Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 9.0 years
3 - 5 Lacs
mumbai
Work from Office
* Person should be responsible for administration & management of three or more technologies listed * Firewall, F5 WAF, F5 SSLO, Ant-DDoS, Packet Broker, Anti-Apt, IPS, etc. * Managing complete administration including but not limited of creation, modification of rules and configuration, system upgrades. * Handling escalated calls and providing SME support on above technologies. * On-boarding of new applications in F5 SSLO, F5 WAF, Packet Broker and handle critical issues for the same. * Single point of contact for above mentioned technologies. * Incident management & timely escalation of incident. Required education Bachelor's Degree Preferred education Master's Degree Required technical an...
Posted 1 week ago
6.0 - 9.0 years
18 - 33 Lacs
pune
Work from Office
Your Role We are seeking a highly skilled Automotive cybersecurity engineer with 6 9 Years of experience specializing in AUTOSAR-based Cryptostack and HSM development, with deep expertise in secure communication, boot, and flash features. Proficient in DaVinci Configurator, embedded C, and ISO/SAE 21434 compliance for secure software integration. Experience in AUTOSAR based Crytostack development and security features such as (SecOC, Secure Boot, Secure Flash etc..). Hands-on experience in HSM Software Development. Use the DaVinci Configurator tool suite to configure AUTOSAR Basic Software (BSW) modules, RTE (Runtime Environment), and software components (SWCs) according to project requireme...
Posted 1 week ago
8.0 - 12.0 years
11 - 16 Lacs
bengaluru
Work from Office
This Position reports to: Technical Authority In this role, you will have the opportunity to execute technical assignments. Each day, you will deliver technical solutions as per agreed timeline and standards using established solutions. You will also showcase your expertise by supporting the development of technical expertise solutions and services. The work model for the role is: #LI- Onsite. This role is contributing to the to the Process Automation business in Energy Industries based in Bangalore, India You will be mainly accountable for: Design and implement project-specific system, network, and security architectures, delivering sustainable services to maintain cybersecurity standards. ...
Posted 1 week ago
2.0 - 7.0 years
5 - 9 Lacs
bengaluru
Hybrid
This Position reports to: IS Dep Manager-Ops Technology&Business Your role and responsibilities: In this role, you will have the opportunity to successfully develop and implement security measures for ABB in your area of responsibility of OT Security. Each day, you will protect ABB from rapidly escalating threats. You will also showcase your expertise by staying vigilant in combating security threats, taking charge of the organizations cybersecurity, and keeping track of existing security infrastructure to ensure systems used in ABB's operational facilities are secured. The role is contributing to IS Services. You will be mainly accountable for: Support the management of OT Security Posture ...
Posted 1 week ago
3.0 - 6.0 years
8 - 12 Lacs
bengaluru
Hybrid
Your role and responsibilities (Mandatory) In this role, you will have the opportunity to establish and maintain operational methods, service compliance, and procedures. Each day, you will be responsible for planning, design, implementation and continuous improvement within governance, compliance, assurance, and/or risk. You will also showcase your expertise by guiding, advising, or supporting in all operational aspects, including document management and systems and procedures analysis. You will be mainly accountable for: Monitoring the implementation, communication, and execution of governance, compliance and risk frameworks and methodologies. Providing timely, accurate, and complete suppor...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
3.0 - 5.0 years
8 - 12 Lacs
kolkata
Work from Office
Job Description Role Purpose The purpose of the role is to analyse security requirements and design security solutions towards protecting organizations security assets Do 1. Analyse Risk and Compliance assurance to protect sensitive information Identify Risk and compliance issues at all levels as per the updates Analyse common compliance frameworks and ensure policies, processes and standards are in place Perform quarterly audit, sample testing and report risks Communicate assurance findings to the clients in a timely manner Monitor remediation on assurance findings and ensure closure of all open points Ensure all required controls are implemented, documented and monitored so as to ensure fu...
Posted 1 week ago
3.0 - 5.0 years
7 - 11 Lacs
chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
3.0 - 5.0 years
8 - 12 Lacs
noida
Work from Office
Job Description Role Purpose The purpose of the role is to analyse security requirements and design security solutions towards protecting organizations security assets Do 1. Analyse Risk and Compliance assurance to protect sensitive information Identify Risk and compliance issues at all levels as per the updates Analyse common compliance frameworks and ensure policies, processes and standards are in place Perform quarterly audit, sample testing and report risks Communicate assurance findings to the clients in a timely manner Monitor remediation on assurance findings and ensure closure of all open points Ensure all required controls are implemented, documented and monitored so as to ensure fu...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
5.0 - 8.0 years
7 - 10 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 1 week ago
6.0 - 9.0 years
5 - 9 Lacs
gurugram
Work from Office
> Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incident...
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Job Description Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design ...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 1 week ago
5.0 - 8.0 years
7 - 10 Lacs
mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
6.0 - 11.0 years
0 - 3 Lacs
hyderabad, chennai, bengaluru
Work from Office
Must-Have** 6-8 years of PING admin experience • Must have experience in PING Federate and PING One Davinci • Installation, management, maintenance, upgrade experience on cluster level, adaptive clustering is must for Ping above products • Working experience in adaptive clustering for PingFederate so that requests hit multiple data centers within one set of groups. • Should have worked on Ping One Risk and MFA, which adds additional security when users access the applications. • Good understanding of GTM(especially traffic across DCs), LTM(load balancing concepts), DNS, and SNAT from a networking perspective where the PingFederate and Ping Access webservers are deployed. • Good-to-Have • Goo...
Posted 1 week ago
10.0 - 15.0 years
25 - 30 Lacs
pune, chennai, bengaluru
Hybrid
Experience Overview 12+ years of experience in Cloud, Infrastructure, and Security Solutioning , with a proven track record in technical pre-sales, architecture design, and client engagement . Strong experience in handling US enterprise clients and flexible to work in overlapping US time zones to support business alignment and delivery coordination. 1. Pre-Sales & Solutioning Lead the technical pre-sales process for cloud and security opportunities across enterprise clients. Collaborate with account and sales teams to understand customer business goals, challenges, and technical requirements. Design and present comprehensive cloud infrastructure and security solutions, including architecture...
Posted 1 week ago
5.0 - 8.0 years
0 - 3 Lacs
bengaluru
Work from Office
• Experience in Identity and Access Management (IAM) • Previous experience in IT Operations, Reliability Engineering, or DevOps • Exposure to Agile / DevOps environments • Knowledge of Site Reliability Engineering (SRE) principles and methodology • ITIL, CISSP or similar certification (optional) Technical Skills: • Basic understanding of the LDAP protocol and its functionalities • Experience supporting PingDirectory and PingDataSync • Familiarity with IAM products from providers such as ForgeRock and Ping Identity • Knowledge of enterprise security standards and concepts • Understanding of general enterprise infrastructure concepts and troubleshooting, including network, storage, web infrast...
Posted 1 week ago
8.0 - 12.0 years
0 - 3 Lacs
ahmedabad, chennai, bengaluru
Work from Office
Job Description SNRequired InformationDetails 1Role**Ping Authorize2Required Technical Skill Set**Ping Authorize3(One)4Desired Experience Range**8 years+5Location of Requirement PAN India Desired Competencies (Technical/Behavioral Competency)Must-Have** Ping Authorize focusing on installation, configuration, policy editing, tuning, logging, monitoring and alerting Good-to-Have Access controls SNResponsibility of / Expectations from the Role 1 Expert knowledge around Ping Authorize focusing on installation, configuration, policy editing, tuning, logging, monitoring and alerting. Construct fine-grained access rules based on identity attributes, entitlements, consents, and any other contextual ...
Posted 1 week ago
5.0 - 10.0 years
4 - 8 Lacs
navi mumbai
Work from Office
We are seeking a seasoned cybersecurity professional to be a part of our security operations and product management function. This role involves managing a team of security engineers and analysts who handle a wide range of security technologies including AV, EDR, XDR, PIM, PAM, DLP, DAM, WAF, and more. You will be responsible for end-to-end security delivery including incident handling, product lifecycle management, automation initiatives, customer engagement, compliance adherence, and continuous innovation. 4+ Years (minimum) in Cybersecurity Operations, Security Product Management. ROLES AND RESPONSIBILITIES Delivery, implementation and operations of multiple security products like AV, EDR...
Posted 1 week ago
3.0 - 6.0 years
3 - 7 Lacs
chennai
Work from Office
We are looking for a skilled Team Leader - Security to join our team at Taj Wellington, with 3-6 years of experience in the hospitality industry. Roles and Responsibility Supervise and coordinate security personnel to ensure the safety and well-being of guests and staff. Develop and implement effective security protocols to prevent incidents and minimize risks. Conduct regular security audits and inspections to identify vulnerabilities and recommend improvements. Collaborate with other departments to ensure seamless operations and resolve security issues promptly. Train and guide security staff on emergency procedures and best practices. Monitor and report any security breaches or incidents ...
Posted 1 week ago
5.0 - 7.0 years
14 - 18 Lacs
gurugram
Hybrid
Work Flexibility : Hybrid What you will do: Manage all facets of Vulnerability Assessment and Penetration testing involving embedded devices, Web and Mobile based Applications. Perform attacks and identify vulnerabilities on interfaces like USB, WiFi. Ethernet etc. Perform manual and automated security code review for complex Desktop, Web and Mobile applications to identify security flaws. Leverage DevSecOps to embed security testing into all phases of SDLC. Provide support/inputs in issue remediation. Prepare Test Plans and Test Reports to support test activities. What you need: Required Qualifications: Bachelors in Software/Electronics Engineering or equivalent degree. 5 to 7 years of expe...
Posted 1 week ago
5.0 - 8.0 years
5 - 10 Lacs
gurugram
Work from Office
Job Role Overview Title: Cybersecurity Data Protection / Governance, Risk & Compliance (GRC) Analyst Key Responsibilities Security Architecture & Controls Design and maintain data protection architecture. Collaborate with IT and business units to define security needs. Stay updated on data protection technologies. Governance, Risk & Compliance Manage Microsoft Purview and other security tools. Conduct risk assessments, audits, and ensure compliance. Support legal and enterprise architecture teams. Security Operations Perform vulnerability analysis and patch management. Implement monitoring systems for cybersecurity. Incident Response Lead response to cyber incidents and threats. Ensure conta...
Posted 1 week ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
137681 Jobs | Dublin
Wipro
43475 Jobs | Bengaluru
EY
34904 Jobs | London
Accenture in India
32420 Jobs | Dublin 2
Uplers
25774 Jobs | Ahmedabad
Turing
24356 Jobs | San Francisco
IBM
21415 Jobs | Armonk
Accenture services Pvt Ltd
20351 Jobs |
Capgemini
20341 Jobs | Paris,France
Infosys
20250 Jobs | Bangalore,Karnataka