Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 7.0 years
0 Lacs
haryana
On-site
Role Overview: As a Senior Consultant / Assistant Manager at EY, you will play a crucial role in supporting the significant growth of the Technology Risk service in MENA. Working across various industries, your main responsibility will be executing and leading IT and cybersecurity projects. Your focus will be on understanding client needs, asking insightful questions, and providing customized solutions. Key Responsibilities: - Lead and deliver engagements with minimal supervision, ensuring high-quality delivery and reports for clients - Support executives in developing proposals, presentations, and other business development activities - Demonstrate expertise in Risk and Governance Frameworks, IT Systems Audit, internal controls over financial reporting, application systems, Business Continuity Planning, and cybersecurity fundamentals - Utilize general skills such as analytical thinking, problem-solving, communication, project management, leadership, and client service - Collaborate effectively within a team environment to achieve project goals Qualifications Required: - Bachelor's degree in Information Technology, Cybersecurity, Computer Science, or a related field - Preferred professional certifications like CISA, CISSP, CISM, ISO 27001 Lead Auditor - 3 to 5 years of experience in IT audit, information security, or related fields - Strong knowledge of ITGC/ITAC, information security frameworks, and cybersecurity best practices - Excellent analytical, problem-solving, and communication skills - Ability to work independently and within a team to achieve project objectives Additional Company Details (if applicable): EY is dedicated to building a better working world by creating new value for clients, people, society, and the planet while fostering trust in capital markets. With a focus on data, AI, and advanced technology, EY teams aim to shape the future confidently and address pressing issues of today and tomorrow. Operating across assurance, consulting, tax, strategy, and transactions services, EY teams leverage sector insights, a vast network, and diverse ecosystem partners to deliver services globally.,
Posted 4 days ago
3.0 - 7.0 years
0 Lacs
chennai, tamil nadu
On-site
You will be joining Tokyo AnalyticX, an innovative ed-tech company based in Tokyo, Japan. Specializing in data science, business analytics, AI, cybersecurity, and ethical hacking courses, Tokyo AnalyticX aims to provide high-quality education to learners worldwide. As a full-time on-site Cyber Security and Ethical Hacking Trainer in Chennai, your responsibilities will include delivering training sessions in Cyber Security and Ethical Hacking. You will play a crucial role in conducting training sessions and offering valuable insights to learners to help them enhance their skills in this field. This position offers you the opportunity to work as a Freelance Cybersecurity Trainer, where you will utilize your expertise in Cybersecurity Fundamentals, Network Security, Ethical Hacking, Security Awareness Training, Security Tools, Risk Management, Security Compliance, and Cybersecurity Certification. To qualify for this role, you should hold a CompTIA Security+ certification or an equivalent certification, along with a minimum of 3 years of experience in the cybersecurity domain. Strong communication skills, experience in training or teaching roles, and exceptional problem-solving abilities with attention to detail are essential qualities for this position.,
Posted 2 weeks ago
0.0 - 4.0 years
0 Lacs
chennai, tamil nadu
On-site
As an individual in this role, you will have the opportunity to contribute to various aspects of security assessments. Your responsibilities will include assisting with security assessments such as vulnerability scans, penetration tests, and static/dynamic code analysis to detect potential security vulnerabilities in applications. Additionally, you will be expected to familiarize yourself with secure coding practices, including principles like OWASP ASVS, and collaborate with development teams to implement these practices effectively. Furthermore, you will play a key role in supporting security testing by carrying out security tests, helping define the scope of testing activities, and analyzing the outcomes of these tests. Your involvement in creating and managing security documentation, which encompasses security plans, policies, and procedures, will be crucial to the organization's overall security posture. In this position, you will also be required to stay informed about emerging security threats, vulnerabilities, and best practices to proactively address potential risks. Moreover, you will be involved in incident response activities, including analyzing logs, determining the root causes of security incidents, and implementing appropriate remediation measures. Participation in security training sessions covering a range of topics such as application security, networking, and cybersecurity fundamentals will be an integral part of your professional development. This role is suitable for individuals seeking full-time employment opportunities and is open to freshers who are enthusiastic about starting their careers in the field of cybersecurity. The work location for this position is on-site, requiring you to be physically present at the designated workplace.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
haryana
On-site
At EY, you will be part of a globally connected powerhouse of diverse teams, shaping your future with confidence. Joining EY means contributing to building a better working world. The role of Senior Consultant / Assistant Manager in Technology Risk at EY MENA involves executing and leading IT and cybersecurity projects across various industries. You will engage with clients, ask insightful questions, and provide support in areas where customized solutions are needed. Your primary responsibilities will include leading and delivering engagements with minimal supervision, supporting executives in business development activities, and ensuring the delivery and quality of final reports to clients. Successful candidates will have a proven track record in Technology Risk engagement delivery, preferably with a Big 4 background or equivalent consulting experience. Key areas of expertise expected for this role include Risk and Governance Frameworks, IT Systems Audit, internal controls over financial reporting (ICFR), application systems knowledge (e.g., SAP, Oracle, Microsoft Dynamics), Business Continuity Planning (BCP), and cybersecurity fundamentals. General skills such as analytical, communication, project management, and client service abilities are essential for success in this role. To excel in this position, you should hold a Bachelor's degree in Information Technology, Cybersecurity, Computer Science, or a related field, along with relevant professional certifications (e.g., CISA, CISSP, CISM, ISO 27001 Lead Auditor). A minimum of 3 to 5 years of experience in IT audit, information security, or related fields is required, as well as strong knowledge of ITGC/ITAC, information security frameworks, and cybersecurity best practices. EY offers a dynamic environment where you will develop future-focused skills, gain world-class experiences, and be part of a diverse and inclusive culture of globally connected teams. If you are ready to shape your future with confidence, apply today. Let us know in advance about any disability-related adjustments or accommodations you may require to ensure an equitable recruitment process. Join EY in building a better working world, where teams leverage data, AI, and advanced technology to create new value for clients, society, and the planet while fostering trust in capital markets. With a full spectrum of services in assurance, consulting, tax, strategy, and transactions, EY teams work collaboratively across more than 150 countries and territories, driven by sector insights and a diverse ecosystem of partners.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
haryana
On-site
As a Risk Management professional, you will be responsible for developing and implementing risk assessment models and frameworks to identify potential threats and vulnerabilities that may impact business operations. You will monitor risk indicators, track risk appetite thresholds, and key risk metrics. Collaboration with cross-functional teams will be key in developing risk mitigation plans. In the realm of Compliance Management, you will ensure compliance with legal, regulatory, and internal policy requirements. This will involve conducting regular audits, compliance reviews, and reporting findings with recommended corrective actions. Keeping abreast of relevant laws, regulations, and best practices such as NIST, CSI, and others will be essential. Additionally, you will develop, implement, and maintain compliance training programs for employees. In Incident Response & Reporting, you will liaise with various teams including Security Operation, IT, IS Governance, and Information & Cybersecurity Incident Response to investigate compliance breaches and risk incidents. Root-cause analysis and corrective action implementation will be part of your responsibilities. Regular risk and compliance reports for executive leadership and the MSIL Board will also be prepared. Key Skill Requirements include proficiency in Cybersecurity Fundamentals, IT Infrastructure Knowledge, Risk Assessment frameworks & Tools (e.g., RSA Archer, ServiceNow GRC, MetricStream), Data Privacy & Protection standards (GDPR, HIPAA, ISO/IEC 27001), Regulatory Frameworks (SOX, PCI-DSS, NIST, COBIT), Audit Management, Policy Development, Problem-Solving, Decision-Making, Effective Communication, and Managing cross-functional teams while training staff on compliance best practices. Your assertiveness, negotiation skills, and ability to translate technical risks into business language will be crucial in this role. Experience in drafting, implementing, and updating IT compliance policies, along with clear reporting to stakeholders, will contribute to the overall success of risk management and compliance within the organization.,
Posted 2 weeks ago
8.0 - 12.0 years
0 Lacs
maharashtra
On-site
As the Head of Technology Infrastructure Security Operations Manager, your primary responsibility is to oversee and lead the security operations team in safeguarding the bank's technology infrastructure. Your key duties include managing the day-to-day operations of the security team, ensuring efficient incident response, and handling security-related incidents and breaches. Collaboration with IT teams to integrate security best practices into the organization's technology infrastructure is crucial. Regular risk assessments and security audits must be conducted to identify potential weaknesses and areas for improvement. Implementing security measures and controls to prevent unauthorized access, data breaches, and cyberattacks is essential. Staying updated with the latest security trends, threats, and technologies is necessary to enhance the organization's security posture continually. Evaluating and selecting security tools, technologies, and vendors that align with the organization's needs and security objectives is part of your role. Managing and monitoring security systems like firewalls, intrusion detection systems, and SIEM tools are vital tasks. Providing leadership, mentorship, and training to the security operations team is necessary to build a strong and capable workforce. Collaboration with other departments and stakeholders ensures security compliance with relevant industry standards and regulations. Reporting security metrics, incidents, and performance to executive management and stakeholders is also part of your responsibilities. Your role is crucial in establishing a robust and proactive security framework to safeguard the organization's technology infrastructure and protect it from potential cyber threats. Skills required for the position of Technology Infrastructure Security Operations Manager include a combination of technical and managerial expertise. You should have a strong understanding of cybersecurity fundamentals, network security, cloud security, operating systems security, vulnerability management, SIEM, incident response, IAM, encryption and cryptography, security auditing and compliance, threat intelligence, security architecture and design, as well as IT governance and risk management.,
Posted 1 month ago
0.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Post-Head - IT Security Operations Job Location -Turbhe -Navi Mumbai Working days - 6 days & Alternative Saturdayoff Salary range - 45LPA Job Role - As the Head of Technology Infrastructure Security Operations Manager, your role is to oversee and lead the security operations team responsible for safeguarding the banks technology infrastructure. Your key responsibilities would include: Managing the day-to-day operations of the security team, ensuring efficient incident response, and handling security-related incidents and breaches. Collaborating with IT teams to ensure security best practices are integrated into the organization&aposs technology infrastructure and systems. Conducting regular risk assessments and security audits to identify potential weaknesses and areas for improvement. Implementing security measures and controls to prevent unauthorized access, data breaches, and cyberattacks. Staying up-to-date with the latest security trends, threats, and technologies to continually enhance the organization&aposs security posture. Evaluating and selecting security tools, technologies, and vendors that align with the organization&aposs needs and security objectives. Managing and monitoring security systems, such as firewalls, intrusion detection systems, and SIEM (Security Information and Event Management) tools. Providing leadership, mentorship, and training to the security operations team to build a strong and capable workforce. Collaborating with other departments and stakeholders to ensure security compliance with relevant industry standards and regulations. Reporting security metrics, incidents, and performance to executive management and stakeholders. Overall, your role will be crucial in establishing a robust and proactive security framework to safeguard the organization&aposs technology infrastructure and protect it from potential cyber threats. Skills : As a Technology Infrastructure Security Operations Manager, you would need a combination of technical and managerial skills to effectively lead the security operations team and protect the organization&aposs technology infrastructure. Some key technology skills required for this role include: 1. Cybersecurity Fundamentals:A strong understanding of cybersecurity principles, best practices, and industry standards is essential to assess risks and develop effective security strategies. 2. Network Security: Proficiency in network security protocols, firewalls, VPNs (Virtual Private Networks), and intrusion detection/prevention systems to secure the organization&aposs network infrastructure. 3. Cloud Security:Knowledge of cloud security concepts, services, and platforms like AWS, Azure, or Google Cloud Platform to ensure the security of cloud-based resources. 4. Operating Systems Security: Familiarity with securing various operating systems, such as Windows, Linux, and macOS, including user management, access controls, and patch management. 5. Vulnerability Management: Experience in identifying and mitigating vulnerabilities through vulnerability scanning, penetration testing, and patch management. 6. Security Information and Event Management (SIEM):Proficiency in using SIEM tools to collect, analyze, and respond to security events and incidents. 7. Incident Response: Knowledge of incident response procedures and tools to effectively handle and mitigate security incidents. 8. Identity and Access Management (IAM): Understanding of IAM principles and technologies for managing user access and authentication. 9. Encryption and Cryptography: Familiarity with encryption algorithms and cryptographic techniques to protect sensitive data. 10. Security Auditing and Compliance: Experience conducting security audits and ensuring compliance with relevant industry standards and regulations, such as GDPR, HIPAA, or ISO 27001. 11. Threat Intelligence: Staying updated with the latest cybersecurity threats, trends, and attack vectors to proactively protect the organization from potential risks. 12. Security Architecture and Design: Ability to design secure technology infrastructure and systems to prevent security breaches. 13. IT Governance and Risk Management: Understanding of IT governance frameworks and risk management Show more Show less
Posted 1 month ago
4.0 - 8.0 years
0 Lacs
haryana
On-site
You will be working for one of the leading Automobile Manufacturing Organizations based in Gurgaon with 4-7 years of experience and a B.Tech qualification. As part of your role, you will be responsible for developing and implementing risk assessment models and frameworks to identify potential threats and vulnerabilities that could impact business operations. Your tasks will include monitoring and reporting on risk indicators, collaborating with cross-functional teams to create risk mitigation plans, and ensuring compliance with legal, regulatory, and internal policy requirements. Regular audits and compliance reviews will be conducted by you, where you will report findings and recommend corrective actions. It will be essential for you to stay updated on relevant laws, regulations, and best practices such as NIST, CSI, and others. Additionally, you will need to develop, implement, and maintain compliance training programs for employees and liaise with various teams including Security Operation, IT, IS Governance, and Information & Cybersecurity Incident Response teams. You will also be responsible for preparing risk and compliance reports for executive leadership and the MSIL Board. The required skills for this role include proficiency in Cybersecurity Fundamentals, IT Infrastructure Knowledge, Risk Assessment frameworks & Tools (such as RSA Archer, ServiceNow GRC, or MetricStream), Data Privacy & Protection standards (e.g., GDPR, HIPAA, ISO/IEC 27001), Regulatory Frameworks (SOX, PCI-DSS, NIST, COBIT), Audit Management, Policy Development, Assertiveness and negotiation skills, Problem-Solving and Decision-Making abilities, effective Communication with stakeholders, and Managing cross-functional teams while training staff on compliance best practices.,
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |