Home
Jobs

1952 Cyber Security Jobs - Page 44

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 10.0 years

10 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Number of Openings 1 ECMS ID in sourcing stage 527090 Assignment Duration 6 months Total Yrs. of Experience 8-10 Yrs Relevant Yrs. of experience 8+ Detailed JD (Roles and Responsibilities) Manage VM tool (Tenable.io) and on-premises VA scanners. Perform regular health check to ensure scanner are up and running with latest plugins. Ensure scans scopes are updated and proper scans are performed on assets as per desired frequency. Troubleshoot and fix scanning issues like authentication failure observed in scheduled scans. Perform risk assessments on vulnerabilities identified by infrastructure scans to determine real risk and prioritizing vulnerabilities. Report findings to teams / individual owners of assets and follow up to get the remediation completed within defined SLA. Develop hardening configuration standards (CIS) document for windows and Linux operating systems and get them implemented with help of stakeholders. Ensure compliance scans are performed to validate hardening configuration as per desired frequency. Report EC2 instances and lambda functions vulnerability findings from aws inspector to individual resource owners and follow up to get the remediation completed within defined SLA. You should be good at performing vulnerability assessment and articulate the findings in an easily consumable manner to the asset owners. Hence it is expected to have good reporting skills as well. Configuration and maintenance of regular and ad-hoc vulnerability scans against internal and external IT infrastructure including Cloud Assessment, reporting and remediation tracking of identified vulnerabilities. Collaboration with Tribe/ Product owners and cross-functional stakeholders related to vulnerability management. Mandatory skills Perform vulnerability assessment and articulate the findings in an easily consumable manner to the asset owners and good reporting skills. Configuration and maintenance of regular and ad-hoc vulnerability scans against internal and external IT infrastructure including Cloud Assessment, reporting and remediation tracking of identified vulnerabilities. Collaboration with Tribe/ Product owners and cross-functional stakeholders related to vulnerability management. Desired/ Secondary skills Knowledge on scripting (e.g. PowerShell) to write automation scripts. Solid understanding of the Cloud terminology, windows platform, Active Directory, and networking protocols Sound knowledge of ITIL standards. Working experience of ITSM tool such as ServiceNow. Domain Cyber Security Max Vendor Rate in Per Day (Currency in relevance to work location) INR 12000 Work Location given in ECMS ID Hyderabad WFO/WFH/Hybrid WFO Hybrid BG Check (Before OR After onboarding) Pre onboarding Is there any working in shifts from standard Daylight (to avoid confusions post onboarding) YES/ NO General shift - 5 days a week (as required)

Posted 3 weeks ago

Apply

6.0 - 10.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Clifyx Technology. is looking for SAP Security Professional to join our dynamic team and embark on a rewarding career journey. SAP Security is a crucial aspect of the SAP system, responsible for ensuring the confidentiality, integrity, and availability of the data processed by the system A SAP Security professional is responsible for:1 Designing and implementing SAP security strategies and policies to secure the SAP landscape2 Configuring user access, authorization, and authentication in SAP systems3 Monitoring and auditing SAP system logs to detect potential security breaches4 Ensuring data privacy and compliance with relevant regulations and standards5 Maintaining and updating SAP security documentation6 Providing technical support to end-users and addressing their security-related queries7 Keeping abreast of new threats and technologies related to SAP security and proactively implementing measures to mitigate them The ideal candidate should have a good understanding of SAP security best practices, in-depth knowledge of SAP authorization concepts, experience with SAP GRC, and familiarity with security technologies such as firewalls, encryption, and identity management solutions

Posted 3 weeks ago

Apply

4.0 - 6.0 years

6 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

Understanding of network defence principles, common attack vectors, and attacker techniques. Technical baseline skills and the ability to acquire in-depth knowledge of network and host security technologies Basic Linux/Windows OS knowledge, firewall rules and policy fundamentals. Excellent analytical and problem-solving skills. Strong work ethic and commitment to accomplish assigned tasks with a sense of urgency. Windows, Linux, Network Security, Phishing, Splunk, Malware

Posted 3 weeks ago

Apply

3.0 - 5.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Position: Application Engineer | ECMS Request No . 528149 Years of Experience: 03-05 Years Activities to be Performed: Collaborate with the OT Network Engineer and OT Generalist to understand the existing application landscape and document relevant systems and interfaces. Design the application interfaces and the server infrastructure required to support the centralized domain. Design the application-specific aspects of the firewall rules and participate in the deployment and testing. Configure servers and applications within the newly created process and DMZ domains. Evaluate the cyber readiness of applications and servers, and implement remediation plans in coordination with the OT Network Engineer. Install cyber security tools on relevant machines and ensure proper upward reporting for application and server components. Provide application and server-related support during the hyper care period and conduct application-specific training. Provision and configure the operating system and any necessary prerequisites on the server that will host the LanSweeper application. Install the LanSweeper software on the newly built server and configure the application settings according to the requirements for scanning the OT environment. Define the scope, frequency, and type of scans that LanSweeper will perform on the OT network assets. Monitor the LanSweeper scans to ensure they are running successfully and collecting the required information. Investigate and resolve any application-level errors or issues that prevent successful scanning. Configure the LanSweeper application to connect to the database, providing the necessary credentials and connection parameters. Troubleshoot any application-level connectivity problems.

Posted 3 weeks ago

Apply

12.0 - 14.0 years

9 - 19 Lacs

Bengaluru

Work from Office

Naukri logo

Key Responsibilities: Hands-on implementation and management of Palo Alto Firewalls and Tuffin Firewall Management . Deployment and configuration of Prisma Access , Prisma Cloud , and optionally Prisma Cortex . In-depth experience with cloud platforms such as AWS , Azure , and preferably GCP . Act as the technical lead for complex projects and client engagements. Configure connectors, develop custom rules and workflows, and manage third-party integrations. Lead UAT , engineering support for bugs, and post-deployment support. Mentor and guide junior engineers on the team. Participate in capacity planning and hardware specification recommendations . Contribute to runbook and procedural documentation development. Take part in professional development, attend workshops, and stay current with industry certifications. Required Skills & Qualifications: Minimum 8 years of hands-on experience with Palo Alto technologies . Minimum 6 years in Information Security / Cybersecurity roles, preferably in consulting or enterprise environments. Certified with PCNSA / PCNSE Mandatory . Prior experience in a customer-facing or consulting capacity. Strong understanding of InfoSec/Cybersecurity implementation . Able to work independently and lead projects from end to end. Excellent communication and documentation skills. Nice to Have: Experience with GCP. Familiarity with Prisma Cortex . Active involvement in cybersecurity communities (e.g., ISSA). Note: Only candidates open to conversion after 3 months will be considered. Shift: US Shift (5 PM to 2 AM / 6 PM to 3 AM IST) Certifications: PCNSA / PCNSE - Mandatory

Posted 3 weeks ago

Apply

1.0 - 6.0 years

3 - 8 Lacs

Pune

Work from Office

Naukri logo

As part of Northern Trust s security operations center, a Senior Analyst will conduct security monitoring, security incident identification, incident prioritization, incident escalation and directed response support functions. Tier one analyst will play a crucial role in executing Northern Trust s 24x7 security monitoring model, creating a resilient and unified team that improves NT s ability to protect and defend it s networks and information. Monitors for alerts from security tools. Provides first response support by analyzing alerts and gathering information about potential incidents or vulnerabilities. Conducts incident analysis and response based on predefined procedures. Creates remediation tickets and tracks tickets to closure. Leverages Northern Trust s security runbooks and playbooks to triage alerts. Escalate incidents to tier two and three analysts as needed. Bachelor s degree in Computer Science or other IT related field. Minimum of 1+ years of experience working in an information security monitoring & response role in a large, complex environment. Solid understanding of the Cyber Incident Response Process & Life Cycle. Intermediate knowledge of security monitoring tools such as SIEM, IDS/IPS, EDR/XDR, & Email Security Solutions, Basic Networking concepts. Experience in working with ITSM tools like ServiceNow. Strong analytical and technical skills. Self motivated, proactive and able to work independently. Strong communication skills.

Posted 3 weeks ago

Apply

6.0 - 8.0 years

8 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

> Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT

Posted 3 weeks ago

Apply

6.0 - 8.0 years

8 - 10 Lacs

Chennai

Work from Office

Naukri logo

> Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT

Posted 3 weeks ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Noida

Work from Office

Naukri logo

> Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years.

Posted 3 weeks ago

Apply

2.0 - 6.0 years

12 - 18 Lacs

Mumbai

Work from Office

Naukri logo

Job Description: IT & Cyber Security Auditor Location- Andheri or any client Position: IT & Cyber Security Auditor Employment Type: Full-time Job Overview: We are seeking a highly skilled IT & Cyber Security Auditor to join our team. The ideal candidate will be responsible for conducting comprehensive audits of IT systems, applications, infrastructure, and cyber security protocols. This role involves assessing risks, evaluating security controls, and ensuring compliance with industry standards and regulatory requirements. The auditor will provide valuable insights and recommendations to enhance the organization's security posture. Key Responsibilities: Conduct IS, IT & Cyber Security Audits: Plan, execute, and report on audits of IT systems, applications, infrastructure, and cyber security protocols. Manage end-to-end audit engagements, including risk assessments, scope development, fieldwork, and reporting. Assess and test the effectiveness of information security controls and risk management practices. Ensure audits comply with relevant regulations, industry standards, and best practices (such as ISO 27001, NIST, PCI DSS, etc.). Identify gaps in processes, systems, and controls, providing actionable recommendations. Prepare audit reports highlighting key findings, risks, control weaknesses, and recommendations for remediation. Present findings to senior management, including executives, and provide support in remediation efforts. Qualifications: Bachelors/Masters degree in Information Technology, Cyber Security, or a related field. Relevant certifications such as CISA, CISSP, ISO 27001 Lead Auditor, or CEH are preferred. Strong knowledge of IT security frameworks, risk management, and compliance standards. Experience in conducting IT audits, vulnerability assessments, and security risk assessments. Experience with regulatory compliance in financial services (RBI, SEBI, IRDA) is highly preferred. Excellent analytical, problem-solving, and communication skills. Ability to work independently and collaboratively with cross-functional teams. How to Apply: Interested candidates are invited to submit their resume and cover letter to [Pallavi.kulkarni@anbglobal.com]. Please include "IT & Cyber Security" in the subject line. Equal Opportunity Employer: ANB is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. For more information about our company and culture, visit https://anbglobal.com/

Posted 3 weeks ago

Apply

1.0 - 3.0 years

5 - 10 Lacs

Gurugram

Work from Office

Naukri logo

Title: Security Analyst (SOC & EDR) Location: Gurgaon, India Type: Hybrid (work from office) Job Description Who We Are: Fareportal is a travel technology company powering a next-generation travel concierge service. Utilizing its innovative technology and company owned and operated global contact centers, Fareportal has built strong industry partnerships providing customers access to over 600 airlines, a million lodgings, and hundreds of car rental companies around the globe. With a portfolio of consumer travel brands including CheapOair and OneTravel, Fareportal enables consumers to book-online, on mobile apps for iOS and Android, by phone, or live chat. Fareportal provides its airline partners with access to a broad customer base that books high-yielding international travel and add-on ancillaries. Fareportal is one of the leading sellers of airline tickets in the United States. We are a progressive company that leverages technology and expertise to deliver optimal solutions for our suppliers, customers, and partners. FAREPORTAL HIGHLIGHTS: Fareportal is the number 1 privately held online travel company in flight volume. Fareportal partners with over 600 airlines, 1 million lodgings, and hundreds of car rental companies worldwide. 2019 annual sales exceeded $5 billion. Fareportal sees over 150 million unique visitors annually to our desktop and mobile sites. Fareportal, with its global workforce of over 2,600 employees, is strategically positioned with 9 offices in 6 countries and headquartered in New York City. Job Overview We are seeking a proactive and knowledgeable Security Analyst to join our Information Security Operations (SecOps) team . This role will focus on SOC monitoring and Endpoint Detection and Response (EDR) using SentinelOne . The ideal candidate should have solid experience in threat monitoring, incident response, and SentinelOne tool handling. Key Responsibilities: Monitor and respond to SOC alerts and security incidents in real time. Analyze logs and alerts from SIEM and SentinelOne EDR platforms. Perform incident triage , escalation, and coordination with internal teams. Troubleshoot SentinelOne-related issues , including error resolution, agent communication, and performance problems. Understand and manage SentinelOne policies , ensure proper deployment, and make necessary adjustments for better coverage. Quickly identify the root cause of issues related to endpoint protection and take corrective actions. Coordinate with the IT team for issue resolution and endpoint remediation. Collaborate with teams to reduce false positives and improve alert accuracy. Maintain incident documentation , reports, and operational dashboards. Support in threat hunting , vulnerability detection, and other BAU (Business As Usual) security tasks. Required Skills & Qualification: Bachelors/Masters Degree in Computer Science, Information Systems, Engineering. 24 years of experience in SOC operations and endpoint security monitoring. Hands-on experience with SentinelOne EDR , including troubleshooting and policy management. Good knowledge of cybersecurity threats, incident response processes, and log analysis. Ability to investigate and resolve SentinelOne alerts and agent-related errors effectively. Experience working with SIEM tools (like Splunk, Qradar, etc.). Strong understanding of false positive tuning and threat detection improvement. Basic scripting knowledge (PowerShell, Python) is a plus. Good communication and analytical skills. Preferred Skills & Qualifications: CEH , CompTIA Security+ , or any other relevant security certification. Disclaimer This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Fareportal reserves the right to change the job duties, responsibilities, expectations or requirements posted here at any time at the Companys sole discretion, with or without notice.

Posted 3 weeks ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Chennai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT Mandatory Skills: Archer. Experience: 5-8 Years.

Posted 3 weeks ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Azure B2X Security. Experience: 3-5 Years.

Posted 3 weeks ago

Apply

7.0 - 10.0 years

11 - 16 Lacs

Pune

Work from Office

Naukri logo

ZS is a place where passion changes lives. As a management consulting and technology firm focused on improving life and how we live it , our most valuable asset is our people. Here you’ll work side-by-side with a powerful collective of thinkers and experts shaping life-changing solutions for patients, caregivers and consumers, worldwide. ZSers drive impact by bringing a client first mentality to each and every engagement. We partner collaboratively with our clients to develop custom solutions and technology products that create value and deliver company results across critical areas of their business. Bring your curiosity for learning; bold ideas; courage an d passion to drive life-changing impact to ZS. Our most valuable asset is our people . At ZS we honor the visible and invisible elements of our identities, personal experiences and belief systems—the ones that comprise us as individuals, shape who we are and make us unique. We believe your personal interests, identities, and desire to learn are part of your success here. Learn more about our diversity, equity, and inclusion efforts and the networks ZS supports to assist our ZSers in cultivating community spaces, obtaining the resources they need to thrive, and sharing the messages they are passionate about. Information Security Project Specialist ZS’s India Capability & Expertise Center (CEC) houses more than 60% of ZS people across three offices in New Delhi, Pune and Bengaluru. Our teams work with colleagues across North America, Europe and East Asia to create and deliver real world solutions to the clients who drive our business. The CEC maintains standards of analytical, operational and technological excellence across our capability groups. Together, our collective knowledge enables each ZS team to deliver superior results to our clients. What You’ll Do Executes the end-to-end management of security projectsincluding resource management, communications, training requirements, change management and budget (if applicable). Estimate the resources and participants needed to achieve project goals. Reviews and recommends changes, reductions or additions to the overall project Acts as the liaison between InfoSec and end-users when applicable Maintains the efficiency of the project management process such as planning, scheduling, and budget and risk assessment. Identifies and mitigates potential risks Work with cross-functional teams and staff of all levels, including assisting in the development, training and assignment of work/projects to team members reporting to others; Works well within a structured environment in which team members can work together as an efficient team. What You’ll Bring Bachelor’s Degree required. 7 - 10 years of relevant work experience, including Information Security, project management (5+ years), and team management. PMP-PMI certification desired, or completion within a year of assuming the position. Agile certification desired, or completion within a year of assuming the position. Security+ or equivalent certification desired, or completion within a year of assuming the position. (CISM- Certified Information Security Manager, CompTIA Security+, Etc ) Project plan development experience, including charter, scope, project management approach, management plans, statement of work, cost estimates, schedule. Excellent communication (written and oral) and interpersonal skills; ability to interface and influence all levels within the organization, including facilitation, consulting, negotiation, and presentation. Excellent project management and coordination skills working with multiple stakeholders across several technology platforms and business areas Strong technical skills and experience. The ideal candidate has lead projects relating to Information Security deliveries or migrations (Vulnerability Management, Identity and access management, Cloud Strategy & Governance, Data Security, Enterprise Risk Management, Asset Management, Security awareness & training) Project plan and budget management. Knowledge of project management best practices, Experience identifying and mediating risk. Perks & Benefits: ZS offers a comprehensive total rewards package including health and well-being, financial planning, annual leave, personal growth and professional development. Our robust skills development programs, multiple career progression options and internal mobility paths and collaborative culture empowers you to thrive as an individual and global team member. We are committed to giving our employees a flexible and connected way of working. A flexible and connected ZS allows us to combine work from home and on-site presence at clients/ZS offices for the majority of our week. The magic of ZS culture and innovation thrives in both planned and spontaneous face-to-face connections. Travel: Travel is a requirement at ZS for client facing ZSers; business needs of your project and client are the priority. While some projects may be local, all client-facing ZSers should be prepared to travel as needed. Travel provides opportunities to strengthen client relationships, gain diverse experiences, and enhance professional growth by working in different environments and cultures. Considering applying At ZS, we're building a diverse and inclusive company where people bring their passions to inspire life-changing impact and deliver better outcomes for all. We are most interested in finding the best candidate for the job and recognize the value that candidates with all backgrounds, including non-traditional ones, bring. If you are interested in joining us, we encourage you to apply even if you don't meet 100% of the requirements listed above. ZS is an equal opportunity employer and is committed to providing equal employment and advancement opportunities without regard to any class protected by applicable law. To Complete Your Application: Candidates must possess or be able to obtain work authorization for their intended country of employment.An on-line application, including a full set of transcripts (official or unofficial), is required to be considered. NO AGENCY CALLS, PLEASE. Find Out More At www.zs.com

Posted 3 weeks ago

Apply

4.0 - 8.0 years

3 - 7 Lacs

Mumbai

Work from Office

Naukri logo

Daily assessment of vulnerabilities identified by infrastructure scan Evaluate rate and perform risk assessments on assets Prioritizing vulnerabilities discovered along with remediation timeline s Work with associated teams to explain vulnerabilities and remediation steps as required Maintain knowledge of the threat landscape Create reports and provide analysis on vulnerabilities for technical teams and leadership Skill Required Knowledge of application network and operating system security Experience with vulnerability and patch assessment Linux and windows experience Good understanding of Windows and Linux patching Knowledge of vulnerability scoring systems CVSS CMSS Experience on vulnerability scanning tools Excellent writing and presentation skills are required in order to communicate findings and status Primary Skills VMDR Policy Compliance Qualys Tenable Nessus Rapid7 Secondary Skills Excellent writing and presentation skills are required in order to communicate findings and statusCleary communicate priorities and escalation points procedures to other team members Detail oriented organized methodical follow up skills with an analytical thought process Experience performing dynamic scans static scans and penetration testing Development experienceProject management experience Innovative and efficiency focused Track trends and configure systems as required to reduce false positives from true events

Posted 3 weeks ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver / No. / Performance Parameter / Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT Mandatory Skills: Saviynt. Experience: 5-8 Years.

Posted 3 weeks ago

Apply

6.0 - 10.0 years

12 - 13 Lacs

Chennai

Work from Office

Naukri logo

The opportunity: Hitachi Energy is a world leader that is advancing a sustainable energy future for all. We are advancing the world s energy system to be more sustainable, flexible, and secure, and we collaborate with customers and partners to enable a sustainable energy future - for today s generations and those to come. The Hitachi Energy Indian Operations Center (INOPC) is a competence center with around 3000+ skilled engineers who focus on tendering, engineering, planning, procurement, project Management, functional system testing, installation supervision, documentation and commissioning. However, over the last decade, it has evolved to become the largest Operations hub. The India Operations Centre team at Chennai, Bangalore and Gurugram supports Hitachi Energy s units in more than 40 countries across a wide portfolio of all the four business units in Hitachi Energy To date, the team has executed engineering and commissioning for projects in more than 80 countries. The technical marketing engineer for Mission Critical telecommunication Solutions (MCS) has the global responsibility to enable the Pre-Sales Sales community of the different regional HUBs to understand technical market requirements for wired telecommunication networks and ensure customer interaction in line with global solution/product strategy. How you ll make an impact: You will be supporting Global Projects by adapting HVDC Cyber security for SCADA HMI developing architecture functional descriptions for Functions / Solutions for future HVDC in cyber security technologies. You will be prepare Perform test case scenarios participate in FST supporting projects in resolving the issues related to Cyber security Functions. You will be coordinate with different stakeholders across the business units to get inputs to optimize the Cyber security solutions in HVDC. You will be design develop a secured network architecture for SCADA system with advanced cyber security features You will evaluate and strengthen the security of any connections to the SCADA network. You will be monitor and validate third party security patches to ensure that reliability of the system is maintained. You will be implementing the security features provided by device and system vendors. You will be performing technical audits of SCADA devices and networks, and any other connected networks, to identify security concerns conducting physical security surveys and assess all remote sites connected to the SCADA network to evaluate their security. You will be maintaining the test environment with updated software and hardware for current and future use backup/ Image handling on servers and workstations and patch management. Living Hitachi Energy s core values of safety and integrity, which means taking responsibility for your own actions while caring for your colleagues and the business. Your Background: Bachelor s degree in computer science/IT with a minimum knowledge in networking protections. Candidate should have 6 to 10 years of experience in networking, security, Anti-Virus. Must have Basic knowledge on IEEE / IEC standards. Must have Knowledge Experience MS Office: Word, Excel. Excellent written and verbal communication skills. Self-starter caliber who could own tasks through to completion Qualified individuals with a disability may request a reasonable accommodation if you are unable or limited in your ability to use or access the Hitachi Energy career site as a result of your disability. You may request reasonable accommodations by completing a general inquiry form on our website. Please include your contact information and specific details about your required accommodation to support you during the job application process. .

Posted 3 weeks ago

Apply

8.0 - 10.0 years

14 - 19 Lacs

Noida

Work from Office

Naukri logo

Role Overview: We are seeking an experienced Data Protection and Privacy Manager, who will be responsible for overseeing the organization's data protection strategy and ensuring compliance with Indian laws such as the Information Technology Act, 2000, and the Personal Data Protection Bill.The DPPM will work closely with DPO and regulatory authorities to ensure that sensitive data is processed securely and ethically. This role is crucial in safeguarding our digital assets and maintaining compliance with industry standards and law. Key Responsibilities: Legal ComplianceEnsure adherence to data protection laws, including local DPDPA, IT Act and international regulations like GDPR. Policy DevelopmentFormulate and implement data protection policies and guidelines across the organization. Data Breach ManagementInvestigate and report data breaches to relevant authorities within the stipulated timeframe. Training & AwarenessConduct training sessions for employees on data protection practices and raise awareness about privacy policies. Impact AssessmentsPerform Data Protection Impact Assessments (DPIA) to identify risks and recommend mitigation strategies. Grievance RedressalAct as the point of contact for data principals (individuals) for grievances related to data handling or privacy violations. RecordkeepingMaintain records of all data processing activities and policies for audit and regulatory purposes. Liaison:With regulatory agencies and stakeholders regarding data protection matters. Qualifications and Experience: 1. Bachelor's degree in Information Security, Computer Science, and Law. 2. Certification in Data Protection or Privacy Management is mandatory, like - CIPM, CDPSE, DCPLA, DCPP and DCDPO 3. 8-10 years of experience in security management. 4. Strong understanding of IT infrastructure , data security best practices, and frameworks. 5. Familiarity with regulatory requirements and compliance standards (e.g., RBI, SEBI). 6. Excellent communication, interpersonal, analytical and leadership skills. 7. Knowledge of emerging technologies, their impact on data protection and ability to handle sensitive information discreetly.

Posted 3 weeks ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

Mumbai

Work from Office

Naukri logo

About Us: Paytm is India's leading mobile payments and financial services distribution company. Pioneer of the mobile QR payments revolution in India, Paytm builds technologies that help small businesses with payments and commerce. Paytm’s mission is to serve half a billion Indians and bring them to the mainstream economy with the help of technology. About the role: As a Vendor Risk Operations team member, you will play a critical role in safeguarding Paytm from potential risks associated with our vendor ecosystem. You will be responsible for conducting comprehensive vendor risk assessments, ensuring compliance with internal policies and regulatory requirements, and actively contributing to the continuous improvement of our vendor risk management framework. This role requires a keen eye for detail, strong analytical skills, and the ability to collaborate effectively with various stakeholders. Conduct end-to-end vendor risk assessments across various risk domains (e.g., Vendor deduplication, information security, financial stability, business continuity, regulatory compliance, data privacy). Collaborate with business units to understand their vendor requirements and associated risks. Review vendor-provided documentation, certifications, and audit reports to identify potential vulnerabilities. Conduct Mystery-shopping wherever required Track and monitor vendor remediation efforts to ensure timely closure of identified risks. Maintain accurate and up-to-date vendor risk profiles and assessment records. Assist in the development and enhancement of vendor risk assessment methodologies, tools, and processes. Contribute to the ongoing development and implementation of Paytm's vendor risk management framework. Generate regular reports on vendor risk posture and assessment progress for internal stakeholders. Participate in ad-hoc projects and initiatives related to vendor risk management as required. Expectations/: Educational QualificationBachelor's degree in Business Administration, Finance, IT, Risk Management, or a related field. Experience2-5 years of experience in vendor risk management, third-party risk management, internal audit, compliance, or a similar risk-focused role. Domain KnowledgeStrong understanding of various risk domains, including information security, data privacy (e.g., GDPR, local data protection laws), financial risk, operational risk, and regulatory compliance. Understanding of Technology and User ExperienceAn appreciation for how technology solutions are built and how they impact user experience will be valuable in assessing vendor capabilities and potential risks. Analytical & Problem-Solving Skills: Excellent analytical and problem-solving skills with the ability to conduct deep dives, identify, assess, and mitigate risks effectively. Advanced Knowledge of Excel is required for data analysis and reporting. Basic knowledge of MySQL would be an added advantage for data retrieval and manipulation. Communication & Interpersonal Skills: Good communication and interpersonal skills, with the ability to present complex information clearly and concisely to diverse audiences. Strong written communication for documentation and reporting. High level of drive, initiative, and self-motivation. Ability to work independently, prioritize tasks, and manage multiple assessments simultaneously in a fast-paced environment. A willingness to experiment, learn quickly, and continuously improve processes and personal skills. Certifications (Preferred but not mandatory)CISA, CRISC, CISM, or other relevant certifications in risk management or information security. Why join us: A collaborative output driven program that brings cohesiveness across businesses through technology Improve the average revenue per use by increasing the cross-sell opportunities A solid 360 feedbacks from your peer teams on your support of their goals Respect, that is earned, not demanded from your peers and manager CompensationIf you are the right fit, we believe in creating wealth for you with enviable 500 mn+ registered users, 21 mn+ merchants and depth of data in our ecosystem, we are in a unique position to democratize credit for deserving consumers & merchants – and we are committed to it

Posted 3 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Noida

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk.

Posted 3 weeks ago

Apply

5.0 - 10.0 years

8 - 18 Lacs

Gurugram

Remote

Naukri logo

General Summary: The Information Security Lead is responsible for leading the development, support, and administration of information security applications and processes including implementations, configuration changes, updates, upgrades, development of reporting, and documentation by proactively planning for and recognizing new and emerging threats to Clients information security. Essential Job Functions and Responsibilities: Provide team leadership for information security functions Implement security tools and best practices to secure Clients information security Administer information security applications applying configuration changes and updates as needed to protect Clients Information security Research known and emerging email threats and update and configure email applications as needed to prevent threats and reduce risk Research known and emerging PC and Server threats and update and configure end-point protection as needed to prevent threats and reduce risk Research known and emerging network vulnerabilities and threats and recommend changes to firewalls, switches, wireless access points, Directory as needed to prevent threats and reduce risk Oversee security incident and event detection and behavioral analysis mechanisms ensuring Clients is protected from active threats and risks to information security Develop reports and alerts and analyze data for consistency and completeness and pinpoint exceptions and/or anomalies and recommend plans of action Recommend information security policies and process changes and updates and review with management Administrator security awareness training program, executing campaigns, and reviewing reports, exceptions, and remediations with management Assist in identification of opportunities for improvement in processes and efficiency Assist in identification of opportunities for improvement of Clients information security processes Assist in identification of opportunities to improve associate training and security awareness Effectively communicate results and/or process to associates constructively and supportively Other duties as assigned by management Level of education required: College degree (4-year) -OR- Equivalent Experience: Degree in Management Information Systems, Computer Science or related major, or equivalent experience required. Equivalent years of experience are defined as one year of professional experience for each year of college requested. 2-5 years experience in information security, systems support or systems engineering Previous experience in Information Security, Active Directory, Cloud Directories, industry leading security applications is required; compliance or technology auditing experience is preferred. Information Security certification from CompTIA, ISC 2, ISACA, etc. Level of experience required: 3 years to 5 years relevant experience. Knowledge/Skills/Abilities: Results-driven, self-motivated person with the drive to maximize personal contribution to the organization Good project management skills with an ability to multi-task and manage competing priorities to meet deadlines Deals successfully with ambiguity, managing multiple priorities, and is able to lead the organization through complex changes Analytical mindset with demonstrated ability to critically evaluate end-to-end business processes Flexibility and ability to adapt to a fast-paced culture, changes in the environment, and changes in work priorities Excellent written and verbal communication skills Proficiency in Microsoft Office Suite and web-based project management applications

Posted 3 weeks ago

Apply

3.0 - 8.0 years

3 - 8 Lacs

Hyderabad, India

Work from Office

Naukri logo

Deliver classroom training to 3rd-year students, assist with queries and projects during labs, track performance and attendance, and ensure discipline, punctuality, and adherence to the curriculum.

Posted 3 weeks ago

Apply

3.0 - 5.0 years

5 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver / No. / Performance Parameter / Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience: 3-5 Years.

Posted 3 weeks ago

Apply

5.0 - 8.0 years

8 - 10 Lacs

Kochi

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Security Log Monitoring.

Posted 3 weeks ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Chennai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver / No. / Performance Parameter / Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Hashicorp Vault. Experience: 5-8 Years.

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies