Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
6.0 - 9.0 years
10 - 15 Lacs
pune
Work from Office
Your Role We are seeking a highly skilled Automotive cybersecurity engineer with 6 9 Years of experience specializing in AUTOSAR-based Cryptostack and HSM development, with deep expertise in secure communication, boot, and flash features. Proficient in DaVinci Configurator, embedded C, and ISO/SAE 21434 compliance for secure software integration. Experience in AUTOSAR based Crytostack development and security features such as (SecOC, Secure Boot, Secure Flash etc..). Hands-on experience in HSM Software Development. Use the DaVinci Configurator tool suite to configure AUTOSAR Basic Software (BSW) modules, RTE (Runtime Environment), and software components (SWCs) according to project requireme...
Posted 1 week ago
2.0 - 5.0 years
4 - 7 Lacs
pune
Work from Office
Look for immediate joiner. Need overall AppSec skills (SAST, DAST, Penetration testing) +Mobile app testing skills (Android, ioS). We should look for a candidate who has deep and diverse hands on exp in above skills. Also, The professional is expected to perform the application security activities - Static code assessment/ manual testing including mobile application testing for android and iOS apps. This profile requires a candidate with hands on Application Security experience specific to mobile applications Communication should excellent Skills: penetration testing,mobile app testing,sast,ios,android,dast. Mandatory Key Skills - SAST,DAST,Penetration testing,mobile app testing,ios,android,...
Posted 1 week ago
8.0 - 12.0 years
10 - 14 Lacs
pune, chennai, bengaluru
Work from Office
Position Overview: We are seeking a highly skilled and motivated Project Manager to lead the implementation of a password reset system for our Middle East (ME) operations. The ideal candidate will have a strong background in IT project management, cybersecurity, and a deep understanding of password management systems. This role requires excellent organizational skills, the ability to manage cross-functional teams, and a keen eye for detail. Key Responsibilities: Project Planning and Execution: Develop and manage the project plan for the password reset implementation. Define project scope, goals, and deliverables in collaboration with stakeholders. Ensure project milestones and deadlines are ...
Posted 1 week ago
5.0 - 9.0 years
8 - 14 Lacs
nagpur
Work from Office
Key Responsibilities: Splunk ITSI Implementation: Develop and configure IT Service Intelligence (ITSI) modules, including KPI creation, service trees, and notable event aggregation. SIEM Development: Design, implement, and optimize Splunk SIEM solutions for threat detection, security monitoring, and log analysis. Dashboard & Visualization: Create advanced dashboards, reports, and visualizations using Splunk SPL (Search Processing Language). Data Ingestion & Parsing: Develop data onboarding, parsing, and field extractions from various log sources, including cloud and on-prem infrastructure. Mandatory Key Skills - IT Service Intelligence,Data Ingestion,Splunk SPL,Splunk SIEM,SIEM Development,S...
Posted 1 week ago
18.0 - 28.0 years
70 - 90 Lacs
bengaluru
Work from Office
Looking for Director Sales from IT infrastructure industry background alone ( server, storage, networking products, cloud and data center products). Handling end customers, enterprise accounts or end user sales. ct bala 9940085713
Posted 1 week ago
7.0 - 10.0 years
8 - 12 Lacs
pune, chennai, bengaluru
Work from Office
Overview: We are seeking a highly skilled and experienced CyberSecurity Presales Consultant to join our team. The ideal candidate will have a strong background in solutioning security across various functions. This role requires a minimum of 7-10 years of experience in the IT field, with at least 3 years specifically in Cyber Security. The candidate should have Security Presales experience in a minimum 2 Functions of Security ( Primary - IAM, PAM, SOC, Cloud Security & Secondary - Network Security, Data & Infra App Security, GRC ) Key Responsibilities: Lead end-to-end presales activities for security solutions, including requirement gathering, solution design, and proposal development. Work ...
Posted 1 week ago
8.0 - 12.0 years
19 - 30 Lacs
mumbai, hyderabad
Work from Office
The project manager role involves driving and managing project starting from planning, initiation to successful delivery of a project in accordance with objectives, milestones, quality standards, timelines and budgets throughout the project lifecycle in coordination with internal & external stakeholders. Roles and Responsibilities Responsibilities: 1. Lead and manage Cybersecurity projects from initiation to successful delivery of a project in accordance with objectives, milestones, quality standards, timelines and budgets throughout the project lifecycle, ensuring alignment with organizational security goals. 2. Collaborate with internal & external stakeholders including technical inputs fr...
Posted 1 week ago
0.0 - 5.0 years
8 - 15 Lacs
kanpur
Work from Office
Job Role: 1. First class Postgraduates with strong fundamentals may apply. NET & GATE qualification shall stand desired. 2. Sound concepts in programming languages viz. C/ C++/ Java/ Python shall be an advantage. 3. Strong class handling skills along with ability to connect with the students. Perks/ Benefits: 1. Campus Accommodation Facility along with subsidized Mess service. 2. Medical Facility coverage upto 5 Lakhs per annum per Family. 3. Entitled for Research Incentives (other than monthly compensation). 4. Attractive bi- annual increments based upon remarkable performance outcomes.
Posted 1 week ago
3.0 - 8.0 years
22 - 37 Lacs
bengaluru
Hybrid
Role & responsibilities : Below will be the scope of the role • Collaborate with teams to build & deliver solutions implementing serverless, microservices based, IaaS, PaaS and containerized architecture of multi cloud environment • Develop rule base and parameterized IaC templates for automated deployment using Terraform • Build CI/CD Pipeline using AWS (CodeBuild, CodeDeploy, CodePipeline), Google (Cloud Build), Azure (DevOps, Pipelines) • Integrate 3 rd party tool with CICD Process (e.g. SonarQube, CheckMarx, Embold) • Config Manage environment using industry standard DevOps tools (Ansible) • Implement scripting to extend build\deployment\monitoring process (PowerShell, Bash, Python) • Ab...
Posted 1 week ago
0.0 - 1.0 years
1 - 2 Lacs
pune
Work from Office
Job description: We are looking for a creative, detail-oriented Email Marketer with hands-on experience in building, managing, and optimizing email campaigns. This role is ideal for someone who can design conversion-friendly drip campaigns, and understands the numbers open rates, click-through rates, and coupon redemption. Youll play a key role in driving user engagement and conversions for our products through well-crafted, performance-driven email journeys. Responsibilities: Plan, write, and execute engaging email drip campaigns for different stages of the customer journey (onboarding, upsell, reactivation, etc.) Stay updated with email marketing trends, tools, and compliance (CAN-SPAM, GD...
Posted 1 week ago
3.0 - 5.0 years
7 - 11 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
3.0 - 5.0 years
7 - 11 Lacs
chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
3.0 - 5.0 years
7 - 11 Lacs
chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
1.0 - 3.0 years
6 - 10 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
5.0 - 10.0 years
22 - 37 Lacs
bengaluru
Hybrid
***** Its Contract to Hire Position*************** Role Overview: We are seeking a Cloud Native Security Consultant with strong expertise in modern security practices, DevSecOps, and cloud-native architectures. The ideal candidate will design, implement, and consult on security solutions across multi-cloud environments, ensuring secure adoption of serverless, containerized, and microservices-based applications. Key Responsibilities: Design and implement security architecture for multi-cloud (AWS, Azure, GCP) environments. Conduct risk assessments, vulnerability analysis, and security gap identification. Develop IaC templates (Terraform) and build CI/CD pipelines with integrated security tool...
Posted 1 week ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
mumbai
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
4.0 - 8.0 years
0 Lacs
chennai, tamil nadu
On-site
As a Cyber Security professional in the TIFS department, you will be responsible for the following duties and responsibilities: - Strong knowledge of cloud security, including Azure, AWS, and GCP - Ability to configure and monitor security devices like firewalls and antivirus software - Proficiency in incident log monitoring - Good understanding of server hardening techniques - Hands-on experience with XDR/EDR solutions - Conducting phishing simulation and training activities - Experience in Vulnerability Assessment and Penetration Testing (VAPT) using tools such as Nessus, NMAP, and Burp Suite - Capability to perform threat analysis, investigation, threat hunting, and adversary tracking - I...
Posted 1 week ago
7.0 - 11.0 years
0 Lacs
maharashtra
On-site
Role Overview: As a GIT Full Stack Developer at Colgate-Palmolive, you will be part of a dynamic developer community working on building a new age eCommerce platform. Your role as a Senior Individual Contributor will involve designing, developing, and supporting robust, scalable, and high-performance applications to enhance eCommerce operations. You will collaborate closely with product managers and digital team members to understand requirements and develop applications, microservices, frontends, APIs, and integrate them to build distributed systems. Your willingness to learn new technologies and stay updated with current frameworks is crucial for this role. Key Responsibilities: - Develop ...
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
maharashtra
On-site
Job Description: Role Overview: As a Cyber ATM Security professional at our company, you will be responsible for risk assessment and management, security architecture design and implementation, staying up-to-date on security threats, maintaining ATM compliance and governance, updating ATM compliance to management, reporting on ATM logical security and compliance to regulators, and managing ATM partners and security governance. Key Responsibilities: - Conducting risk assessment and management - Designing and implementing security architecture for new projects and systems - Keeping abreast of security threats and vulnerabilities - Ensuring ATM Compliance and Governance in line with Bank standa...
Posted 1 week ago
2.0 - 3.0 years
4 - 5 Lacs
varanasi
Work from Office
Act as a strategic advisor to the executive team on IT-related challenges and opportunities Provide insights into emerging trends such as cloud computing, cybersecurity, and AI-driven solutions Help shape the companys long-term technology roadmap Candidates should have experience in IT leadership roles within Fortune 500 companies or high-growth startups Ability to mentor CTOs and tech teams is an added advantage Mandatory Key Skills cybersecurity,Artificial intelligence,strategic advisor,strategy management,cloud computing*
Posted 1 week ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
88025 Jobs | Dublin
Wipro
30699 Jobs | Bengaluru
Accenture in India
25586 Jobs | Dublin 2
EY
23713 Jobs | London
Uplers
19531 Jobs | Ahmedabad
IBM
15625 Jobs | Armonk
Bajaj Finserv
15600 Jobs |
Amazon.com
15164 Jobs |
Capgemini
14629 Jobs | Paris,France
Accenture services Pvt Ltd
14230 Jobs |