Home
Jobs

6155 Cybersecurity Jobs - Page 42

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Join us a Release Train Engineerat Barclays where you will manage the efficient delivery of large-scale technical projects and capabilities across Markets Sales Tech. This role involves collaborating with internal and external stakeholders to understand their needs and expectations throughout the software product lifecycle, while adhering to agreed time, budget, security, and quality requirements. The role is a strategic enabler for embedding governance, ensuring transparency, and supporting execution of complex programmes and portfolios. Over time, it evolves from reporting and compliance into a trusted advisory and delivery partner to senior leadership. To be successful as Release Train Engineer, where you should have experience with: Establish and evolve Agile processes tailored to team and programme needs. Lead and manage 2 or more Scrum boards/teams across regions using frameworks like Scrum, Kanban, XP, or SAFe. Track project milestones, KPIs, and ensure timely reporting for senior stakeholders. Drive TDRF Compliance – ensure all applications pass through all three TDRF gates before production. Manage delivery, resource allocation, and improvement of complex project capabilities across the bank. Handle dependencies across multiple internal and external teams and ensure timely escalation of issues. Collaborate with delivery leads, business partners, and control functions to align priorities. Identify and raise risks or concerns early, and work proactively to mitigate issues and unblock teams. Champion platform ownership conversations and highlight the importance of non-functional aspects like performance, latency, stability, resilience, and cybersecurity. Drive initiatives around code quality by ensuring all applications meet the 90% code coverage benchmark on DS Insights. Lead time improvement initiatives using strategies like "release disabled functionality" for faster go-live enablement. Drive cybersecurity best practices by working with leads on CyberArk onboarding, password rotation, and Docker image security scanning. Coordinate with teams (e.g., Trade Store, EDW, Hermes Data) to reduce incidents and ensure high system resilience. Ensure weekly project reporting, non-compliance escalation, and budget/resource forecasting. Influence and coach teams with strong verbal and written communication across geographies. Ensure transparent governance and support adherence to compliance, regulatory, and risk standards. Some Other Highly Valued Skills May Include Project delivery experience with at least exposure as a senior or lead Scrum Master/RTE role. Bachelor’s or Master’s in Computer Science, Information Systems, Engineering, or Business. Preferred Agile certifications (CSM, PSM, CSP, SAFe RTE/Agilist, etc.). Strong experience with Agile methodologies and tools (JIRA, Rally, Azure DevOps). Hands-on experience in managing multiple priorities and teams across time zones. Proven ability to coach and influence stakeholders across business, tech, and control functions. Strong analytical mindset and problem-solving with a continuous improvement approach. You may be assessed on the key critical skills relevant for success in role, such as risk and controls, change and transformation, business acumen strategic thinking and digital and technology, as well as job-specific technical skills. This role is based in Pune. Purpose of the role To support the portfolio management team in the delivery of successful projects, while ensuring that portfolio management processes and practices are aligned with controls and governance standards and that projects are aligned with the organization's strategic objectives. Accountabilities Facilitate portfolio prioritisation, ensuring the portfolio is compliant with the established control framework, including oversight of controls and standards. Support the effective governance of the portfolio, helping establish and operate effective Portfolio Governance that enables quality, data driven decision making, ensuring executive reporting is fit for purpose and timely. Monitor portfolio performance, including tracking of programme and project progress, identification of thematic portfolio risks and issues, and reporting on portfolio status to senior management and key stakeholders. Facilitate the management of the portfolio Book of Work, prioritisation and dependencies of change initiatives, considering factors like resource availability, stakeholder buy-in, and potential risks. Oversight of change delivery to ensure alignment with relevant policies and standards, driving consistent, robust controls data; monitoring indicators of control adherence, acting to remediate any weaknesses in the controls; and identifying and implementing actions to drive greater maturity against key control indicators. Review, resolve, manage and escalate portfolio risks and issues, challenging where appropriate and actively supporting the resolution of variances as necessary. Engage and influence all stakeholders to help them to understand their responsibilities and fulfil them effectively through clear, timely communication and well facilitated portfolio management processes. Support an environment of effective delivery by empowering portfolio management resources, utilising data led thinking to inform decisions, leverage expertise, and drive accountability and transparency. Operate as a source of best practice guidance and expertise, to ensure consistent excellence around controls, and governance (including training) is embedded across the portfolio. Assistant Vice President Expectations To advise and influence decision making, contribute to policy development and take responsibility for operational effectiveness. Collaborate closely with other functions/ business divisions. Lead a team performing complex tasks, using well developed professional knowledge and skills to deliver on work that impacts the whole business function. Set objectives and coach employees in pursuit of those objectives, appraisal of performance relative to objectives and determination of reward outcomes If the position has leadership responsibilities, People Leaders are expected to demonstrate a clear set of leadership behaviours to create an environment for colleagues to thrive and deliver to a consistently excellent standard. The four LEAD behaviours are: L – Listen and be authentic, E – Energise and inspire, A – Align across the enterprise, D – Develop others. OR for an individual contributor, they will lead collaborative assignments and guide team members through structured assignments, identify the need for the inclusion of other areas of specialisation to complete assignments. They will identify new directions for assignments and/ or projects, identifying a combination of cross functional methodologies or practices to meet required outcomes. Consult on complex issues; providing advice to People Leaders to support the resolution of escalated issues. Identify ways to mitigate risk and developing new policies/procedures in support of the control and governance agenda. Take ownership for managing risk and strengthening controls in relation to the work done. Perform work that is closely related to that of other areas, which requires understanding of how areas coordinate and contribute to the achievement of the objectives of the organisation sub-function. Collaborate with other areas of work, for business aligned support areas to keep up to speed with business activity and the business strategy. Engage in complex analysis of data from multiple sources of information, internal and external sources such as procedures and practises (in other areas, teams, companies, etc).to solve problems creatively and effectively. Communicate complex information. 'Complex' information could include sensitive information or information that is difficult to communicate because of its content or its audience. Influence or convince stakeholders to achieve outcomes. All colleagues will be expected to demonstrate the Barclays Values of Respect, Integrity, Service, Excellence and Stewardship – our moral compass, helping us do what we believe is right. They will also be expected to demonstrate the Barclays Mindset – to Empower, Challenge and Drive – the operating manual for how we behave. Back to nav Share job X(Opens in new tab or window) Facebook(Opens in new tab or window) LinkedIn(Opens in new tab or window) Show more Show less

Posted 6 days ago

Apply

0 years

0 Lacs

Delhi, India

Remote

Linkedin logo

Trustoryx is a digital investigation and verification agency focused on fighting online fraud, verifying job offers, company legitimacy, employee backgrounds, and influencer deals using cybersecurity and OSINT tools. We're looking for a motivated, self-driven individual to join us as a Client Acquisition & Promotion Partner . In this role, you will be responsible for promoting our services, building awareness, and converting leads into paying clients. This role is ideal for candidates with strong communication skills, experience in community engagement, and an interest in cybersecurity, HR tech, or digital trust. Responsibilities Promote Trustoryx’s services through digital platforms (LinkedIn, WhatsApp, Telegram, Instagram, forums, job boards) Identify and engage with potential clients, including job seekers, HR professionals, startups, and influencer managers Explain services and forward interested leads to the internal team Maintain simple tracking of outreach and referral success Actively collaborate with the team on content ideas, outreach campaigns, and digital promotions Qualifications Strong communication and outreach skills (spoken + written) Active on social platforms and/or community groups Comfortable working independently and remotely Basic understanding of hiring, job fraud, or social media ecosystems No technical background required, but a plus if familiar with scams, job fraud trends, or digital tools Compensation Earn 30% commission on each paying client referred (Example: You refer a client who pays ₹1500 — you earn ₹450 directly) Performance-based bonuses Certificate of experience or letter of recommendation (upon request after 2 months) Show more Show less

Posted 6 days ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Management Level I About EQ Equiniti is a leading international provider of shareholder, pension, remediation, and credit technology. With over 6000 employees, it supports 37 million people in 120 countries. EQ India began its operations in 2014 as a Global India Captive Centre for Equiniti, a leading fintech company specialising in shareholder management. Within a decade, EQ India strengthened its operations and transformed from being a capability centre to a Global Competency Centre, to support EQ's growth story worldwide. Capitalising on India’s strong reputation as a global talent hub for IT / ITES, EQ India has structured the organisation to be a part of this growth story. Today, EQ India has evolved as an indispensable part of EQ Group providing critical fintech services to the US and UK. I nformation Security & Administrative Support Apprentice Responsibilities: Assist with cybersecurity monitoring, conducting RBAC and other security audits. Help in managing access control and maintaining information security compliance documentation. Maintain audit-ready records for both InfoSec and Risk Management. Learning Opportunities: Practical experience in information security practices and ISO Standard. Familiarity with GDPR, data privacy, and cybersecurity frameworks. Benefits: Being a permanent member of the team at EQ you will be rewarded by our company benefits, these are just a few of what is on offer: 31 days + 9 bank holidays (UK) Comprehensive Medical Assurance cover Two-way cab transport for staff working in UK & US shift Maternity leave of 6 months full pay, 10 days paid paternity leave Accidental & Life cover 3 times of concerned CTC We are committed to equality of opportunity for all staff and applications from individuals are encouraged regardless of age, disability, sex, gender reassignment, sexual orientation, pregnancy and maternity, race, religion or belief and marriage and civil partnerships. Please note any offer of employment is subject to satisfactory pre-employment screening checks. Show more Show less

Posted 6 days ago

Apply

10.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

We are recruiting for our client, who is US based F100 GCC. Job Title: Associate Director, Cyber Security Location: Hyderabad, India Job Summary: The Associate Director of Cyber Security will serve as a key member of the Cyber Security leadership team, responsible for developing and executing the enterprise-wide cyber security strategy. This role leads multiple functional areas across security operations, engineering, governance, risk management, and compliance. Reporting directly to the Head of I/O & Cyber Security, the Associate Director will provide strategic direction, operational oversight, and technical leadership to protect the organization’s information assets, systems, and infrastructure from internal and external threats . Key Responsibilities: Leadership and Management: Lead and manage a team of technical resources located offshore, ensuring high performance, motivation, and professional development. Oversee Security Operations Center (SOC), incident response, vulnerability management, threat intelligence, and endpoint protection. Direct the development and implementation of security architecture, tools, and frameworks across cloud, on-premises, and hybrid environments. Partner with IT, legal, compliance, risk, privacy, and business stakeholders to manage security risk and ensure adherence to industry frameworks (e.g., NIST CSF, ISO 27001, CIS). Drive the maturity of identity and access management (IAM), data loss prevention (DLP), zero trust architecture, and secure DevOps initiatives. Develop and maintain security policies, standards, metrics, and reporting to executive leadership and audit bodies. Build, lead, and mentor a high-performing, diverse cybersecurity team across technical and GRC domains. Manage relationships with external vendors, partners, auditors, and regulatory entities. Support cyber incident response planning, tabletop exercises, and executive-level simulations. Stay informed of emerging threats, trends, and technologies to proactively guide strategy and investments. Project Deliverables: Oversee the planning, execution, and delivery of technical projects, ensuring they are completed on time, within scope, and within budget. Collaboration: Work closely with onshore teams, to align offshore activities with overall business objectives and project goals. Resource Allocation: Efficiently allocate and manage technical resources to meet project / operation demands and optimize productivity. Quality Assurance: Implement and maintain quality assurance processes to ensure the highest standards of technical delivery. Communication: Facilitate effective communication between offshore and onshore teams, ensuring transparency and alignment on project status, risks, and issues. Problem Solving: Proactively identify and resolve technical and operational challenges to ensure smooth project execution. Stakeholder Management: Build and maintain strong relationships with key stakeholders, providing regular updates and addressing any concerns or requirements. Qualifications: Education: Bachelor’s degree in computer science, Information Technology, or a related field. A master’s degree is preferred. Experience: 5–10+ years of progressive experience in cyber security, including at least 5 years in senior leadership roles. Technical Skills: Deep understanding of cyber security frameworks (NIST CSF, NIST 800-53, MITRE ATT&CK) Leadership Skills: Demonstrated experience building and managing enterprise security programs in complex, regulated environments. Proven ability to influence at all levels, including executives and board members. Excellent leadership, communication, and stakeholder engagement skills. Problem-Solving: Strong technical foundation in network security, cloud security (GCP, AWS, Azure, OCI), security engineering, and incident response. Cultural Awareness: Ability to work effectively in a multicultural environment and manage teams across different time zones. Preferred Qualifications: Experience working in a global organization with distributed teams. Certification in (CISSP, CISM, CISA, CCSP, etc.) strongly preferred. Experience and Certifications in ITIL, Agile and DevOps practices. Experience working in Retail & Manufacturing. Knowledge of managing regulatory environments such as HIPAA, SOX, PCI-DSS, GDPR. Experience integrating security in agile, DevOps, and CI/CD pipelines Show more Show less

Posted 6 days ago

Apply

5.0 - 8.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Job description: Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ͏ Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ͏ Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ͏ ͏ Mandatory Skills: CA PAM . Experience: 5-8 Years . Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome. Show more Show less

Posted 6 days ago

Apply

0.0 - 3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

This is a junior/entry level position for graduates looking to start a career in third-party risk management We’re partnering with a prominent financial institution seeking to grow their Vendor Risk team with the addition of a Vendor Risk Analyst . This is a fantastic opportunity for an individual with 0-3 years of experience , with a passion for third-party risk management, operational controls, and vendor oversight to join a high-impact team. This role involves close collaboration with stakeholders across the business to ensure vendor relationships meet internal risk, compliance, and governance standards. Key Responsibilities: Manage third-party vendors across onboarding, oversight, incident handling, and offboarding. Conduct vendor risk assessments, control reviews, and post-incident analysis. Ensure compliance with internal Vendor Management policies and regulatory expectations. Support risk reporting and performance monitoring for divisional stakeholders. Collaborate with teams like compliance and technology on risk mitigation and control enhancement. Requirements: 0-3 years of experience in financial services, vendor risk, or operational risk. Proficient in Excel (e.g. PivotTables, VLOOKUP) Knowledge of third-party due diligence and risk domains (e.g. cybersecurity, operational). Strong communication, organisational, and analytical skills. Understanding of information security concepts such as IAM, encryption, and patching. If this sounds like a fit for you, we’d love to hear from you! Show more Show less

Posted 6 days ago

Apply

2.0 - 3.0 years

4 - 5 Lacs

Surat

Work from Office

Naukri logo

Act as a strategic advisor to the executive team on IT-related challenges and opportunities. Provide insights into emerging trends such as cloud computing, cybersecurity, and AI-driven solutions. Help shape the company’s long-term technology roadmap. Candidates should have experience in IT leadership roles within Fortune 500 companies or high-growth startups. Ability to mentor CTOs and tech teams is an added advantage.

Posted 6 days ago

Apply

2.0 - 3.0 years

4 - 5 Lacs

Patna

Work from Office

Naukri logo

Act as a strategic advisor to the executive team on IT-related challenges and opportunities. Provide insights into emerging trends such as cloud computing, cybersecurity, and AI-driven solutions. Help shape the companys long-term technology roadmap. Candidates should have experience in IT leadership roles within Fortune 500 companies or high-growth startups. Ability to mentor CTOs and tech teams is an added advantage.

Posted 6 days ago

Apply

2.0 - 3.0 years

4 - 5 Lacs

Mysuru

Work from Office

Naukri logo

Act as a strategic advisor to the executive team on IT-related challenges and opportunities. Provide insights into emerging trends such as cloud computing, cybersecurity, and AI-driven solutions. Help shape the companys long-term technology roadmap. Candidates should have experience in IT leadership roles within Fortune 500 companies or high-growth startups. Ability to mentor CTOs and tech teams is an added advantage.

Posted 6 days ago

Apply

3.0 - 5.0 years

5 - 8 Lacs

Chandigarh

Work from Office

Naukri logo

Provide strategic direction and technical expertise to help shape the companys IT initiatives. Guide the adoption of emerging technologies like AI, cloud computing, and blockchain. Offer insights into IT infrastructure, software development trends, and cybersecurity risks. Collaborate with executive leadership to ensure tech-driven business scalability. Candidates should have significant experience in leading digital transformation projects at a senior level.

Posted 6 days ago

Apply

2.0 - 3.0 years

4 - 5 Lacs

Chandigarh

Work from Office

Naukri logo

Act as a strategic advisor to the executive team on IT-related challenges and opportunities. Provide insights into emerging trends such as cloud computing, cybersecurity, and AI-driven solutions. Help shape the companys long-term technology roadmap. Candidates should have experience in IT leadership roles within Fortune 500 companies or high-growth startups. Ability to mentor CTOs and tech teams is an added advantage.

Posted 6 days ago

Apply

3.0 years

0 Lacs

Mohali district, India

On-site

Linkedin logo

Job Title: GRC Professional Location: Mohali Experience: 3+ Years Employment Type: Full-Time Job Summary: We are seeking a skilled and proactive GRC Professional to join our team in Mohali. The ideal candidate will play a pivotal role in developing and maintaining the organization’s Governance, Risk, and Compliance (GRC) framework, with a strong emphasis on Business Continuity Management (BCM) and the governance of security tools . This role serves as a bridge between security operations and compliance requirements, ensuring a resilient and well-governed IT environment. Key Responsibilities: GRC & Compliance Governance: Develop, implement, and maintain GRC policies, procedures, and standards aligned with industry best practices (e.g., ISO 27001, NIST) and applicable regulatory frameworks. Conduct regular assessments of internal controls, identify gaps, and recommend improvements. Support internal and external audit processes by preparing documentation and evidence of compliance. Business Continuity Management (BCM): Govern and continuously improve the organization's Business Continuity Management System (BCMS) . Lead efforts in Business Impact Analysis (BIA) , Business Continuity Planning (BCP) , and Disaster Recovery Planning (DRP) . Coordinate testing and review of continuity plans to ensure organizational resilience. Security Tool Governance: Oversee the governance of critical security tools including SIEM, DLP, EDR, IAM, and Firewalls . Define and enforce policies for the effective configuration, deployment, and monitoring of these tools. Establish accountability frameworks for tool ownership, usage, and compliance. Performance Metrics & Reporting: Develop and maintain dashboards and reports to track GRC, BCM, and security tool effectiveness. Present insights and recommendations to senior stakeholders. Cross-Functional Collaboration: Work closely with IT security, infrastructure, and business units to embed GRC practices into daily operations. Ensure security governance is aligned with business and IT strategies. Qualifications: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related discipline. Minimum of 3 years of hands-on experience in GRC, with strong exposure to BCM and security tool governance . Sound understanding of security frameworks and regulatory requirements. Experience with tools such as SIEM, DLP, IAM, EDR, and firewalls. Strong analytical, documentation, and communication skills. Preferred Skills (Nice to Have): Relevant certifications such as ISO 27001 Lead Implementer/Auditor , CBCP , CISA , or CISSP . Experience in managing third-party risk or vendor assessments. Immediate joiners preferred. Show more Show less

Posted 6 days ago

Apply

10.0 years

0 Lacs

India

On-site

Linkedin logo

Job Description We are seeking a Senior Cloud Security Architect with deep expertise in securing cloud infrastructures in AWS and Azure. This role will drive secure cloud adoption, design security architectures, and implement proactive threat detection and risk mitigation strategies. The ideal candidate will be a technical leader with hands-on experience securing complex cloud environments, integrating automation, DevSecOps, and compliance frameworks into scalable cloud security solutions. Required Skills & Experience - 10+ years of (cybersecurity) security experience, with 4+ years in cloud security architecture and engineering - Expert knowledge of AWS and Azure security architectures, cloud-native services, and security controls like (IAM, Firewalls, and Encryption) - Deep expertise in cloud networking, cryptography, and security protocols (TLS, OAuth, OIDC, Zero Trust, etc.) - Experience with Infrastructure as Code (Terraform, CloudFormation, Bicep) for secure cloud deployments - Proficiency in automation and scripting (Python, PowerShell, Bash) for security orchestration - Strong understanding of Kubernetes security, including Open Policy Agent (OPA), Kyverno, Kubernetes Pod Security Standards (PSS), and service mesh technologies Nice to Have Skills & Experience - Cloud Certifications, such as AWS Certified Solutions Architect - Professional, AWS Certified Security - Specialty, Microsoft Certified Azure Solutions Architect Expert, Azure Security Engineer Associate, Google Cloud Architect, CISSP, CCSP, CISM Key Responsibilities Cloud Security Architecture & Implementation: - Design and implement secure, scalable cloud architectures in AWS and Azure. - Develop security frameworks, policies, and standards. - Architect IAM, RBAC, and CIEM solutions. - Secure cloud-native services (serverless, Kubernetes, containers). - Deploy and secure network security controls (firewalls, VPNs, IPS). Threat Detection & Response: - Manage SIEM, SOAR, and EDR/XDR solutions. - Implement real-time threat detection and automated response. - Analyze network traffic, logs, and security events. - Use threat intelligence platforms and CSPM solutions. DevSecOps & CI/CD Security: - Secure CI/CD pipelines (Jenkins, GitHub Actions, GitLab CI/CD). - Integrate automated security testing (SAST, DAST, SCA). - Implement API security best practices. Offensive Security & Compliance: - Conduct penetration testing and security assessments. - Implement data security controls (encryption, DLP). - Ensure compliance with NIST 800-53, ISO 27001, PCI DSS, HIPAA, GDPR. - Perform risk assessments and develop remediation plans. Compensation : 30 LPA to 40 LPA Exact compensation may vary based on several factors, including skills, experience, and education. Benefit packages for this role will start on the 31st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law. Show more Show less

Posted 6 days ago

Apply

2.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Associate - Digital Forensics - IN Professionals in this group specialize in investigating computer and information security incidents to determine extent of compromise to information and automated information systems. Key Responsibilities And Duties They support forensic and intrusion investigations including computer analysis, data recovery, and network assessments. They configure and validate products/systems to detect information security weakness. Educational Requirements University (Degree) Preferred Work Experience 2+ Years Required; 3+ Years Preferred Physical Requirements Physical Requirements: Sedentary Work Career Level 6IC Continuously monitor IT systems for unusual activities or security breaches using advanced tools. Implement proactive measures to prevent attacks. Handling security incidents, such as data breaches, malware infections, or system compromises, by containing the incident, analyzing the cause, and taking corrective actions. Leading the response to security incidents, including immediate containment and long-term remediation strategies. Provide mentorship and guidance to other detection analysts, to help them develop in their ability to recognize, triage, and report security incidents. Conducting comprehensive threat intelligence analysis that successfully identified sophisticated threat actors, contributing significantly to our security posture. Evaluating the risks associated with various security vulnerabilities and recommend mitigation strategies. Related Skills Accountability, Adaptability, Business Continuity Planning, Cloud Computing Security, Collaboration, Communication, Compliance, Consultative Communication, Cybersecurity, Detail-Oriented, General Risk Management, Network Security, Prioritizes Effectively _____________________________________________________________________________________________________ Company Overview TIAA Global Capabilities was established in 2016 with a mission to tap into a vast pool of talent, reduce risk by insourcing key platforms and processes, as well as contribute to innovation with a focus on enhancing our technology stack. TIAA Global Capabilities is focused on building a scalable and sustainable organization , with a focus on technology , operations and expanding into the shared services business space. Working closely with our U.S. colleagues and other partners, our goal is to reduce risk, improve the efficiency of our technology and processes and develop innovative ideas to increase throughput and productivity. We are an Equal Opportunity Employer. TIAA does not discriminate against any candidate or employee on the basis of age, race, color, national origin, sex, religion, veteran status, disability, sexual orientation, gender identity, or any other legally protected status. Accessibility Support TIAA offers support for those who need assistance with our online application process to provide an equal employment opportunity to all job seekers, including individuals with disabilities. If you are a U.S. applicant and desire a reasonable accommodation to complete a job application please use one of the below options to contact our accessibility support team: Phone: (800) 842-2755 Email: accessibility.support@tiaa.org Privacy Notices For Applicants of TIAA, Nuveen and Affiliates residing in US (other than California), click here. For Applicants of TIAA, Nuveen and Affiliates residing in California, please click here. For Applicants of TIAA Global Capabilities, click here. For Applicants of Nuveen residing in Europe and APAC, please click here. Show more Show less

Posted 6 days ago

Apply

12.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Director Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats, drive transformation, and foster growth. As companies increasingly adopt digital business models, the generation and sharing of data among organizations, partners, and customers multiply. We play a crucial role in ensuring that our clients are protected by developing transformation strategies focused on security, efficiently integrating and managing new or existing technology systems, and enhancing their cybersecurity investments. As a Director, you will be responsible for overseeing regular operations, driving continuous improvement processes, and managing client and vendor interactions. This role involves managing complex incidents escalated from L2 analysts, operating the Security Incident process, and mentoring junior team members to build a cohesive and motivated unit. Responsibilities Review cybersecurity events analyzed by L2 security analysts, serving as the escalation point for detection, response, and remediation activities. Monitor and guide the team in triaging cybersecurity events, prioritizing, and recommending/performing response measures. Provide technical support for IT teams in response and remediation activities for escalated cybersecurity events/incidents. Follow up on cybersecurity incident tickets until closure. Guide L1 and L2 analysts in analyzing events and response activities. Expedite cyber incident response and remediation activities when delays occur, coordinating with L1 and L2 team members. Review and provide suggestions for information security policies and best practices in client environments. Ensure compliance with SLAs and contractual requirements, maintaining effective communication with stakeholders. Review and share daily, weekly, and monthly dashboard reports with relevant stakeholders. Update and review documents, playbooks, and standard operational procedures. Validate and update client systems and IT infrastructure documentation. Share knowledge on current security threats, attack patterns, and tools with team members. Create and review new use cases based on evolving attack trends. Analyze and interpret Windows, Linux OS, firewall, web proxy, DNS, IDS, and HIPS log events. Develop and maintain threat detection rules, parsers, and use cases. Understand security analytics and flows across SaaS applications and cloud computing tools. Validate use cases through selective testing and logic examination. Maintain continuous improvement processes and build/groom teams over time. Develop thought leadership within the SOC. Mandatory Skill Sets Bachelor’s degree (minimum requirement). 12+years of experience in SOC operations. Experience analyzing malicious traffic and building detections. Experience in application security, network security, and systems security. Knowledge of security testing tools (e.g., BurpSuite, Mimikatz, Cobalt Strike, PowerSploit, Metasploit, Nessus, HP Web Inspect). Proficiency in common programming and scripting languages (Python, PowerShell, Ruby, Perl, Bash, JavaScript, VBScript). Familiarity with cybersecurity frameworks and practices (OWASP, NIST CSF, PCI DSS, NY-DFS). Experience with traditional security operations, event monitoring, and SIEM tools. Knowledge of MITRE or similar frameworks and procedures used by adversaries. Ability to develop and maintain threat detection rules and use cases. Preferred Skill Sets Strong communication skills, both written and oral. Experience with SMB and large enterprise clients. Good understanding of ITIL processes (Change Management, Incident Management, Problem Management). Strong expertise in multiple SIEM tools and other SOC environment devices. Knowledge of firewalls, IDS/IPS, AVI, EDR, Proxy, DNS, email, AD, etc. Understanding of raw log formats of various security devices. Foundational knowledge of networking concepts (TCP/IP, LAN/WAN, Internet network topologies). Relevant certifications (CEH, CISA, CISM, etc.). Strong work ethic and time management skills. Coachability and dedication to consistent improvement. Ability to mentor and encourage junior teammates. Knowledge of regex and parser creation. Ability to deploy SIEM solutions in customer environments. Years Of Experience Required 12 + years Education Qualification B.Tech Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering Degrees/Field Of Study Preferred Certifications (if blank, certifications not specified) Required Skills Accenture Managed Detection and Response (MDR) Ops Security Engineering Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Coaching and Feedback, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Influence, Innovation, Intellectual Curiosity, Learning Agility, Managed Services, Optimism {+ 20 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date Show more Show less

Posted 6 days ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Roles And Responsibilities Support Cybersecurity Assessments: Assist in conducting cybersecurity governance risk assessments for applications. Help in the preparation and review of the Cybersecurity Governance Assessment Questionnaire (CGAQ). Ensure all necessary information is collected and documented accurately. Provide guidance and support to ensure understanding and compliance with cybersecurity requirements. Issue and Exception Management: Track and follow up on issues and exceptions identified during assessments. Ensure timely closure of findings from assessments and audits. Document and report the status of issues and exceptions to relevant stakeholders. Documentation and Reporting: Assist in maintaining accurate records of assessments, issues, and exceptions. Maintain contact with with IT and Business to ensure customer satisfaction Skills:- GRC, Risk assessment, Risk Management, Risk analysis and ISO 27001 Show more Show less

Posted 6 days ago

Apply

8.0 years

0 Lacs

India

Remote

Linkedin logo

Job Title: Manager – SOAR Administration Department: Information Security Group (ISG) Duration: 6 months Reports To: VP – Head of Cyber Defense Center Location: REMOTE,India Job Purpose The Manager – SOAR Administration is responsible for the end-to-end administration and optimization of Security Orchestration, Automation, and Response (SOAR) solutions within the Cyber Defense Center. This role is critical to enhancing the efficiency and effectiveness of the organization’s security operations through the use of automation and orchestration. The role involves collaborating with the SOC team, integrating security tools, developing automated workflows, and improving incident response capabilities to bolster the overall cyber resilience of the organization. Key Result Areas Lead the implementation, configuration, and administration of SOAR platforms (e.g., Splunk SOAR, Palo Alto Cortex XSOAR, IBM Resilient). Design, build, and optimize automated playbooks for incident detection and response. Ensure orchestration and integration across various security tools (SIEM, threat intelligence platforms, etc.). Drive process automation using scripting languages (Python, PowerShell, Bash). Support the incident response lifecycle and coordinate with the SOC during incidents. Monitor and enhance the SOAR ecosystem to reduce mean time to detect and respond (MTTD/MTTR). Deliver projects related to SOAR optimization and innovation. Key Principles Business Alignment: Ensure SOAR initiatives are aligned with the bank’s strategic security objectives. Accountability: Own SOAR processes, outcomes, and reporting. Maturity Improvement: Continuously drive enhancements to cyber defense posture. Impact-Driven Approach: Focus on tangible results such as reduced response times and risk mitigation. Innovation & Automation: Promote scalable automation strategies and cutting-edge solutions. Continuous Improvement: Regularly review and upgrade SOAR processes and playbooks. Operating Environment & Relationships Collaborate with: Group-level CISOs, Cyber Defense Center staff Regulatory bodies, local and global teams First, Second, and Third Lines of Defense (e.g., DPP, IT, Risk, Audit, Compliance) Ensure alignment with: Cybersecurity standards and frameworks Bank-wide governance and regulatory mandates Problem Solving & Critical Thinking Analyze and resolve complex cybersecurity incidents through automation and orchestration. Develop innovative solutions where standard approaches fall short. Apply strong technical knowledge of security frameworks, protocols, and SOAR integrations. Decision-Making Authority & Responsibility Serve as the subject matter expert (SME) for all SOAR-related initiatives. Validate the adequacy of process controls against internal policies and regulatory requirements. Influence strategic direction for automation in incident response and security operations. Knowledge, Skills & Experience Essential Knowledge & Experience 8+ years in Information Security, including 4–6 years in Security Incident Response using SOAR. Proven hands-on experience with platforms such as Microsoft Sentinel, Splunk SOAR, Cortex XSOAR, or IBM Resilient. Familiar with advanced SOC tools, frameworks (NIST, CERT/CC, ISO 27035), and regulatory requirements. Strong background in the BFSI sector, preferably in a SOC function. In-depth understanding of governance, compliance, risk management, and incident response. Technical Skills & Application Expertise in scripting (Python, PowerShell, Bash) for playbook development. Ability to assess, design, and review SOAR use cases, automation logic, and integrations. Maintain up-to-date knowledge of evolving threat landscapes and defense mechanisms. Demonstrate resilience in enhancing security hygiene and monitoring capabilities. Other Requirements Bachelor’s degree in Computer Science, Information Security, or related discipline. Strong awareness of emerging technologies and evolving threat vectors. Professional certifications such as GCIH, CISSP, CEH are highly preferred. Show more Show less

Posted 6 days ago

Apply

3.0 years

0 Lacs

India

Remote

Linkedin logo

Job Title: Consultant / Senior Consultant – Third-Party Risk Management (TPRM) Location: Remote – India Experience: 3+ years Shift Timing: Evening Shift (Start time: 5–6 PM IST, aligned with US hours) Industry: Cybersecurity, Risk Management Employment Type: Full-Time Job Summary: We are hiring a Consultant / Senior Consultant with 3+ years of experience in Third-Party Risk Management (TPRM) to work remotely with our global clients , primarily in the US region . This role requires solid knowledge of cybersecurity standards such as PCI DSS, ISO 27001, SOC 2, and NIST , as well as hands-on experience in conducting vendor risk assessments and ensuring compliance. Key Responsibilities: Perform third-party/vendor security risk assessments , evaluating information security practices of external vendors. Assess vendor compliance with PCI DSS, ISO 27001, SOC 2, NIST, and other regulatory frameworks . Review vendor documentation, including policies, audit reports, penetration test results, and risk assessments. Identify cybersecurity risks and assist in drafting risk reports and remediation plans . Liaise with internal stakeholders and vendor contacts to ensure timely risk issue resolution and follow-up . Support ongoing monitoring of vendors through risk ratings, reassessments, and tracking regulatory obligations. Maintain accurate records and dashboards related to TPRM activities. Participate in process improvement initiatives to enhance the effectiveness of the TPRM program. Collaborate with global teams, particularly in the US time zone . Qualifications and Skills: Minimum 3+ years of experience in TPRM, cyber risk assessments, compliance audits, or related cybersecurity domains. Strong understanding of regulatory and industry frameworks like PCI DSS, ISO 27001, NIST, SOC 2 , etc. Familiarity with tools used for TPRM, compliance tracking, and risk assessments. Bachelor’s degree in Information Security, Computer Science, Risk Management , or related field. Relevant certifications such as CISA, ISO 27001 LA, or CISSP (preferred but not mandatory). Excellent communication skills, with the ability to present risk findings and collaborate with international stakeholders. Must be comfortable working in evening shifts starting around 5–6 PM IST . Why Join Us? Opportunity to work with global clients and gain exposure to world-class cybersecurity standards. 100% remote role with flexibility in working from anywhere in India. Attractive compensation and career growth potential . Inclusive and collaborative team culture with a focus on learning and development . Show more Show less

Posted 6 days ago

Apply

6.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

NetSPI is the proactive security solution used to discover, prioritize, and remediate security vulnerabilities of the highest importance. We help secure the most trusted brands on Earth with our Penetration Testing as a Service (PTaaS), Attack Surface Management (ASM), and Breach and Attack Simulation (BAS) solutions. Leveraging a unique combination of dedicated security experts, intelligent process, and advanced technology, NetSPI brings a proactive approach to cybersecurity with more clarity, speed, and scale than ever before. NetSPI is on an exciting growth journey as we disrupt and improve the proactive security market. We are looking for individuals with a collaborative, innovative, and customer-first mindset to join our team. Learn more about our award-winning workplace culture and get to know our A-Team at www.netspi.com/careers . Responsibilities: • Understand and analyse user requirements and convert them into a feasible test document (test plans, test suites). • Selenium and Java UI automation-based application testing • Work with geographically distributed team of various experience level Required Technical Skills: • 6-8 years of hands-on testing experience and 3+ years in Automation testing • Knowledge of testing tools, techniques, and methodologies • Strong experience in web application testing • Strong experience with UI Automation testing (desktop) • Good experience in Rest API testing. • Good experience with relational / NoSQL databases • Experience in unit testing, integration testing, performance testing & functional testing Preferred Skills: • Experience working on AI-based products/projects is a big plus. • Open-source contribution • Hands-on experience in Karate Framework • Experience in Web Services, AWS, Azure and Python is a plus • Experience working in Agile team environment • Good communication skills Required Education: • Bachelor’s degree in Computer Science At NetSPI, you will join a team that values innovation and collaboration, where your contributions make a real impact. Apply now to help secure the digital frontier. About the Organization : NetSPI is the proactive security solution used to discover, prioritize, and remediate security vulnerabilities of the highest importance, so businesses can protect what matters most. Leveraging a unique combination of dedicated security experts, intelligent process, and advanced technology, NetSPI helps security teams take a proactive approach to cybersecurity with more clarity, speed, and scale than ever before. By continually advancing solutions such as Penetration Testing as a Service (PTaaS), Attack Surface Management (ASM), and Breach and Attack Simulation (BAS), NetSPI goes beyond the noise to deliver high impact results and recommendations based on business needs, so customers can protect their priorities, perform better, and innovate with confidence. NetSPI secures the most trusted brands on Earth, including nine of the top 10 U.S. banks, four of the top five leading cloud providers, three of the five largest healthcare companies, four MAMAA companies, seven of the top 10 U.S. retailers & e-commerce companies, and many of the Fortune 500. EOE Statement: We are an equal employment opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status or any other characteristic protected by law. Show more Show less

Posted 6 days ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

About noon noon, the region's leading consumer commerce platform. On December 12th, 2017, noon launched its consumer platform in Saudi Arabia and the UAE, expanding to Egypt in February 2019. The noon ecosystem of services now includes marketplaces for food delivery, quick-commerce, fintech, and fashion. noon is a work in progress; we’re six years in, but only 5% done. noon’s mission: every door, everyday. What we are looking for Noon’s Cybersecurity department, Security operations team is looking for a talented, experienced, and enthusiastic Senior Threat Detection Engineer to help build and scale the Detection & Threat Hunting program at Noon. The ideal candidate will be someone who has diverse security skill-set (IR, TI, SOC..) and specialized in detecting engineering and threat hunting. The focus area for this role will be on designing and implementing advanced detection mechanisms based on known/emerging attacks and pivoting techniques. The Sr. Threat Detection will be working on proactive approaches to advance steps ahead of attackers and help in building detection to identify advanced, current and emerging threats. He will be responsible for the design and implementation of security intelligence and detection capabilities across our applications and networks. This role will be assisting in building the strategy and the team for our Detection and Threat Hunting Program. He will be the focal point for the planning and execution of security investigation, response process and coordination of relevant parties when an information security incident occurs. In addition, documentation, analytical and critical thinking skills, investigation and forensics, and the ability to identify needs and take the initiative are key requirements of this position. About the role Help build and scale the Detection & Threat hunting Program at Noon Drive improvements in detection and response capabilities, and operations for the Internal SOC/TI Write detection signatures, tune security monitoring systems/ tools, develop automation scripts and correlation rules. Work closely with other Security Team members to strengthen our detection and defence mechanisms in regards to, Web applications, Cloud and Network. Exhibit knowledge of attacker lifecycle, TTPs, indicators of compromise (IOCs), and proactively implementing countermeasures to neutralize the threats. Identifies opportunities to enhance the development and implementation of new methods for detecting attacks and malicious activities. Participate as a member of the CSIRT during major incidents and lend contributions to post-Incident review and continuous improvement Proactive threat hunting of anomalies to identify IOCs and derive custom snort signatures for the IOCs Identifying and managing a wide range of intelligence sources to provide a holistic view of the threat landscape. (OSINT aggregation) Work closely with the Red Team and Blue Team to implement custom detection of new and emerging threats, and develop monitoring use cases. Coordinate in red teaming activities such as table-top and adversarial simulation exercises. Responsible for owning all confirmed incidents. This includes publishing Incident Report, documenting Lessons Learnt and updating Knowledge Base. Required Expertise: Required: Senior level experience in a threat intel, detection, IR, or similar cybersecurity roles for medium to large organizations. Required: Technical professional security certifications in Incident Response, Digital Forensics, Offensive Security, or Malware Analysis, such as GCIH, GCFA, GNFA, GCTI, OSCP or similar Bachelor’s degree in Computing, Information Technology, Engineering or a related field, with a strong security component. Hands-on experience in detection engineering, advanced cyber threat intelligence activities, intrusion detection, incident response, and security content development (e.g., signatures, rules, etc.) A broad and diverse security skill-set with an advanced understanding of modern network security technologies (e.g. Firewalls, Intrusion Detection/Prevention Systems, Access Control Lists, Network Segmentation, SIEMs, Auditing/Logging and Identity & Access Management solutions, DDoS protection etc.). Knowledge of at least one common scripting language (Python, Ruby, Go). Experience handling and building a SOAR such as Chronicle’s SOAR, Demisto, Phantom or similar tools. Experience conducting and leading incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Insider Threats .. etc. Understanding of log collection and aggregation techniques, Elastic Search, Logstash, Kibana (ELK), Syslog-NG, Windows Event Forwarding (WEF), etc. Experience with endpoint security agents (Carbon Black, Crowdstrike, etc.). Preferred Qualifications: Hands on experience with Chronicle SIEM/SOAR and Google SecOps Expertise in threat hunting in one or more public cloud solutions such as AWS and GCP Ability to work with a team or independently with minimal direction/leadership Hands-on experience in offensive/defensive web applications security is a big plus for this role. Highly motivated and self-directed with a passion for solving complex problems Establishes industry expertise through writing, speaking or online presence. Who will excel? We’re looking for people with high standards, who understand that hard work matters. You need to be relentlessly resourceful and operate with a deep bias for action. We need people with the courage to be fiercely original. noon is not for everyone; readiness to adapt, pivot, and learn is essential. Show more Show less

Posted 6 days ago

Apply

5.0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

Linkedin logo

Job Title: Senior Embedded Firmware Engineer Location: Ahmedabad, Gujarat Company: ATRI Solutions Pvt. Ltd. Experience: 5+ years Job Type: Full-Time About ATRI Solutions: ATRI Solutions is a technology innovation company driving solutions across Embedded Product Development, IoT, Cloud Integration, AI/ML, and Advanced Systems Engineering. We are expanding our expert team at the Ahmedabad location and are seeking a seasoned Senior Embedded Firmware Engineer to lead and drive embedded development initiatives for cutting-edge projects across automotive, industrial, consumer electronics, and healthcare domains. Key Responsibilities: Architect, design, develop, and debug embedded firmware for microcontroller-based systems. Lead firmware development lifecycle from requirement gathering to deployment and testing. Work with cross-functional teams (hardware, software, QA) to deliver integrated solutions. Optimize embedded code for memory usage, performance, and power consumption. Interface with various communication protocols like UART, SPI, I2C, CAN, USB, BLE, and Ethernet. Conduct board bring-up, hardware-software integration, and debugging using tools like oscilloscopes, logic analyzers, JTAG, etc. Collaborate with system architects and project managers to ensure timely delivery and technical excellence. Mentor junior engineers and perform code reviews to maintain code quality and best practices. Required Skills and Qualifications: Bachelor’s or master's degree in Electronics, Electrical, Computer Engineering, or related field. 5+ years of hands-on experience in embedded firmware development. Proficient in C/C++, RTOS-based development (FreeRTOS, Zephyr, or similar). Experience with ARM Cortex-M and other MCU architectures (STMicroelectronics, NXP, TI, Renesas, etc.). Familiarity with firmware version control (Git), CI/CD, and Agile methodologies. Strong debugging skills and understanding of low-level system behavior. Experience in secure boot, OTA firmware update, and firmware reliability strategies is a plus. Preferred Qualifications: Exposure to IoT protocols such as MQTT, CoAP, LwM2M. Experience with cloud-connected embedded devices. Knowledge of cybersecurity and secure firmware development. Experience in working with medical, automotive, or industrial-grade products. What We Offer: Opportunity to work on innovative and impactful projects. Collaborative and tech-driven work environment. Career growth and skill enhancement opportunities. Flexible work culture and supportive leadership. Show more Show less

Posted 6 days ago

Apply

4.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

About Marvell Marvell’s semiconductor solutions are the essential building blocks of the data infrastructure that connects our world. Across enterprise, cloud and AI, automotive, and carrier architectures, our innovative technology is enabling new possibilities. At Marvell, you can affect the arc of individual lives, lift the trajectory of entire industries, and fuel the transformative potential of tomorrow. For those looking to make their mark on purposeful and enduring innovation, above and beyond fleeting trends, Marvell is a place to thrive, learn, and lead. Your Team, Your Impact Joining Marvell as a CyberSecurity Analyst, you will be an expert at identifying and responding to threats against Marvell data and systems. The SOC is the central nervous system for the cybersecurity organization, a 24x7 service responsible for detection, assessing, and responding to security threats globally. You will be deeply engaged in the day-to-day operations that ensure we effectively detect and respond to evolving cyber threats using leading edge technology and robust processes. What You Can Expect Provide primary triage, analysis and operational support for security events and alerts. Perform correlation using security analytics tools, log aggregators, advanced network malware protection, data indicator mining tools, forensics tools and threat intelligence repositories. Perform real-time incident handling (e.g., intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Participate in analyzing nature of the attack and root cause analysis of an incident. Monitor external data sources proactively to determine which security issues may have an impact on the enterprise. Document and publish techniques, guidance, and reports on incident findings to appropriate constituencies within Marvell. Participate in the improvement tasks such as but not limited to false positive reduction, use case refinement. Effectively communicate both verbal and written updates on alerts and incidents What We're Looking For 4+ years' experience as a SOC Analyst preferably for a >5000 person enterprise. Experience in working with a geographically diverse team in multiple time zones around the globe Strong communication skills and an ability to adapt a message to audiences ranging from technology SMEs to company executives to stakeholders in every business discipline. Deep understanding of MITRE ATT&CK, with demonstrated experience building detection cases and playbooks around the tactics and techniques most relevant to your business. Proficient technical writing skills (documenting processes and procedures). Ability to solve problems and work through ambiguity and uncertainty. Proficiency with one or more DLP platform Experience working extensively with technologies such as IDS/IPS, NGFW, EDR, SIEM, HIDS/HIPS, AV, and Vulnerability Scanners. Expert level and continually expanding understanding of common and emerging security threats and vulnerabilities Self-motivated and proven ability to deliver end-to-end solutions in a high-tech and fast-moving industry. Industry security certifications such as C|EH and relevant GIAC certifications or equivalent highly desirable. Experience with infrastructure operations and processes associated with IT service management in an Enterprise-level organization. Additional Compensation And Benefit Elements With competitive compensation and great benefits, you will enjoy our workstyle within an environment of shared collaboration, transparency, and inclusivity. We’re dedicated to giving our people the tools and resources they need to succeed in doing work that matters, and to grow and develop with us. For additional information on what it’s like to work at Marvell, visit our Careers page. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Show more Show less

Posted 6 days ago

Apply

10.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Business Unit: Cubic Corporation Company Details: When you join Cubic, you become part of a company that creates and delivers technology solutions in transportation to make people’s lives easier by simplifying their daily journeys, and defense capabilities to help promote mission success and safety for those who serve their nation. Led by our talented teams around the world, Cubic is committed to solving global issues through innovation and service to our customers and partners. We have a top-tier portfolio of businesses, including Cubic Transportation Systems (CTS) and Cubic Defense (CD). Explore more on Cubic.com. Job Details: Job Summary: We are seeking a highly skilled and deeply technical Principal Network Engineer to lead our enterprise networking initiatives. This role is ideal for a senior-level professional with 10+ years of hands-on experience in designing, securing, and optimizing complex network infrastructures. The ideal candidate will have at least 5 years at a senior level or above , a strong command of network architecture and security, and the ability to mentor others while executing on large-scale, high-impact projects. This is a technical leadership role (90%+ technical) with an expectation of expert-level contributions to architecture, troubleshooting, automation, and performance engineering. Key Responsibilities: Architect and deploy secure, scalable, and high-availability network solutions across LAN/WAN, cloud, and hybrid environments. Lead end-to-end technical execution of initiatives such as SD-WAN, cloud connectivity, and data center migrations. Own root cause analysis and resolution for complex network performance issues and critical incidents (P1/P2). Collaborate with cybersecurity teams to enforce Zero Trust frameworks and robust segmentation strategies. Provide technical mentorship to network engineers; drive consistency through best practices and technical standards. Lead vendor evaluations, procurement strategies, and capacity planning aligned with enterprise goals. Maintain network monitoring and reporting infrastructure to provide visibility into health, usage, and potential risk. Technical Expertise Required: Core Networking: Expert in routing and switching protocols: BGP, OSPF, EIGRP, RIP, STP, HSRP/VRRP Strong in IPv4/IPv6 planning, MPLS, QoS, and multicast routing Experience with enterprise-grade hardware: Cisco, Juniper, Arista Network Security: Deep hands-on with Cisco ASA, Firepower, Palo Alto, Fortinet firewalls IPSec/SSL VPNs, NAC (Cisco ISE or Aruba ClearPass), ACL management Practical knowledge of Zero Trust principles, micro-segmentation, and PKI Cloud & Hybrid Networking: Strong experience with AWS, Azure, or GCP networking: VPCs, Transit Gateways, ExpressRoute Proficiency in site-to-site VPNs, cloud firewalls, load balancers, and hybrid connectivity Automation & Scripting: Advanced scripting skills using Python, Ansible, or Terraform Familiarity with network APIs (REST, NETCONF), infrastructure as code, Cisco NSO Monitoring & Diagnostics: Tools: Wireshark, SolarWinds, NetFlow, PRTG, Zabbix, Splunk Strong in SNMP, Syslog analysis, RCA processes, and proactive performance tuning Architecture & Compliance: Experience with Cisco Validated Designs (CVDs), ITIL, and architectural frameworks like TOGAF Awareness of compliance standards (PCI-DSS, ISO 27001, HIPAA) Skilled in using documentation tools like Visio and Lucidchart Qualifications: Bachelor’s or Master’s degree in Computer Science, Information Technology, or related field. Minimum 10+ years of relevant experience, with 5+ years in a senior/principal-level engineering role. Advanced certifications such as CCNP, CCIE, PCNSE, or AWS Advanced Networking Specialty required. Demonstrated ability to lead from the front on complex technical challenges. Worker Type: Employee Show more Show less

Posted 6 days ago

Apply

4.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

About Marvell Marvell’s semiconductor solutions are the essential building blocks of the data infrastructure that connects our world. Across enterprise, cloud and AI, automotive, and carrier architectures, our innovative technology is enabling new possibilities. At Marvell, you can affect the arc of individual lives, lift the trajectory of entire industries, and fuel the transformative potential of tomorrow. For those looking to make their mark on purposeful and enduring innovation, above and beyond fleeting trends, Marvell is a place to thrive, learn, and lead. Your Team, Your Impact Joining Marvell as a CyberSecurity Analyst, you will be an expert at identifying and responding to threats against Marvell data and systems. The SOC is the central nervous system for the cybersecurity organization, a 24x7 service responsible for detection, assessing, and responding to security threats globally. You will be deeply engaged in the day-to-day operations that ensure we effectively detect and respond to evolving cyber threats using leading edge technology and robust processes. What You Can Expect Provide primary triage, analysis and operational support for security events and alerts. Perform correlation using security analytics tools, log aggregators, advanced network malware protection, data indicator mining tools, forensics tools and threat intelligence repositories. Perform real-time incident handling (e.g., intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Participate in analyzing nature of the attack and root cause analysis of an incident. Monitor external data sources proactively to determine which security issues may have an impact on the enterprise. Document and publish techniques, guidance, and reports on incident findings to appropriate constituencies within Marvell. Participate in the improvement tasks such as but not limited to false positive reduction, use case refinement. Effectively communicate both verbal and written updates on alerts and incidents What We're Looking For 4+ years' experience as a SOC Analyst preferably for a >5000 person enterprise. Experience in working with a geographically diverse team in multiple time zones around the globe Strong communication skills and an ability to adapt a message to audiences ranging from technology SMEs to company executives to stakeholders in every business discipline. Deep understanding of MITRE ATT&CK, with demonstrated experience building detection cases and playbooks around the tactics and techniques most relevant to your business. Proficient technical writing skills (documenting processes and procedures). Ability to solve problems and work through ambiguity and uncertainty. Proficiency with one or more DLP platform Experience working extensively with technologies such as IDS/IPS, NGFW, EDR, SIEM, HIDS/HIPS, AV, and Vulnerability Scanners. Expert level and continually expanding understanding of common and emerging security threats and vulnerabilities Self-motivated and proven ability to deliver end-to-end solutions in a high-tech and fast-moving industry. Industry security certifications such as C|EH and relevant GIAC certifications or equivalent highly desirable. Experience with infrastructure operations and processes associated with IT service management in an Enterprise-level organization. Additional Compensation And Benefit Elements With competitive compensation and great benefits, you will enjoy our workstyle within an environment of shared collaboration, transparency, and inclusivity. We’re dedicated to giving our people the tools and resources they need to succeed in doing work that matters, and to grow and develop with us. For additional information on what it’s like to work at Marvell, visit our Careers page. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Show more Show less

Posted 6 days ago

Apply

4.0 - 20.0 years

0 Lacs

Kochi, Kerala, India

On-site

Linkedin logo

Dear Candidate, Greetings from TCS Cyber Security TAG Team!!! We are pleased to announce the Exclusive walk-in drive for TCS Cyber Security unit at 2 Locations, (Bangalore, Pune, Kochi) on 14th June 2025 Drive Details: Interview Date: 14th June 2025 (Saturday) Registration Time: 09:00 AM to 1:00 PM Skills: Network security Engineer. Experience Range: 4 to 20Years Request your support in cascading the same with your Friends and Social media Networks!!! TCS Cyber Security Opportunities TCS Cybersecurity Practice is your ideal starting ground for an exceptional career as a Digital Defender. Venue Address Bangalore Tata Consultancy Services, Think Campus, JRD Auditorium Cafeteria, Electronic City, Bangalore Pune Tata Consultancy Services, Sahyadri Park SP1, A1 Auditorium & Zone 3, Rajiv Gandhi Infotech Park, Hinjewadi Phase 3, Pune - 411057 Are you available for this Walkin drive? If yes, please fill the necessary details Interested professionals send your updated CV & the below details to varsha.muthukrishnan@tcs.com Full Name: Email: Contact Number: Total Experience: Relevant Experience: Current Location: Preferred Location: Notice Period: Current Company Name: All Previous Companies Names: Education or career gap in months/years (kindly mention if there's a gap between your education and your first organization): Reason for gap: Year of 10th Completion: Year of 12th Completion: Year of Under graduation Completion: Year of Post graduation Completion (if applicable): Highest Full-Time Education qualification: Highest Qualification Fulltime Y/N (Part-time courses are NOT eligible): University Name: Current CTC (Voluntary Disclosure): Expected CTC (Voluntary Disclosure): EP Reference Number (if already registered with TCS): The ideal candidate will be responsible for maintaining and intermittently improving our current network configuration and infrastructure. You will design our revamped network infrastructure with the goal of maximizing our network performance. You will also provide troubleshooting and configuration support by using your strong technical skills in Linux and Windows environments and IP networking. Products and Technology : Network Security (Palo Alto, Cisco, FortiGate, Zscaler, Netskope, Akamai, Imperva, F5) Industry certifications like CCNP Security, F5 LTM certification Knowledge of Firewall compliance tool like Algosec, Tufin, Skybox Understanding of working of Network Access Technology. Deep technical expertise in Network security technology domain with demonstrated expertise in one or more of the following areas – Firewalls, IPS/IDS, Web Proxy, NAC, VPN. Proven experience in maintaining security solutions across enterprise environments. Provide compliance reports (monthly and based on need) Network security deployment & configuration Device upgrade and patch management Configuration and change management. Change & configuration management. Excellent troubleshooting skills Creation of SOPs for daily operations of network security tools and services Creation and modification of custom rules for IPS services Monitoring security advisory groups to ensure all necessary security updates, patches and preventive measures are in place. Support forensics activates and requirements. Good soft skills and multi-tasking abilities Show more Show less

Posted 6 days ago

Apply

Exploring Cybersecurity Jobs in India

Cybersecurity is a rapidly growing field in India, with an increasing demand for skilled professionals to protect organizations from cyber threats. As the country continues to digitize various sectors, the need for cybersecurity experts has never been greater.

Top Hiring Locations in India

  1. Bangalore
  2. Mumbai
  3. Pune
  4. Hyderabad
  5. Delhi

These cities are known for their thriving IT industries and have a high demand for cybersecurity professionals.

Average Salary Range

The average salary range for cybersecurity professionals in India varies based on experience level. Entry-level positions can expect to earn between INR 4-6 lakhs per year, while experienced professionals can earn upwards of INR 15 lakhs per year.

Career Path

A typical career path in cybersecurity may include roles such as: - Junior Security Analyst - Security Engineer - Senior Security Consultant - Chief Information Security Officer

Related Skills

In addition to cybersecurity expertise, professionals in this field are often expected to have skills in: - Network Security - Penetration Testing - Incident Response - Cryptography - Risk Management

Interview Questions

  • What are the differences between symmetric and asymmetric encryption? (medium)
  • Explain the concept of a firewall and its importance in network security. (basic)
  • How do you stay updated with the latest cybersecurity threats and trends? (basic)
  • What is the difference between vulnerability assessment and penetration testing? (medium)
  • Can you explain the CIA triad in the context of cybersecurity? (medium)
  • Describe a recent cybersecurity incident you handled and how you resolved it. (advanced)
  • How would you secure a wireless network from potential threats? (medium)
  • What is a DDoS attack, and how would you mitigate it? (medium)
  • Explain the concept of zero-day vulnerability. (medium)
  • How do you approach conducting a security risk assessment for an organization? (advanced)
  • What is the role of encryption in cybersecurity, and how does it work? (basic)
  • Describe the differences between a virus, worm, and trojan horse. (basic)
  • How would you prioritize security vulnerabilities based on their severity? (medium)
  • Explain the concept of social engineering in the context of cybersecurity. (basic)
  • How do you ensure compliance with relevant cybersecurity regulations and standards? (medium)
  • What steps would you take to secure a web application from potential attacks? (medium)
  • Can you explain the process of digital forensics and its role in cybersecurity investigations? (advanced)
  • How do you approach incident response in the event of a security breach? (medium)
  • What is the importance of multi-factor authentication in enhancing security? (basic)
  • Describe the role of a Security Information and Event Management (SIEM) system in cybersecurity. (medium)
  • How would you assess the security posture of an organization's cloud infrastructure? (medium)
  • What is the difference between black-box and white-box testing in cybersecurity? (medium)
  • How do you ensure data privacy and protection in an organization? (basic)
  • Can you explain the concept of a security policy and its importance in an organization? (basic)
  • How would you handle a security incident involving a ransomware attack? (advanced)

Closing Remark

With the increasing importance of cybersecurity in today's digital landscape, there are ample opportunities for job seekers in this field in India. By honing your skills, staying updated with the latest trends, and preparing thoroughly for interviews, you can confidently pursue a rewarding career in cybersecurity. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies