Jobs
Interviews

78 Cybersecurity Principles Jobs - Page 3

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 9.0 years

0 Lacs

hyderabad, telangana

On-site

You are a skilled Business Analyst / Project Manager with expertise in Secrets Management, Identity & Access Management (IAM), and technical platforms such as DevOps, CI/CD pipelines, and Cloud infrastructure. Your role is critical in driving requirement gathering, stakeholder engagement, and the adoption of secrets management solutions across global business units and regions. You will collaborate with application, infrastructure, and platform teams to gather technical and business requirements related to Secrets Management. It is essential to define and document use cases, ensuring alignment with IAM and cybersecurity standards. Coordination with stakeholders across Cybersecurity, Cloud Services, Architecture, IAM, and Global Functions is required. Your responsibility includes capturing and documenting regional and country-specific requirements, including those in Highly Regulated Countries (HRCs). You will prepare and gain approval for detailed requirements documentation from senior stakeholders. Acting as a central liaison between the program and stakeholders, you will ensure delivery milestones and adoption plans remain on track. Analyzing processes and data flows to identify areas for improvement and automation is a key aspect of your role. Additionally, you will support the delivery and integration of secrets management tooling across global teams. Your required skills and experience include proven expertise in requirements gathering within technical environments such as DevOps, CI/CD, or infrastructure. A strong understanding of Secrets Management, IAM/PAM solutions, and related controls is necessary. You should have experience working with application and infrastructure teams in enterprise environments, possess strong data analysis, process mapping, and documentation skills, and demonstrate the ability to manage complex stakeholder relationships and drive cross-functional collaboration. Familiarity with Agile methodologies and tools such as JIRA and Confluence, along with a solid understanding of cybersecurity principles, IAM controls, and compliance, are essential. Preferred skills for this role include experience with Secrets Management tools like HashiCorp Vault, CyberArk, or AWS Secrets Manager, previous experience working with global teams and multi-region initiatives, and familiarity with highly regulated environments and compliance-driven projects. If you possess the skills mentioned above and are ready to take on the responsibilities of this challenging and rewarding role, we encourage you to apply and become a valuable member of our team.,

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

noida, uttar pradesh

On-site

In this role, you will engage with clients to understand their business objectives and operations in order to analyze their current IT and Security setup. Your responsibility will be to recommend appropriate technologies and design comprehensive solutions to ensure compliance and achieve overall operational efficiency and excellence. You will play a vital role in helping clients safeguard their assets, protect their operations, and mitigate risks through the effective integration of technology and surveillance solutions. You will evaluate existing IT systems, propose improvements, and develop strategies for IT integration with other systems such as AV and security. Conducting comprehensive evaluations of clients" security measures, policies, and procedures to detect risks and compliance gaps will be a part of your responsibilities. Additionally, you will assess clients" IT infrastructure, systems, processes, workflows, surveillance systems, and physical security systems to identify gaps and recommend enhancements or upgrades. As part of your duties, you will also develop cybersecurity strategies, ensure compliance with relevant security standards, and design Data Centres. You will oversee the implementation of recommended IT solutions, coordinate projects from beginning to completion, and keep up with the latest trends and best practices in information technology and security sectors. To qualify for this role, you should have a Bachelor's degree in Information Technology, Computer Science, Network Engineering, or a related field (Master's degree preferred). Certifications such as CISSP, CCNP, or similar are highly preferable. A minimum of 2-5 years of experience in IT and Security design is required, along with expertise in networking technologies, cloud environments, IT infrastructure design, physical security solutions, and cybersecurity principles. Strong communication skills, problem-solving abilities, attention to detail, and customer service orientation are essential soft skills for this position. The ability to manage multiple projects, prioritize tasks effectively, and build and maintain client relationships will also be crucial for success in this role.,

Posted 1 month ago

Apply

9.0 - 13.0 years

0 Lacs

karnataka

On-site

Goldbelt Apex, a part of the Healthcare Technology Transformation Group, is dedicated to maintaining process and quality excellence in every aspect. As a leading expert in healthcare IT, we are committed to developing systems that facilitate seamless communication and data exchange among healthcare organizations across various platforms and devices. The DHA Hearing Center of Excellence (HCE) is currently seeking an experienced Information Assurance Cyber Subject Matter Expert (SME) to contribute to the development, implementation, and management of cybersecurity and information assurance strategies. In this pivotal role, you will be responsible for ensuring the security and compliance of HCE's information systems and data within a healthcare environment. The ideal candidate should possess a profound understanding of cybersecurity principles, risk management, and regulatory compliance. This is a hybrid position, with the expectation of working on-site one day per week. **Responsibilities:** **Essential Job Functions:** - Provide support to the HCE cybersecurity division team for all assigned systems. - Lead the Assessment and Authorization effort (ATO) for all systems. - Categorize all information systems based on the sensitivity and criticality of the data collected, stored, and transmitted. - Develop all necessary systems documentation, including PTA/PIA, FIPS 199, Standard Operational Procedures, Business Impact Assessment, and other relevant supporting documents and artifacts. - Protect system authorization boundaries and resources by implementing baseline controls, conducting assessments, obtaining system authorization, and ensuring continuous monitoring of the application. **Qualifications:** **Necessary Skills and Knowledge:** - Thorough knowledge of cybersecurity principles, risk management, and regulatory compliance. - Proficiency in security technologies and tools, such as firewalls, intrusion detection systems, and encryption. - Strong analytical, problem-solving, and decision-making skills. - Excellent communication and interpersonal skills, with the ability to explain complex technical information to non-technical audiences. **Minimum Qualifications:** - Bachelor's degree in Cybersecurity Management and Computer Science. - Certifications: Security Plus, Certified Information System Auditor, Risk Management Framework, eMASS, Authorization and Accreditation. - Minimum of 9 years of experience in cybersecurity, with previous roles as an Information System Security Officer and Information Assurance in the HCE environment. **Preferred Qualifications:** - Master's degree in a related field. - Secret Security Clearance. The annual salary range for this position is $90,000.00 to $110,000.00. Goldbelt values the dedication and hard work of our team members and rewards them accordingly. We offer a competitive base salary commensurate with experience, along with a comprehensive benefits package that includes medical, dental, and vision insurance, a 401(k) plan with company matching, tax-deferred savings options, supplementary benefits, paid time off, and professional development opportunities.,

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Technical Consultant with our team, you will be a key player in the Infinity development process, from technical design to implementation. Your expertise in Visualizer/Fabric, Java, JavaScript, APIs, and various other technologies will be crucial in supporting the scrum team and contributing to the technical architecture and design. Your responsibilities will include providing guidance to team members, participating in the creation of solution design documents, reviewing requirements for web services, collaborating with the Infinity Solution Architect, engaging with customer project teams and vendors, and communicating with Temenos product teams. In terms of technical deliverables, you are expected to showcase your expertise in Visualizer, Fabric, Java, JavaScript, SQL, SOAP, JSON, web services, APIs, as well as proficiency in programming languages like Java, C#, Python, or Kotlin. Your skills in mobile and web development, database management, DevOps practices, cloud platforms, cybersecurity principles, and microservices architecture will be highly valuable. Your expected skills include a strong understanding of the Software Development Life Cycle (SDLC) in the context of Infinity implementation, the ability to debug code and develop hotfixes efficiently, excellent problem-solving skills, and knowledge of frameworks such as J2EE, JPA, and Spring Boot. Familiarity with database technologies and tools like Postman and Swagger for testing will also be beneficial. Join our team as a Technical Consultant and be part of a dynamic environment where your technical expertise and problem-solving skills will play a significant role in the success of our projects.,

Posted 1 month ago

Apply

10.0 - 14.0 years

0 Lacs

hyderabad, telangana

On-site

As a Senior Manager, Domain Solutions Architect at ResMed, your primary responsibility will be to lead architecture activities in the Customer Platform area. You will guide the development and management of a portfolio of solutions, ensuring they align with the company's strategy and business needs. Your role will involve understanding business goals, capabilities, value-streams, and processes to define the target application landscape and maintain architectural integrity. You will establish and govern an architecture board in the Customer Platform area and manage a team responsible for designing robust technical architecture, enforcing standards, driving innovation, and overseeing pilot programs. Additionally, you will be tasked with overseeing domain solutions architecture for the customer area, ensuring alignment with the overall GTS strategy and business objectives. You will facilitate the definition of the target application landscape, guide the design and implementation of domain-specific solutions, and ensure seamless integration with other enterprise applications. In terms of qualifications, skills, and experience, we are looking for candidates with a Bachelor's degree in Computer Science or a related discipline (Master's degree preferred). You should have significant experience in managing and delivering software solutions, as well as a strong business acumen in areas related to customers such as marketing, sales, E-Commerce, and customer support. To excel in this role, you should possess strong leadership skills, excellent communication and presentation abilities, proficiency in architecture frameworks like TOGAF or Zachman, and knowledge of cloud computing platforms such as AWS, Azure, or Google Cloud. Familiarity with cybersecurity principles, information management practices, agile methodologies, and emerging technologies like generative AI will be beneficial. At ResMed, you will have access to competitive benefits, a bonus plan, working from home flexibility, referral bonuses, and internal career development opportunities. Join us in creating a healthier world and a workplace that values diversity, inclusion, and innovation. If you are ready for a challenging and inspiring career, apply now to be part of our dynamic team.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

noida, uttar pradesh

On-site

You will be joining Bioqube, a pioneering company that is revolutionizing the field of identity and security with its innovative Web 3.0-ready, AI-powered biometric platform. Bioqube stands out as a leader in multi-factor, multimodal decentralized digital identity, offering cutting-edge, real-time data analytics that seamlessly integrate across various devices without specialized hardware. From enhancing border security to transforming banking operations, our adaptable solutions are reshaping security standards across different industries. By becoming a part of Bioqube, you will contribute to creating a safer, smarter, and more connected world where digital identity is not only secure and seamless but also future-proof. As a Server and Network Engineer at Bioqube, based in Noida, you will play a crucial role in managing and maintaining the company's IT infrastructure. Your responsibilities will include installing, configuring, and upkeeping servers, network devices, and associated systems to ensure optimal performance, security, and scalability. It will be your duty to monitor system performance, troubleshoot any arising issues, and guarantee high availability. Additionally, implementing security measures such as firewalls, VPNs, and data encryption, along with conducting regular system backups, will be essential aspects of your role. You will also provide technical support to end-users, resolve hardware and software-related problems, and keep system documentation up to date. Joining Bioqube will offer you the opportunity to work with cutting-edge technologies and impactful projects within a dynamic and fast-growing startup environment. You will benefit from a collaborative and flexible workspace, where you can take ownership of your work and make a real difference. Moreover, we offer a competitive salary and benefits package to our employees. To excel in this role, you should possess a Bachelor's degree in computer science, Information Technology, or a related field. Strong knowledge of networking protocols, hands-on experience with Linux/Ubuntu and O365, familiarity with virtualization technologies, and proficiency in configuring and troubleshooting network devices are essential qualifications. Basic knowledge of Cloud Technology, cybersecurity principles, and problem-solving skills are also required. Possessing certifications like CCNA, CCNP, MCSA, MCSE, or equivalents will be advantageous. At Bioqube, we provide flexible working options, a chance to make a positive impact, and a great work environment to our team members. Join us in shaping the future of identity and security with innovative solutions that are setting new standards in the industry.,

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

coimbatore, tamil nadu

On-site

At EY, you will have the opportunity to shape a career that aligns with your uniqueness, supported by a global network, inclusive environment, and cutting-edge technology to empower you to reach your full potential. Your distinct voice and perspective are valued contributions towards enhancing EY's continuous improvement. Join us to craft an exceptional journey for yourself and contribute towards creating a more efficient working environment for all. As a CyberArk Operations Support Analyst within the Global Managed Service - Privileged Identity and Access Management team, your primary responsibility will involve the day-to-day management of the CyberArk Privileged Access Management (PAM) platform. Your duties will include overseeing the CyberArk infrastructure, monitoring system performance, and delivering initial support to address issues related to privileged account management. An ideal candidate for this role should possess a foundational understanding of cybersecurity principles and demonstrate eagerness to expand their knowledge and expertise within this dynamic field. Key Requirements / Responsibilities: - Administer and maintain the CyberArk PAM solution, which involves managing safes, platforms, and policies. - Monitor the performance and health of the CyberArk environment, promptly addressing alerts and notifications. - Provide initial support for privileged account access issues, including password checkouts, session management, and account onboarding. - Participate in the onboarding process of new accounts into the CyberArk platform, ensuring adherence to security policies and industry best practices. - Collaborate with the cybersecurity team to implement upgrades and enhancements to the CyberArk infrastructure. - Document standard operating procedures, system configurations, and incident reports. - Contribute to the development and delivery of CyberArk user training and awareness programs. - Support internal and external audits by furnishing necessary documentation and evidence related to CyberArk operations. - Stay abreast of the latest CyberArk features, updates, and industry best practices. - Perform routine maintenance tasks such as patching, upgrades, and backups within the CyberArk environment. Preferred Skills: - Fundamental understanding of cybersecurity principles and practices. - Proficiency in Windows and Unix/Linux operating systems. - Knowledge of Active Directory and LDAP is advantageous. - Strong analytical and problem-solving capabilities. - Excellent communication and interpersonal skills. - Ability to thrive in a fast-paced, collaborative environment. - Willingness to embrace learning opportunities and tackle new technological challenges. - Previous experience with CyberArk or other Privileged Access Management (PAM) solutions is beneficial but not mandatory. - Certifications such as CyberArk Defender or Sentry are desirable but not mandatory for entry-level applicants. Education: - A Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Work Requirements: - Flexibility for occasional travel. - Availability for on-call support and occasional overtime. - Willingness to work in shifts as necessary. Join EY in our mission to build a better working world, where we strive to create lasting value for clients, people, and society while fostering trust in the capital markets. Our diverse teams, empowered by data and technology across 150+ countries, offer assurance and support clients in their growth, transformation, and operations across various sectors. Through our services spanning assurance, consulting, law, strategy, tax, and transactions, EY teams drive innovation by asking insightful questions to address the complex challenges of today's world.,

Posted 1 month ago

Apply

6.0 - 10.0 years

0 Lacs

karnataka

On-site

We are looking to hire a Technical Presales Engineer with a specialization in Microsoft Security products such as MDE, MDO, Sentinel, Purview, Intune, Entra ID, etc. The ideal candidate should have a strong understanding of cybersecurity principles and be proficient in using Microsoft security tools. As a Presales Engineer, you will be responsible for providing technical expertise to support sales, designing customized security solutions, conducting product demonstrations, leading Proof of Concepts (PoCs), and serving as a trusted advisor to our customers. To excel in this role, you should possess excellent communication and presentation skills, along with a Bachelor's degree in Computer Science, Information Technology, or Cybersecurity. Having relevant Microsoft certifications will be considered a plus. If you are passionate about cybersecurity and have experience in the field, we encourage you to reach out to us at careers@skysecure.ai to explore this exciting opportunity further.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

kochi, kerala

On-site

The Backup Administrator role involves ensuring the stability, reliability, and recoverability of company data by efficiently managing backup and recovery processes. To excel in this position, you must be detail-oriented, analytical, and adept at troubleshooting complex data-related issues. Your responsibilities will include designing, implementing, and overseeing robust backup and recovery solutions to safeguard critical business data. You will troubleshoot backup failures, conduct backup and restore operations across various operating systems, and regularly test backup processes for data integrity. Collaboration with the IT team and stakeholders to establish data retention policies and conducting training sessions for staff on backup procedures will also be essential tasks. Additionally, you will be responsible for developing and testing disaster recovery plans to ensure business continuity. This role requires collaboration with stakeholders to align disaster recovery plans with business objectives and maintaining up-to-date documentation of these plans. To qualify for this position, you should have a minimum of 3 years of experience in IT systems administration with a focus on backup and recovery. Proficiency in managing backup solutions in large-scale environments, familiarity with backup software and tools, and knowledge of Servers, virtualization technologies, databases, cloud computing, and cybersecurity principles are necessary. Relevant certifications and strong analytical, problem-solving, and communication skills are also required. As a Backup Administrator, you should be able to work independently and as part of a team, thrive in dynamic environments with changing priorities, and possess good problem analysis and resolution skills. Your ability to make decisions quickly, prioritize tasks, and effectively manage time will be crucial in this role. In conclusion, the Backup Administrator plays a vital role in ensuring the protection and availability of company data through efficient backup and recovery processes, disaster recovery planning, and collaboration with stakeholders to align strategies with business objectives.,

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

karnataka

On-site

The role available is a full-time on-site position at Vsmart World Communication Pvt Ltd in Bengaluru for a Management Information Systems (MIS) professional. Your primary responsibilities will include managing information systems, ensuring data accuracy and security, analyzing system performance, and providing strategic data insights to support business decisions. You will be tasked with daily activities such as overseeing databases, configuring systems, strengthening information security protocols, and collaborating with various departments to enhance technological workflows. To excel in this role, you should possess strong analytical skills to interpret complex data effectively. Effective communication skills are crucial for successful collaboration with team members and stakeholders. Proficiency in Information Management and Information Technology is essential, along with knowledge of cybersecurity principles and practices. Experience with database management systems and related software is required. A Bachelor's degree in Information Technology, Computer Science, or a related field is necessary. The ability to work autonomously, manage multiple projects simultaneously, and hold relevant certifications (e.g., CISSP, CISM) would be advantageous.,

Posted 1 month ago

Apply

15.0 - 20.0 years

14 - 20 Lacs

Bengaluru, Karnataka, India

On-site

Role Responsibilities: Oversee large-scale and complex technology projects, ensuring effective resource allocation. Lead communication with stakeholders, conveying complex technical strategies at all levels. Drive innovation and continuous improvement in technology operations. Build and lead high-performing technology teams, setting strategic performance goals. Job Requirements: B.E/B.Tech/MCA in relevant fields Certifications in ITIL F/CompTIA Project+/CISSP/CISA/AWS Certified Solutions Architect, and others Experience in managing technology projects and risk mitigation Proven leadership and strategic management skills in technology operations

Posted 1 month ago

Apply

4.0 - 9.0 years

0 Lacs

karnataka

On-site

As an Embedded Software Development Engineer, you will be responsible for designing, developing, and maintaining embedded medical devices to ensure reliability, efficiency, and performance. Your role will involve writing clean, well-documented, and maintainable code in C/C++ and other relevant languages. Collaboration with hardware teams to define system requirements and optimize software-hardware integration will be crucial. Additionally, you will develop devices in compliance with medical device standards such as ISO 13485 and IEC 62304. Adherence to safety critical software development practices, including risk management and failure mode analysis, is essential. You will be required to develop and execute test plans for unit, integration, and system level testing of firmware. Troubleshooting and resolving firmware issues using debugging tools and techniques will be part of your responsibilities. Creating and maintaining comprehensive documentation, including specifications, design documents, and tests, is also a key aspect of the role. Contribution to the preparation of documentation required for regulatory submissions and tracking software defects throughout the development lifecycle are expected. To be successful in this role, you should have 4-9 years of experience in embedded software development, with at least 2 years in the medical device industry. Proficiency in C/C++, assembly language, and real-time operating systems (RTOS) is required. Experience with microcontroller/microprocessor architectures, peripherals, and common communication protocols (RS232, I2C, SPI, RS485) is necessary. Familiarity with software development lifecycle (SDLC) tools and methodologies, version control systems (e.g., Git), and strong problem-solving, analytical, and debugging skills are essential. Excellent communication skills and the ability to work effectively in a team-oriented environment are also critical for this role. Desirable skills include strong knowledge of medical device standards (IEC 62304, ISO 13485), familiarity with FDA guidelines and the 510K submission process, experience with wireless communication protocols, and knowledge of cybersecurity principles in embedded systems. If you possess the required skills and experience and are looking for a challenging opportunity as an Embedded Software Development Engineer, this position based in IND Bengaluru - Technology Campus could be the next step in your career.,

Posted 1 month ago

Apply

8.0 - 12.0 years

25 - 30 Lacs

Bengaluru

Work from Office

Hi, Greetings from Thales India Pvt Ltd.....! We are hiring for Technical Lead - C++, Linux, IOT & Networking for our Engineering competency center for Bangalore location. Job Description: Thales India Engineering Competency Center is seeking a Technical Lead who is in charge of the software development activities (definition of requirements, the design of SW architecture, coding and testing), in order to deliver software that meet requirements coming from a Business Lines (B/L), with the adequate quality and maturity level, within schedule and budget. Qualifications: Bachelor or Master of Technology in Computer Science & Engineering, Electronics & Communication or equivalent discipline with 8 to 12 years of relevant experience. Location: Thales India Private Limited, Richmond Town, Bengaluru, Karnataka 560025. Competencies: Passion for coding, technologies and shipping features that bring innovation Experience in leading the design, development and deployment software solutions. Experience in collaborating with cross-functional teams to define, design and ship new feature. Experience improving quality through thoughtful code review, appropriate testing, proper rollout, monitoring and proactive changes. Solid know-how of Linux operating system Experience with embedded RTOS system and Yocto distributions. Strong C/C++ and scripting languages (python/bash) skills Extended know-how with regards to TCP/IP networking and the corresponding low-level APIs. You also potentially have background on Linux network configuration Familiar with cybersecurity principles, network protocols, and familiarity with networking component. Experience with distributed version control systems Experience with network debug and testing tools (Wireshark) Experience with test automation framework (Jenkins) High level of responsibility, ownership, and accountability Good verbal and written communication skills Expertise in requirement management Minimum Skills/Experience: Any experience with Bootloader or Kernel would be beneficial. Experience with software packaging using the RedHat Package Manager. Familiar with Linux containers (Docker, LXC, OpenShift or Kubernetes). Experience working on complex, multi-threaded application architectures. Familiar with the SNMP protocol. Familiar with the basic tools deployed in our infrastructure: DOORs, Jira Familiar with build automation systems (Jenkins) and automation testing.

Posted 1 month ago

Apply

4.0 - 8.0 years

0 Lacs

indore, madhya pradesh

On-site

Ascentt is at the forefront of developing advanced data analytics & AI/ML solutions for prominent automotive and manufacturing companies worldwide. We specialize in transforming enterprise data into real-time decisions through cutting-edge machine learning and GenAI technologies. Our dedicated team tackles complex engineering challenges on a large scale, delivering tangible impacts across various industries. If you are a passionate innovator, we invite you to join us in shaping the future of industrial intelligence. We are looking for a proficient IT Asset Manager to take charge of the lifecycle management of IT hardware and software assets, with a primary focus on company-issued laptops (Windows and Mac). In this role, you will be responsible for maintaining precise inventory records, ensuring prompt software updates and patching, and establishing centralized management practices to uphold compliance, security, and operational efficiency. Responsibilities: Asset Lifecycle Management: - Maintain up-to-date records of IT assets, including assignment, location, lifecycle status, and warranty information. - Supervise the procurement, deployment, maintenance, and decommissioning of laptops and peripherals. - Implement and uphold policies governing hardware and software asset usage. Software Update & Patch Management: - Administer centralized software deployment and patching using tools like Microsoft Intune, Jamf, or similar solutions. - Ensure regular updates, security patches, and compliance on Windows and macOS endpoints. - Monitor and report patch compliance status and rectify non-compliant systems. Endpoint Configuration & Compliance: - Define and enforce standard operating environments (SOE) for Windows and Mac devices. - Apply configuration policies, security baselines, and MDM (Mobile Device Management) practices. - Provide support for remote device setup, configuration, and management. Vendor & License Management: - Track and manage software licenses to ensure compliance with vendor agreements. - Collaborate with procurement for license renewals and hardware acquisitions. - Engage with vendors and support teams to address escalated issues or warranty claims. Reporting & Auditing: - Generate routine reports on asset inventory, license utilization, and patch compliance. - Prepare for and assist in internal or external IT audits. - Identify opportunities for cost optimization and risk mitigation. Qualifications: - Bachelor's degree in Information Technology, Computer Science, or a related field. - Minimum 4 years of experience in IT asset management or endpoint management. - Proficiency in tools such as Microsoft Intune, Jamf, SCCM, or equivalent platforms. - Sound knowledge of Windows and macOS administration, patching, and configuration management. - Familiarity with ITIL practices and asset lifecycle frameworks. - Strong organizational, analytical, and communication skills. Preferred Skills: - ITIL or relevant certification (e.g., CSAM, CHAMP). - Experience with automated software deployment solutions. - Understanding of cybersecurity principles and endpoint protection tools.,

Posted 1 month ago

Apply

1.0 - 5.0 years

0 Lacs

karnataka

On-site

Eagle Eye Networks is the global leader in cloud video surveillance, providing cyber-secure, cloud-based video with artificial intelligence (AI) and analytics to enhance business efficiency and global safety. The Eagle Eye Cloud VMS is a robust and flexible platform that drives the future of video surveillance and intelligence. Headquartered in Austin, Texas, Eagle Eye has offices in Amsterdam, Bangalore, and Tokyo. We are currently looking for a Sales Engineer to join our team in Bangalore, India. The ideal candidate should possess expertise in video surveillance systems and cloud-based technologies. In this role, you will play a crucial part in supporting our sales efforts by offering technical knowledge, designing solutions, and guiding customers. As a Sales Engineer, your responsibilities will include driving sales, managing pipelines, advancing opportunities, and assisting in closing deals. You will collaborate closely with the Regional Sales Manager and channel partners to ensure successful execution of deals. This position is suitable for professionals with varying levels of experience, and responsibilities will be customized based on your background. Engaging with a diverse client base ranging from SMB to large enterprises will be a key aspect of this role. Key Responsibilities: **Technical Expertise & Pre-Sales Support:** - Acquire in-depth product knowledge to effectively communicate key features, benefits, and use cases. - Provide pre-sales technical support to sales teams, partners, and customers. - Conduct compelling remote product demonstrations and presentations. - Train internal sales personnel and resellers on products and offerings. - Support evaluations, proof-of-concepts (PoCs), and pilot programs. - Stay updated on industry trends and competitive landscapes. - Assist in responding to RFPs and technical inquiries. **Solution Design & Sales Collaboration:** - Design customized solutions that meet specific customer requirements. - Guide sales teams on optimal solution positioning and product alignment. - Consult on system design, including hardware specifications, subscriptions, and integrations. - Specify system hardware to meet project needs and customer expectations. **Pipeline Development & Deal Progression:** - Develop a robust sales pipeline through proactive prospecting, lead follow-up, and nurturing client relationships. - Progress deals from initial contact to successful closure by identifying client needs and delivering tailored solutions. **Closing Deals:** - Manage the full sales cycle and ensure smooth transitions for implementation. - Negotiate contracts, address objections, and close deals with clients of various sizes. - Meet or exceed annual sales quotas. **Collaboration with Partner Network:** - Work with partners to ensure seamless transitions for successful deal implementations. - Build and maintain strong relationships with clients and partners for long-term success. - Occasional travel may be required to meet business and customer needs. Desired Skills & Experience: - 1-4 years of experience in Sales Engineer or similar roles, preferably in video surveillance or SaaS industries. - Bachelor's degree in Computer Science, MIS, Engineering, or related fields, or equivalent experience. - Ability to conduct high-quality product demonstrations for technical and executive audiences. - Strong interest in high-tech solutions and continuous learning. - Organizational, planning, and multitasking skills. - Solid understanding of TCP/IP Networking. - Confidence in expanding technical skill set and capabilities. - Proficiency in Cybersecurity principles and practices. Join us at Eagle Eye Networks as we leverage AI on our cloud platform to revolutionize the video surveillance and security industry. Our Cloud VMS solution is designed to enhance safety, security, operations, and customer service for businesses worldwide. With thousands of customers in over 90 countries, our platform is trusted for actionable business intelligence and proactive security. Partnering with us means integrating with a secure, future-proof system that supports various industry cameras without requiring infrastructure replacement. Eagle Eye Cloud VMS is the platform of choice for the future of video surveillance.,

Posted 1 month ago

Apply

8.0 - 12.0 years

0 Lacs

karnataka

On-site

As a Technology Risk and Control Analyst within the Infrastructure Platform Engineering (IPE) team at the London Stock Exchange Group (LSEG), you will play a crucial role in identifying, assessing, and mitigating operational, regulatory, and technology-related risks across the organization. Working under the Infrastructure and Cloud business division, your responsibilities will involve supporting the implementation and maintenance of risk and control frameworks, conducting control testing, and collaborating with various teams to ensure compliance with internal policies and external regulations. Your key responsibilities will include identifying and assessing operational, regulatory, and compliance risks within the IPE teams, supporting the Risk and Control Self-Assessment (RCA) process, designing and documenting effective control procedures in collaboration with Infrastructure and GRC teams, as well as conducting Design Effectiveness Testing (DET) and Operating Effectiveness Testing (OET) to evaluate control performance. Additionally, you will work closely with cross-functional teams across Operations, Risk, Compliance, and IT to embed robust risk management practices, provide guidance and training on risk and control frameworks, recommend continuous improvements to control processes and risk mitigation strategies, and monitor industry trends and regulatory developments to ensure the effectiveness of risk practices. To qualify for this role, you should hold a Bachelor's degree in engineering, Computer Science, or a related field, along with 8-12 years of hands-on experience in Operational risk management, internal controls, IT audit, or compliance. A strong understanding of IT Governance framework and familiarity with IT industry standards such as ISO27001 and COBIT is essential. Experience with control testing, audit practices, compliance assessments, cybersecurity principles, and enterprise IT environments will be beneficial. Professional certifications such as CISA, CRISC, CISM are preferred, while proficiency in data analysis, reporting tools, and project management software is required. Strong analytical, problem-solving, and communication skills, as well as the ability to work collaboratively and manage relationships with stakeholders at all levels, are key attributes for success in this role. As part of LSEG, a leading global financial markets infrastructure and data provider, you will be contributing to driving financial stability, empowering economies, and enabling sustainable growth. With a diverse and inclusive organizational culture, you will have the opportunity to bring your true self to work, contribute to a collaborative and creative environment, and help re-engineer the financial ecosystem to support and drive sustainable economic growth. LSEG offers a range of tailored benefits and support, including healthcare, retirement planning, paid volunteering days, and wellbeing initiatives to ensure the well-being and development of its employees.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

chennai, tamil nadu

On-site

As a System Engineer specializing in Industry 4.0 technologies at Saint-Gobain in Chennai, you will play a crucial role in Indec 4.0, the Global Competency Center dedicated to enhancing manufacturing processes across Saint-Gobain's 800+ factories worldwide. Working alongside a team of 350+ experts, you will focus on industrial automation, communication, MES, data analytics, and IoT to design, implement, and optimize advanced systems that drive productivity and efficiency. Your responsibilities will include designing and developing industrial automation solutions, managing communication protocols, configuring MES for streamlined operations, analyzing data for process improvements, integrating IoT devices for real-time monitoring, and collaborating with cross-functional teams to execute Industry 4.0 projects successfully. You will also troubleshoot system issues, stay updated on Industry 4.0 trends, and apply them to ongoing initiatives. To excel in this role, you should hold a Bachelor's or Master's degree in Electrical Engineering, Computer Science, or a related field with 3-5 years of experience in industrial automation. Proficiency in communication protocols, MES platforms, data analytics tools, IoT frameworks, and Ignition software is essential. Your expertise in Python, database management, problem-solving, and collaboration will be key to your success. Preferred qualifications include proficiency in programming languages like Python, C#, or Java, knowledge of cybersecurity principles, relevant certifications in Industry 4.0 technologies, and experience with popular MES platforms. Prior exposure to manufacturing environments would be advantageous. Join Saint-Gobain, a global leader committed to innovation, sustainable development, and creating a positive impact on the world through materials and solutions that enhance wellbeing and shape the future for all.,

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

noida, uttar pradesh

On-site

At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. As a Technology Transformation Risk Manager, you will play a pivotal role in ensuring that technology transformations within the organization are carried out with a comprehensive understanding and management of the associated risks. Your responsibilities will include identifying, evaluating, and mitigating risks related to technology change initiatives, ensuring alignment with the company's risk appetite and compliance with relevant regulations and standards. You will lead risk assessments for technology transformation projects such as cloud migrations, system implementations, and digital innovations. Additionally, you will develop and maintain a risk management framework tailored to technology transformations, integrating industry best practices and regulatory requirements. Collaboration with project teams to identify potential risks early in the transformation lifecycle and recommend mitigation strategies will be key. You will monitor the effectiveness of risk mitigation plans, adjust them as necessary to address emerging risks and changes in the project scope, and facilitate risk workshops and training sessions to promote a proactive risk management culture among technology and business teams. Furthermore, you will liaise with internal and external stakeholders, including auditors, regulators, and third-party vendors, to ensure comprehensive risk coverage. Providing regular reporting to senior management on the risk profile of technology transformation initiatives, including key risk indicators and status of mitigation efforts, will be part of your role. To qualify for this role, you must have a Bachelor's or Master's degree in Information Technology, Computer Science, Risk Management, or a related field, along with a minimum of 5 years of experience in technology risk management, focusing on transformation projects. Strong understanding of IT governance frameworks, cybersecurity principles, and data privacy regulations is required. Desired experience in Internal controls within SAP ECC/S4 Applications and professional certifications such as CRISC, CISM, CISSP, or equivalent are highly desirable. You are expected to have strong exposure to client-facing roles, collaborate with cross-functional teams, and possess excellent communication, documentation, and report writing skills. Stay abreast of emerging technologies, industry trends, and regulatory changes that may impact the risk landscape of technology transformations, and support the continuous improvement of risk management policies, procedures, and tools.,

Posted 2 months ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

As a Product Security and QA Lead at Aptiv, you will play a crucial role in driving security and quality assurance initiatives for edge AI applications. Your primary responsibility will be to ensure that our edge computing solutions meet the highest standards of security, reliability, and performance. By leading cross-functional teams, you will establish robust security frameworks and quality processes specifically tailored for AI applications deployed at the edge. In terms of security leadership, you will be responsible for designing and implementing comprehensive security frameworks for edge AI applications. This includes ensuring secure model deployment, data protection, and device authentication. You will conduct threat assessments specific to edge AI environments, identify vulnerabilities in AI models, edge devices, and communication channels, and establish security testing protocols such as penetration testing, vulnerability assessments, and adversarial AI testing. Compliance management will also be a key aspect of your role, as you ensure adherence to industry standards and emerging AI governance frameworks, including ISO 27001, NIST, GDPR, and CCPA. Additionally, you will implement privacy-preserving techniques for edge AI, such as federated learning, differential privacy, and secure multi-party computation. In terms of quality assurance leadership, you will develop and execute comprehensive QA strategies for edge AI products, including model validation, performance testing, and reliability assessment. You will create detailed test plans covering functional, performance, security, and AI-specific testing scenarios, and lead and mentor QA engineers, security analysts, and test automation specialists. Establishing KPIs and metrics for product quality, security posture, and AI application/model performance will be essential, along with continuously optimizing testing processes and methodologies for edge AI applications. Your background should include a Bachelor's degree in Computer Science, Cybersecurity, Engineering, or a related field, along with 10+ years of experience in product security and/or QA leadership roles, with at least 3 years specifically in AI/ML or edge computing. Deep understanding of cybersecurity principles, threat modeling, security testing methodologies, machine learning algorithms, model training, inference, AI system architectures, edge computing platforms, IoT devices, distributed AI systems, programming proficiency in Python, C/C++, and scripting languages, experience with security testing tools, AI frameworks, cloud platforms, and testing frameworks will be crucial for success in this role. Join Aptiv to be part of an inclusive work environment that fosters growth and development for all individuals, regardless of gender, ethnicity, or beliefs. Make an impact by contributing to a safer world with zero fatalities, zero injuries, and zero accidents. Benefit from resources and support for your family, physical, and mental health, including competitive health insurance. Enjoy hybrid and flexible working hours, higher education opportunities, life and accident insurance, Sodexo cards, well-being programs, EAP Employee Assistance, access to fitness clubs, and creche facilities for working parents. Apply today to be a part of shaping tomorrow at Aptiv!,

Posted 2 months ago

Apply

3.0 - 7.0 years

0 Lacs

noida, uttar pradesh

On-site

At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture, and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better too. Join us and build an exceptional experience for yourself, and a better working world for all. As a Technology Transformation Risk Senior, you will play a pivotal role in ensuring that technology transformations within the organization are carried out with a comprehensive understanding and management of the associated risks. You will assist in identifying, assessing, and mitigating risks associated with significant technology changes, such as system upgrades, cloud migrations, and the introduction of new digital tools and platforms. Your role will ensure that technology advancements are implemented securely and in compliance with the company's risk management policies. Key responsibilities: - Assist in conducting risk assessments for technology transformation projects, identifying potential risks and vulnerabilities. - Support the development and implementation of risk mitigation strategies to address identified risks. - Collaborate with project teams to ensure risk considerations are integrated throughout the project lifecycle. - Monitor and report on the status of risk mitigation activities, providing updates to the Technology Transformation Risk Manager and other stakeholders. - Participate in the creation and maintenance of risk documentation, including risk registers, reports, and dashboards. - Contribute to the development of risk management policies, procedures, and training materials. - Engage with internal and external stakeholders to communicate risk findings and recommendations. - Stay informed about emerging technology trends, threats, and regulatory requirements that may impact the risk landscape. - Support the Technology Transformation Risk Manager in fostering a culture of risk awareness and proactive risk management within the organization. To qualify for the role, you must have a Bachelor's degree in Information Technology, Computer Science, Risk Management, or a related field, along with a minimum of 3 years of experience in technology risk management, with a focus on transformation projects. A strong understanding of IT governance frameworks, cybersecurity principles, and data privacy regulations is required. Desired experience includes internal controls within SAP ECC/S4 Applications, professional certifications such as CRISC, CISM, CISSP, or equivalent are highly desirable, and exposure working in client-facing roles with cross-functional teams. EY exists to build a better working world, helping to create long-term value for clients, people, and society, and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform, and operate. Working across assurance, consulting, law, strategy, tax, and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.,

Posted 2 months ago

Apply

3.0 - 7.0 years

0 Lacs

noida, uttar pradesh

On-site

As a Technology Transformation Risk Senior at EY, you will be instrumental in ensuring that technology transformations are executed with a thorough understanding and management of associated risks. Your role will involve identifying, assessing, and mitigating risks related to significant technology changes like system upgrades, cloud migrations, and the implementation of new digital tools. By adhering to the company's risk management policies, you will guarantee the secure and compliant implementation of technological advancements. Key Responsibilities: - Conduct risk assessments for technology transformation projects to identify potential risks and vulnerabilities. - Assist in developing and executing risk mitigation strategies to address identified risks. - Collaborate with project teams to incorporate risk considerations throughout the project lifecycle. - Monitor and communicate the status of risk mitigation activities to the Technology Transformation Risk Manager and other stakeholders. - Contribute to the preparation and upkeep of risk documentation, including risk registers, reports, and dashboards. - Participate in the formulation of risk management policies, procedures, and training materials. - Engage with internal and external stakeholders to convey risk findings and recommendations. - Stay abreast of emerging technology trends, threats, and regulatory requirements that could impact the risk landscape. - Support the Technology Transformation Risk Manager in cultivating a culture of risk awareness and proactive risk management within the organization. Qualifications: - Bachelor's degree in Information Technology, Computer Science, Risk Management, or a related field. - At least 3 years of experience in technology risk management, particularly in transformation projects. - Profound knowledge of IT governance frameworks (e.g., COBIT, ITIL), cybersecurity principles, and data privacy regulations (e.g., GDPR, CCPA). - Preferred experience in Internal controls within SAP ECC/S4 Applications, IT application controls, IT general controls, and interface controls. - Professional certifications such as CRISC, CISM, CISSP, or equivalent are highly advantageous. - Demonstrated exposure to client-facing roles and collaboration with cross-functional teams including internal audits, IT security, and business stakeholders to evaluate control effectiveness and facilitate remediation activities. - Excellent communication, documentation, and report writing skills. Join EY to craft a fulfilling career and contribute to building a better working world for all.,

Posted 2 months ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

As a Security Analyst/Engineer, you will be responsible for supporting the security operations of the organization by assisting in the monitoring, detection, and response to security incidents. This role offers a blend of security analysis and engineering tasks, providing a progression from foundational knowledge to more advanced responsibilities, enabling you to contribute significantly to the organization's cybersecurity efforts. You will be involved in various key responsibilities, including security monitoring and analysis. This involves monitoring security events and alerts from sources such as SIEM, IDS/IPS, antivirus systems, and endpoint detection platforms. Additionally, you will conduct initial analysis of security events, collaborate with senior analysts to investigate and respond to security incidents like malware infections, phishing attempts, and unauthorized access. In incident response activities, you will provide technical assistance during security incidents for containment, eradication, and recovery efforts. You will also document incident response procedures, develop post-incident reports, and implement proactive measures to enhance incident detection and response capabilities, such as developing playbooks for common attack scenarios. Supporting the vulnerability management process will be part of your responsibilities, including assisting in vulnerability scanning, assessment, and remediation efforts. You will help prioritize and track the resolution of identified vulnerabilities, collaborate with system owners and IT teams for timely patching and mitigation, and conduct security assessments and penetration tests to identify weaknesses in systems, applications, and network infrastructure. Furthermore, you will assist in the administration and configuration of security tools and technologies, participate in evaluating and testing new security technologies, optimize the configuration and tuning of security tools, and recommend enhancements based on industry best practices and organizational requirements. You will also support security awareness and training initiatives by assisting in the development of educational materials and delivering security awareness briefings to staff. The ideal candidate should have a Bachelor's degree in computer science, Information Security, or related field, along with 3-5 years of experience in a cybersecurity role. Strong understanding of cybersecurity principles, proficiency in security tools and technologies, excellent analytical and problem-solving skills, effective communication, and stakeholder management abilities are essential. Certifications such as CompTIA Security+, CEH, or equivalent are a plus. Demonstrated experience in conducting security analysis, incident response, and vulnerability management in a complex environment, hands-on experience with security tool optimization, security assessments, and penetration testing, as well as a proven track record of incident response efforts are desired qualifications for this role. This position offers a valuable opportunity for career growth and development in the field of cybersecurity, with the possibility to progress into more specialized roles such as Senior Security Analyst, Incident Responder, or Security Engineer. Continued learning and professional certifications will be encouraged to enhance skills and knowledge in the cybersecurity domain. Joining the global cyber security team at Carmeuse will provide you with the opportunity to contribute to the organization's digitalization strategy while ensuring security. Working with a team of regional senior security managers and cyber architects, you will be involved in security design, delivery, and operations to safeguard Carmeuse's digital IT & OT footprint, participating in innovative initiatives to strengthen operations. Reporting to Victor Alexandrescu, the leader of the team, you will benefit from his extensive experience and practical knowledge. Victor's management style focuses on efficiency, continuous improvement, and proactive problem-solving, aiming to optimize processes and enhance team performance. The organization offers a permanent contract, flexible working hours, home working policy, competitive salary package and benefits, growth opportunities, strong HR and training policy, and work-life balance. The recruitment process includes steps such as resume and cover letter analysis by Georges Mensah-Boateng, a first "Teams" interview with personality questionnaires, a second interview with Victor Alexandrescu and Aurelie Mordant, and a final interview with Stavros Georgakopoulos, Rusty Gavin, and Eugene Marchenko to assess your suitability for the role.,

Posted 2 months ago

Apply

0.0 - 1.0 years

0 Lacs

Gurugram

Work from Office

Why Were Looking for an Intern: As part of our ongoing efforts to strengthen the culture of security awareness, we are in the process of developing a dedicated Intranet library to cater this requirement. Given the need to embed cybersecurity best practices and guidelines in this site, we see this as an excellent opportunity to bring in a motivated intern who can: Assist in the design and development of the SharePoint intranet site. Learn and grow under the guidance of our global cybersecurity team. Get to know about cybersecurity domains and operations.

Posted 2 months ago

Apply

2.0 - 5.0 years

3 - 13 Lacs

Pune, Maharashtra, India

On-site

Evaluate the cyber security functionalities of product and improve the security posture. Work for fulfilling security compliance requirements for the products. Perform Threat modeling/ Security assessment for products Perform product hardening, to allow only necessary function for products operation. Cybersecurity functionality verification on control system components Participate in Vulnerability handling of the products competencies Good understanding of cybersecurity principles like cyber security architecture, defense in depth, default deny, least privilege, compartmentalization, privileged initiation, AAA, etc. Good understanding of cyber security controls like; IDS/IPS (host and network), hardening, security policies, Malware Protection, Filtering, NGFW, etc. Knowledge in Networking, patch management. Hands on Experience with protocols like HTTP, HTTPS, SSL, SSH, ICMP, DHCP, L2TP, PPTP, DNS, SNMP, RDP, and NTP. Windows and Virtual Machine Administration. Experience with Security tools like NMAP, Nessus, Wireshark, etc. Certifications like MCP/MCITP/MCSE/CEH/CISSP are advantage. Knowledge on security standards like IEC 62443, ISO 27001. Knowledge on protocols like IEC 61850, Goose, Modbus is an added advantage. ,

Posted 2 months ago

Apply

3.0 - 6.0 years

3 - 6 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Position Overview: We are seeking a motivated and detail-oriented Junior Vulnerability Management Analyst to join our cybersecurity team. The role focuses on identifying, analysing, and assisting in the remediation of infrastructure vulnerabilities using tools like PingCastle and Qualys SCA. This is an excellent opportunity for individuals looking to grow their expertise in cybersecurity and vulnerability management. Key Responsibilities Vulnerability Scanning & Analysis: Conduct vulnerability scans using PingCastle and Qualys SCA to identify risks in Active Directory and infrastructure systems. Analyze scan results, validate findings, and prioritize vulnerabilities based on risk levels. Monitor scan performance, troubleshoot issues, and report anomalies to senior analysts. Remediation Support : Collaborate with IT Operation Teams to track remediation efforts and ensure timely resolution of identified vulnerabilities. Provide recommendations for configuration hardening based on findings. Reporting & Documentation: Generate detailed vulnerability reports and dashboards for internal stakeholders. Maintain accurate records of vulnerabilities, remediation timelines, and compliance status. Policy & Compliance: Assist in reviewing security policies and ensuring adherence to industry standards like CIS benchmarks. Support compliance efforts by aligning vulnerability management practices with organizational goals.Soft Skills: Strong analytical skills with attention to detail. Effective communication skills for technical reporting and collaboration with cross-functional teams. Eagerness to learn new tools and adapt to evolving cybersecurity challenges.Desirable Skills: Experience with patch management processes. Familiarity with compliance frameworks (e.g., ISO 27001, NIST). QualificationsQualifications & Skills Technical Skills: Foundational understanding of cybersecurity principles, vulnerability management, and risk mitigation. Familiarity with tools like PingCastle, Qualys SCA, or similar vulnerability assessment platforms. Basic knowledge of Active Directory security and IT infrastructure components (e.g., servers, networks).Education & Experience: Bachelors degree in Cybersecurity, Information Technology, or a related field (or equivalent experience) 0-3 years of experience in cybersecurity or IT operations.

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies