Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 6.0 years
15 - 25 Lacs
Mumbai
Work from Office
About Organization: Larsen & Toubro Ltd, commonly known as L&T, is an Indian multinational conglomerate company, with business interests in engineering, construction, manufacturing, technology, information technology and financial services, headquartered in Mumbai. The company is counted among world's top five construction companies. The L&T Group comprises of 93 subsidiaries, 5 associate companies, 27 joint ventures and 35 jointly held operations, operating across basic and heavy engineering, construction, realty, manufacturing of capital goods, information technology, and financial services. Specialties: Aerospace, Infrastructure, Shipbuilding, Construction, Defense, Finance, Forging, Hydrocarbon, Information Technology & Engineering Services, Construction Equipment, Railways, Boilers, Process Plant, Turbines, Power, Renewable Energy, Manufacturing, and Green Hydrogen. Job Title: Assistant Manager/Manager - Technology support & excellence Job Location: Powai, Mumbai Working Model: Work from office Operating Model: 6 days (2nd and 4th Saturdays Off) EDUCATIONAL QUALIFICATIONS: B.Tech/B.E./MCA/M.Sc. In Cyber Security Specialization EXPERIENCE: Min 4-6 years in Information Security Job Profile: Should have handled latest security tools, technologies (EDR, PIM, WAF, SASE, Proxy etc) & maintained compliance to standards (e.g. ISO27001:2022) Remediate cyber security incidents as per agreed service levels with Central Cyber Security operation Center As SME of security technology, evaluate & deploy security technologies Establish vendor selection criteria (RFP, Evaluation, Short listing, Selection) Ensure implementation of security tools & technologies as per project plans Managing & ensuring service delivery of partners with agreed SLA & payments as per schedule Conducting security awareness trainings for stakeholders in respective areas Run technology excellence program (CoE) with KPIs in line with industry standards Adherence to Budgets (Capex, Opex)
Posted 2 weeks ago
8.0 - 13.0 years
6 - 15 Lacs
Mohali, Chandigarh
Work from Office
We are seeking a highly qualified Assistant / Associate Professor in Computer Science & Engineering (CSE) to join our esteemed faculty. The candidate will be responsible for teaching undergraduate and postgraduate courses, conducting research, mentoring students, and contributing to academic and institutional development. Key Responsibilities: Deliver lectures, labs, and seminars in core and specialized areas of CSE . Guide research scholars and students in projects, dissertations, and publications. Develop and update curriculum to align with industry trends and emerging technologies. Publish research in reputed journals and participate in academic conferences. Secure research grants and collaborate on interdisciplinary projects. Engage in student mentoring, counseling, and extracurricular activities. Participate in faculty development programs and institutional initiatives. Qualifications & Experience: Ph.D. in Computer Science & Engineering or a related field from a recognized university. Minimum 8-10 years of teaching/research/industry experience (as per AICTE/UGC norms). Strong research background with publications in SCI/Scopus indexed journals. Expertise in areas like AI, Machine Learning, Cybersecurity, IoT, Data Science, Cloud Computing, etc. Inviting applications at umang.hr@cgc.ac.in or can call at 8360367050
Posted 2 weeks ago
7.0 - 12.0 years
12 - 18 Lacs
Mumbai, Thane, Navi Mumbai
Hybrid
We are seeking a highly skilled and experienced Network Engineer to manage and support the daily operations of our global backend network infrastructure. The ideal candidate will have deep expertise in Cisco routing and switching, strong knowledge of core networking protocols including BGP and VRF, and hands-on experience in scripting and automation. This role also requires a solid understanding of cybersecurity principles and experience with cloud platforms such as Azure or AWS. Key Responsibilities: Oversee daily operations and management of a global backend network. Design, develop, and maintain network solutions using Agile DevOps and sprint-based methodologies. Coordinate with suppliers and provide support to 1st and 2nd line technical teams. Perform hands-on network troubleshooting and incident resolution. Ensure network security, compliance, and long-term operational reliability. Document network configurations, procedures, and changes. Collaborate with cross-functional teams to support business and IT initiatives. Required Skills and Experience: Proven experience with Cisco routing and switching technologies. In-depth knowledge of BGP, VRF , and other core networking protocols. Proficiency in scripting languages such as Python, Perl, PowerShell, C#, JavaScript, Go, or Bash . Strong understanding of cybersecurity principles and risk management . Experience with cloud platforms like Microsoft Azure or Amazon Web Services (AWS) . Familiarity with network monitoring and management tools. Excellent problem-solving and communication skills. Preferred Qualifications: Relevant certifications such as CCNP, CCIE, AWS Certified Advanced Networking, or Azure Network Engineer Associate . Experience in Agile/Scrum environments. Knowledge of automation tools and infrastructure-as-code (IaC) practices. Why Join Us? Work in a dynamic, global environment with cutting-edge technologies. Opportunity to grow and innovate in a collaborative team. Competitive compensation and benefits package.
Posted 2 weeks ago
3.0 - 6.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Primary Skills: Support during the investigation of suspected cyber security events Analysis and respond to the service request and incident related to securitytools (Carbon Black,Armis, EDR,etc) and related policies Deep knowledge of TCP/IP suite and ICS protocols. Endpoint Detection Response (Carbon Black, CrowdStrike) Hands on Experience in Cyberark Responsibilities: Supports Carbon Black Endpoint Detection and Response (EDR) applications and ensures cyber security service availability for the endpoints. Daily monitoring EDR AV logs Monitor EDR dashboard for compliance, threats and further troubleshootingwherever required. Basic level of fine tune policies. Raise case and follow up with Vendor support for any issue. Maintain security Run Books and SOPs. Ticket handling Generate regular reports and updates on security incident trends. Monitoring Incidents/Outages Carbon Blac. Primary Skills: Support during the investigation of suspected cyber security events Analysis and respond to the service request and incident related to security tools (Carbon Black, Armis, EDR, etc) and related policies Deep knowledge of TCP/IP suite and ICS protocols. Endpoint Detection Response (Carbon Black, CrowdStrike) Hands on Experience in Cyberark. Responsibilities: Supports Carbon Black Endpoint Detection and Response (EDR) applications and ensures cyber security service availability for the endpoints. Daily monitoring EDR AV logs Monitor EDR dashboard for compliance, threats and further troubleshooting wherever required. Basic level of fine tune policies. Raise case and follow up with Vendor support for any issue. Maintain security Run Books and SOPs. Ticket handling Generate regular reports and updates on security incident trends. Monitoring Incidents/Outages
Posted 2 weeks ago
5.0 - 9.0 years
9 - 14 Lacs
Bengaluru
Work from Office
Hands-on experience on vulnerabilities and should know Life Cycle ofvulnerabilities, Perform data validation and prioritization The core team will work with the Program Manager for any emergency vulnerabilities and will work with all stakeholders with high-priority Validate the report for any anomalies Categorization of Vulnerabilities Validate Ageing of Vulnerabilities Validate Remediated Vulnerabilities Provide the patching Schedule, and classify based on criticality, OS, and Non-OS, and further sub-classify into config, registry and application vulnerabilities categories on a timely basis Prepare the teams shift roster based on the patching schedule Identify Vulnerabilities still shown as open despite remediation and raise withthe infosec team - update InfoSec Issue Trackers Identify Vulnerabilities and create Fixlets where solutions exist Work on and call out Known issues on KBs Provide technical solutions to all Vulnerabilities and engage with SMEfor any critical discussions Vulnerability Assessment, Vulnerability Mitigation, Static/dynamic testing of mobile applications, Cyber Security Assessment Consulting, Penetration Testing, Manual Penetration Testing using OWASP checklists. The core team will work with the Program Manager for any emergency vulnerabilities and will work with all stakeholders with high-priority
Posted 2 weeks ago
5.0 - 9.0 years
9 - 14 Lacs
Pune, Bengaluru
Work from Office
Assist in defining security Policies Standards and reference Architecture for Network design and deployment related to above technologies. Proactive analysis of Network for secure deployments, secure configurations against Global Security Best Practices. Assisting network design team with security inputs while designing an architecture for new offices/ branches/ data centres etc. for Security by Design. Developing network security standards and guiding network design to meet corporate requirements. Strategize and formulate high and low-level monitoring mechanism for security posture of network deployments and advise measures to improve them. Possess and maintain technical knowledge of aspects of DDoS mitigation, NAC, Internet Proxy, DNS etc. Conducting analysis of network security and Strategize and formulate high and low-level monitoring mechanism for DDoS mitigation, NAC, Internet Proxy, DNS. Taking proactive measures for enhancing the security posture of the Bank's network by studying the vulnerabilities issued/ published by various OEMs, internal and external agencies such as CERTetc. Working with internal and external business stakeholders on ensuring that IT infrastructure meet global network security standards. Produce and track metrics for the effectiveness and maturity of Secure network deployments.
Posted 2 weeks ago
4.0 - 7.0 years
11 - 15 Lacs
Bengaluru
Work from Office
Vulnerability Assessment, Vulnerability Mitigation, Manual Penetration Testing using OWASP checklists, Penetration Testing, Cloud Security Assessment, Cyber Security Assessment Consulting, Cybersecurity, Cyber Security Perform comprehensive penetration testing and vulnerability assessments on enterprise networks, firewalls, routers, switches other infrastructure components Identify and exploit vulnerabilities to assess the security posture of network components Provide detailed reports with risk ratings, remediation steps, and security recommendations Work with IT DevOps teams to ensure timely resolution of vulnerabilities Utilize industry-standard tools such as Nessus, Nmap, Metasploit, Burp Suite, Wireshark, Open VAS Implement and manage vulnerability scanning solutions across the organization Collaborate with IT, DevOps security teams to ensure patches and mitigations are applied effectively Conduct security assessments for cloud environments (AWS, Azure, GCP) including configuration audits Identify misconfigurations, privilege escalations security risks in cloud infrastructure Implement continuous monitoring logging solutions for cloud security visibility
Posted 2 weeks ago
5.0 - 9.0 years
9 - 14 Lacs
Bengaluru
Work from Office
Dedicated lead to work with the Happiest Minds Shared SOC team and ITteam to enhance the overall Incident response processes Run any critical incident response along with SOC and IT team Review and update the use caserepository as applicable to Happiest Minds Environment Work on root causeanalysis and remediations for alerts/incidents raised by customers Review andupdate existing automation playbooks Continuous updates of detectiontechniques Periodic threat hunting Use cases to prioritize based on thefindings from the threat and vulnerability management program
Posted 2 weeks ago
5.0 - 9.0 years
9 - 14 Lacs
Bengaluru
Work from Office
Manual Penetration Testing using OWASP checklists, Penetration Testing, Vulnerability Assessment, OWASP Top 10, OWASP ZAP, AWS Cloud, Azure Cloud, Cyber Security, Cloud Security Assessment, Cyber Security Assessment Consulting, Cybersecurity, Data Security Assessment Consulting Perform Penetration testing Develop and recommend mitigation strategies to enhance the defense mechanisms of critical infrastructure components Collaborate with IT and security teams to refine security measures and response strategies Prepare detailed reports on findings from simulations and suggest improvements Facilitate training sessions for internal teams on security awareness and breach response tactics
Posted 2 weeks ago
5.0 - 9.0 years
9 - 14 Lacs
Bengaluru
Work from Office
Implementation and Deployment: - Design and deploy IDS (ARMIS)solutions tailored to OT environments. - Develop comprehensive deploymentarchitectures, ensuring seamless integration with existing systems. - Configure and optimize network andfirewall settings to support IDS deployments. Data Network Security - IDS, Cybersecurity.
Posted 2 weeks ago
4.0 - 6.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Manual Penetration Testing using OWASP checklists, Penetration Testing, Security Configuration Review, Cloud Security Assessment, Cyber Security, Manual Penetration Testing using OWASP checklists, Penetration Testing, Security Configuration Review, Cloud Security Assessment, Cyber Security 4 to 6 years of experience conducting Application Security assessments Experienced in conducting Manual and Automated DAST for Web, API Thick client covering OWASP Top 10 Experienced in conducting Manual code review Experienced in Mobile VAPT (Both static and Dynamic) Knowledge of Infra VAPT or at least VA and configuration review Knowledge in Container / Docker security / Cloud Audit is a plus Certifications suck as CEH, CRTP, OSCP is preferred Good communication skills, ability to explain vulnerabilities to business users in simple terms Notice: Immediate to 15 days
Posted 2 weeks ago
7.0 - 12.0 years
11 - 16 Lacs
Bengaluru
Work from Office
Aqua, Vulnerability Assessment, Vulnerability Mitigation - Applicants should possess 7+ years of demonstrated experience in cybersecurity, network engineering, and/or infrastructure engineering 5 of the years must include hands on experience in one or many of the following areas - threat intelligence, server vulnerability management and container vulnerability management - 3 plus years experience administering cloud container vulnerability solutions like Aqua or Wix is required Candidates without this experience will not be considered - 3+ years working with container technologies and container vulnerabilities is required Candidates without this experience will not be considered - Experience with scanning solutions such as Rapid7, Qualys, or Tenable scanning is desired - Understanding of MITRE ATTCK and OWASP frameworks is desired - Understanding of malware and common attack types is desired
Posted 2 weeks ago
4.0 - 6.0 years
9 - 14 Lacs
Bengaluru
Work from Office
Static/dynamic testing of mobile applications, Vulnerability Assessment, Manual Penetration Testing using OWASP checklists, Penetration Testing, Cyber Security Assessment Consulting, Cloud Security Assessment 4 to 6 years of experience conducting Application Security assessments Experienced in conducting Manual and Automated DAST for Web, API Thick client covering OWASP Top 10 Experienced in conducting Manual code review Experienced in Mobile VAPT (Both static and Dynamic) Knowledge of Infra VAPT or at least VA and configuration review Knowledge in Container / Docker security / Cloud Audit is a plus Certifications suck as CEH, CRTP, OSCP is preferred Good communication skills, ability to explain vulnerabilities to business users in simple terms Notice: Immediate to 15 days
Posted 2 weeks ago
4.0 - 6.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Penetration Testing, Manual Penetration Testing using OWASP checklists, Cloud Security Assessment, Security Configuration Review, Vulnerability Assessment, Vulnerability Mitigation, Cyber Security 4 to 6 years of experience conducting Application Security assessments Experienced in conducting Manual and Automated DAST for Web, API Thick client covering OWASP Top 10 Experienced in conducting Manual code review Experienced in Mobile VAPT (Both static and Dynamic) Knowledge of Infra VAPT or at least VA and configuration review Knowledge in Container / Docker security / Cloud Audit is a plus Certifications suck as CEH, CRTP, OSCP is preferred Good communication skills, ability to explain vulnerabilities to business users in simple terms
Posted 2 weeks ago
3.0 - 8.0 years
5 - 9 Lacs
Pune
Work from Office
Fortinet-Fortigate Firewalls, Data Network Security - Firewalls, VPN, Microsoft Email Security, Zscaler Proxy, Load Balancing. Security exposure, PA, Fortinet, WAF, Email Security, Proxy. All L2 level. 3 years of Exp in Infosec Domain. Should be able to handle Domestic and Global customers both. Key Skills: Firewalls Web Application Firewall Application Delivery Controller (Load Balancer) Virtual Private Network (VPN) Email Security Appliance Proxy Web filtering Important Note: CEH certification is Mandatory
Posted 2 weeks ago
1.0 - 6.0 years
11 - 15 Lacs
Bengaluru
Work from Office
Cybersecurity, Azure Sentinel SIEM,MS Defender for Endpoints (EDR/ATP),AWS IAM,SOAR Concept, Fortinet FortiSOAR, Palo Alto Networks - Firewalls, Cortex XSOAR, Python We are seeking a Cybersecurity Analyst with 1-6years of experience in fundamental cybersecurity concepts, including SIEM, EDR, IAM, and SOAR platforms The ideal candidate should have a basic understanding of security automation and orchestration using platforms like FortiSOAR, Palo Alto XSOAR, and ThreatConnect (preferred) Experience with SOAR play book creation , integration etc Additionally, knowledge of Python scripting for automation and security tasks will be an added advantage
Posted 2 weeks ago
2.0 - 6.0 years
4 - 8 Lacs
Noida
Work from Office
Headquartered in Canada with locations across the United States and around the globe with a footprint on six continents, Bulletproof, a GLI company has decades of technology, security, and compliance expertise. Bulletproofs work in the security space has been recognized nationally and globally with Microsofts global Security Partner of the Year in 2021 and five Microsoft Canada Impact Award wins from 2019 to present-day. At Bulletproof, our vision is to serve, secure, and empower the world through people and technology; one customer at a time. We believe everyone has the right to feel safe and secure. Our mission is to serve and protect organizations to ensure their success. What we have to offer : Challenging Work - We love solving highly complex problems. Across our teams and in all roles, every employee is empowered to bring their best ideas forward and to jump in and solve the problems they're passionate about. Great People - We are stronger, together, when we are open, honest, and above all, real. Every person is valued here and plays an important role in our shared success. Global Impact - As a global team spanning continents, boundaries, and cultures, every day we are inspired by the impact our work has on our colleagues, our customers, our communities, and the world at large. Diversity, Equity and Inclusion - We celebrate each others differences, continuously strive for equality and recognize that inclusion makes us stronger as individuals, a company and a global citizen. Position Summary: This position will work with Bulletproof employees to extract internal requirements for the configuration of an Audit Automation Platform. The candidate will need to define the best approach to configure those requirements within the chosen Audit Automation platform. This includes, but it is not limited to implementing checklists starting from a given technical standard, implementing report and audit plan templates and define workflow logic. Those requirements need to be maintained within the platform as the number of checklists served is increasing and as the audit methodology evolves. This position's main duties are regarding the configuration and maintenance of a chosen Audit Automation Platform. Responsibilities: Configure audit templates and checklists in the Audit Automation Platform Translate compliance frameworks (e.g., ISO 27001, NIST, SOC 2) into structured audit workflows Maintain and update templates based on evolving audit needs Support internal users and troubleshoot platform issues Document configuration guidelines and best practices Liaise with auditors and IT/security stakeholders to ensure audit readiness Develops and reviews security audit reports for quality assurance. Collaborating with clients to develop appropriate remediation plans. Collaborating with colleagues in other lines of services in support of client needs for Information Security Services. Follows, maintains and suggests improvements to standard operation procedures (SOP) Follows, maintains and suggests improvements to workflow and Audit Automation Platform interface Provides clients with exceptional service in a professional, courteous and timely manner. Perform other related duties as assigned. Defines the scope for information security audit assignments. Support the team technical development (e.g. through service development or research) and contribute to technical processes overall. Required Education / Credentials / Qualifications: Degree in Computer Science, Information Systems, Engineering or related major from an accredited University or equivalent College Diploma and related experience. Prior experience with audit or compliance automation tools (experience with AuditBoard, Vanta, Drata or Intact Platform is a plus) Familiarity with IT/IS audit and compliance standards (ISO 27001, NIST, SOC 2, etc.) Strong skills in configuring structured templates and workflows Ability to understand and map audit requirements into platform configurations Detail-oriented, organized, and self-motivated Clear written and verbal communication in English Must have in-depth experience designing and implementing information security solutions. The following skills are preferred but not required: Basic scripting or low-code experience (depending on customization features) Experience working with internal IT or security teams Familiarity with other GRC tools or platforms
Posted 2 weeks ago
4.0 - 6.0 years
5 - 9 Lacs
Bengaluru
Work from Office
This will be an Individual Contributor role to start and can evolve over time based on how this function matures. You will play a critical role in the companys tech infrastructure, processes which will be fully aligned with regulatory, security and business continuity standards. Key Responsibilities Draft, coordinate monitor IT processes policies to ensure compliance as per IT Act, regulatory bodies (e.g. RBI, SEBI, GDPR, UIDAI etc.), info security (ISM) guidelines and other applicable laws with respect to Technology, in coordination with internal external stakeholders Prepare update business-wise IT infra details required by the Compliance/Legal teams for regulatory filings and 3rd party audits Conduct vendor risk assessment audits ensure identified gaps are proactively filled Introduce new processes policies by conducting market studies surveys relevant to our business Plan, formulate, coordinate, implement monitor the cyber crisis management plan (CCMP) Incident Management and resolution Interface with external auditors and set up processes to ensure all Infosec audits go smoothly Formulate, implement, review monitor BCP Requirements 4-6 years of experience, including being SPOC for Infosec audits In-depth knowledge of technology, security, risk, and compliance best practices Strong capability in interfacing with both technology and business teams Detailed understanding of security monitoring, threat intelligence vulnerability management A self-driven attitude with a strong sense of ownership Experience with RBI and/or SEBI (preferred) audits is a big plus Assisting the team to conduct Technology Committee Assisting the Risk Officer to conduct independent assessments of the business functions Provide timely data for Risk Management Committee
Posted 2 weeks ago
3.0 - 8.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Need overall AppSec skills (SAST, DAST, Penetration testing) +Mobile app testing skills (Android, ioS). We should look for a candidate who has deep and diverse hands on exp in above skills. Also, The professional is expected to perform the application security activities - Static code assessment/ manual testing including mobile application testing for android and iOS apps.
Posted 2 weeks ago
10.0 - 14.0 years
14 - 20 Lacs
Bengaluru
Work from Office
SC100: MS Cybersecurity Certified 10 yrs in Cybersecurity, 4+ Architecture Compliance - NIST,ISO 27001,RBI,GDPR Zero Trust Architecture KQL Queries Logic Apps Cloud Security Identity Governance Threat Detection SC-200/AZ-500/SC-300 TOGAF, CISSP, CISM
Posted 3 weeks ago
12.0 - 22.0 years
25 - 40 Lacs
Hyderabad
Work from Office
Job Title: Technical Cyber Security Operations Manager ( 15-30 days Joiners) Location: Hyderabad About Us : Stefanini is a leading provider of cybersecurity solutions committed to protecting our clients from digital threats and ensuring the safety of their data. As our SOC Manager, you will be pivotal in leading our Security Operations Center and driving various specialized squads to enhance our security operations. You will be at the forefront of our security initiatives, safeguarding our clients' most valuable assettheir data. Position Summary : The SOC Manager will oversee the day-to-day operations of the Security Operations Center, ensuring effective monitoring, detection, and response to security incidents. This role includes managing a comprehensive suite of cybersecurity services, including Managed Detection and Response (MDR), SOC as a Service, CISO Advisory, SOC Advisory, Brand Protection & External Data Leakage, Attack Surface & Vulnerability Management, and Insider Threat Detection. The SOC Manager will also be responsible for SOC gamification and executing strategic squad lab research and development. Key Responsibilities : Lead and Manage the SOC Team: Supervise and mentor a team of Tier-1 through Tier-3 Security Analysts and Engineers, providing guidance, training, and performance evaluations to ensure effective team management and leadership. Deployment and Oversight: Oversee the deployment, configuration, and delivery of core cybersecurity services, ensuring their effective integration and operation within the SOC. Incident Response: Manage the detection, investigation, and resolution of security incidents. Coordinate with other departments to mitigate and recover from security breaches. Toolset Management: Ensure the effective deployment and use of cybersecurity tools and platforms, including SIEM, endpoint protection, vulnerability assessment tools, and threat intelligence feeds, and integration of Stefanini's SAI Cyber Hub platform. Security Monitoring: Continuously monitor security systems and alerts to identify and respond to potential threats, utilizing the full range of managed services. Policy and Procedure Development: Develop and maintain SOC policies, procedures, and playbooks to ensure a standardized approach to security operations and consistent service delivery. Reporting and Metrics: Generate regular reports on security incidents, team performance, and SOC activities, providing insights and recommendations for improvements across all service areas. Stakeholder Communication: Liaison between the SOC and other business units, ensuring clear communication of security issues and their impact and the status and performance of the deployed services. Continuous Improvement: Stay current with the latest cybersecurity trends and technologies. Implement best practices and innovative solutions to enhance the SOC's capabilities and service offerings. SOC Gamification Oversight: Implement and oversee SOC gamification strategies to enhance team engagement, motivation, and continuous skill development. Track and report on gamification metrics and progress. Strategic Squad Lab R&D: Execute and manage the day-to-day operations of strategic squad lab research and development initiatives as directed by the Head of Cybersecurity. Ensure alignment with overall security objectives and innovation goals. Required Skills and Qualifications: Experience: At least 5 years in a service delivery role, with at least 7 years in a SOC management position. Education: A bachelor’s or master’s degree in computer science, Information Security, or a related field is highly desirable. Relevant certifications such as CISSP, CISM, or CEH are also highly desirable. Technical Proficiency: In-depth knowledge of SIEM systems, endpoint security solutions, vulnerability management tools, threat intelligence platforms, incident ticketing systems, knowledge management systems, access management solutions, and asset management tools. Leadership Skills: Proven ability to lead, manage, and motivate a team of security professionals. Analytical Skills : Strong problem-solving and analytical skills, with the ability to think critically and make informed decisions under pressure. Communication Skills: Excellent verbal and written communication skills, with the ability to convey complex security concepts to nontechnical stakeholders. Attention to Detail: High level of accuracy and attention to detail in all aspects of work. Adaptability: Ability to work in a fast-paced, dynamic environment and adapt to changing priorities and technologies. IAM Policies and Procedures Knowledge: Proficient in developing, implementing, and managing policies and procedures related to Identity and Access Management. Cloud Experience: Experience with AWS, Azure, or Google Cloud, along with automation capabilities. Data Security: Solid understanding of data security principles. Generative AI Experience: Experience with generative AI is a plus. Preferred Qualifications : Certifications: CISSP, CISM, CEH, or equivalent certifications. Compliance Experience: Familiarity with industry standards and regulations such as NIST 2.0, ISO 27001, NIST 800-53, NIST 800-171, HIPAA, and PCI-DS
Posted 3 weeks ago
0.0 - 5.0 years
2 - 7 Lacs
Hyderabad, Pune, Bengaluru
Work from Office
We are Hiring Freshers, who are passionate to build their careers in Cyber Security Engineer/ Cyber Security Analyst Eligibility : All PG & UG graduates can apply for interview Cyber Security Engineer/ Cyber Security Analyst - Freshers Bulk Hiring Required Candidate profile BCA /BSC/B.E/ B.tech / M.tech (IT/CS)/ MCA Freshers Cyber Security Engineer/ Cyber Security Analyst - Freshers Bulk Hiring Contact HR : 8546851230 for interview
Posted 3 weeks ago
2.0 - 4.0 years
10 - 11 Lacs
Hyderabad
Work from Office
Overview Exp. - 3-6 Years Location - Hyderabad, Bangalore, Gurgaon, Mumbai Shift - 11 AM - 8 PM Skills - Exp. in Vulnerability mgt., vulnerability scanning tools such as Qualys, Tenable, or Rapid7, Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). About Omnicom Global Solutions Omnicom Global Solutions is an integral part of Omnicom Group, a leading global marketing and corporate communications company. Omnicom’s branded networks and numerous specialty firms provide advertising, strategic media planning and buying, digital and interactive marketing, direct and promotional marketing, public relations, and other specialty communications services to over 5,000 clients in more than 70 countries. OGS India plays a critical role for our group companies and global agencies by providing stellar products, solutions, and services across Creative Services, Technology, Marketing Science (Data & Analytics), Advanced Analytics, Market Research, Business Support Services, Media Services, and Project Management. With over 4000 talented colleagues in India, we are growing rapidly and are looking for professionals like you to help build the next chapter of our journey. Responsibilities Role Overview We have an exciting opportunity for an Analyst, Vulnerability Management at our Hyderabad office. This role is central to maintaining and enhancing Omnicom’s cybersecurity framework by overseeing vulnerability assessments, remediation guidance, and program governance. As a Vulnerability Management Specialist, you will drive day-to-day scanning operations, review security exposures, and ensure that the organization’s attack surface is minimized through proactive analysis and mitigation. You’ll also collaborate on vendor assessments and support strategic improvements to our enterprise vulnerability management program. Key Responsibilities Maintain and operate vulnerability scanning tools and associated processes. Conduct regular scans and assessments of enterprise environments to detect security vulnerabilities. Review findings, prioritize risks, and recommend remediations or security patches in coordination with IT and security teams. Develop and present exception and management reports; track remediation status and escalate unresolved risks. Assist in creating and maintaining quality metrics and dashboards for vulnerability program performance. Monitor vendor and third-party security postures; support governance and compliance protocols. Collaborate with cross-functional teams to support risk mitigation strategies and secure configuration management. Contribute to the evolution of Omnicom’s next-generation vulnerability management and threat detection frameworks. Qualifications Required Qualifications 3–5 years of experience in vulnerability management, information security, or a related discipline. Proficiency with vulnerability scanning tools such as Qualys, Tenable, or Rapid7. Familiarity with patch management workflows and remediation lifecycle practices. Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). Ability to analyse technical findings, assess business impact, and provide actionable remediation guidance. Effective communication skills with experience in stakeholder engagement and reporting. Detail-oriented with strong problem-solving skills and the ability to work independently or in a team setting. Preferred Qualifications Security certifications such as CompTIA Security+, CEH, or equivalent. Exposure to vendor risk management and third-party security assessment. Experience with ITSM tools and ticketing systems for remediation tracking
Posted 3 weeks ago
8.0 - 13.0 years
10 - 14 Lacs
Hyderabad, Gurugram, Bengaluru
Work from Office
We are the leading provider of professional services to the middle market globally, our purpose is to instill confidence in a world of change, empowering our clients and people to realize their full potential. Our exceptional people are the key to our unrivaled, inclusive culture and talent experience and our ability to be compelling to our clients. You ll find an environment that inspires and empowers you to thrive both personally and professionally. There s no one like you and that s why there s nowhere like RSM. Bachelor or Master degree in computer science with a minimum of 8 years in cyber security domain Technical background in networking/system administration, security testing or related fields In-depth knowledge of TCP/IP Two or more years of Perl, Python, Bash, or C experience Operating System Configuration and Security experience (Windows, HP-UX, Linux, Solaris, AIX, etc.) Configuration and Security experience with firewalls, switches, routers, VPNs Experience with security and architecture testing and development frameworks, such as the Open Web Application Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), Information Systems Security Assessment Framework (ISSAF), and NIST SP800-115 Familiar with security testing techniques such as threat modeling, network discovery, port and service identification, vulnerability scanning, network sniffing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing, fuzzing, and password cracking and can perform these techniques from a variety of adversarial perspectives (white-, grey-, black-box) Experience with discovering, utilizing, and possibly writing exploits for such vulnerabilities as buffer and stack overflows Familiar with the logistics of security testing such as acquiring authorization for testing, reporting, risk analysis of findings, data handling, and legal considerations Commercial Application Security tools experience (Nessus, Nexpose, Qualys, Appdetective, Appscan, etc.) Open source and free tools experience (Kali Linux suite, Metasploit, nmap, airsnort, Wireshark, Burp Suite, Paros, etc.) One or more of the following testing certifications: Certified Ethical Hacker (CEH); GIAC Certified Penetration Tester (GPEN); Offensive Security Certified Professional (OSCP); or equivalent development or testing certification (ECSA, CEPT, CPTE, CPTS, etc) In addition, one or more of the following governance certifications is preferred: Certified Information Systems Security Professionals (CISSP ); Certified Information Systems Auditor (CISA ); Certified Information Security Manager (CISM ) Strong leadership and communication skills, technical knowledge, and the ability to write at a "publication" quality level in order to communicate findings and recommendations to the client's senior management Must possess a high degree of integrity and confidentiality, as well as the ability to adhere to both company policies and best practices Position & Key Responsibilities Develop an understanding of the RSM US Risk Consulting service offerings, methodologies, and tools Perform analysis and testing to verify the strengths and weaknesses of client IT environments utilizing commercial and open source security testing tools Perform Internet penetration testing (blackbox/ greybox / whitebox testing) and network architecture reviews (manual/ automated) Perform other security testing tasks such as wireless penetration testing, social engineering campaigns (email, web, phone, physical, etc.), mobile application testing, embedded device testing, and similar activities meant to identify critical weaknesses within client environments Assist with the development of remediation recommendations for identified findings Identify and clearly articulate (written and verbal) findings to senior management and clients Help identify improvement opportunities for assigned clients Supervise and provide engagement management for other staff working on assigned engagements Works closely with the client and RSM team to make sure we meet or exceed client expectations on each engagement and maintain high customer satisfaction. Exercise professional skepticism, judgment and adhere to the code of ethics while on engagements Ensure that documentation is compliant with the quality standards of the firm Work collaboratively as a part of the team and communicate effectively with RSM consulting professionals, and senior management in the U.S. on a daily basis Key Skills to Accelerate Career Maintains a high degree of quality and client relationship on multiple clients at the same time Positively engages, motivates and influences team members Identifies client needs/requirements and initiates discussion to expand services through a solid understanding of the firm s service capabilities and offerings Subscribes to and actively read industry publications and share relevant information with clients as considered applicable
Posted 3 weeks ago
8.0 - 14.0 years
16 - 17 Lacs
Pune
Work from Office
Our passionate and highly skilled engineering team is proficient in building comprehensive data protection solutions to secure, manage and protect data of large enterprise customers across variety of environment. As a Staff Software Engineer, you will be an individual contributor focused on architecting, designing, developing, enhancing innovative features on next generation of our proven NetBackup architecture. We are a motived team of engineers building microservices based scalable, elastic and resilient solutions to achieve significant cost savings for our customers. HOW you'll SPEND YOUR TIME HERE Collaborate with stakeholders and team members to understand customer asks, use cases. Brainstorm, design and implement robust and scalable solutions, ensure timely delivery as per release milestones. Ensure high quality output with diligent code reviews, thorough unit/automation testing and stakeholder demos. Analize, troubleshoot and resolve complex issues found during internal testing, customer usage. Mentor/Guide junior team members. Collaborate & contribute to innovation efforts across the company we'd LOVE TO TALK TO YOU IF YOU HAVE MANY OF THE FOLLOWING Proficiency and hands on development experience of 8-14 years in C/C++, GoLang, exposure to Python. Excellent understanding and background in Containers and Kubernetes. In depth knowledge of Cloud (AWS, Azure & Google). Strong understanding of cyber security is desirable. Strong coding, analytical, debugging and troubleshooting skills including use of tools such GDB, Python Debugger. Highly motivated and passionate, problem-solver who can dive deep to solve complex problems/issues and build quality products. Strong collaborator with great communication skills.
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane