Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 10.0 years
6 - 10 Lacs
chennai
Remote
Own threat detection, response, and hardening across cloud and endpoint estates. Design/operate SIEM/XDR/SOAR with detection engineering mapped to MITRE ATT&CK, and automate triage using GenAI for alert summarisation, enrichment, and knowledge search. Build Sigma rules, integrate EDR/telemetry (CrowdStrike, Defender, Sentinel/Splunk/Chronicle), and run purple-team exercises to close gaps. Champion Zero Trust, secrets hygiene, and incident runbooks with AI-assisted updates. Measure MTTA/MTTR, detection coverage, and control efficacy. Keywords: SIEM/XDR/SOAR operations and rule tuning (Sentinel/Splunk/Chronicle + EDR)Detection engineering mapped to ATT&CK Sigma/YARA authoring GenAI for alert t...
Posted 2 days ago
1.0 - 4.0 years
2 - 5 Lacs
noida
Work from Office
Roles and Responsibility Ensure the safety and security of patients, staff, and clinic premises. Monitor and report any suspicious activity or incidents to management. Maintain a high level of visibility and presence on the clinic premises. Develop and implement effective security protocols and procedures. Collaborate with other departments to ensure seamless operations. Provide excellent customer service and respond to patient inquiries. Job Requirements Minimum 2 years of experience in a similar role, preferably in a healthcare or dermatology setting. Strong knowledge of security principles and practices. Excellent communication and interpersonal skills. Ability to work effectively in a fa...
Posted 2 days ago
8.0 - 10.0 years
27 - 30 Lacs
bengaluru
Work from Office
Key Skills: IOT, Embedded, Penetration Testing, Cyber Security, RTOS, Regulatory Compliance, Linux, ISO, Regulatory regulations, IEC 62443 Roles and Responsibilities: Conduct penetration testing on embedded systems and medical devices to identify vulnerabilities. Evaluate and enhance security measures for IoT and operational technology (OT) environments. Ensure compliance with relevant cybersecurity standards including ISO 14971, IEC 62304, and IEC 81001-5-1. Collaborate with cross-functional teams to integrate security practices into the product development lifecycle. Provide expert guidance on regulatory compliance and best practices in cybersecurity. Document findings and provide actionab...
Posted 2 days ago
4.0 - 9.0 years
22 - 25 Lacs
hyderabad, chennai, bengaluru
Work from Office
Role Overview The Cybersecurity Engineer L2 is responsible for day-to-day cybersecurity operations and technical execution across endpoint security, firewall security, identity and access management , and security incident handling. This role performs hands-on activities to monitor, investigate, remediate, and maintain security controls across on-premises and Azure cloud environments. The engineer works as part of a 24x7 security operations model , supporting Tier-1 teams, escalating complex issues appropriately, and operating under governance aligned to the NIST Cybersecurity Framework (CSF) . Key Responsibilities 1. Security Monitoring & Incident Support Support 24x7 security monitoring ac...
Posted 2 days ago
4.0 - 8.0 years
22 - 25 Lacs
hyderabad, chennai, bengaluru
Work from Office
Role Overview The Cybersecurity Engineer L2 (SIEM, VA, PT) is responsible for operational execution of security monitoring, vulnerability management, and penetration testing activities across the client’s on-premises and Azure cloud environments. This role provides hands-on support for SIEM operations, vulnerability scanning, remediation tracking, and security analytics , operating under governance aligned to the NIST Cybersecurity Framework (CSF) . The engineer works closely with Tier-1 SOC teams, the Cybersecurity Lead, and infrastructure stakeholders to ensure continuous visibility into security posture and effective remediation of identified risks . Key Responsibilities 1. SIEM Operation...
Posted 2 days ago
12.0 - 16.0 years
27 - 32 Lacs
hyderabad, chennai, bengaluru
Work from Office
Role Overview The Cybersecurity Lead L3 is responsible for end-to-end leadership, governance, and technical oversight of the client’s cybersecurity services, covering network security, endpoint protection, security monitoring, vulnerability management, and email security . This role ensures cybersecurity operations are delivered in alignment with the NIST Cybersecurity Framework (CSF) and the agreed scope, leveraging Microsoft’s security ecosystem to protect on-premises, cloud, and endpoint environments. The lead acts as the primary authority for cybersecurity operations , client engagement, and service assurance. Key Responsibilities 1. Cybersecurity Operations Leadership (Aligned to NIST C...
Posted 2 days ago
2.0 - 6.0 years
0 Lacs
kochi, all india
On-site
As a Placement Coordinator at our company, your role involves ensuring that all students are provided with placement trainings on a regular basis. You will be responsible for delivering high-quality technical and soft skills training to eligible candidates each month. Your key responsibilities will include: - Identifying companies with requirements for Cyber security resources - Coordinating interviews and mock interview calls for all eligible students - Establishing strong liaisons with Operations Heads of all Branches - Coordinating with HR of Companies to organize proper interviews - Gathering feedback from students on interview trainings and job placements - Maintaining the RedTeam Alumn...
Posted 2 days ago
3.0 - 7.0 years
0 Lacs
navi mumbai, all india
On-site
As a Senior Trainer in Cyber Security & Ethical Hacking at MCTA (Marketing Courses Training Academy), your role involves teaching cyber security topics to students both in a classroom and online setting. You will be responsible for developing and delivering curriculum on cybersecurity fundamentals and advanced topics, conducting hands-on labs and simulations, and ensuring that students are engaged and encouraged in their practical learning. Additionally, you need to stay updated with the latest trends in cyber security, assist students with doubts, assignments, and career guidance, and collaborate with other instructors and industry professionals to enhance training programs. Key Responsibil...
Posted 2 days ago
5.0 - 9.0 years
0 - 0 Lacs
pune, all india
On-site
As a Trainer/Faculty at our institution in Pune, you will have the opportunity to share your expertise in Database Management, Web Designing, HTML Programming, Artificial Intelligence, and Cyber Security with students. Your role will involve delivering engaging training sessions, designing content, guiding students with projects, staying updated with industry trends, and tracking student performance. Key Responsibilities: - Deliver structured training sessions on Database Management Concepts, Web Designing, HTML & Front-End Programming, Artificial Intelligence Basics & Tools, and Cyber Security Fundamentals. - Design training content, exercises, and evaluation tools. - Guide students with pr...
Posted 2 days ago
8.0 - 12.0 years
0 Lacs
navi mumbai, all india
On-site
Job Description: As the Vice President of Enterprise Security Research and Solution Development (ESRD) at REBIT, you will play a crucial role in spearheading the ESRD Business Unit. Your main responsibility will be to strategize and execute all functions within this unit, focusing on providing next-generation products and solutions in the areas of Cyber Security for the Cyber Security (CS) and System Audit (SA) verticals. You will lead a team in conducting core research, developing state-of-the-art solutions, and enhancing products based on the RBI Enterprise Platform. Key Responsibilities: - Lead the ESRD Business Unit, collaborating with multiple domain areas and COEs to drive Security Res...
Posted 2 days ago
12.0 - 22.0 years
30 - 45 Lacs
bengaluru
Hybrid
Excellent C Programming skills with Linux Operating System. 10+ years strong experience in embedded security. Knowledge on Python and shell scripting Hands on with STM32 platforms with good knowledge on ARM Cortex architecture Experience using the STMCubeIDE, IAR Workbench and Kiel with good debuggingskills Experience in Embedded Security framework like SecureBoot, Secure firmware update, STM32_Secure_Engine, mbedTLS, mbedcrypto, Trusted Firmware, STM32_Key_Management_Services and FreeRTOS etc. Good understanding of HAL and low-layer drivers Good Communication and learning attitude.
Posted 2 days ago
4.0 - 9.0 years
4 - 9 Lacs
mumbai
Work from Office
Key Requirement : Provided first-line technical support for a large development team, ensuring minimal downtime and efficient issue resolution. Built, deployed, and configured PCs, development consoles, and virtual environments for employees. Used Microsoft SCCM to manage regular security patch management. Managed Active Directory, including users, computers, groups, and OU structures, ensuring compliance with security protocols. Conducted regular physical stock checks, maintained accurate asset inventory, and managed procurement and vendor coordination. Supported and monitored on-premises and hybrid IT infrastructure, ensuring scalability, performance, and security. Participated in service ...
Posted 3 days ago
4.0 - 9.0 years
15 - 20 Lacs
noida, bengaluru
Hybrid
Vulnerability Assessment (VAPT) across servers, networks, applications, cloud environments, and endpoints OR Privileged Access Management (PAM) with CyberArk or Beyond Trust in hybrid and multi-cloud environments
Posted 4 days ago
7.0 - 12.0 years
9 - 19 Lacs
hyderabad, pune, chennai
Work from Office
Zscaler Architect Technical Requirements Core Expertise Strong hands-on experience with Zscaler ZIA, ZPA, CASB , and Cloud Firewall . Knowledge of App Connectors , Branch Connectors , and Zero Trust Network Access (ZTNA) . Experience in translating VPN/firewall rules to ZPA policies. Networking & Security Deep understanding of TCP/IP, DNS, HTTP/HTTPS , and SSL inspection . Expertise in firewall migration and secure web gateway concepts. Integration Skills Experience integrating Zscaler with identity providers (Okta, Azure AD). Knowledge of CASB policies , DLP , and cloud security posture management . Tools & Platforms Proficiency in Zscaler Admin Portal , API integrations , and automation sc...
Posted 4 days ago
3.0 - 7.0 years
0 Lacs
kochi, all india
On-site
As a Cyber Security and Ethical Hacking Trainer, your role involves delivering classroom and practical training on core topics such as network security, web security, vulnerability assessment, and basic penetration testing. You will conduct hands-on lab sessions using industry-standard tools and technologies, preparing lesson plans, training materials, assignments, and assessments. Your responsibility includes evaluating student performance, providing academic guidance and mentoring, as well as guiding students in projects, certifications, and career pathways. Additionally, you will be updating course content according to the latest cyber security trends and threats, supporting workshops, se...
Posted 4 days ago
10.0 - 15.0 years
1 - 2 Lacs
nellore
Work from Office
Purpose/Objective The Application Support Manager is responsible for ensuring that business-critical applications run smoothly, securely, and efficiently Key Responsibilities of Role Primary Responsibilities 1. Assist in translating business scenarios into digital solutions and process improvements. 2. Work closely with technology partners to ensure 99. 8% availability of TOS, PCS, and other business applications. 3. Responsible for role-based user access management and conducting user access reviews on a quarterly basis to comply with ISO27001-2022. 4. Assist the IT Head in the timely execution of digital projects. 5. Assist business teams in preparing BRD documents and obtaining UAT sign-o...
Posted 4 days ago
14.0 - 19.0 years
1 - 2 Lacs
ahmedabad
Work from Office
Purpose/Objective Lead - Instrumentation & Control Key Responsibilities of Role Responsible for review and updating of specifications, design guides, standard specification forms/drawings of field instruments. Responsible for design engineering, sizing & selection of various valves, including but not limited to ball valves, gate valves, butterfly valves, safety relief valves, etc. Responsible to review, analyze and provide recommendation/ approval on technical queries, deviation/ concession requests, site engineering request, engineering change request raised by detail engineering contractors, construction team and end users. To participate in HAZOP/SIL/Cyber HLRA-Detailed level RA & impleme...
Posted 4 days ago
6.0 - 12.0 years
0 Lacs
pune, all india
On-site
As an IT Services Organization, your role will entail the following responsibilities: - Implement and manage IT security controls across applications and systems. - Oversee operational management and ownership of IT security areas. - Contribute to the development and refinement of security policies. - Provide technical expertise to support project objectives. - Collaborate with project teams to design, develop, test, and deploy secure software solutions. - Troubleshoot and debug security-related issues. - Participate in Agile ceremonies and relevant technical communities. To excel in this role, you should possess the following key skills: - Kubernetes - Azure DevOps - Cyber Security - Data P...
Posted 4 days ago
6.0 - 10.0 years
5 - 10 Lacs
chennai
Work from Office
Greeting from DATAMARK BPO SERVICE LLP!!! Position: Information Security Analyst Candidates with at least 7+ year of experience at Information Security Position Overview: The Information Security Analyst is responsible for the administration of the organizations information and data security policies and practices of the overall internal security audit program to ensure that the Company is protected in terms of security, compliance and confidentiality. Primary Responsibilities: Coordinates and assists with security activities for the enterprise Operate, maintain, and validate vulnerability scanning of Infrastructure, Applications, and APIs Review daily threat intelligence. Ensures compliance...
Posted 4 days ago
5.0 - 8.0 years
5 - 9 Lacs
noida
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 4 days ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 4 days ago
1.0 - 3.0 years
6 - 10 Lacs
mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 4 days ago
3.0 - 5.0 years
7 - 11 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 4 days ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 4 days ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 4 days ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
192783 Jobs | Dublin
Wipro
61786 Jobs | Bengaluru
EY
49321 Jobs | London
Accenture in India
40642 Jobs | Dublin 2
Turing
35027 Jobs | San Francisco
Uplers
31887 Jobs | Ahmedabad
IBM
29626 Jobs | Armonk
Capgemini
26439 Jobs | Paris,France
Accenture services Pvt Ltd
25841 Jobs |
Infosys
25077 Jobs | Bangalore,Karnataka