical and solution expertise to drive targeted opportunities and exceed customer expectations. In this role, you won't just be another advisor; you will be a trusted ally and visionary, delivering unique and differentiated value to our customers. Through captivating show-and-tell methods such as engaging demos and compelling presentations, you will showcase our credibility and eminence in the industry, leaving a lasting impression on potential customers. As a vital member of our team, you will support Consulting, Advisory, and Architecture activities across Sales, Pre-Sales & Delivery, collaborating closely with Customer Partners and Kyndryl Consult Partners. With your extensive technical knowledge and mastery of the practice-specific domain, you will bring together the breadth of Kyndryl's expertise to develop profitable deals that drive our success. Your dedication to continuous improvement and your passion for our practice will shine through as you showcase your end-to-end knowledge of the domain you align with, as well as the associated subdomains. Your technical prowess, backed by your external certifications, will establish you as a true authority in your field. As a Customer Technology Advisor, you will possess strong technical and business acumen, allowing you to provide value driven solutions within the practice services domain(s). Your exceptional customer facing skills, combined with your articulate communication style and interpersonal finesse, will enable you to effortlessly convey the technical benefits of Kyndryl's capabilities, perfectly matching the unique needs of each customer. As a strategic thinker, you will identify the intricate business and technical requirements of our customers, leveraging the vast capabilities of Kyndryl to generate winning cross-practice solutions. Your ability to develop and deliver compelling demonstrations, proof of concepts, and prototypes will clearly demonstrate the tangible value our offerings bring to our customers, leaving them eager to partner with us. In addition to your technical expertise, you will also take the lead in coordinating the entire pre-sales process, ensuring quality and compliance verification while adhering to Kyndryl best practices. Your collaboration with internal and external stakeholders will generate winning responses and create optimal technical solutions. Moreover, you will actively build and nurture relationships with our external alliance partners, fostering a collaborative environment where joint solutions are co-created. Join our team of forward thinking, tech-savvy professionals and embark on a journey of innovation, growth, and fulfillment. As a Customer Technology Advisor, you will not only shape the future of technology solutions but also make a meaningful impact on the success of our customers and Kyndryl as a whole. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Skills and Experience The Kyndryl CTA (Cross Industry) brings together knowledge across 3-4 industries with the credibility to build valued client relationships up to and including CIO,CTO,CxO level. This role requires expertise to oversee multiple new logos & with ability to shift focus to logos where there might be a potential opportunity arising. Critical to this role will be a deep understanding of the overall Digital WorkPlace Services, at least three industries and a successful track record in hunting IT services sales engagements. Your focus will be to identify new fields of interest for Digital Workplace Services in existing clients (farming) as well as new clients (hunting). CTA (Cross Industry) is responsible for pitching, identifying, developing, and closing integrated solutions that address their client's business needs (both from an industry and business point of view). A high calibre individual is sought to cover the breadth of responsibility outlined below. Primary Job Responsibilities: Customer Success – Act and become our customers’ trusted advisor within their specialty. Works within a practice but responsible for adjacent areas to provide a complete Kyndryl customer solution – Actively open doors and opportunities in other Kyndryl specialties by engaging with peers – Maintain and develop relationships with key alliance partners and ecosystems; create referenceable customers – Lead the technical / solution customer engagement as a technical solution expert, support the close of sale with the Customer Partner and Consult Partner – Has the eminence to deliver billable work for early engagement of the sales process and ensure follow through to create customer satisfaction Commercial Success – Assist the Customer Partner and Consult Partner to identify, develop and close deals through deep technical / solution expertise – Define a unique value proposition for respective area of expertise. Responsible for looking at the solution from a cross practice perspective to bring full value to the customer – Collaborate with internal and external stakeholders to generate a winning response and optimal technical solutions – Responsible to utilize the full breath of Kyndryl’s value propositions to develop profitable deals. Work with the pricing / commercial teams to ensure suggested solutions are profitable – Support in developing/repackaging solution capabilities aligned to deal characteristics and needs in the targeted account Distinctive Expertise – Develop understanding of best-in-class, profitable solutions to bring into customer discussions to develop the right winning solution – Leverage technology-specific expertise to support to win deals – Support selling new solutions/offerings with an understanding of Kyndryl services capabilities – Deep technical/solution expertise for respective area – Ensure customer satisfaction and act with integrity – Bring together Kyndryl deep technical and solution expertise with alliance partners for jointly successful pursuits. – Externally recognized as an expert in the technology and/or solutioning area Skills – Design use cases to articulate the user experience of customer’s employees in their use of devices, collaboration tools, and applications to perform their own job responsibilities. – Responsible to work on the creation of requirements, use cases, sequence diagrams, arch solution docs, Test cases and Acceptance criteria. – Lead the Microsoft space. Utilize Architecture Thinking and Methodology, Unified Endpoint Management (UEM), Offering/ Product Lifecycle Management, Cybersecurity and Data Privacy Compliance Posture, Digital Experience Monitoring (DEM), Cloud Computing Professional Expertise: You need to demonstrate the following professional expertise: Required: Degree or equivalent in Computer Engineering, Electrical Engineering or related (employer will accept a Bachelor's degree plus five (5) years of progressive experience in lieu of a Master’s degree) and one (1) year of experience as an Enterprise Architect or related. One (1) year of experience must include utilizing Architecture Thinking and Methodology, Unified Endpoint Management (UEM), Offering/ Product Lifecycle Management, Cybersecurity and Data Privacy Compliance Posture, Digital Experience Monitoring (DEM), Cloud Computing. Experienced C-level IT services seller, appropriate and articulate taking care of clients at the most senior levels You are expected to bring a network at CISO and C-level that you can easily approach A track record of sales leadership in negotiating and closing transformational services engagements A track record of meeting or exceeding sales goals. Highly organised, self-driven and able to work with minimal supervision. Ability to story tell and simplify the solution context and outcomes. Innovative and creative in solving complex problems. Ability to collaborate and bring together a unified approach with multiple stakeholders to deliver outcomes. Ability to sell in a virtual environment - given the ongoing pandemic you must be able execute meetings effectively while working remotely via tooling such as Teams, WebEx etc. You understand cross-industry and day-to-day concerns experienced by CxOs in running complex IT infrastructure environments together with an ability to position the unique value of our services to address these concerns Ability to develop and maintain comprehensive technical sales knowledge in cloud (services) solutions, along with financial and selling skills Personal drive, tenacity and energy and results oriented Strong communication and presentation skills with the ability to produce and deliver powerful and persuasive presentations - comfortable in presenting to both small and large audiences Excellent written and oral communication skills. Sales forecasting and deals / closure assessment traits and be a believer in CRM hygiene Key attributes required for success: Compelling at C-Level interactions. Acts entrepreneurially to grow (personal) business and team to identify / win deals. Clear domain expertise: Brings knowledge and reason for clients to engage. Connected in their market: able to open doors from past relationships. Skilled at building senior relationships & partnerships Bold thinker/creative: able to think outside the box and imagine / stretch to construct large opportunities Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 2 weeks ago
8.0 - 13.0 years
8 - 12 Lacs
Hyderabad
Work from Office
- Experienced with LAN, WAN, and WLAN - Exp with routers and switches - DNS, BGP, OSPF, EIGRP, VLAN, QoS, DSL, and Metro Ethernet, remote-access VPNs, firewall, site-to-site VPN -Experience in cyber security is highly preferred CCNA/CCNP Required Candidate profile - Min exp- 1 to 3 years - hands-on exp as a network administrator on different vendor products - Exp in core routing & switching design principles -Whatsapp cv- 7506760448
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane