Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 8.0 years
3 - 6 Lacs
Kolkata
Work from Office
We are looking for a CEH V11 Trainer who can work with us on a full time basis. A Trainer who can deliver and lead basic and advanced Cyber Security trainings (Technical trainings) for various programs and collaborate with management to identify training needs of Government institutions, Universities and corporates. Job Role : Can take training for Students Corporate. Develop retain an up-to-date knowledge of current working practice. Be able to deliver high-quality virtual in-person technical training in line with industry-recognized Have best practices on Cyber Security Ethical Hacking Must be from B.Tech/BCA Background Should be CEH V11 CHFI V10 Certified. (CHFI V10 is preferred) Should have good communication presentation skills Should have 0 - 3 years experience in IT Security domain. Salary- On the Table CEH V11 CHFI V10 Certified. (CHFI V10 is preferred)
Posted 3 weeks ago
3.0 - 5.0 years
10 - 18 Lacs
Noida
Work from Office
We are looking for a skilled and curious Cybersecurity Officer with a passion for identifying vulnerabilities and a drive to continuously improve the security of complex systems. In this role, you will go beyond maintaining complianceactively seek out vulnerabilities, challenge assumptions, and help design creative, forward-thinking security solutions that keep us a step ahead of potential threats. This position is central to protecting healthcare and patient data and is ideal for someone who thrives in environments that value autonomy, initiative, and deep technical curiosity. Key Responsibilities Proactive Security Independently identify and exploit vulnerabilities in our systems through ethical hacking and offensive security testing. Simulate real-world attack scenarios to discover blind spots and improve incident response preparedness. Develop and implement innovative, proactive defenses and hardening techniques. Collaborate closely with development and IT teams to design secure architectures and embed security into CI/CD pipelines. Stay ahead of emerging threats, vulnerabilities, and security technologies; bring fresh ideas to the table. Security Infrastructure & Innovation Continuously evaluate and enhance cybersecurity tools, policies, and procedures. Lead efforts to design and scale secure infrastructure, with a focus on automation and resilience Implement threat detection and prevention strategies that reduce both risk and operational friction. Qualifications Required: Proven experience in cybersecurity with a strong focus on penetration testing, vulnerability discovery, and system hardening Strong understanding of security frameworks (HIPAA, ISO 27001, SOC 2) and compliance requirements Hands-on experience identifying, assessing, and remediating security issues in cloud and hybrid environments Deep technical knowledge in areas such as network security, cloud infrastructure (AWS, Azure, GCP), scripting, and access control Preferred: Certifications like OSCP, CISSP, CEH, CISM, or HCISPP Experience with GRC platforms, SIEM systems, and vulnerability scanning tools Familiarity with secure DevOps practices and automating security workflows Self-motivated with a hacker mindsetalways questioning and exploring Strong written and verbal communication skills, especially when translating complex findings to non-technical audiences High attention to detail and a strong sense of responsibility Comfortable working both independently and collaboratively with cross-functional teams
Posted 3 weeks ago
12.0 - 17.0 years
45 - 50 Lacs
Gurugram
Hybrid
Experience: 12+ years of experience in Security Domain At least 5+ experience in managing and leading a global security operation centre. Prior experience of 5+ years in handling a team of at least 10 people Essential capabilities: Excellent understanding and experience with: Running and improving mature security operations centres Team leadership with energy and passion Managing operational teams Working in large/complex environments Demonstrated ability to stay calm and lead under pressure Excellent verbal and written communication skills Excellent time management and prioritisation skills Excellent consulting and stakeholder management Excellent coaching, leadership and soft skills Demonstrated ability to influence Demonstrated willingness to engage in self-learning or security research outside of standard business hours Strong analytical, problem solving and lateral thinking skills Excellent subject-matter and technical skills: incident response methodologies and techniques detection and mitigation strategies for a broad range of cyber threats, including malware, DDOS, hacking, phishing, lateral movement and data exfiltration common cloud platforms/technologies, such as Azure, AWS and Google cloud common enterprise technologies, such as Windows, Linux, Active Directory, DNS, DHCP, web proxies, SMTP, TCP/IP, AWS, Azure operational usage of common analysis and response tooling performing penetration testing, including network, infrastructure and application exploitation and exploit development NIST framework MITRE ATT&CK, Lockheed Martin Cyber Kill Chain or similar methodologies Interested Candidates can share their Updated Resume at [pooja.sharma@black-turtle.co.in]
Posted 3 weeks ago
3.0 - 7.0 years
6 - 12 Lacs
Noida
Remote
Alcor Solutions is seeking a proactive and results-oriented Business Consultant to drive growth across the U.S. region. In this role, you'll be responsible for introducing clients to our cutting-edge cybersecurity and IT SaaS product, helping businesses strengthen their security posture through innovative solutions. You'll work within U.S. business hours, leveraging your consultative approach to generate interest, build client relationships, and support seamless adoption of our solutions. If you're passionate about empowering clients with technology that enhances security and efficiency, let's connect! Key Responsibilities: As an Inside Sales Specialist you will sell products and services to an assigned geographic or national account base territory to achieve assigned objectives. Generates sales leads as well as closing the sales online or by phone. Utilizes inbound and/or outbound calls to pursue sales. Develops account penetration strategies and closes business. Responsible for understanding cloud product offerings and competitive issues. Identifies new business opportunities by creating and implementing territory campaigns with management assistance. Participates as a team member on sales teams including field sales, support and education sales and sales consulting. Ideal Skills & Experience: BA/BS degree or equivalent Must have at least 4+ years of relevant experience in Inside Sales/Sales Candidate should have exceptional written and verbal communication skills along with great presentation skills Should have a natural flair for conversations and enjoy talking to customers about our solutions and products Should be comfortable in making outbound calls and can easily connect with customers at various executive levels Should possess sound understanding of sales lifecycle Must be self-motivated with a proven track record of achieving sales/inside sales targets Strategic thinker with good analytical skills Must have strong business acumen and negotiation skills Experience in selling IAM/cybersecurity/IGA is a must. Experience of IT services and solutions sales preferred Interested candidate can share resume at arushi.verma@alcortech.com
Posted 3 weeks ago
2.0 - 5.0 years
4 - 7 Lacs
Hyderabad
Work from Office
ROLES & RESPONSIBILITIES Reviews alerts generated by SentinelOne and implements appropriate containment and mitigation measures Proficient in SIEM, with a focus on QRadar SIEM, as well as threat monitoring and hunting within SIEM environments. Analyzes payloads using JoeSandbox and escalates to the appropriate team as necessary Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the clients environment Conducts historical log reviews to support threat hunting efforts and ensures all malicious artifacts are mitigated in the SentinelOne console Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy Conducts perimeter scans of client infrastructure and reports any identified vulnerabilities to the Tiger Team for appropriate escalation Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle Creates user accounts in SentinelOne console for the client Generates Threat Reports showcasing activity observed within the SentinelOne product Executes passphrase exports as needed for client offboarding Submits legacy installer requests to ensure the team is properly equipped for deployment Provides timely alert notifications to the IR team of any malicious activity impacting our clients Assists with uninstalling/migrating SentinelOne Generates Ranger reports to provide needed visibility into client environments Manages and organizes client assets (multi-site and multi-group accounts) Applies appropriate interoperability exclusions relating to SentinelOne and client applications Performs SentinelOne installation / interoperability troubleshooting as needed Contributes to the overall documentation of SOC processes and procedures Participates in Handler on Duty (HOD) shifts as assigned to support the TT client matters Internally escalates support ticket / alerts to Tier II-IV Analysts as needed May perform other duties as assigned by management SKILLS AND KNOWLEDGE Demonstrated knowledge of Windows and Unix operating systems Thorough understanding of Digital Forensics and Incident Response practices Proficiency in advanced analysis techniques for processing and reviewing large datasets in various formats Familiarity with TCP/IP and OSI Model concepts at a basic level Expertise in the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned) Working knowledge of the MITRE ATT&CK framework at an intermediate level Proven ability to work independently and solve complex problems with little direction from management Highly detail-oriented and committed to producing quality work JOB REQUIREMENTS Associate s degree and 6+ years of IT related experience or Bachelor s Degree and 2-5 years related experience Current or previous knowledge of, or previous experience with, Endpoint Detection and Response (EDR) toolsets General knowledge of the Incident Handling Lifecycle Ability to communicate in both technical and non-technical terms both oral and written DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We re proud to be an equal opportunity employer- and celebrate our employees differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. #LI Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete You ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We re proud to be an equal opportunity employer- and celebrate our employees differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.
Posted 3 weeks ago
3.0 - 5.0 years
5 - 7 Lacs
Bengaluru
Work from Office
Cyber Security Engineer-CASB Analyst- Total Yrs. of Experience 3 to 5 Years Relevant Yrs. of experience 3 to 5 Years Detailed JD (Roles and Responsibilities) CASB Analyst Ensures cloud usage aligns with organizational security policies. Identify and mitigate security threats in cloud environments. Monitor data movement to prevent leaks and ensure regulatory compliance. Monitor and prevent the data movement on SaaS applications/storages. Analyze security incidents and provideing recommendations for remediation. Ensure data movement to SaaS storages is as per Exception policies Tool: Microsoft Defender for Cloud Apps Mandatory skills CASB Analyst Desired/ Secondary skills Ensures cloud usage aligns with organizational security policies. Identify and mitigate security threats in cloud environments. Monitor data movement to prevent leaks and ensure regulatory compliance. Monitor and prevent the data movement on SaaS applications/storages. Analyze security incidents and provideing recommendations for remediation. Ensure data movement to SaaS storages is as per Exception policies Tool: Microsoft Defender for Cloud Apps Domain CASB Analyst WFO/WFH/Hybrid WFO Hybrid Is there any working in shifts from standard Daylight (to avoid confusions post onboarding) YES/ NO 3.30 am to 12.30 pm EDT. 2:00 PM to 11:00 PM IST (depends on daylight saving time) Location- PAN India Yrs of Exp-5Yrs
Posted 3 weeks ago
0.0 - 2.0 years
6 - 7 Lacs
Patna
Work from Office
Interniship(6 month-extendible) Assist in cybersecurity tasks & Implementations Shadow Salesforce implementation & configs Have fair knowledge of DS and Algo. Document meetings, research solution & prepare summaries Maintain confidentiality & adept
Posted 3 weeks ago
8.0 - 13.0 years
25 - 30 Lacs
Hyderabad
Work from Office
Job Description: Role Title : L10 - AVP, Data Protection Engineer Company Overview : Synchrony (NYSE: SYF) is a premier consumer financial services company delivering one of the industry s most complete digitally enabled product suites. Our experience, expertise and scale encompass a broad spectrum of industries including digital, health and wellness, retail, telecommunications, home, auto, outdoors, pet and more. We have recently been ranked #2 among India s Best Companies to Work for by Great Place to Work. We were among the Top 50 India s Best Workplaces in Building a Culture of Innovation by All by GPTW and Top 25 among Best Workplaces in BFSI by GPTW. We have also been recognized by AmbitionBox Employee Choice Awards among the Top 20 Mid-Sized Companies, ranked #3 among Top Rated Companies for Women, and Top-Rated Financial Services Companies. Synchrony celebrates ~51% women diversity, 105+ people with disabilities, and ~50 veterans and veteran family members. We offer Flexibility and Choice for all employees and provide best-in-class employee benefits and programs that cater to work-life integration and overall well-being. We provide career advancement and upskilling opportunities, focusing on Advancing Diverse Talent to take up leadership roles. Organizational Overview: The AVP, Data Protection Engineer within the Information Security organization will be responsible for driving an enterprise-wide data discovery program to safeguard and secure the organization s data. Role Summary/Purpose: In this role, this individual will manage a team and be part of the Data Protection Engineering team for Information Security, working with the cyber security teams and key business stakeholders to help define data discovery strategy and roadmap and influencing teams to deliver best in class data protection service. You will be responsible for the development and implementation of data discovery classifiers to address and reduce the risk of data exfiltration. Key Responsibilities: Accountable for designing and building effective data discovery classifiers to protect and safeguard the organizations data. Lead and manage a team of contractors supporting data discovery efforts Support the Data Protection product owner defining the intent, roadmap, and strategy to ensure execution and delivery of the data protection and data discovery roadmap. Acting as a subject matter expert to assist with solving data protection challenges Required Skills/Knowledge : Serves as a data protection expert, trusted advisor, and central point of contact for IT and business stakeholders. Assists with the development of standards, best practices, and guidelines for the organizations policies, standards, and procedures. Ensures that as part of designing and building efficient cyber security capabilities these capabilities are achieving industry best practices, compliance and regulatory requirements such as PCI-DSS, HIPAA, etc. Desired Skills/Knowledge : Demonstrate an understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business Proven strong decision-making capabilities, with a proven track record of weighing the relative costs and benefits of potential actions and identifying the most appropriate one A team-focused mentality with proven experience to work effectively with diverse stakeholders Eligibility Criteria: Bachelor s degree with a minimum of 5 years of experience in Information Security, Engineering, Application Development, or related field OR in lieu of a degree, a High School Diploma/GED and minimum 6 years equivalent work experience. Minimum 2 years of experience in data discovery Work Timings: (This role qualifies for Enhanced Flexibility and Choice offered in Synchrony India and will require the incumbent to be available between 06:00 AM Eastern Time - 11:30 AM Eastern Time (timings are anchored to US Eastern hours and will adjust twice a year locally). This window is for meetings with India and US teams. The remaining hours will be flexible for the employee to choose. Exceptions may apply periodically due to business needs. Please discuss this with the hiring manager for more details.) For Internal Applicants: Understand the criteria or mandatory skills required for the role, before applying Inform your manager and HRM before applying for any role on Workday Ensure that your professional profile is updated (fields such as education, prior experience, other skills) and it is mandatory to upload your updated resume (Word or PDF format) Must not be any corrective action plan (First Formal/Final Formal) L8+ Employees who have completed 18 months in the organization and 12 months in current role and level are only eligible. L08+ Employees can apply Level / Grade : 10 Job Family Group: Information Technology
Posted 3 weeks ago
7.0 - 10.0 years
9 - 12 Lacs
Pune
Work from Office
ZS is a place where passion changes lives. As a management consulting and technology firm focused on improving life and how we live it , our most valuable asset is our people. Here you’ll work side-by-side with a powerful collective of thinkers and experts shaping life-changing solutions for patients, caregivers and consumers, worldwide. ZSers drive impact by bringing a client first mentality to each and every engagement. We partner collaboratively with our clients to develop custom solutions and technology products that create value and deliver company results across critical areas of their business. Bring your curiosity for learning; bold ideas; courage an d passion to drive life-changing impact to ZS. Our most valuable asset is our people . At ZS we honor the visible and invisible elements of our identities, personal experiences and belief systems—the ones that comprise us as individuals, shape who we are and make us unique. We believe your personal interests, identities, and desire to learn are part of your success here. Learn more about our diversity, equity, and inclusion efforts and the networks ZS supports to assist our ZSers in cultivating community spaces, obtaining the resources they need to thrive, and sharing the messages they are passionate about. As a Risk management specialist at ZS Associates, you'll be responsible for identifying, and mitigating compliance and operational risks in line with the firm's standards. You'll also provide subject matter expertise and technical guidance to technology-aligned process owners, ensuring that implemented controls are operating effectively and in compliance with regulatory, legal, and industry best practices. By partnering with various stakeholders, including Product Owners and Business function Managers, you will contribute to the reporting of a comprehensive view of technology risk posture and its impact on the business. You'll have advanced knowledge of risk management principles, practices, and theories will enable you to drive innovative solutions and effectively manage a diverse team in a dynamic and evolving risk landscape. What you'll do Develop the culture of risk management across the organisation, and ensure effective identification, quantification, communication, and management of risks focusing on root cause analysis and resolution recommendations across domains – Cyber, HR, Legal, Finance, etc. Proactively monitor and evaluate control effectiveness, identify gaps, and recommend enhancements to strengthen risk posture and regulatory compliance. Provide SME support to functional managers or Internal stakeholders in understanding and applying responsibilities towards risk and compliance providing recommendations as appropriate. Support the CIO and CISO, and work with internal stakeholders to Participate in consultation and conduct gap analysis against new requirements Coordinate and facilitate IT / cyber security audits. Support Risk Owners and Tech teams in documenting control procedures, guidelines, etc. Ensure risk and control activities are completed in a timely and appropriate manner applying the correct governance route Report and publish Risks to senior leadership inclusive of providing content for Senior Leadership risk and control review forums/Committees. Ensure all governance attestations and sign-off from Senior leadership are completed including the conduct risk measures. Co-ordinate and track the tickets / findings in areas like IT Operational Risks and Information Security Risks, Control Self assessments , Internal/External Audit findings with appropriate CAPA, BCP / Disaster recovery , Problem tickets with root cause analysis. Audit event co-ordination, Audit liaison and issue closure oversight (SOC 2 Type 2, ISO 27001, etc.) Lead pre-audit preparation activities with stakeholders (SOC 2 Type 2, ISO 27001, etc.) Provide first line of defense support in assessing risk and reviewing control issues Documentation of control procedures, standards and guidelines, etc. What you'll bring: Bachelor’s degree in IT or relevant field with a strong academic background A minimum of 7-10 Years of experience in Risk management and internal controls governance Strong communication & strategic influencing skills. Relevant experience working with senior leaders, building internal networks, and delivering high impact programs in complex -matrixed environments. Formal training or certification in Information Security, and/or 5+ years of experience or equivalent expertise in technology risk management, information security, or related field, emphasizing risk identification, assessment, and mitigation. Familiarity with risk management frameworks, industry standards, and financial industry regulatory requirements Proficient knowledge and expertise in data security, risk assessment & reporting, control evaluation, design, and governance, with a proven record of implementing effective risk mitigation strategies. Proficient in MS Office productivity suite (e.g., Word, Excel, PowerPoint, SharePoint). Advanced Excel skills strongly preferred CISM/CRISC/CISA/CISSP/CIA/MBA or relevant Risk Management / Audit certification Basic working knowledge of following (Majority of the points, if not all): -COBIT – Control Objectives for Information and Related Technology -ISO/IEC 27001:2013 – Code of Practice for Information Security Management -NIST SP 800-53 -NIST CSF -SOC1/SOC2/SOC3 -HIPAA/HITECH Security and Privacy Audit Protocol -Shared Assessments Standard Information Gathering (SIG) framework -US SOX – Sarbanes Oxley Act -US HIPAA/HITECH Act -EU GDPR – General Data Protection Regulation -US EU Privacy Shield -India Companies Act Additional Skills: Demonstrated ability to influence executive-level strategic decision-making and translating technology insights into business strategies for senior executives. Program level management up to and including Executive presentation and reporting. Knowledge and Experience of Technology Infrastructure. Understanding of Infrastructure Security Stakeholder management Willingness to adapt to evolving industry standards and technologies Ability to manage a wide variety of tasks and meet deadlines, and reliability/dependability Proven ability to work creatively and analytically in a problem-solving environment Perks & Benefits: ZS offers a comprehensive total rewards package including health and well-being, financial planning, annual leave, personal growth and professional development. Our robust skills development programs, multiple career progression options and internal mobility paths and collaborative culture empowers you to thrive as an individual and global team member. We are committed to giving our employees a flexible and connected way of working. A flexible and connected ZS allows us to combine work from home and on-site presence at clients/ZS offices for the majority of our week. The magic of ZS culture and innovation thrives in both planned and spontaneous face-to-face connections. Travel: Travel is a requirement at ZS for client facing ZSers; business needs of your project and client are the priority. While some projects may be local, all client-facing ZSers should be prepared to travel as needed. Travel provides opportunities to strengthen client relationships, gain diverse experiences, and enhance professional growth by working in different environments and cultures. Considering applying At ZS, we're building a diverse and inclusive company where people bring their passions to inspire life-changing impact and deliver better outcomes for all. We are most interested in finding the best candidate for the job and recognize the value that candidates with all backgrounds, including non-traditional ones, bring. If you are interested in joining us, we encourage you to apply even if you don't meet 100% of the requirements listed above. ZS is an equal opportunity employer and is committed to providing equal employment and advancement opportunities without regard to any class protected by applicable law. To Complete Your Application: Candidates must possess or be able to obtain work authorization for their intended country of employment.An on-line application, including a full set of transcripts (official or unofficial), is required to be considered. NO AGENCY CALLS, PLEASE. Find Out More At www.zs.com
Posted 3 weeks ago
2.0 - 7.0 years
3 - 6 Lacs
Hyderabad
Work from Office
About the role: The global Identity Access Management team is passionately serving our stakeholders while evolving best practices. As an Identity Access Engineer , you have a pivotal operational role to provide and deprovision system access.You have an equally crucial role to partner collectively with stakeholders to mature, streamline, and automate Identity and Access Management procedures for Blackbaud. What you’ll do Ensure appropriate Control through timely removal of unnecessary or inappropriate system access Expediently provision approved access, often utilizing evolving Role Based Access Controls (RBAC), for Blackbaud systems to prevent excessive permissions and rights. Proactively expand approved RBAC roles through analysis, recommendation and adoption/rollout. Analyze and resolve access issues, coordinating with system owners or technical support resources as necessary. Participate in ongoing audits and assessments, and assist with implementation of audit or compliance recommendations Develop and maintain detailed documentation on standard operating procedures, system configurations, and technical settings for internal team use, end user support Identify , evaluate and recommend opportunities to eliminate, streamline, and automate access management practices.Partner with colleagues including application owners, cloud engineers, cyber security SMEs, etc. to effectively execute improvements based on expected value. Generate reports to perform in-depth analysis and data collection for issues associated with IAM What you’ll bring 2 years of experience in Identity or Access Management Tireless adherence and attention to appropriate IT general computing controls Ability to understand, work with and where appropriate leverage various technologies including PowerShell , ServiceNow, SailPoint's Identity-Now, Active Directory, EntraID , Salesforce, Workday, etc. Practical experience with SCA, ITIL, COBIT, NIST and/or other security and control frameworks Stay up to date on everything Blackbaud, follow us on Linkedin, X, Instagram, Facebook and YouTube Blackbaud is a digital-first company which embraces a flexible remote or hybrid work culture. Blackbaud supports hiring and career development for all roles from the location you are in today! Blackbaud is proud to be an equal opportunity employer and is committed to maintaining an inclusive work environment. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, physical or mental disability, age, or veteran status or any other basis protected by federal, state, or local law.
Posted 3 weeks ago
3.0 - 5.0 years
7 - 12 Lacs
Noida
Work from Office
At CGM, the leading provider of software solutions in the healthcare sector, we are looking for a skilled Ethical Hacker (m/f/d) to join our growing cybersecurity team. We believe in innovation, teamwork, and the power of technology to drive change. With our vision that "No one should suffer or die because at some point medical information was missing", we aim to create a culture that contributes positively to the future of our healthcare system. You are a proactive problem-solver with a passion for cybersecurity and the desire to make a real difference! Join us on this exciting journey! Your contribution: Conduct penetration testing on applications, networks, and systems to identify vulnerabilities and provide actionable recommendations for improvement. Simulate real-world attacks and collaborate with IT and security teams to develop effective remediation strategies. Prepare detailed reports of findings, including risk assessments, and conduct security awareness training for staff to promote a culture of cybersecurity. Stay updated on the latest security threats and participate in incident response activities and forensic analysis in the event of a security breach. Maintain compliance with security policies, legal regulations, and industry best practices to ensure a robust cybersecurity framework.\ What you bring: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field, along with proven experience as an ethical hacker (m/f/d) or penetration tester (m/f/d) (HackerOne or Integrity Score preferred) Relevant certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information System Security Professional (CISSP) Proficiency in security testing tools (e.g. Metasploit, Wireshark, Burp Suite, Nmap) and strong knowledge of networking protocols, operating systems, and web applications. Experience with thick client penetration testing, along with programming or scripting skills (e.g. Python, Java, Bash) as an advantage Willingness to train and obtain certification in cloud penetration testing, combined with excellent analytical, problem-solving, and communication skills (German and English) to convey technical information to non-technical audiences What you can expect: Mobile Work: Work flexibly two days a week remotely and three days on-site. Attractive locations: Our offices feature fully equipped workspaces completed by regular events, including summer gatherings and Christmas parties. Health: We value health highly. Our in-house cafeteria offers a selection of delicious and healthy meals every day. Personal Development: Our in-house academy and portfolio of external partners support your professional growth. Diversity is part of CGM! We welcome your application regardless of disability, gender, nationality, ethnic and social origin, religion, age or sexual orientation and identity. Convinced? Apply now with your comprehensive documents (including your certificates, salary expectations, and earliest possible start date).
Posted 3 weeks ago
13.0 - 17.0 years
25 - 30 Lacs
Bengaluru
Work from Office
Job Description: Experience 13 Yrs + Lead, engage and motivate VAPT/DevSecOps team members to deliver business objectives. Implement and enforce Vulnerability Management Tool, processes and procedures across Kmart and Target on premise and Cloud to have better visibility and remediation metrics. Improve Penetration testing skills and services for better visibility and to meet an objective of NIST CSF 4.0. Ensuring that the organizations data and infrastructure are protected by enabling the appropriate security controls, Understanding of AWS and Cloud security controls Participating in the change management process with ownership of Cyber Security Changes. Testing and identifying network and system vulnerabilities with the help of Internal/External partners. Implement security checks (SAST, SCA, secret scanning) in Developers IDE andCICD. Practical working experience with various IDE and CICDs (Eclipse, Visual studio, IntelliJ,Jenkins, Github actions, circleCI, Buildkite etc) Experience with Snyk and Prisma Cloud or relevant tool is a plus. Knowledge on AWS cloud native security tools Daily administrative tasks, reporting, and communication with the relevant departments in the organization, ability to convert complex technical requirements into simpler terms . Knowledge of applications, databases, operating systems, middleware to address security threats against the same. A place you can belong We celebrate the rich diversity of the communities in which we operate and are committed to creating inclusive and safe environments where all our team members can contribute and succeed. We believe that all team members should feel valued, respected, and safe irrespective of your gender, ethnicity, indigeneity, religious beliefs, education, age, disability, family responsibilities, sexual orientation and gender identity and we encourage applications from all candidates.
Posted 3 weeks ago
5.0 - 8.0 years
8 - 11 Lacs
Bengaluru
Work from Office
Implement and review IT security technologies in Infrastructure, applications and cloud platforms for effective enforcement of policies. Periodic review of user and privileged access management for infrastructure and applications. Maintaining updated information security documentation including standard operating procedures, review records. Design and implementation of security use cases in Security incident event management and end point security policies. Act as a first responder for cyber security incidents and part of cyber security incident response team by working in close coordination with IT infrastructure and application teams. Conduct vulnerability assessment with IT systems and collaborate with stakeholders for remediation of vulnerabilities. Implement and review IT security technologies in Infrastructure, applications and cloud platforms for effective enforcement of policies. Periodic review of user and privileged access management for infrastructure and applications. Maintaining updated information security documentation including standard operating procedures, review records. Design and implementation of security use cases in Security incident event management and end point security policies. Act as a first responder for cyber security incidents and part of cyber security incident response team by working in close coordination with IT infrastructure and application teams. Conduct vulnerability assessment with IT systems and collaborate with stakeholders for remediation of vulnerabilities. Educational Qualifications and experience: Bachelors degree in science, engineering discipline Minimum of 5 years experience IT operations with at least 2-3 years of hands-on experience with cyber security technologies. Competency in applying the cyber/information security frameworks and standards such as MITRE, NIST and ISO 27001
Posted 3 weeks ago
3.0 - 6.0 years
12 - 16 Lacs
Hyderabad
Work from Office
TJ Maxx At TJX Companies, every day brings new opportunities for growth, exploration, and achievement. You ll be part of our vibrant team that embraces diversity, fosters collaboration, and prioritizes your development. Whether you re working in our four global Home Offices, Distribution Centers or Retail Stores TJ Maxx, Marshalls, Homegoods, Homesense, Sierra, Winners, and TK Maxx, you ll find abundant opportunities to learn, thrive, and make an impact. Come join our TJX family a Fortune 100 company and the world s leading off-price retailer. Job Description: About TJX At TJX, is a Fortune 100 company that operates off-price retailers of apparel and home fashions. TJX India - Hyderabad is the IT home office in the global technology organization of off-price apparel and home fashion retailer TJX, established to deliver innovative solutions that help transform operations globally. At TJX, we strive to build a workplace where our Associates contributions are welcomed and are embedded in our purpose to provide excellent value to our customers every day. At TJX India, we take a long-term view of your career. We have a high-performance culture that rewards Associates with career growth opportunities, preferred assignments, and upward career advancement. We take well-being very seriously and are committed to offering a great work-life balance for all our Associates. What you will discover? Inclusive culture and career growth opportunities A truly Global IT Organization that collaborates across North America, Europe, Asia, and Australia Challenging, collaborative, and team-based environment What you will do ? Digital IT Security Operations team will need to knowledge and experience to design, implement, and troubleshoot security technologies in their assigned Platform(s) / Product(s) they support. Lead the technical direction in their product team, and can communicate future plans and direction to technical and non-technical individuals. Engineers at this level can lead and deliver on assigned Epics in their supported area. The organization delivers capabilities that enrich the customer experience and provide business value. We seek a motivated, talented Senior Engineer with good understanding of Security, DevSecOps & Automation to help improve our overall security posture. What you will need ? The Digital IT Security Team thrives on strong relationships with our operations, delivery & development partners and works diligently to address their needs which supports TJX growth, operational stability and security posture. On this tightly knit and fast-paced operational security team you will be constantly challenged to stretch and think outside the box. You will be working with our global digital security team, product teams , 3rd party vendors and operational stakeholders to improve security posture, improve availability & code stability. You will be responsible for enforcing our security requirements and recommendations for all banners. In addition, you will be actively coaching and mentoring other engineers and developers in the product teams on proper App Sec security and push for shift left in security. Minimum Qualifications: Bachelor s Degree or equivalent Engineering skillset / training / work experience in relevant technical domain 6+ years experience in troubleshooting applications, cyber security, monitoring system performance, managing configurations & infrastructure. Passionate about Cyber Security and Problem Solving Security experience in optimization of e-commerce platforms from edge platforms (Akamai) all the way through backend systems. Strong DevSecOps & Engineering Mindset Strong Communication skills with the ability to collaborate. Ability to handle security challenges in an operations setting with poise and calmness Success leading agile technical implementations at an enterprise scale Experience using Akamai or other CDN Technologies. Ability to understand the work environment and competing priorities in conjunction with developing/meeting project goals. Shows a positive, open-minded, and can-do attitude. Proficient knowledge of at least two out of: Splunk, AppDynamics, Akamai or another CDN Experience with Jira, Confluence, ServiceNow and Visio. Customer First mindset. Preferred Qualifications: Proficiency in scripting languages can be beneficial Endeca experience would be beneficial. Experience working in Agile teams Akamai experience & Programming Aptitude would be beneficial. Knowledge of IT Security Best Practices Skills: Application Security Splunk Akamai In addition to our open door policy and supportive work environment, we also strive to provide a competitive salary and benefits package. TJX considers all applicants for employment without regard to race, color, religion, gender, sexual orientation, national origin, age, disability, gender identity and expression, marital or military status, or based on any individuals status in any group or class protected by applicable federal, state, or local law. TJX also provides reasonable accommodations to qualified individuals with disabilities in accordance with the Americans with Disabilities Act and applicable state and local law. Address: Salarpuria Sattva Knowledge City, Inorbit Road Location: APAC Home Office Hyderabad IN
Posted 3 weeks ago
3.0 - 6.0 years
11 - 14 Lacs
Bengaluru
Work from Office
Are you a forward-thinking data scientist, poised to lead with innovation? At KnowBe4, youll be able to shape a career as distinctive as your expertise, supported by our global reach, inclusive ethos, and cutting-edge technology. As a Data Scientist, youll be at the forefront of crafting impactful, data-driven solutions, collaborating with talented teams in a dynamic, fast-paced environment. Join us in creating an extraordinary path for your professional growth and making a meaningful impact in the working world. Data scientists design data modeling processes, create algorithms and predictive models to be used by software engineers for developing new and exciting products for KnowBe4 s customers, alongside other engineers in a fast-paced, agile development environment. Responsibilities: Research, design, and implement Machine Learning, Deep Learning algorithms to solve complex problems Communicate complex concepts and statistical models to non-technical audiences through data visualizationsPerforms statistical analysis and using results to improve models Identify opportunities and formulate data science / machine learning projects to optimize business impact Serve as a subject matter expert in data science and analytics research, and adopt the new tooling and methodologies in Knowbe4 Manage the release, maintenance, and enhancement of machine learning solutions in a production environment via multiple deployment options such as APIs, embedded software, or stand-alone applications Advise various teams on Machine Learn Practices and ensure the highest quality and compliance standards for ML deployments Design and develop cyber security awareness products and features using Generative AI, machine learning, deep learning, and other data ecosystem technologies. Collaborate with cross-functional teams to identify data-related requirements, design appropriate NLP experiments, and conduct in-depth analyses to derive actionable insights from unstructured data sources. Staying updated with the latest advancements in machine learning, deep learning, and generative AI through self-learning and professional development. Research, design, and implement Machine Learning, Deep Learning algorithms to solve complex problems Communicate complex concepts and statistical models to non-technical audiences through data visualizationsPerforms statistical analysis and using results to improve models Identify opportunities and formulate data science / machine learning projects to optimize business impact Serve as a subject matter expert in data science and analytics research, and adopt the new tooling and methodologies in Knowbe4 Manage the release, maintenance, and enhancement of machine learning solutions in a production environment via multiple deployment options such as APIs, embedded software, or stand-alone applications Advise various teams on Machine Learn Practices and ensure the highest quality and compliance standards for ML deployments Requirements: BS or equivalent plus 10 years experience MS or equivalent plus 5 years experience Ph.D. or equivalent plus 4 years experience Expertise working experience with programming languages like Python, R, and SQL Solid understanding of statistics, probability, and machine learning 10+ years of relevant experience in designing ML/DL/GenAI systems Expertise in rolling out Generative AI SAAS product and features. Expertise in AWS ecosystem. Proficiency in machine learning algorithms and techniques, including supervised and unsupervised learning, classification, regression, clustering, and dimensionality reduction. Strong understanding and practical experience with deep learning frameworks such as TensorFlow or PyTorch. Ability to design, train, and optimize deep neural networks for various tasks like image recognition, natural language processing, and recommendation systems. Knowledge and experience in generative models like Generative Adversarial Networks (GANs) and Variational Autoencoders (VAEs). Ability to create and use generative models for tasks such as image generation, text generation, and data synthesis. Exposure to LLMs, Transformers, and a few technologies like Langchain, Llamaindex, Pinecone, Sagemaker Jumpstart, Chatgpt, AWS Bedrock, and VertexAI. Strong data manipulation skills, including data cleaning, preprocessing, and feature engineering. Experience with data manipulation libraries like Pandas. Ability to create compelling data visualizations using tools like Matplotlib or Seaborn to communicate insights effectively. Proficiency in NLP techniques for text analysis, sentiment analysis, entity recognition, and topic modeling. Strong understanding of data classification, sensitivity, PII, and personal data modeling techniques Experience in model evaluation and validation techniques, including cross-validation, hyperparameter tuning, and performance metrics selection. Proficiency in version control systems like Git for tracking and managing code changes. Strong communication skills to convey complex findings and insights to both technical and non-technical stakeholders. Ability to work collaboratively in cross-functional teams. Excellent problem-solving skills to identify business challenges and devise data-driven solutions. Nice to Have: Experience in designing data pipelines and products for real-world applications Experience with modern/emerging scalable computing platforms and languages (e.g. Spark) Familiarity with big data technologies like Hadoop, Spark, and distributed computing frameworks for handling large datasets.
Posted 3 weeks ago
2.0 - 5.0 years
18 - 19 Lacs
Hyderabad
Work from Office
ROLES & RESPONSIBILITIES Reviews alerts generated by SentinelOne and implements appropriate containment and mitigation measures Proficient in SIEM, with a focus on QRadar SIEM, as well as threat monitoring and hunting within SIEM environments. Analyzes payloads using JoeSandbox and escalates to the appropriate team as necessary Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the clients environment Conducts historical log reviews to support threat hunting efforts and ensures all malicious artifacts are mitigated in the SentinelOne console Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy Conducts perimeter scans of client infrastructure and reports any identified vulnerabilities to the Tiger Team for appropriate escalation Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle Creates user accounts in SentinelOne console for the client Generates Threat Reports showcasing activity observed within the SentinelOne product Executes passphrase exports as needed for client offboarding Submits legacy installer requests to ensure the team is properly equipped for deployment Provides timely alert notifications to the IR team of any malicious activity impacting our clients Assists with uninstalling/migrating SentinelOne Generates Ranger reports to provide needed visibility into client environments Manages and organizes client assets (multi-site and multi-group accounts) Applies appropriate interoperability exclusions relating to SentinelOne and client applications Performs SentinelOne installation / interoperability troubleshooting as needed Contributes to the overall documentation of SOC processes and procedures Participates in Handler on Duty (HOD) shifts as assigned to support the TT client matters Internally escalates support ticket / alerts to Tier II-IV Analysts as needed May perform other duties as assigned by management SKILLS AND KNOWLEDGE Demonstrated knowledge of Windows and Unix operating systems Thorough understanding of Digital Forensics and Incident Response practices Proficiency in advanced analysis techniques for processing and reviewing large datasets in various formats Familiarity with TCP/IP and OSI Model concepts at a basic level Expertise in the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned) Working knowledge of the MITRE ATT&CK framework at an intermediate level Proven ability to work independently and solve complex problems with little direction from management Highly detail-oriented and committed to producing quality work JOB REQUIREMENTS Associate s degree and 6+ years of IT related experience or Bachelor s Degree and 2-5 years related experience Current or previous knowledge of, or previous experience with, Endpoint Detection and Response (EDR) toolsets General knowledge of the Incident Handling Lifecycle Ability to communicate in both technical and non-technical terms both oral and written DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We re proud to be an equal opportunity employer- and celebrate our employees differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. #LI Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete You ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We re proud to be an equal opportunity employer- and celebrate our employees differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.
Posted 3 weeks ago
1.0 - 2.0 years
1 - 5 Lacs
Pune
Hybrid
So, what’s t he r ole all about? As a member of the Cloud Security team, a successful Cloud Security Analyst will need to be self-sufficient to collaborate effectively with multiple teams, such as Application Support, Infrastructure Operations, DevOps, Product R&D, Security teams, customers and 3 rd party auditors. This role will hold the responsibility of understanding the Cloud security policies, procedures, practices and technologies and documenting them appropriately as well as demonstrating to auditors and customers the excellent Cloud Security at NICE. A successful candidate in this role will be able to work in production cloud environments to collect and curate evidence and explain it to anyone who asks for it. Experience with Governance, Risk and Compliance (GRC) is a big plus! How will you make an impact? You will directly impact the success of the NICE cloud business by ensuring all customer and auditory security requirements are met and demonstrated. A diverse, merit-driven work environment which rewards a growth mindset and encourages innovation and continued professional development; The opportunity to work in a global, highly skilled, passionate workforce to deliver world-class service and products to market. Competitive pay and excellent benefits. Generous PTO policies. A highly focused security & compliance team which is collaborative, supportive, experienced, and driven to help everyone from the individual to enterprise to our customers realize the success for which they aim. Have you got what it takes? 1-2 years of experience with Information Security & Compliance or GRC University-level degree in InfoSec, Computer Science or other related field. knowledge with major compliance frameworks such as PCI, ISO 27001/17, SOC 2, HITRUST, GDPR. A burning curiosity to learn as much as you can about the NICE cloud environment and the services and products we offer our customers as well as the existing security infrastructure we have in place today; Excellent communications skills along to work collaboratively with security team members and operations and development teams or independently to achieve tactical and strategic security goals; Strong organization and prioritization skills; Education, training or experience with security and compliance fundamentals; Experience working with work tracking tools such as JIRA, Service Now or others. What’s in it for you? Join an ever-growing, market disrupting, global company where the teams – comprised of the best of the best – work in a fast-paced, collaborative, and creative environment! As the market leader, every day at NICE is a chance to learn and grow, and there are endless internal career opportunities across multiple roles, disciplines, domains, and locations. If you are passionate, innovative, and excited to constantly raise the bar, you may just be our next NICEr! Enjoy NICE-FLEX! At NICE, we work according to the NICE-FLEX hybrid model, which enables maximum flexibility: 2 days working from the office and 3 days of remote work, each week. Naturally, office days focus on face-to-face meetings, where teamwork and collaborative thinking generate innovation, new ideas, and a vibrant, interactive atmosphere. Requisition ID: 7117 Reporting into: Technical Manager Role Type: Individual Contributor
Posted 3 weeks ago
8.0 - 13.0 years
10 - 15 Lacs
Chennai
Work from Office
Strong knowledge in DevOps best practices. Hands-on experience on CI-CD, Monitoring Good knowledge in scripting languages In depth knowledge in K8, Azure Services Hands-on experience in Cloud Configuration tools Experience in multicloud platforms (Azure/AWS) Experience in Cyber Security/Database Management Experience in Sys admin or architecture in Windows or Linux Experience in DevSecOps Great communication sills
Posted 3 weeks ago
10.0 - 15.0 years
30 - 36 Lacs
Pune
Work from Office
* Design, implement & maintain automated security solutions. * Ensure compliance with industry standards & best practices. * Monitor SIEM data & SOC alerts.
Posted 3 weeks ago
0.0 - 5.0 years
5 - 9 Lacs
Pune
Work from Office
Responsibilities: Monitor systems, respond to incidents. Collaborate with teams on threat management strategies. Manage access control & encryption. Maintain compliance standards. Conduct regular security assessments. Office cab/shuttle Food allowance Health insurance Provident fund
Posted 3 weeks ago
15.0 - 24.0 years
30 - 45 Lacs
Jaipur
Work from Office
The CIO will lead the company’s digital transformation journey & oversee the entire IT ecosystem, aligning technology initiatives with strategic business goals. Ability to implementscalable, secure, and efficient IT systems to drive business growth. Required Candidate profile Technology Strategy & Roadmap Digital Transformation IT Infrastructure &Operations Cybersecurity & Compliance Team Leadership Vendor & Budget Management CRM Ecosystem Management
Posted 3 weeks ago
2.0 - 7.0 years
4 - 9 Lacs
Hyderabad, Pune, Bengaluru
Work from Office
TO TEACH MACHINE LEARNING--AI DATA SCIENCE--AI CYBER SECURITY COMPUTER ENGINEERING SALARY RANGE:4LAKHS TO 18LAKHS
Posted 3 weeks ago
2.0 - 4.0 years
6 - 10 Lacs
Hyderabad
Work from Office
We are seeking a talented and highly motivated Microsoft Sentinel SIEM Engineer to join our Dedicated Defense group. As a key member of our team, you will be responsible for deploying and maintaining Microsoft Security technologies to enhance threat detection, response, and overall security posture. This is an exciting opportunity for an individual with expertise in major SIEM technologies, aiming to help safeguard critical systems and data from evolving cyber threats. Responsibilities: Architect, deploy, and maintain Microsoft Sentinel for SIEM use cases including log ingestion, data normalization, and incident correlation. Manage and optimize Microsoft Defender for Endpoint, Identity, Cloud, Office 365, and other Defender tools to maximize protection and visibility. Develop custom queries,detection rules, workbooks, and automation playbooks to improve threat detection and response efficiency. Lead the design and implementation of security monitoring, including data connectors, analytics rules, and incident automation. Collaborate with threat analysts and incident response teams to triage, investigate, and respond to security alerts and incidents. Provide technical guidance in security best practices, incident response procedures, and threat hunting using Microsoft security tools. Continuously assess the security landscape and recommend improvements to policies, tools, and configurations. In addition to strong technical acumen, the ideal candidate will bring excellent communication and client-facing skills to collaborate directly with customers, understand their security needs, and deliver tailored solutions that align with their risk posture and compliance requirements. Outcomes: Integration & Optimization: Integrate and optimize Microsoft Sentinel to improve visibility and automate threat detection workflows Threat Detection: Utilize Microsoft Sentinel AI-powered analytics to dashboard reports and automate critical reporting functions Automation & Playbook Development: Develop automated detection and response playbooks based on Microsoft data feeds, streamlining incident management and reducing time to resolution. Collaboration & Knowledge Sharing: Work closely with other security and IT teams to share threat intelligence, optimize SIEM use, and contribute to security strategy development. Reporting & Documentation: Develop and maintain dashboards, reports, and documentation related to Microsoft Sentinel deployment, performance, and incident metrics. Continuous Improvement: Continuously evaluate Microsoft Sentinel capabilities and other relevant security tools to recommend improvements and refine detection capabilities. Required Qualifications: 5 years of SIEM experience in Splunk, Qradar, Microsoft, and comparable SIEMS Hands-on experience with other SIEM platforms (Splunk, IBM QRadar, Microsoft Sentinel, etc.) and integrating them with endpoint security tools. Strong understanding of cybersecurity principles, threat detection, and SIEM management. Experience working with Sentinel One Core EDR technology Proficiency in scripting and automation (Python, PowerShell, etc.). Experience with cloud security (AWS, Azure, GCP) and cloud-native SIEM solutions is a plus. Bachelor’s degree in computer science, Information Security, or a related field (or equivalent experience). Preferred Qualifications: 5 years of experience in cybersecurity in a SOC or security engineering capacity. Proven hands-on expertise with Microsoft Sentinel and Microsoft Defender suite. Deep knowledge of Kusto Query Language (KQL) and building custom analytics rules and workbooks in Sentinel. Strong experience in customer-facing roles. Experience with incident response, threat detection, and threat hunting techniques. Strong understanding of cloud security, especially in Azure environments. Familiarity with MITRE ATT&CK, NIST, and other security frameworks. Experience integrating Sentinel with third-party solutions (e.g., threat intel feeds, ticketing systems).
Posted 3 weeks ago
10.0 - 15.0 years
20 - 35 Lacs
Bengaluru
Work from Office
Key Responsibilities: • Gather, analyse, and document business requirements for cybersecurity products, tools, and services. • Collaborate with stakeholders to define use cases, workflows, and business processes aligned with cybersecurity best practices. • Translate business needs into functional and technical specifications for engineering teams. • Support risk assessments and compliance initiatives by analysing existing systems and identifying security gaps. • Monitor industry trends and threat intelligence to inform product and business strategy. • Assist with business case development, including cost-benefit analysis and ROI projections. • Work with QA and DevOps teams to ensure solutions meet business and regulatory requirements. • Prepare detailed reports and presentations for internal and external stakeholders. • Facilitate meetings, interviews, and workshops to elicit requirements and feedback. Qualifications: • An Engineering Degree in Computer Science, Information Systems, Cybersecurity, or a related field. • 7+ years of experience as a Business Analyst, with adequate depth in the cybersecurity domain. • Strong understanding of cybersecurity principles, frameworks and threat landscape (e.g., SIEM, SOAR, XDR, or TIP) • Experience working with GenAI/LLM use cases in security contexts would be strong pref. • Proven experience in business process modelling, data analysis, and documentation. • Familiarity with compliance requirements such as GDPR, HIPAA, or SOC 2 is a plus. • Proficient in tools like JIRA, Confluence, Visio, or similar platforms. • Strong communication and interpersonal skills to work effectively with technical and non-technical stakeholders.
Posted 3 weeks ago
2.0 - 4.0 years
2 - 4 Lacs
Hyderabad
Hybrid
IT Administrators are responsible for the smooth functioning of an organization's IT infrastructure, including managing hardware, software, networks, and user accounts . They ensure systems are up-to-date, secure, and optimized for productivity. Key Responsibilities: Hardware and Software Management: Installing, configuring, maintaining, and troubleshooting hardware and software across the organization. Network Administration: Managing and maintaining network infrastructure, including servers, routers, and switches. User Account Management: Creating, managing, and deleting user accounts, granting access rights, and setting security permissions. IT Service Management: Responding to IT service requests, providing technical support, and troubleshooting issues. Data Backup and Recovery: Implementing and managing data backup and recovery procedures. Security Management: Implementing and maintaining security protocols, monitoring system performance, and identifying and mitigating security threats. Software Deployment and Updates: Deploying new software and updating existing software across the organization. Documentation: Maintaining accurate documentation of IT infrastructure, procedures, and security protocols. Training: Providing training to users on new hardware and software. Collaboration: Working with other IT professionals and business units to ensure IT systems meet organizational needs. Compliance: Ensuring compliance with industry standards and regulatory requirements.
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane