Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
7.0 - 12.0 years
6 - 16 Lacs
bangalore rural, bengaluru
Work from Office
Work Location: Ulsoor Road (Near Trinity Metro station / M.G road), Bangalore Mode: On-site, WFO Ideal Candidate: Hands-on experience in IT infra / Networking sales (Infrastructure sales) like: Switching, routing, cybersecurity, security, managed services, cabling, digital, cloud, etc. Exposure toward CISCO portfolio / HP, Aruba, Crowd strike, Dell, any infra OEM will be recommended End-to-end sales role, BDM / Account management (Large / Global accounts) / Hunting + farming role Experience in OEM sales & coordination, cracking large size deals & closure Proactive Data Systems Pvt. Ltd. offers sales and support services in IT Infrastructure to enterprise customers in India. The company provi...
Posted 2 weeks ago
7.0 - 10.0 years
10 - 18 Lacs
gurugram
Work from Office
Join Our Team as a Manager for Cyber Security, Data Protection, Privacy, VAPT, Cyber Governance, ISO and BCP/DR! About Us We are a leading company in the technology industry, committed to innovation and excellence. We are on a mission to provide top-notch security solutions to our clients worldwide. If you are passionate about cyber security and want to make a difference, we want you to be part of our team! Key Responsibilities Develop and implement cyber security strategies and protocols Manage data protection, privacy, VAPT, cyber governance, ISO, and BCP/DR Ensure compliance with security regulations and standards Oversee incident response and risk management Lead and mentor a team of sec...
Posted 2 weeks ago
1.0 - 3.0 years
4 - 9 Lacs
hyderabad, chennai, bengaluru
Work from Office
About the role We are seeking an experienced, ethical, and curious Ethical Hacker to identify vulnerabilities before attackers do. You will perform penetration tests, red-team engagements, vulnerability assessments, and support secure development practices to harden our systems, applications, and cloud infrastructure. This role blends handson offensive security work with clear reporting and remediation guidance to engineering and ops teams. Key responsibilities Plan and execute authorized penetration tests (web, mobile, API, network, cloud, wireless, IoT, and internal/external infrastructure). Perform red team exercises and adversary emulation to evaluate detection and response capabilities....
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
5.0 - 7.0 years
6 - 10 Lacs
hyderabad
Work from Office
We're seeking a dynamic and forward-thinking Senior Cyber Security Strategist to join our team. In this pivotal role, you'll have the opportunity to shape the future of cyber security at a leading global biopharmaceutical company. Key responsibilities: Strategic Partnership: Partner with product teams to provide strategic and subject matter advice across multiple risk domains, ensuring robust security measures are integrated into all aspects of our operations. Innovation Leadership: Promote and implement NextGen/predictive monitoring and quality intelligence solutions. You'll be at the forefront of removing barriers to innovation, positioning yourself as a Key Opinion Leader (KOL) in the fie...
Posted 2 weeks ago
5.0 - 10.0 years
15 - 18 Lacs
chennai
Work from Office
IT Infrastructure & Security Specialist Job Objective : The objective of IT Infrastructure & Security Specialist role under this consultancy is to evaluate the existing setup at DMA for the present UTIS and suggest the Infrastructure requirements and the appropriate measures to be taken up for Security related issues. The specialist should prepare the process manual for the regular Security Audit clearance by DMA on its own for implementation of UTIS with proper technology. Evaluate the existing systems and determine ways to better align those systems to support business operations for increased efficiency. The Consultant is expected to follow the established approach of the “Plan-Do-Check- ...
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
kochi
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
1.0 - 3.0 years
3 - 7 Lacs
pune, bengaluru, delhi / ncr
Hybrid
Qualifications: • B.Tech in Computer Science, Engineering, or related field or equivalent work experience • Expert in web security, possessing extensive knowledge of vulnerabilities, along with the ability to identify and exploit them effectively. • 3+ years of experience in code review, application security testing, or web application development • Excellent written and verbal communication skills • Strong scripting skills (e.g. Python, Ruby, Perl) • Experience with cloud platforms, such as AWS, and knowledge of cloud security best practices • Familiarity with development technologies like Docker, CDK, Terraform, Java, Python, React, GraphQL, Javascript, JSON, REST, etc. • Must possess a hi...
Posted 2 weeks ago
2.0 - 7.0 years
0 - 3 Lacs
bengaluru
Remote
Freelancing Internet Security Expert Timings: Minimum 4 Hours/Day Compensation: Rs.400 to Rs.900 per hour (based on experience) Project: Antivirus Email Data Labeling project, where emails will be tagged as scam, spam, phishing, etc.
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
137681 Jobs | Dublin
Wipro
43475 Jobs | Bengaluru
EY
34904 Jobs | London
Accenture in India
32420 Jobs | Dublin 2
Uplers
25774 Jobs | Ahmedabad
Turing
24356 Jobs | San Francisco
IBM
21415 Jobs | Armonk
Accenture services Pvt Ltd
20351 Jobs |
Capgemini
20341 Jobs | Paris,France
Infosys
20250 Jobs | Bangalore,Karnataka