Home
Jobs

5787 Cybersecurity Jobs - Page 12

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Solution Engineer - Cybersecurity Location : Hyderabad, Bangalore Employment Type : Full-Time Experience : 8+ years (Hands-on Experience) Desired Qualification : B.Tech or BE in Computers / MCA. Certifications such as CISSP, CEH, GCIH, OSCP, OSCE are a plus. Job Requirements Minimum 3 years of experience in a large-scale IT environment focusing on Cyber/Information Security. Expertise in Pre-Sales support, Service & Solution delivery, and Program Management (Transition & Transformation). Strong knowledge of security technologies including SIEM, SOAR, Threat Hunting, EDR, Deception, NTA, NBAD, and UEBA. Hands-on experience (3+ years) with leading analytical platforms like Splunk, IBM QRadar, Hunters, Sumo Logic, and Sentinel. Familiarity with additional security tools such as Email Security Gateway, SOAR, IPS/IDS, Proxy, EDR, TI, DLP, CASB, and PAM is an advantage. Deep understanding of Detection Engineering and the MITRE ATT&CK Framework. Strong proficiency in OS (Linux, Windows) and Networking. Analytical and problem-solving skills with an ability to assess security challenges effectively. Up-to-date knowledge of IT/OT industry trends and Security Best Practices. Expertise in Digital Forensics, Malware Assessment, Incident Response, and Threat Hunting. Strong interpersonal and communication skills, both verbal and written. Ability to collaborate with organizational and client stakeholders to identify and implement security solutions. Job Responsibilities : Define, plan, and implement cybersecurity solutions tailored to organizational needs. Conduct gap analysis to assess and improve an organization's security posture. Develop detailed security requirements and design cybersecurity solutions. Perform technical proof-of-concept (POC) demonstrations to validate security solutions. Translate technical security solutions into business values aligned with organizational objectives. Respond to complex RFPs, delivering customized security solutions that meet client needs. Execute thorough design and implementation of security solutions across various industries. Conduct competitive analysis, security workshops, and executive presentations. Design and present customized cybersecurity solutions based on client requirements. Collaborate with cross-functional teams to ensure seamless service delivery of cybersecurity solutions. Develop threat scenarios and use cases based on industry-specific attack patterns. Nice to Have : Ethical hacking certifications such as CISSP, GCIH, or equivalent training are highly preferred. (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Responsibilities As a Vulnerability Management and Threat Intel Specialist, you will be a key member of our cybersecurity team responsible for managing and enhancing our vulnerability management program. Leveraging your extensive experience with Qualys and other vulnerability assessment tools you will play a critical role in identifying, prioritizing, and mitigating security vulnerabilities across our environments. Lead the development and implementation of the vulnerability management strategy, policies, and procedures. Conduct regular vulnerability assessments and penetration tests using Qualys and other industry-standard tools to identify security weaknesses in networks, systems, and applications. Analyze scan results and prioritize vulnerabilities based on severity, exploitability, and potential impact. Collaborate with cross-functional teams to develop and implement remediation plans to address identified vulnerabilities in a timely manner. Stay abreast of emerging cyber threats, vulnerabilities, and industry best practices to continually improve the effectiveness of the vulnerability management program. Prepare and present reports on vulnerability assessment findings, remediation progress, and overall program effectiveness to senior management and clients. Monitor, analyze, and investigate emerging cyber threats, vulnerabilities, and attack trends using CloudSEK and Mandiant. Conduct dark web monitoring to identify potential threats, data leaks, or malicious activities targeting the organization. Correlate threat intelligence findings with security incidents using SIEM and collaborate with the SOC team for proactive threat detection. Contribute to threat-hunting activities by leveraging TTPs from frameworks like MITRE ATT&CK. Analyze indicators of compromise and develop actionable intelligence to strengthen security defenses. Assist in automating threat intelligence workflows using SOAR platforms. Prepare intelligence reports and brief senior management on emerging threats and their potential Skills : Hands-on experience with Qualys (or other VA tools like Tenable, Rapid7) for vulnerability assessment and scanning. Strong analytical skills to interpret scan results, false positives, and emerging threats. Strong understanding of CVSS scoring, risk-based vulnerability prioritization, and exploitability analysis. Experience in conducting penetration tests and security assessments. Familiarity with compliance frameworks (NIST, CIS, ISO 27001, PCI-DSS) related to vulnerability management. Scripting skills for automating scanning and reporting workflows are a plus. Experience with threat intelligence tools (CloudSEK, Mandiant, Recorded Future, ThreatConnect, etc.). Understanding of dark web monitoring, malware analysis, and cyber threat landscapes. Hands-on knowledge of SIEM and SOAR. Familiarity with MITRE ATT&CK framework, cyber kill chain, and intelligence-sharing platforms Strong analytical skills for correlating threat intelligence with security incidents. (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

8.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

Techvantage.ai is a next-generation technology and product engineering company at the forefront of innovation in Generative AI, Agentic AI, and autonomous intelligent systems. We build intelligent, secure, and scalable digital platforms that power the future of AI across industries. Role Overview We are looking for a Senior Security Specialist with 8+ years of experience in cybersecurity, cloud security, and application security. You will be responsible for identifying, mitigating, and preventing threats across our technology landscape - particularly in AI-powered, data-driven environments. This role involves leading penetration testing efforts, managing vulnerability assessments, and implementing best-in-class security tools and practices to protect our platforms and clients. Key Responsibilities Design and implement robust security architectures for cloud-native and on-prem environments. Conduct penetration testing (internal/external, network, application, API) and deliver clear remediation strategies. Perform regular vulnerability assessments using industry-standard tools and frameworks. Lead threat modeling and risk assessments across systems, services, and data pipelines. Collaborate with development and DevOps teams to integrate security in SDLC and CI/CD pipelines (DevSecOps). Define and enforce security policies, incident response procedures, and access controls. Monitor for security breaches and investigate security events using SIEM and forensic tools. Ensure compliance with global standards such as ISO 27001, SOC 2, GDPR, and HIPAA. Provide guidance on secure implementation of AI/ML components and data protection strategies. Requirements 8+ years of experience in information security, application security, or cybersecurity engineering. Proficient in penetration testing methodologies and use of tools such as Burp Suite, Metasploit, Nmap, Wireshark, Nessus, OWASP ZAP, Qualys, etc. Deep experience in vulnerability management, patching, and security hardening practices. Strong understanding of OWASP Top 10, CWE/SANS Top 25, API security, and secure coding principles. Hands-on experience with cloud security (AWS, Azure, or GCP), IAM, firewalls, WAFs, encryption, and endpoint security. Familiarity with SIEM, EDR, IDS/IPS, and DLP solutions. Knowledge of DevSecOps and tools like Terraform, Kubernetes, Docker, etc. Excellent problem-solving, analytical, and incident-handling capabilities. Preferred Qualifications Certifications such as CISSP, CISM, CEH, OSCP, or AWS Security Specialty. Experience working on security aspects of AI/ML platforms, data pipelines, or model inferencing. Familiarity with governance and compliance frameworks (e.g, PCI-DSS, HIPAA). Experience in secure agile product environments and threat modeling techniques. What We Offer A mission-critical role securing next-gen AI systems. Opportunity to work with an innovative and fast-paced tech company. High visibility and leadership opportunities in a growing security function. Compensation is not a constraint for the right candidate. (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

5.0 years

0 Lacs

Gurugram, Haryana, India

Remote

Linkedin logo

Job Summary We are looking for a dedicated and knowledgeable IT Support Administrator to manage and support our internal technology infrastructure, ensuring seamless operations across networks, devices, applications, and user environments. The ideal candidate will serve as the first point of contact for technical support, manage IT systems, and contribute to the maintenance, monitoring, and improvement of IT operations. Key Responsibilities End-User Support: Provide Tier 1 & Tier 2 technical support to users for hardware, software, networking, and systems issues. Respond to service requests and incidents through a ticketing system (e.g., JIRA, ServiceNow, Zendesk). Troubleshoot issues related to Windows/Mac OS, printers, mobile devices, and office equipment. Set up and configure laptops, desktops, VoIP phones, and other peripherals. Assist in onboarding/offboarding users including account setup, hardware provisioning, and access permissions. System & Network Administration Monitor and maintain local area networks (LAN), wide area networks (WAN), Wi-Fi, and VPN connectivity. Administer Active Directory, Group Policies, DNS, DHCP, and other Windows Server services. Manage Office 365 / Microsoft 365, Google Workspace, or other productivity platforms. Perform regular patch management, software updates, and antivirus deployments. Asset And Inventory Management Maintain and update IT asset inventory for hardware and software licenses. Coordinate with vendors for equipment procurement, warranty claims, and service requests. Security & Compliance Ensure data security best practices, including user permission audits, endpoint protection, and secure backups. Enforce IT policies for passwords, access control, device usage, and acceptable use. Participate in audits and compliance checks (ISO, SOC, HIPAA, etc., if applicable). Documentation & Process Improvement Create and maintain user guides, knowledge base articles, and standard operating procedures (SOPs). Identify and propose improvements to support processes and IT infrastructure. Required Qualifications Bachelors degree in Information Technology, Computer Science, or related field (or equivalent work experience). 5+ years of experience in IT support or system administration. Proficiency with Windows and Mac operating systems, Microsoft 365, and standard desktop applications. Experience with Active Directory, DNS, DHCP, Group Policies, and remote support tools. Knowledge of networking fundamentals (TCP/IP, DHCP, VPN, firewalls). Strong troubleshooting skills and ability to diagnose both hardware and software issues. Preferred Qualifications Certifications such as CompTIA A+, Network+, Microsoft Certified (MCP, MCSA), ITIL, or Cisco CCNA. Experience with ticketing systems (JIRA, ServiceNow) and remote management tools (TeamViewer, AnyDesk). Exposure to cloud-based environments (Azure AD, AWS, Google Workspace). Familiarity with mobile device management (MDM) tools such as Intune or JAMF. Understanding of cybersecurity principles and endpoint protection solutions. Soft Skills Strong communication and interpersonal skills. Excellent time management and ability to handle multiple priorities. Customer-focused attitude with a sense of urgency. Team player with a proactive and analytical mindset. (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

4.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

Role Responsibilities Monitor and analyze security events and incidents using advanced security tools to identify potential threats, vulnerabilities, and suspicious activities. Recognize potential, successful, and unsuccessful intrusion attempts Conduct in-depth analysis of security incidents, leveraging various sources of threat intelligence, to determine the scope and impact of security threats and incidents. Stay up to date with the latest cybersecurity news and trends, and provide insights and recommendations to enhance our security posture. Engage with various teams to expand your knowledge of the environment Research new and evolving threats that have the potential to impact the environment Serve on the incident response team for major or high-profile security incidents in tandem with external providers. Propose procedural updates and process improvements Be an escalation point for the SOC of Experience : Minimum 4 years experience in Cybersecurity or related Requirements : Requirements Due to the nature of 24x7 SOC monitoring requirements, this position requires, subject to compliance with applicable laws, occasional weekend work and alternate shifts as needed to ensure adequate coverage and meet the demands of our Requirements : Certifications such as CISSP and CEH are desirable Knowledge of cybersecurity principles, concepts, and practices Knowledge of networks, firewalls, and operating systems Strong analytical and problem solving skills, with the ability to collate and interpret data from various sources, assess complex security issues, and propose effective solutions. Experience with security incident detection and response Familiarity with security technologies, such as SIEM, IDS/IPS, firewalls, endpoint protection, and vulnerability scanners. Familiarity with industry standards and frameworks, such as NIST Cybersecurity Framework and ISO Values : Strong interpersonal, oral, and written communication and collaboration skills Strong organizational skills including the ability to adapt to shifting priorities and meet frequent deadlines Proactive approach to problem-solving with strong judgment and decision-making capability. Highly resourceful and collaborative team-player, with the ability to also be independently effective and exude initiative and a sense of urgency. Exemplifies our customer-focused, action-oriented, results-driven culture. Forward looking thinker, who actively seeks opportunities, has a desire for continuous learning, and proposes solutions. Ability to act with discretion and maintain complete confidentiality. Dedicated to the firms values of non-negotiable integrity, valuing our people, exceeding client expectations, and embracing intellectual curiosity (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

Remote

Linkedin logo

Job Description The candidate has to manage Palo Alto Firewall and Panorama. Cybersecurity engineers should design, build, and manage the security infrastructure of information technology (IT) systems. This includes installing hardware, configuring firewalls, setting up virtual private networks (VPNs), and adding upgrades. Despite the strong technical focus of the job, Cyber Security engineers also engage with clients, relaying information about the project and troubleshooting all issues discovered. They are proficient in change management and disaster response, and they actively apply policies and standards to all projects. They may work in shifts 16x5 Responsibilities To provide support for on-call escalations and do root cause analyses. To independently resolve tickets within the agreed SLA of ticket volume and time. To adhere to quality standards, regulatory requirements, and company policies. Work on value-adding activities such as Knowledge base update and management. Configuration objects on Panorama and push to the Palo Alto Firewall. Configuration of GRE, IPsec Tunnel on Panorama and push to the Palo Alto Firewall. Configuration of Dynamic Updates on Panorama and push to the Palo Alto Firewall. Configuration of NAT policies on Panorama and push to the Palo Alto Firewall. Configuration of Security policies on Panorama and push to the Palo Alto Firewall. Prepare a plan for Firewall OS version degradation, which is recommended by the OEM. Prepare a plan for Panorama OS version degradation, which is recommended by the OEM. Configuration of High Availability on Panorama and Palo Alto Firewall. Configuration of Policies and troubleshooting in Radware Server Load Balancer, link proof, and WAF. Configuration of SSL VPN policies and troubleshooting. Vulnerability assessment of the vulnerability, which is published by OEM. Requirements Good Understanding of Basic Routing and switching concepts. Must have expertise in Remote Infrastructure management for the network. Hands-on experience in the configuration and troubleshooting of Palo Alto, Fortinet, Checkpoint firewalls, or other network security technologies. Perform day-to-day firewall activities like Administration, Management, monitoring, and troubleshooting. Good knowledge of IOS Upgrades and software strategies. Hands-on experience in configuring URL filtering, file blocking, and security profiles in Palo Alto firewalls. Review network security threat logs for intrusions and compromises, and provide solutions Good knowledge of authentication methods like RADIUS and TACACS. Good knowledge of Migration of Firewall from different vendor (ASA, Check Point and etc. ) to Palo Alto Firewall. Must know Radware Server Load balancer, WAF, NAC, SSL VPN (Pulse Secure), and Cloud Security Products for CSPM and CASB. Device and Technology knowledge : Palo Alto, Panorama, L3 (Switch, Router), Radware Server Load balancer, WAF, NAC, SSL VPN (Pulse Secure), Network devices, IPS, Vulnerability tools. Personal Attributes Self-motivated with the ability to work independently and as part of a team. Strong attention to detail and a proactive approach to problem-solving. Willingness to learn and grow in the information security field. (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

3.0 years

0 Lacs

Gurugram, Haryana, India

Remote

Linkedin logo

About the Company : ACPL Systems Pvt. Ltd. We at ACPL are Cyber Security specialists and help corporates with their complete cycle of setting up the Cyber security platform. Right from selecting the adaptable security tools to the deployment of the same and then providing dedicated cybersecurity services. Established in 1990, ACPL is the developer of India's first antivirus software "SmartDog". We offer our services and solutions by integrating complex technologies offered by the leading IT companies through strategic partnerships. Our solutions and services are majorly focused on the most challenging industry verticals like BFSI, Manufacturing, Telecommunication, Retail, Healthcare, IT/ ITES, Power, Media Education, Distribution and more. We are $70 million company with PAN India presence with services across ASIA and a branch office in Singapore and Australia. We are a team of 300+ highly qualified professionals having certifications like CISSP , CISA , GICH etc. Apart from winning various Industry awards and recognitions ACPL is 100% RBA Compliant and a certified "Great place to work". Job Overview Candidate has to manage Palo Alto Firewall and Panorama. Cyber Security engineers should design, build, and manage the security infrastructure of information technology (IT) systems. This includes installing hardware, configuring firewalls, setting up virtual private networks (VPNs), and adding upgrades. Despite the strong technical focus of the job, Cyber Security engineers also engage with clients, relaying information about the project and troubleshooting all issues discovered. They are proficient in change management and disaster response, and they actively apply policies and standards to all projects. They may work in shifts 16x5. Candidate Must Have Knowledge Good Understanding in Basic Routing and switching concepts. Experience - 3 Years To 6 Years Must have expertise in Remote Infrastructure management for network. Mandatory to have hands-on experience in configuration and troubleshooting of Palo - Alto along with any other firewalls such as Fortinet, Checkpoint firewalls, or other network security technologies Perform day to day firewall activities like Administration, Management, monitoring and troubleshooting Good knowledge on IOS Upgrades and software strategies. Hands on experience in configuring URL filtering, file blocking and security profiles in Palo Alto firewalls. Review network security threat logs for intrusions and compromises and provide solutions Good knowledge on authentication methods like radius & tacacs. Good knowledge of Migration of Firewall from different vendor (ASA, Check Point and etc.) to Palo Alto Firewall. Must have knowledge of Radware Server Load balancer, WAF, NAC, SSL VPN (Pulse Secure) & Cloud Security Products for CSPM and CASB. Responsibilities Task To provide support for on call escalations and doing root cause analyses To independently resolve tickets within agreed SLA of ticket volume and time To adhere to quality standards, regulatory requirements and company policies Work on value adding activities such Knowledge base update & management. Configuration objects on Panorama and push to the Palo Alto Firewall. Configuration of GRE, IPsec Tunnel on Panorama and push to the Palo Alto Firewall. Configuration of Dynamic Updates on Panorama and push to the Palo Alto Firewall. Configuration of NAT policies on Panorama and push to the Palo Alto Firewall. Configuration of Security policies on Panorama and push to the Palo Alto Firewall. Prepare plan for Firewall OS version upgradation which is recommended by OEM. Prepare plan for Panorama OS version upgradation which is recommended by OEM. Configuration of High Availability on Panorama and Palo Alto Firewall. Configuration of Policies and troubleshooting in Radware Server Load balancer, link proof and WAF. Configuration of SSL VPN policies and troubleshooting. Vulnerability assessment of the vulnerability, which is published by OEM. Device & Technology Knowledge Palo Alto, Panorama, L3 (Switch, Router), Radware Server Load balancer, WAF, NAC, SSL VPN (Pulse Secure), Network devices, IPS, Vulnerability tools. Personal Attributes Self-motivated with the ability to work independently and as part of a team. Strong attention to detail and a proactive approach to problem-solving. Willingness to learn and grow in the information security field. (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

3.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Join a Leading Cybersecurity Innovator for a Strong Future. Job Overview Deploy, configure, and manage the CyberArk Privileged Access Management (PAM) solution, including the CyberArk Vault, CPM, PSM, and PTA. Design and implement secure access policies, password vaulting, session monitoring, and privileged access controls across various systems and platforms. Install, configure, and maintain CyberArk components, ensuring the highest levels of security and efficiency. Monitor the performance of the CyberArk infrastructure and troubleshoot issues as they arise. Implement proactive monitoring of the CyberArk systems to ensure availability, reliability, and security of the privileged access management solutions. Integrate CyberArk with other enterprise security tools and systems, such as SIEM, MFA, Active Directory, and other identity management solutions. Collaborate with other teams (e.g, network security, application security) to improve security posture and manage privileged access across the organization. Provide expert-level support for incidents related to CyberArk, including troubleshooting and providing resolutions to security issues. Respond to security incidents and work to mitigate any risks involving privileged access or compromised credentials. Requirements 3-5 years of hands-on experience with CyberArk Privileged Access Management solutions. Experience with CyberArk Vault, CPM, PSM, PTA, and related components. Strong knowledge of network and system security principles. Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field (preferred). Personal Attributes Self-motivated with the ability to work independently and as part of a team. Strong attention to detail and a proactive approach to problem-solving. Willingness to learn and grow in the information security field. About the Company : (www.acpl.com) : We at ACPL are Cyber Security specialists and help corporates with their complete cycle of setting up the Cyber security platform. Right from selecting the adaptable security tools to the deployment of the same and then providing dedicated cybersecurity services. Established in 1990, ACPL is the developer of India's first antivirus software "SmartDog". We offer our services and solutions by integrating complex technologies offered by the leading IT companies through strategic partnerships. Our solutions and services are majorly focused on the most challenging industry verticals like BFSI, Manufacturing, Telecommunication, Retail, Healthcare, IT/ ITES, Power, Media Education, Distribution and more. We are $70 million company with PAN India presence with services across ASIA and a branch office in Singapore and Australia. We are a team of 300+ highly qualified professionals having certifications like CISSP , CISA , GICH etc. Apart from winning various Industry awards and recognitions ACPL is 100% RBA Compliant and a certified "Great place to work". (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Role Description This is a full-time, on-site role for a Technical Product Marketer located in Chennai. The Technical Product Marketer will develop and execute go-to-market strategies, manage product marketing activities, and collaborate with cross-functional teams. Key responsibilities include marketing analytics, communication with stakeholders, and supporting sales initiatives. The Technical Product Marketer will create detailed technical documents which includes but not limited to blogs, release notes, ebooks, whitepapers, case studies and much more. Qualifications Experience in Marketing Analytics and Communication skills Proficiency in Product Management and developing Go-to-Market Strategies Strong Sales support skills and the ability to collaborate with sales teams Excellent written and verbal communication skills Ability to work on-site in Chennai Bachelor's degree in Marketing, Business, or a related field Experience in the cybersecurity industry will be a strong qualifying criteria. Show more Show less

Posted 1 day ago

Apply

5.0 years

0 Lacs

Thane, Maharashtra, India

On-site

Linkedin logo

About Quantanite Quantanite is a customer experience (CX) solutions company that helps fast-growing companies and leading global brands to transform and grow. We do this through a collaborative and consultative approach, rethinking business processes and ensuring our clients employ the optimal mix of automation and human intelligence. We are an ambitious team of professionals spread across four continents and looking to disrupt our industry by delivering seamless customer experiences for our clients, backed-up with exceptional results. We have big dreams, and are constantly looking for new colleagues to join us who share our values, passion and appreciation for diversity. About The Role As a DevOps Engineer you will work closely with our global teams to learn about the business and technical requirements and formulate the necessary infrastructure and resource plans to properly support the growth and maintainability of various systems. Key Responsibilities Implement a diverse set of development, testing, and automation tools, as well as manage IT infrastructure. Plan the team structure and activities, and actively participate in project management. Comprehend customer requirements and project Key Performance Indicators (KPIs). Manage stakeholders and handle external interfaces effectively. Set up essential tools and infrastructure to support project development. Define and establish DevOps processes for development, testing, release, updates, and support. Possess the technical expertise to review, verify, and validate software code developed in the project. Engage in software engineering tasks, including designing and developing systems to enhance reliability, scalability, and operational efficiency through automation. Collaborate closely with agile teams to ensure they have the necessary tools for seamless code writing, testing, and deployment, promoting satisfaction among development and QA teams. Monitor processes throughout their lifecycle, ensuring adherence, identifying areas for improvement, and minimizing wastage. Advocate and implement automated processes whenever feasible. Identify and deploy cybersecurity measures by continuously performing vulnerability assessments and managing risk. Handle incident management and conduct root cause analysis for continuous improvement. Coordinate and communicate effectively within the team and with customers. Build and maintain continuous integration (CI) and continuous deployment (CD) environments, along with associated processes and tools. About The Candidate Qualifications and Skills : Proven 5 years of experience with Linux based infrastructure and proficient in scripting language. Must have solid cloud computing skills such as network management, cloud computing and cloud databases in any one of the public clouds (AWS, Azure or GCP) Must have hands-on experience in setting up and managing cloud infrastructure like Kubernetes, VPC, VPN, Virtual Machines, Cloud Databases etc. Experience in IAC (Infrastructure as Code) tools like Ansible, Terraform. Must have hands-on experience in coding and scripting in at least one of the following : Shell, Python, Groovy Experience as a DevOps Engineer or similar software engineering role. Experienced in establishing an optimized CI / CD environment relevant to the project. Automation using scripting language like Perl/python and shell scripts like BASH and CSH. Good knowledge of configuration and building tools like Bazel, Jenkins etc. Good knowledge of repository management tools like Git, Bit Bucket etc. Good knowledge of monitoring solutions and generating insights for reporting Excellent debugging skills/strategies. Excellent communication skills. Experienced in working in an Agile environment. Benefits At Quantanite, we ask a lot of our associates, which is why we give so much in return. In addition to your compensation, our perks include: Dress : Wear anything you like to the office. We want you to feel as comfortable as when working from home. Employee Engagement : Experience our family community and embrace our culture where we bring people together to laugh and celebrate our achievements. Professional development : We love giving back and ensure you have opportunities to grow with us and even travel on occasion. Events : Regular team and organisation-wide get-togethers and events. Value orientation : Everything we do at Quantanite is informed by our Purpose and Values. We Build Better. Together. (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

8.0 - 13.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Company Description Incorporated in 1966, Thermax Group is a leading conglomerate in the energy and environment space with a focus on clean energy, clean air, and clean water. Headquartered in Pune, India, the company operates globally with a presence in over 90 countries. Thermax offers integrated solutions in heating, cooling, power generation, water treatment and recycling, air pollution control, and chemicals. With operations including 34 international and 22 domestic offices, and 14 manufacturing facilities, Thermax helps industries achieve better resource productivity while maintaining a cleaner environment. Role Description This is an on-site, full-time role for a Cybersecurity Architect, located in Pune. The Cybersecurity Architect will design, implement, and manage security solutions to protect the company's IT infrastructure and data. Daily tasks will include evaluating and mitigating security risks, developing security policies and procedures, conducting security audits, and collaborating with IT teams to ensure compliance with security standards and best practices. The role requires staying updated on emerging security threats and technologies to safeguard the organization's assets : Experience in designing and implementing security solutions. Knowledge of risk assessment and mitigation strategies. Proficiency in developing security policies and procedures. Skills in conducting security audits and compliance checks. Familiarity with emerging security threats and technologies. Excellent problem-solving and analytical skills. Strong communication and teamwork abilities. Bachelor's degree in Cybersecurity, Information Technology, or related field with 8 to 13 years of experience. Relevant certifications such as CISSP, CISM, or CEH are a plus. Experience in the energy and environmental industry is beneficial. (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

35.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Roles & Responsibilities Design, develop, and maintain scalable and robust back-end applications. Write clean, reusable, and well-documented code following best practices. Collaborate with front-end developers, product managers, and QA teams to deliver high-quality software solutions. Participate in the full software development lifecycle from planning and design to deployment and maintenance. Debug and resolve technical issues reported in the production environment. Perform code reviews and provide constructive feedback to peers. Optimize applications for performance, security, and scalability. Stay updated with the latest industry trends, technologies, and best practices. Skills & Qualifications 35 years of proven experience in back-end software development. Strong understanding of Object-Oriented Programming (OOP) principles. Proficiency in one or more back-end programming languages such as Java, Python, Node.js, Ruby, or C#. Hands-on experience with databases (SQL/NoSQL) and writing efficient queries. Experience with version control systems like Git. Familiarity with API development (RESTful services). Strong debugging and analytical skills. Excellent teamwork and communication abilities. Bachelor's degree in Computer Science, Engineering, or a related field. Experience in the cybersecurity or security product domain is a plus. Knowledge of CI/CD tools, containerization (Docker, Kubernetes), and cloud platforms (AWS, Azure, GCP) is an added advantage. (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

3.0 - 6.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Designation : Cybersecurity Engineer Experience : 3- 6 Years Location : Chennai Job Description We are seeking a skilled Cybersecurity Engineer to develop and implement security protocols that protect our systems, networks, and applications from security threats. The ideal candidate will have a strong understanding of cybersecurity principles and practices, and will be responsible for monitoring systems for vulnerabilities, performing risk assessments, and responding promptly to security incidents. Key Responsibilities Develop and implement security protocols to safeguard systems, networks, and applications. Monitor systems for vulnerabilities and conduct regular risk assessments. Identify and mitigate potential security breaches; respond promptly to incidents. Ensure compliance with industry security standards and best practices. Perform regular security audits, penetration testing, and implement encryption solutions. Qualifications Bachelors degree in Computer Science, Information Technology, or a related field. 3- 6 years of experience in cybersecurity engineering or a related role. Proficiency in security protocols, risk assessment tools, and incident response. Strong knowledge of industry security standards and best practices. Excellent problem-solving skills and attention to detail. (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

2.0 years

0 Lacs

Surat, Gujarat, India

On-site

Linkedin logo

Salary : 8 to 10 LPA Job Description We are looking for a skilled and proactive IT Project Manager to lead and manage technology-driven projects across multiple domains. The ideal candidate will be responsible for end-to-end project delivery, ensuring timely completion within budget, scope, and quality standards. Key Responsibilities Plan, execute, and manage IT projects from initiation to closure. Collaborate with stakeholders to define project scope, objectives, and deliverables. Create detailed project plans, timelines, and resource allocation. Manage project risks, issues, and dependencies. Coordinate between internal teams, vendors, and clients for seamless execution. Ensure adherence to project management methodologies, standards, and best practices. Regularly communicate project status, updates, and risks to stakeholders. Manage project budgets and track project performance. Drive continuous improvement in project delivery processes. Ensure effective documentation and compliance throughout the project lifecycle. Required Skills & Qualifications Bachelor's degree in Computer Science, Information Technology, Engineering, or related field. 2+ years of proven experience in IT Project Management. Strong understanding of project management methodologies (Agile, Scrum, Waterfall). Excellent leadership, communication, and stakeholder management skills. Proficiency in project management tools (JIRA, Trello, MS Project, Asana, etc.). Strong problem-solving and analytical skills. Ability to manage multiple projects simultaneously. PMP / PRINCE2 / Agile Scrum certification (Preferred). Nice To Have Experience managing software development, infrastructure, or cloud projects. Exposure to IT governance, compliance, and cybersecurity practices. Understanding of SDLC and DevOps practices. (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

10.0 - 15.0 years

0 Lacs

Sahibzada Ajit Singh Nagar, Punjab, India

On-site

Linkedin logo

Job Title : Director AI Automation & Data Sciences Experience Required : 10- 15 Years Industry : Legal Technology / Cybersecurity / Data Science Department : Technology & Innovation About The Role We are seeking an exceptional Director AI Automation & Data Sciences to lead the innovation engine behind our Managed Document Review and Cyber Incident Response services. This is a senior leadership role where youll leverage advanced AI and data science to drive automation, scalability, and differentiation in service delivery. If you are a visionary leader who thrives at the intersection of technology and operations, this is your opportunity to make a global impact. Why Join Us Cutting-edge AI & Data Science technologies at your fingertips Globally recognized Cyber Incident Response Team Prestigious clientele of Fortune 500 companies and industry leaders Award-winning, inspirational workspaces Transparent, inclusive, and growth-driven culture Industry-best compensation that recognizes excellence Key Responsibilities (KRAs) Lead and scale AI & data science initiatives across Document Review and Incident Response programs Architect intelligent automation workflows to streamline legal review, anomaly detection, and threat analytics Drive end-to-end deployment of ML and NLP models into production environments Identify and implement AI use cases that deliver measurable business outcomes Collaborate with cross-functional teams including Legal Tech, Cybersecurity, Product, and Engineering Manage and mentor a high-performing team of data scientists, ML engineers, and automation specialists Evaluate and integrate third-party AI platforms and open-source tools for accelerated innovation Ensure AI models comply with privacy, compliance, and ethical AI principles Define and monitor key metrics to track model performance and automation ROI Stay abreast of emerging trends in generative AI, LLMs, and cybersecurity analytics Technical Skills & Tools Proficiency in Python, R, or Scala for data science and automation scripting Expertise in Machine Learning, Deep Learning, and NLP techniques Hands-on experience with LLMs, Transformer models, and Vector Databases Strong knowledge of Data Engineering pipelines ETL, data lakes, and real-time analytics Familiarity with Cyber Threat Intelligence, anomaly detection, and event correlation Experience with platforms like AWS SageMaker, Azure ML, Databricks, HuggingFace Advanced use of TensorFlow, PyTorch, spaCy, Scikit-learn, or similar frameworks Knowledge of containerization (Docker, Kubernetes) and CI/CD pipelines for ML Ops Strong command of SQL, NoSQL, and big data tools (Spark, Kafka) Qualifications Bachelors or Masters in Computer Science, Data Science, AI, or a related field 10- 15 years of progressive experience in AI, Data Science, or Automation Proven leadership of cross-functional technology teams in high-growth environments Experience working in LegalTech, Cybersecurity, or related high-compliance industries preferred (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Job Description We're looking for a Software Engineer to join our team. In this role, you'll build integrations between different cybersecurity platforms and third-party systems. You'll use both specialized low-code/no-code tools for quick development and Python scripting for more complex needs. Your work will directly support our security analysts by ensuring they have the correct data and automation to detect and respond to threats : Research and Evaluate APIs : Research and evaluate APIs from third-party platforms (e. g., SIEMs, threat intelligence providers, logging tools, etc. ) to identify the most relevant integrations for our Security Operations Center (SOC) Analysts. Design and Develop Integrations : Design, develop, and deploy secure and scalable API integrations that bring real-time data and insights into the Metron Security ecosystem. API Interaction and Data Management : Make robust API calls to third-party platforms to extract existing data and generate new data or actions on those platforms. API Protocol Expertise : Work with RESTful APIs and OpenAPI/Swagger specification to define and integrate APIs efficiently. Custom Scripting : Utilize Python scripting for complex data transformations, custom business logic, and advanced automation. Collaboration : Collaborate closely with Security Analysts and Backend Engineers to thoroughly understand SOC workflows and deliver features that directly enhance threat visibility and response capabilities. Command-Line Proficiency : Leverage the command-line interface (CLI) for API testing, automation, deployment, and debugging tasks (e. g., using curl, httpie, jq, and Bash scripting). Code Quality : Write clean, maintainable, and well-documented code, adhering to best security and software development practices. Requirements API Expertise : Strong analytical and problem-solving skills with a proven ability to evaluate third-party APIs, understand their utility, and map them to security operations needs. API Protocols : Hands-on experience with API protocols and specifications, including REST and OpenAPI/Swagger. Programming Proficiency : Proficiency in Python for scripting, custom logic, and advanced automation, with comfort in other languages like Go, Java, or Node.js a plus. Authentication and Authorization : Practical experience with various authentication and authorization mechanisms : Basic Auth, OAuth 2.0 (including different flows), JWT, and API Keys. Command-Line Tools : Comfortable and experienced working with CLI tools such as curl, httpie, jq, and scripting environments like Bash for API interaction and debugging. Version Control : Familiarity with version control systems (e. g., Git) and collaborative development workflows. Problem-Solving : Excellent analytical and problem-solving skills with a logical approach to integration challenges. Communication : Strong verbal and written communication skills to articulate technical concepts to both technical and non-technical audiences. Nice-to-Have Skills Experience in building integrations with specific cybersecurity platforms, such as EDRs, SIEMs, SOARs, and Vulnerability Management tools. Knowledge of data modeling and data transformation, along with their best practices. Understanding of cloud platforms (AWS, Azure, GCP) and their API ecosystems. Experience with continuous integration/continuous deployment (CI/CD) pipelines. (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

Remote

Linkedin logo

About KnowBe4 KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, is used by tens of thousands of organizations around the globe. KnowBe4 enables organizations to manage the ongoing problem of social engineering by helping them train employees to make smarter security decisions, every day. Fortune has ranked us as a best place to work for women, for millennials, and in technology for four years in a row! We have been certified as a "Great Place To Work" in 8 countries, plus we've earned numerous other prestigious awards, including Glassdoor's Best Places To Work. Our team values radical transparency, extreme ownership, and continuous professional development in a welcoming workplace that encourages all employees to be themselves. Whether working remotely or in-person, we strive to make every day fun and engaging; from team lunches to trivia competitions to local outings, there is always something exciting happening at KnowBe4. Please submit your resume in English. The Cybersecurity Threat Researcher works in the KnowBe4 Threat Research Lab, and is responsible for deploying and configuring various security products and solutions such as endpoint, email, web and network protection. Responsibilities Deploy, configure, maintain various cybersecurity products in a lab environment. This includes endpoint, web, email and network protection products Maintains product inventory such as licenses, updates and multiple versions of the same Recommend solutions for security product deployment and configurations Analysis of PHISHING emails. Analysis of malicious URLs and PHISHING URLs Tracking and identifying new and existing PHISHING campaigns Trend identification for latest phishing emails. Requirements BS or equivalent plus 3 years experience MS or equivalent plus 1 year experience Well versed with IOCs, reverse engineering and threat campaign tracking Experience in malicious URL and phishing Email analysis Script enabled for scripting automations for handling huge volumes of threat artifacts like files, emails, URLs etc Email analysis skills to determine PHISHING, Clean and Spam emails Ability to identify PHISHING email campaigns Ability to work with high volume of emails for accurate email classification Expertise in static and dynamic analysis of URLs and Files Expertise in URL analysis for identification of PHISHING and scam URLs Well versed with creating Yara rules for email grouping and clustering Ability to automate daily email classification through automation and scripting Keep up to date with emerging threats & security technologies Ability to think analytically & work collaboratively Our Fantastic Benefits We offer company-wide bonuses based on monthly sales targets, employee referral bonuses, adoption assistance, tuition reimbursement, certification reimbursement, certification completion bonuses, and a relaxed dress code - all in a modern, high-tech, and fun work environment. For more details about our benefits in each office location, please visit www.knowbe4.com/careers/benefits. Note: An applicant assessment and background check may be part of your hiring procedure. Individuals seeking employment at KnowBe4 are considered without prejudice to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, sexual orientation or any other characteristic protected under applicable federal, state, or local law. If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please visit www.knowbe4.com/careers/request-accommodation. No recruitment agencies, please. Show more Show less

Posted 1 day ago

Apply

25.0 years

0 Lacs

Ahmedabad, Gujarat, India

Remote

Linkedin logo

Job Summary We are seeking a highly skilled and proactive IT Support Manager / Senior IT Support Engineer to oversee and manage our IT support operations. The ideal candidate will be responsible for ensuring seamless IT service delivery, resolving technical issues promptly, and maintaining a secure and efficient IT infrastructure. Responsibilities This role demands strong leadership, technical expertise, and a customer-centric approach to support end-users and drive IT excellence across the Responsibilities Support & Troubleshooting : Provide technical support and assistance to users, resolving hardware, software, and network issues promptly and effectively. Act as the escalation point for complex technical problems and ensure timely & Network Administration : Install, configure, and maintain computer systems, networks, printers, and other IT peripherals. Manage and maintain servers, firewalls, switches, and wireless Monitoring & Cybersecurity : Monitor system performance, ensure uptime, and implement best practices for IT security. Proactively identify potential threats and implement solutions to safeguard data and Training & Support : Conduct training sessions for employees on IT tools, new software, and best practices. Enhance user proficiency and productivity through effective communication and & SOPs : Maintain accurate documentation of IT infrastructure, procedures, assets, and troubleshooting steps. Develop and update standard operating procedures (SOPs) and user : Bachelors degree in Computer Science, Information Technology, or a related field. 25 years of experience in IT support or infrastructure management. Strong knowledge of Windows/Linux systems, networking, and IT security. Experience with hardware maintenance, network troubleshooting, and software deployment. Excellent problem-solving, interpersonal, and communication skills. Ability to manage multiple tasks and work effectively under Skills : Leadership experience in managing IT support teams or helpdesk operations. Familiarity with ticketing systems, remote support tools, and asset management solutions. Exposure to cloud platforms (e.g., Microsoft 365, Google Workspace, AWS, or Azure). (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

810.0 years

0 Lacs

Jaipur, Rajasthan, India

On-site

Linkedin logo

Job Title : Senior Manager / AGM IT Experience Required : 810 Years (with 35 years in a leadership role) Company : Shubhashish Homes (A part of JK Jajoo Ventures) Key Responsibilities (KRA) Lead and manage the IT infrastructure and cloud ecosystem (AWS/Azure) of the organization. Oversee cybersecurity initiatives and ensure compliance with security standards. Drive implementation and automation of Zoho applications across departments. Provide strategic direction on IT initiatives aligned with business goals. Lead project management for IT development, upgrades, and integration. Mentor and manage cross-functional technical teams for performance and efficiency. Evaluate and implement emerging technologies to improve business operations. Monitor IT budgets, cost-effectiveness, and procurement planning. Ensure minimal downtime and high availability of IT services across the company. Collaborate with stakeholders to identify technology-driven growth opportunities. Required Skillsets Proven experience in IT infrastructure management and cloud technologies (AWS/Azure). Strong knowledge of cybersecurity frameworks and threat mitigation techniques. Hands-on experience with Zoho applications, workflows, and process automation. Expertise in IT project management, strategic planning, and execution. Leadership and team management capabilities with a focus on delivery. Strong analytical, troubleshooting, and problem-solving skills. Excellent communication and stakeholder management. Familiarity with DevOps practices and modern enterprise IT tools (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

6.0 - 8.0 years

0 Lacs

Nagpur, Maharashtra, India

On-site

Linkedin logo

We are seeking a highly skilled Cyber Security Consultant with deep expertise in Identity and Access Management (IAM), especially with IBM Verify Access (ISAM) and IBM Verify Governance (ISIM). The ideal candidate will have hands-on experience designing, implementing, and maintaining IAM solutions across enterprise environments, with a strong focus on access governance, system integrations, workflow development, and security best practices. Key Responsibilities Design, implement, and support enterprise-wide IAM solutions using IBM ISAM and ISIM. Conduct current state assessments and develop IAM roadmaps and architecture strategies. Integrate IAM solutions with enterprise applications, directories, and cloud environments. Define and manage user access policies, entitlements, roles, and segregation of duties (SoD) frameworks. Implement and manage identity lifecycle workflows provisioning, de-provisioning, approvals, notifications, and certifications. Ensure compliance with internal policies and external regulatory standards (e.g., GDPR, SOX). Customize connectors, workflows, rules, and policies based on organizational requirements. Design and develop role-based access control (RBAC) and attribute-based access control (ABAC) models. Develop scripts and utilities to support automation and customization using Java, JavaScript, Shell, or other scripting languages. Integrate IAM solutions with web services, APIs, and SOA-based enterprise systems. Troubleshoot issues and optimize performance of IAM components. Provide security consulting to business and IT stakeholders for identity security-related initiatives. Assist in the development and enforcement of IAM governance and operational models. Stay current with emerging IAM trends, threats, and technologies. Required Skills & Qualifications Bachelor's degree in Computer Science, Information Security, or a related technical field. 6- 8 years of relevant experience in Cybersecurity with a focus on IAM. Hands-on experience with IBM Verify Access (ISAM) and IBM Verify Governance (ISIM). Solid understanding of identity lifecycle management, access governance, SSO, MFA, and RBAC/ABAC models. Proficiency in Java and scripting languages (Shell, Python, JavaScript). Experience working with REST/SOAP APIs, web services, and SOA workflows. Strong analytical, troubleshooting, and documentation skills. Excellent verbal and written communication, client-facing, and stakeholder management abilities. Exposure to Cloud IAM solutions (e.g., Azure AD, Okta, Ping Identity, AWS IAM). IBM Security certifications or equivalent IAM certifications. Experience with containerized deployments (Docker/Kubernetes) and DevSecOps practices. Understanding of Zero Trust Security and modern authentication protocols (OAuth2, SAML, OIDC). Technical Requirements Strong domain expertise in Identity and Access Governance. In-depth, hands-on experience with IBM Verify Access (ISAM) and IBM Verify Governance (ISIM). Proven background in IAM consulting and solution architecture. Experience in implementing, supporting, and maintaining IAM solutions. Proficiency in workflow design, rules, role definitions, notifications, certifications, connectors, policies, and entitlements. Good working knowledge of Java, scripting languages, web services, and SOA workflows. Experience with Cloud IAM solutions is a strong plus. (ref:hirist.tech) Show more Show less

Posted 1 day ago

Apply

12.0 years

0 Lacs

Sadar, Uttar Pradesh, India

On-site

Linkedin logo

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role In Systems Management at Kyndryl, you will be critical in ensuring the smooth operation of our customers’ IT infrastructure. You'll be the mastermind behind maintaining and optimizing their systems, ensuring they're always running at peak performance. Not only will you be responsible for managing and maintaining the IT infrastructure, but you'll also have the opportunity to work on cutting-edge technologies and innovative solutions that will shape the future of the industry. You'll be at the forefront of new service preparation and change management processes, constantly learning and growing your technical expertise to ensure the best outcomes for our customers. Your technical prowess will be put to the test as you troubleshoot critical customer situations and provide timely solutions to keep their systems secure, reliable, and efficient. You'll be the go-to expert for sizing and optimizing systems, ensuring our customers' business performance is always world-class. At Kyndryl, we're committed to providing the best possible service to our customers, and as a Systems Management Specialist, you'll be an integral part of that mission. So if you're passionate about technology and want to be part of a dynamic team that's shaping the future of IT infrastructure management – then this role is for you. Your Future at Kyndryl Kyndryl's focus on providing innovative IT solutions to its customers means that in Systems Management, you will be working with the latest technology and will have the opportunity to learn and grow your skills. You may also have the opportunity to work on large-scale projects and collaborate with other IT professionals from around the world. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Expertise: 7–12 years of experience in IT infrastructure, system administration, or DevOps roles. Strong hands-on experience with VCF on VxRail and VMware Aria Operations and Automation. Proficiency in infrastructure automation using Ansible and experience managing pipelines using Azure DevOps (CI/CD). Solid background in system management, network administration, and technical support. Expertise in operating systems like Linux, Windows, and Unix. Working knowledge of cybersecurity operations: incident response, vulnerability management, threat hunting, IT security architecture, and risk management. Strong understanding of data warehousing, data modeling, database administration, and data quality frameworks. Advanced networking knowledge including routing/switching, load balancing, VPNs, and infrastructure troubleshooting. Preferred Technical and Professional Experience: Strong analytical and troubleshooting mindset with a systematic approach to problem-solving. Familiarity with databases such as SQL, DB2, MySQL. Relevant certifications in areas such as Cybersecurity (e.g., CISSP, CEH), Cloud Computing (e.g., Azure/AWS), or Project Management (e.g., PMP, ITIL). Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address. Show more Show less

Posted 1 day ago

Apply

3.0 - 5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Skills: L1 IT & Network Engineer IT Support role, IT System Network Cybersecurity, troubleshooting technical support, basic configuration IT infrastructure, End User Support, onsite engineer L2/L3 support engineers, Network Monitoring, Network Troubleshooting, Greetings from Netsach - A Cyber Security Company. We looking for a Level 1 IT & Network Support Engineer with 3 - 5yrs of experience to join our client onsite in Manama. Job Title: L1 IT & Network Engineer Exp: 3 - 5yrs Job Location: Manama, Bahrain - Onsite Job Type: Fulltime Work Days: Sunday to Thursday Interested candidates please share your resume at emily@netsach.co.in and post in netsachglobal.com Role Overview The selected candidate will: onsite engineer Work alongside L2/L3 support engineers Provide L1-level support for IT systems, network, and cybersecurity Assist in troubleshooting, basic configuration, and end-user support Offer hands-on helpdesk and technical support in a professional business environment Support overall IT infrastructure and architecture under supervision Requirements Valid Work Visa in Bahrain Valid Bahrain Driving License Strong interpersonal and communication skills Proficient in spoken and written English Sound knowledge of the IT industry, cybersecurity, networking, and IT solutions 3-5 years of relevant experience in a similar IT support role Thank You Emily Jha emily@netsach.co.in Netsach - A Cyber Security Company www.netsachglobal.com Show more Show less

Posted 1 day ago

Apply

7.0 years

0 Lacs

Sadar, Uttar Pradesh, India

On-site

Linkedin logo

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role In Systems Management at Kyndryl, you will be critical in ensuring the smooth operation of our customers’ IT infrastructure. You'll be the mastermind behind maintaining and optimizing their systems, ensuring they're always running at peak performance. Not only will you be responsible for managing and maintaining the IT infrastructure, but you'll also have the opportunity to work on cutting-edge technologies and innovative solutions that will shape the future of the industry. You'll be at the forefront of new service preparation and change management processes, constantly learning and growing your technical expertise to ensure the best outcomes for our customers. Your technical prowess will be put to the test as you troubleshoot critical customer situations and provide timely solutions to keep their systems secure, reliable, and efficient. You'll be the go-to expert for sizing and optimizing systems, ensuring our customers' business performance is always world-class. At Kyndryl, we're committed to providing the best possible service to our customers, and as a Systems Management Specialist, you'll be an integral part of that mission. So if you're passionate about technology and want to be part of a dynamic team that's shaping the future of IT infrastructure management – then this role is for you. Your Future at Kyndryl Kyndryl's focus on providing innovative IT solutions to its customers means that in Systems Management, you will be working with the latest technology and will have the opportunity to learn and grow your skills. You may also have the opportunity to work on large-scale projects and collaborate with other IT professionals from around the world. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Expertise: 7+ years of experience in IT infrastructure or storage engineering roles. In-depth knowledge and hands-on experience with: NetApp NAS and StorageGRID ONTAP Administration & Management Ansible Automation and CI/CD Pipelines using Azure DevOps Strong background in system management, network administration, and technical support. Solid understanding of operating systems (Windows, Linux, Unix) and enterprise software systems. Familiarity with cybersecurity principles, including: Incident response Security operations Vulnerability management IT security architecture and cyber risk management Threat hunting and compliance with cybersecurity standards. Strong expertise in data warehousing, data modeling, data architecture, and database administration across platforms. Solid foundation in networking technologies including routing, switching, load balancing, VPNs, and performance troubleshooting. Preferred Technical and Professional Experience: Strong analytical and systematic troubleshooting skills. Working knowledge of relational databases like SQL, DB2, MySQL. Professional certifications in any of the following areas: Cybersecurity (e.g., CISSP, CEH) Cloud Computing (e.g., Azure, AWS) Project Management (e.g., PMP, ITIL) Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address. Show more Show less

Posted 1 day ago

Apply

5.0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

Working with Us Challenging. Meaningful. Life-changing. Those aren't words that are usually associated with a job. But working at Bristol Myers Squibb is anything but usual. Here, uniquely interesting work happens every day, in every department. From optimizing a production line to the latest breakthroughs in cell therapy, this is work that transforms the lives of patients, and the careers of those who do it. You'll get the chance to grow and thrive through opportunities uncommon in scale and scope, alongside high-achieving teams. Take your career farther than you thought possible. Bristol Myers Squibb recognizes the importance of balance and flexibility in our work environment. We offer a wide variety of competitive benefits, services and programs that provide our employees with the resources to pursue their goals, both at work and in their personal lives. Read more careers.bms.com/working-with-us . Description The Analyst III Manager, Agile Sourcing, Enabling Services - IT is part of a global team which collaborates with Enabling Services category leaders and business partners on procurement execution in support of category strategy development, contributing advanced strategic industry insight. The Analyst III Manager, Agile Sourcing Enabling Services - IT will build an understanding of BMS's global, end-to-end value chain as it relates to the categories in focus. Key responsibilities include owning and driving implementation of high value and highly complex sourcing projects and contracts; and identifying supply optimization opportunities for speed-to-market, innovation, revenue enhancement, mitigated risk/improved lifecycle management, overall competitive cost advantage, and other sources of value for Bristol-Myers Squibb. This position has a strong emphasis on contracting. Key Responsibilities Manage end-to-end development and implementation of Sourcing and Contracting Strategy Ability to manage a large book of work across multiple individuals, teams, geographies. Must be able to bring organization and transparency to a fast-paced environment. Lead short and long-term initiatives that deliver positive impacts on the organization. Oversee project management for complex projects -Source to Contract including sourcing events from end-to-end (RFI/RFP), FMV assessment and contract negotiations. Position has a heavy focus on contracting. This individual may also be involved in identification, screening and selection of potential sources and determination of appropriate methods of procurement, utilizing extensive and deep contracting or technical expertise across IT categories. Lead the preparation and solicitation of competitive bids, quotations and proposals; evaluate competitive offerings; assess supplier product and pricing information; conduct negotiations and communicate decisions externally. Prepare, issue and negotiate contracts for legal review and approval. Note, this specific role will require complex contracting globally in a highly regulated area, contracting will be a primary focus for the role. Partner closely with supporting functions (Cybersecurity / IT, Data Privacy, Quality, etc.) in addition to legal for contract negotiations Provide insights from internal and market analytics to influence the development of strategic category plans; partner with category leaders and business partners on plan development, including building plans for smaller categories. Builds understanding of BMS's global, end-to- end value chain as it relates to the categories in focus. Lead Book of Work review meetings with BP&S teams together potential projects, prioritize them and align on timelines, remove barriers to execution, escalations as needed. Conduct Supplier Performance and Relationship Management for select categories and suppliers. Participate in certain supplier management activities involving key preferred suppliers, using the Supplier Management methodology, developing metrics for supplier performance. Analyze contracts to generate insights for leadership, empowering Supplier Relationship management efforts with highly strategic suppliers. Support the review of supplier innovations and demonstrations in partnership with the Business Partnering & Strategy (BPS) group for prioritized highly strategic suppliers. For escalated issues with respect to quality, performance or supply, support BPS with the analytics required to solve root cause issues; collaborate with local procurement on solutions. Own and drive mitigation projects on a prioritized basis, as needed. As required for function and categories assigned, support the design and development of procurement compliance programs, including category-specific risk management efforts Support implementing and managing the small business and disadvantaged suppliers search and development programs. Drive/support both procurement-wide and category specific continuous improvement initiatives. Champion process improvements, recommending new ways of working to improve processes and embed new systems in the function and across Agile Sourcing. Lead or participate in organizational cross-functional development such as process improvement, capabilities development efforts, continuous innovation programs. Provide BMS support/oversight to suppliers of procurement and contracting-related services. Qualifications & Experience Minimum Requirements B.S./B.A. (Business, Science or Engineering is desirable) Minimum of 5 years' work experience with at least 3 years procurement or relevant experience in IT procurement. Strong contracting acumen with experience in negotiating complex contracts including but not limited to global Master Services Agreements, Software-as-a-Service Agreements, Software licensing Agreements and IT Services Agreements. Expertise in procurement processes, technology and systems (such as Ariba, Icertis), contract and supplier analysis and management, financial analysis, market analysis, supplier diversity, strategic planning and integrated supply chain. Demonstrated ability to partner with and manage internal stakeholders up to some senior leaders within a highly matrixed organization, working across cross-functional, cross-organizational teams. Strong understanding of data analytics, category management, project and performance management Proficiency in English If you come across a role that intrigues you but doesn't perfectly line up with your resume, we encourage you to apply anyway. You could be one step away from work that will transform your life and career. Uniquely Interesting Work, Life-changing Careers With a single vision as inspiring as Transforming patients' lives through science™ , every BMS employee plays an integral role in work that goes far beyond ordinary. Each of us is empowered to apply our individual talents and unique perspectives in a supportive culture, promoting global participation in clinical trials, while our shared values of passion, innovation, urgency, accountability, inclusion and integrity bring out the highest potential of each of our colleagues. On-site Protocol BMS has an occupancy structure that determines where an employee is required to conduct their work. This structure includes site-essential, site-by-design, field-based and remote-by-design jobs. The occupancy type that you are assigned is determined by the nature and responsibilities of your role Site-essential roles require 100% of shifts onsite at your assigned facility. Site-by-design roles may be eligible for a hybrid work model with at least 50% onsite at your assigned facility. For these roles, onsite presence is considered an essential job function and is critical to collaboration, innovation, productivity, and a positive Company culture. For field-based and remote-by-design roles the ability to physically travel to visit customers, patients or business partners and to attend meetings on behalf of BMS as directed is an essential job function. BMS is dedicated to ensuring that people with disabilities can excel through a transparent recruitment process, reasonable workplace accommodations/adjustments and ongoing support in their roles. Applicants can request a reasonable workplace accommodation/adjustment prior to accepting a job offer. If you require reasonable accommodations/adjustments in completing this application, or in any part of the recruitment process, direct your inquiries to adastaffingsupport@bms.com . Visit careers.bms.com/ eeo -accessibility to access our complete Equal Employment Opportunity statement. BMS cares about your well-being and the well-being of our staff, customers, patients, and communities. As a result, the Company strongly recommends that all employees be fully vaccinated for Covid-19 and keep up to date with Covid-19 boosters. BMS will consider for employment qualified applicants with arrest and conviction records, pursuant to applicable laws in your area. If you live in or expect to work from Los Angeles County if hired for this position, please visit this page for important additional information https //careers.bms.com/california-residents/ Any data processed in connection with role applications will be treated in accordance with applicable data privacy policies and regulations. Show more Show less

Posted 1 day ago

Apply

0.0 - 6.0 years

0 Lacs

Tiruchchirappalli, Tamil Nadu

On-site

Indeed logo

Area Sales Manager (ASM) Company : Quick Heal Technologies Ltd. Location : Assigned Regional Territory Industry : Cybersecurity / IT Security Role Summary: As an Area Sales Manager at Quick Heal, you will lead the channel sales strategy for your assigned area, ensuring market penetration, revenue growth, and brand visibility. This role combines relationship management, territory planning, and sales execution, with a focus on expanding Quick Heal’s market share through distribution partners and retail networks. Key Responsibilities: Develop and manage a robust network of distributors, resellers, and retailers. Drive primary and secondary sales across product lines like Quick Heal Total Security, Seqrite Endpoint Security, and mobile security solutions. Create and implement territory-wise sales plans and promotional activities. Track and achieve monthly/quarterly revenue and activation targets. Conduct partner training, product demos, and joint customer visits to ensure partner enablement. Ensure stock availability, pricing discipline, and healthy channel relationships. Monitor competitor activities, pricing trends, and provide market intelligence to the marketing and product teams. Collaborate with internal teams including logistics, support, and marketing for smoother operations. Drive billing, collections, and ensure timely reporting through CRM/tools. Qualifications & Skills: Bachelor's degree in Business, Marketing, or related field (MBA preferred). 3–6 years of experience in channel/retail sales, preferably in IT security, FMCG, or software. Strong knowledge of channel dynamics and regional market behavior. Excellent communication, negotiation, and interpersonal skills. Proficiency in Excel, CRM, reporting, and target tracking. Willingness to travel extensively within the assigned area. Job Type: Full-time Pay: Up to ₹600,000.00 per year Benefits: Health insurance Life insurance Provident Fund Language: Tamil (Preferred) Location: Trichy, Tamil Nadu (Preferred) Willingness to travel: 75% (Preferred) Work Location: In person Application Deadline: 30/06/2025

Posted 1 day ago

Apply

Exploring Cybersecurity Jobs in India

Cybersecurity is a rapidly growing field in India, with an increasing demand for skilled professionals to protect organizations from cyber threats. As the country continues to digitize various sectors, the need for cybersecurity experts has never been greater.

Top Hiring Locations in India

  1. Bangalore
  2. Mumbai
  3. Pune
  4. Hyderabad
  5. Delhi

These cities are known for their thriving IT industries and have a high demand for cybersecurity professionals.

Average Salary Range

The average salary range for cybersecurity professionals in India varies based on experience level. Entry-level positions can expect to earn between INR 4-6 lakhs per year, while experienced professionals can earn upwards of INR 15 lakhs per year.

Career Path

A typical career path in cybersecurity may include roles such as: - Junior Security Analyst - Security Engineer - Senior Security Consultant - Chief Information Security Officer

Related Skills

In addition to cybersecurity expertise, professionals in this field are often expected to have skills in: - Network Security - Penetration Testing - Incident Response - Cryptography - Risk Management

Interview Questions

  • What are the differences between symmetric and asymmetric encryption? (medium)
  • Explain the concept of a firewall and its importance in network security. (basic)
  • How do you stay updated with the latest cybersecurity threats and trends? (basic)
  • What is the difference between vulnerability assessment and penetration testing? (medium)
  • Can you explain the CIA triad in the context of cybersecurity? (medium)
  • Describe a recent cybersecurity incident you handled and how you resolved it. (advanced)
  • How would you secure a wireless network from potential threats? (medium)
  • What is a DDoS attack, and how would you mitigate it? (medium)
  • Explain the concept of zero-day vulnerability. (medium)
  • How do you approach conducting a security risk assessment for an organization? (advanced)
  • What is the role of encryption in cybersecurity, and how does it work? (basic)
  • Describe the differences between a virus, worm, and trojan horse. (basic)
  • How would you prioritize security vulnerabilities based on their severity? (medium)
  • Explain the concept of social engineering in the context of cybersecurity. (basic)
  • How do you ensure compliance with relevant cybersecurity regulations and standards? (medium)
  • What steps would you take to secure a web application from potential attacks? (medium)
  • Can you explain the process of digital forensics and its role in cybersecurity investigations? (advanced)
  • How do you approach incident response in the event of a security breach? (medium)
  • What is the importance of multi-factor authentication in enhancing security? (basic)
  • Describe the role of a Security Information and Event Management (SIEM) system in cybersecurity. (medium)
  • How would you assess the security posture of an organization's cloud infrastructure? (medium)
  • What is the difference between black-box and white-box testing in cybersecurity? (medium)
  • How do you ensure data privacy and protection in an organization? (basic)
  • Can you explain the concept of a security policy and its importance in an organization? (basic)
  • How would you handle a security incident involving a ransomware attack? (advanced)

Closing Remark

With the increasing importance of cybersecurity in today's digital landscape, there are ample opportunities for job seekers in this field in India. By honing your skills, staying updated with the latest trends, and preparing thoroughly for interviews, you can confidently pursue a rewarding career in cybersecurity. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies