Jobs
Interviews

1574 Data Security Jobs - Page 13

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

7 - 12 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

About Atos Atos is a global leader in digital transformation with c. 78,000 employees and annual revenue of c. 10 billion. European number one in cybersecurity, cloud and high-performance computing, the Group provides tailored end-to-end solutions for all industries in 68 countries. A pioneer in decarbonization services and products, Atos is committed to a secure and decarbonized digital for its clients. Atos is a SE (Societas Europaea) and listed on Euronext Paris. . Lead and support the implementation of Microsoft Purview for data discovery, classification, labeling, and governance.Configure sensitivity labels, policies, and data loss prevention (DLP) rules aligned with business and compliance needs.Manage ongoing operations of Microsoft Purview, including data source onboarding, connector management, and regular scan scheduling.Collaborate with data owners, IT, compliance, and security teams to ensure accurate data classification and policy enforcement.Monitor platform health, troubleshoot issues, and maintain system performance and availability.Analyze scan results and generate actionable reports for risk remediation and compliance.Support compliance, audit, and incident response efforts with data visibility provided by Purview.Maintain and update documentation, runbooks, and SOPs related to Purview configuration and usage.Stay current with Microsoft Purview features, roadmap updates, and data security best practices. Here at Atos, diversity and inclusion are embedded in our DNA. Read more about our commitment to a fair work environment for all.

Posted 2 weeks ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

About Atos Atos is a global leader in digital transformation with c. 78,000 employees and annual revenue of c. 10 billion. European number one in cybersecurity, cloud and high-performance computing, the Group provides tailored end-to-end solutions for all industries in 68 countries. A pioneer in decarbonization services and products, Atos is committed to a secure and decarbonized digital for its clients. Atos is a SE (Societas Europaea) and listed on Euronext Paris. The purpose of Atos is to help design the future of the information space. Its expertise and services support the development of knowledge, education and research in a multicultural approach and contribute to the development of scientific and technological excellence. Across the world, the Group enables its customers and employees, and members of societies at large to live, work and develop sustainably, in a safe and secure information space. Lead and support the implementation of Microsoft Purview for data discovery, classification, labeling, and governance.Configure sensitivity labels, policies, and data loss prevention (DLP) rules aligned with business and compliance needs.Manage ongoing operations of Microsoft Purview, including data source onboarding, connector management, and regular scan scheduling.Collaborate with data owners, IT, compliance, and security teams to ensure accurate data classification and policy enforcement.Monitor platform health, troubleshoot issues, and maintain system performance and availability.Analyze scan results and generate actionable reports for risk remediation and compliance.Support compliance, audit, and incident response efforts with data visibility provided by Purview.Maintain and update documentation, runbooks, and SOPs related to Purview configuration and usage.Stay current with Microsoft Purview features, roadmap updates, and data security best practices. Here at Atos, diversity and inclusion are embedded in our DNA. Read more about our commitment to a fair work environment for all. Atos is a recognized leader in its industry across Environment, Social and Governance (ESG) criteria. Find out more on our CSR commitment. Choose your future. Choose Atos.

Posted 2 weeks ago

Apply

5.0 - 7.0 years

7 - 9 Lacs

Bengaluru

Work from Office

Job Title: Senior User Experience Designer About Skyhigh Security: Skyhigh Security is a dynamic, fast-paced, cloud company that is a leader in the security industry. Our mission is to protect the world s data, and because of this, we live and breathe security. We value learning at our core, underpinned by openness and transparency. Since 2011, organizations have trusted us to provide them with a complete, market-leading security platform built on a modern cloud stack. Our industry-leading suite of products radically simplifies data security through easy-to-use, cloud-based, Zero Trust solutions that are managed in a single dashboard, powered by hundreds of employees across the world. With offices in Santa Clara, Aylesbury, Paderborn, Bengaluru, Sydney, Tokyo and more, our employees are the heart and soul of our company. Skyhigh Security Is more than a company; here, when you invest your career with us, we commit to investing in you. We embrace a hybrid work model, creating the flexibility and freedom you need from your work environment to reach your potential. From our employee recognition program, to our Blast Talks learning series, and team celebrations (we love to have fun!), we strive to be an interactive and engaging place where you can be your authentic self. We are on these too! Follow us on LinkedIn and Twitter @SkyhighSecurity . Role Overview: Skyhigh Security is looking for you, a Senior User Experience Designer to help drive the evolution of our Security Service Edge (SSE) portfolio. You will be responsible for crafting intuitive, user-centric experiences that empower our clients to leverage the full potential of our SSE solutions, driving innovation and differentiation. Do you like simplifying complexity? Visualizing data in a way that provides powerful insights? Streamlining workflows? In this role, these are the kinds of puzzles we solve everyday on our mission to protect organizations and their data from threats. Role Overview: A little about the role: Skyhigh Security is looking for you, a Senior User Experience Designer to help drive the evolution of our Security Service Edge (SSE) portfolio. You will be responsible for crafting intuitive, user-centric experiences that empower our clients to leverage the full potential of our SSE solutions, driving innovation and differentiation. Do you like simplifying complexity? Visualizing data in a way that provides powerful insights? Streamlining workflows? In this role, these are the kinds of puzzles we solve everyday on our mission to protect organizations and their data from threats. In this role, you can expect to : Design wireframes, mockups and prototypes to effectively conceptualize new product initiatives and features. Quickly iterate and offer versions based on design critique from peers and learnings found in user feedback. Plan and initiate engagements with users through coordination with research leads and integrate research findings into design iterations. In collaboration with a UX Lead, you will plan, conduct and lead UX storyboards, design meetings, and presentations on data gathered and important findings. Partner with our internal teams to generate user flow and product creation timelines. To Fly High in this role, you have: Bachelor s degree in Graphic Design, Industrial Design, or Human-Computer Interaction with 5 to 7 years of equivalent work experience. A quality design portfolio, containing shipped product work and case studies (required). Adequate knowledge of user-centered design principles and design thinking. Worked with minimal direction and are guided operational and project guidelines while. collaborating withPM and/or engineering to clearly define design problems, when necessary. Demonstrated the ability to execute excellent judgment in selecting methods and best practices for obtaining solutions in common design problems. Demonstrated excellent verbal and written communication skills. Skilled in Figma ( Sketch experience equivalent). Solid experience using Digital Whiteboard apps (FigJam, Mural or Miro). Would be great if you have: Experience with HTML Experience with security or networking Company Benefits and Perks: We believe that the best solutions are developed by teams who embrace each others unique experiences, skills, and abilities. We work hard to create a dynamic workforce where we encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees. Retirement Plans Medical, Dental and Vision Coverage Paid Time Off Paid Parental Leave Support for Community Involvement Were serious ab out our commitment to a workplace where everyone can thrive and contribute to our industry-leading products and customer support, which is why we prohibit discrimination and harassment based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.

Posted 2 weeks ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

Mumbai, Navi Mumbai

Work from Office

About Atos Atos is a global leader in digital transformation with c. 78,000 employees and annual revenue of c. 10 billion. European number one in cybersecurity, cloud and high-performance computing, the Group provides tailored end-to-end solutions for all industries in 68 countries. A pioneer in decarbonization services and products, Atos is committed to a secure and decarbonized digital for its clients. Atos is a SE (Societas Europaea) and listed on Euronext Paris. The purpose of Atos is to help design the future of the information space. Its expertise and services support the development of knowledge, education and research in a multicultural approach and contribute to the development of scientific and technological excellence. Across the world, the Group enables its customers and employees, and members of societies at large to live, work and develop sustainably, in a safe and secure information space. Responsibilities: Design and implement data obfuscation strategies using Thales CipherTrust Tokenization, FPE, and Data Masking modules. Define and build reusable obfuscation templates and policies based on data classification, sensitivity, and business use cases. Apply obfuscation to PII, PCI, and other regulated data across databases, applications, files, APIs, and cloud services. Install, configure, and administer CipherTrust Manager, DSM, and related connectors. Develop and deploy integration patterns with enterprise systems (e.g., Oracle, SQL Server, Kafka, Snowflake, Salesforce, AWS, Azure). Automate policy deployment and secret rotation using APIs, CLI, or scripting tools (e.g., Ansible, Terraform, Python, Shell). Work with or integrate secondary data protection tools (e.g. DLP, IRM, MIP etc.) Design, deploy, and manage PKI systems, including root and subordinate certificate authorities (CAs). Manage digital certificate lifecycles for users, devices, and services. Ensure secure storage and access controls for encryption/decryption and signing keys. Enable cross-platform key management and policy consistency for hybrid and multi-cloud environments. Align obfuscation patterns with internal data protection standards, classification schemes, and regulatory frameworks (GDPR, CCPA, DORA, SEBI, etc.). Provide obfuscation logs and audit evidence to support security assessments, audits, and compliance reviews. Implement monitoring and alerting for obfuscation control failures, anomalies, or unauthorized access attempts. Create detailed technical documentation, SOPs, and configuration guides. Train internal engineering teams and application owners on how to securely integrate with obfuscation services. Collaborate with data governance, security architecture, and DevSecOps teams to drive secure-by-design initiatives. Knowledge, Skill, Experience Required: Required: 3 6 years of hands-on experience with Thales CipherTrust Data Security Platform (Tokenization, DSM, FPE, Masking). Strong knowledge of data protection concepts: tokenization (deterministic and random), pseudonymization, static/dynamic masking, and encryption . Experience integrating obfuscation solutions with databases (Oracle, SQL, PostgreSQL, etc.), enterprise apps, and data pipelines. Proficiency in scripting and automation tools: Python, Shell, REST APIs, Ansible, CI/CD pipelines. Familiarity with key management, HSM integration, and data access policies. Beneficial: Thales Certified Engineer / Architect CipherTrust CISSP, CISA, CDPSE, or CIPT will be a binus Cloud Security Certification (e.g., AWS Security Specialty, Azure SC-300) Personal Characteristics : Strong analytical and problem-solving mindset Ability to work independently in a fast-paced, global enterprise environment Excellent documentation and communication skills Comfortable collaborating with cross-functional teams (App Dev, Security, Compliance, Data Governance) Experience supporting enterprise data security transformations and data-centric protection strategies #LinkedIN

Posted 2 weeks ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

Mumbai, Navi Mumbai

Work from Office

About Atos Atos is a global leader in digital transformation with c. 78,000 employees and annual revenue of c. 10 billion. European number one in cybersecurity, cloud and high-performance computing, the Group provides tailored end-to-end solutions for all industries in 68 countries. A pioneer in decarbonization services and products, Atos is committed to a secure and decarbonized digital for its clients. Atos is a SE (Societas Europaea) and listed on Euronext Paris. . Responsibilities: Design and implement data obfuscation strategies using Thales CipherTrust Tokenization, FPE, and Data Masking modules. Define and build reusable obfuscation templates and policies based on data classification, sensitivity, and business use cases. Apply obfuscation to PII, PCI, and other regulated data across databases, applications, files, APIs, and cloud services. Install, configure, and administer CipherTrust Manager, DSM, and related connectors. Develop and deploy integration patterns with enterprise systems (e.g., Oracle, SQL Server, Kafka, Snowflake, Salesforce, AWS, Azure). Automate policy deployment and secret rotation using APIs, CLI, or scripting tools (e.g., Ansible, Terraform, Python, Shell). Work with or integrate secondary data protection tools (e.g. DLP, IRM, MIP etc.) Design, deploy, and manage PKI systems, including root and subordinate certificate authorities (CAs). Manage digital certificate lifecycles for users, devices, and services. Ensure secure storage and access controls for encryption/decryption and signing keys. Enable cross-platform key management and policy consistency for hybrid and multi-cloud environments. Align obfuscation patterns with internal data protection standards, classification schemes, and regulatory frameworks (GDPR, CCPA, DORA, SEBI, etc.). Provide obfuscation logs and audit evidence to support security assessments, audits, and compliance reviews. Implement monitoring and alerting for obfuscation control failures, anomalies, or unauthorized access attempts. Create detailed technical documentation, SOPs, and configuration guides. Train internal engineering teams and application owners on how to securely integrate with obfuscation services. Collaborate with data governance, security architecture, and DevSecOps teams to drive secure-by-design initiatives. Knowledge, Skill, Experience Required: Required: 3 6 years of hands-on experience with Thales CipherTrust Data Security Platform (Tokenization, DSM, FPE, Masking). Strong knowledge of data protection concepts: tokenization (deterministic and random), pseudonymization, static/dynamic masking, and encryption . Experience integrating obfuscation solutions with databases (Oracle, SQL, PostgreSQL, etc.), enterprise apps, and data pipelines. Proficiency in scripting and automation tools: Python, Shell, REST APIs, Ansible, CI/CD pipelines. Familiarity with key management, HSM integration, and data access policies. Beneficial: Thales Certified Engineer / Architect CipherTrust CISSP, CISA, CDPSE, or CIPT will be a binus Cloud Security Certification (e.g., AWS Security Specialty, Azure SC-300) Personal Characteristics : Strong analytical and problem-solving mindset Ability to work independently in a fast-paced, global enterprise environment Excellent documentation and communication skills Comfortable collaborating with cross-functional teams (App Dev, Security, Compliance, Data Governance) Experience supporting enterprise data security transformations and data-centric protection strategies #LinkedIN

Posted 2 weeks ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

Mumbai, Navi Mumbai

Work from Office

About Atos Atos is a global leader in digital transformation with c. 78,000 employees and annual revenue of c. 10 billion. European number one in cybersecurity, cloud and high-performance computing, the Group provides tailored end-to-end solutions for all industries in 68 countries. A pioneer in decarbonization services and products, Atos is committed to a secure and decarbonized digital for its clients. Atos is a SE (Societas Europaea) and listed on Euronext Paris. The purpose of Atos is to help design the future of the information space. Its expertise and services support the development of knowledge, education and research in a multicultural approach and contribute to the development of scientific and technological excellence. Across the world, the Group enables its customers and employees, and members of societies at large to live, work and develop sustainably, in a safe and secure information space. Responsibilities: Design and implement data obfuscation strategies using Thales CipherTrust Tokenization, FPE, and Data Masking modules. Define and build reusable obfuscation templates and policies based on data classification, sensitivity, and business use cases. Apply obfuscation to PII, PCI, and other regulated data across databases, applications, files, APIs, and cloud services. Install, configure, and administer CipherTrust Manager, DSM, and related connectors. Develop and deploy integration patterns with enterprise systems (e.g., Oracle, SQL Server, Kafka, Snowflake, Salesforce, AWS, Azure). Automate policy deployment and secret rotation using APIs, CLI, or scripting tools (e.g., Ansible, Terraform, Python, Shell). Work with or integrate secondary data protection tools (e.g. DLP, IRM, MIP etc.) Design, deploy, and manage PKI systems, including root and subordinate certificate authorities (CAs). Manage digital certificate lifecycles for users, devices, and services. Ensure secure storage and access controls for encryption/decryption and signing keys. Enable cross-platform key management and policy consistency for hybrid and multi-cloud environments. Align obfuscation patterns with internal data protection standards, classification schemes, and regulatory frameworks (GDPR, CCPA, DORA, SEBI, etc.). Provide obfuscation logs and audit evidence to support security assessments, audits, and compliance reviews. Implement monitoring and alerting for obfuscation control failures, anomalies, or unauthorized access attempts. Create detailed technical documentation, SOPs, and configuration guides. Train internal engineering teams and application owners on how to securely integrate with obfuscation services. Collaborate with data governance, security architecture, and DevSecOps teams to drive secure-by-design initiatives. Knowledge, Skill, Experience Required: Required: 3 6 years of hands-on experience with Thales CipherTrust Data Security Platform (Tokenization, DSM, FPE, Masking). Strong knowledge of data protection concepts: tokenization (deterministic and random), pseudonymization, static/dynamic masking, and encryption . Experience integrating obfuscation solutions with databases (Oracle, SQL, PostgreSQL, etc.), enterprise apps, and data pipelines. Proficiency in scripting and automation tools: Python, Shell, REST APIs, Ansible, CI/CD pipelines. Familiarity with key management, HSM integration, and data access policies. Beneficial: Thales Certified Engineer / Architect CipherTrust CISSP, CISA, CDPSE, or CIPT will be a binus Cloud Security Certification (e.g., AWS Security Specialty, Azure SC-300) Personal Characteristics : Strong analytical and problem-solving mindset Ability to work independently in a fast-paced, global enterprise environment Excellent documentation and communication skills Comfortable collaborating with cross-functional teams (App Dev, Security, Compliance, Data Governance) Experience supporting enterprise data security transformations and data-centric protection strategies #LinkedIN

Posted 2 weeks ago

Apply

2.0 - 7.0 years

4 - 9 Lacs

Pune

Work from Office

Our team members are at the heart of everything we do. At Cencora, we are united in our responsibility to create healthier futures, and every person here is essential to us being able to deliver on that purpose. If you want to make a difference at the center of health, come join our innovative company and help us improve the lives of people and animals everywhere. Apply today! Job Details 1. Abstract and digitize Prime Vendor Agreements (PVAs) to support pricing tool data / input 2.Process Health Systems (HS) contracts, Community Retail & Long-Term Care (CRLTC) PVAs, and other contracts across the organization 3.Review and digitize contracts per the Service Level Agreement (SLA) 4.Collaborate with various functional teams regarding data interpretation and entry 5.Leverage the current abstraction methodology and format for determining terms, conditions, fields, and grids for digitization 6.Present to team on decisions and rational behind data input / digitization assumptions 7.Provide status updates to supervisors and other team members 8.Discuss / escalate day-to-day tasks with team supervisor as needed 9.Prepare for quarterly data quality review process / audit 10. Assist and support department managers in preparing for meetings 11. Maintain and promote positive and professional working relationships with associates and management 12. Comply with all appropriate policies, procedures, and regulations 13.Any other duties assigned . WORK EXPERIENCE AND EDUCATION: Bachelor s degree or equivalent in a relevant field 2+ years of experience in legal contract management and data abstraction Experienced in reviewing PVAs, Amendments, and Term Sheets Skilled in using Excel and CLM platforms, especially Icertis Helped standardize abstraction formats for better consistency Maintains confidentiality and data security Strong communication and presentation skills What Cencora offers Benefit offerings outside the US may vary by country and will be aligned to local market practice. The eligibility and effective date may differ for some benefits and for team members covered under collective bargaining agreements. Full time Affiliated Companies Affiliated Companies: CENCORA BUSINESS SERVICES INDIA PRIVATE LIMITED Equal Employment Opportunity Cencora is committed to providing equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, genetic information, national origin, age, disability, veteran status or membership in any other class protected by federal, state or local law. Cencora is committed to providing reasonable accommodations to individuals with disabilities during the employment process which are consistent with legal requirements. If you wish to request an accommodation while seeking employment, please call 888.692.2272 or email hrsc@cencora.com . We will make accommodation determinations on a request-by-request basis. Messages and emails regarding anything other than accommodations requests will not be returned

Posted 2 weeks ago

Apply

3.0 - 9.0 years

5 - 11 Lacs

Bengaluru

Work from Office

Not Applicable Specialism Data, Analytics & AI Management Level Senior Associate & Summary . In business intelligence at PwC, you will focus on leveraging data and analytics to provide strategic insights and drive informed decisionmaking for clients. You will develop and implement innovative solutions to optimise business performance and enhance competitive advantage. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purposeled and valuesdriven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above s Job Accountabilities Hands on Experience in Azure Data Components like ADF / Databricks / Azure SQL Good Programming Logic Sense in SQL Good PySpark knowledge for Azure Data Bricks Data Lake and Data Warehouse Concept Understanding Unit and Integration testing understanding Good communication skill to express thoghts and interact with business users Understanding of Data Security and Data Compliance Agile Model Understanding Project Documentation Understanding Certification (Good to have) Domain Knowledge Mandatory skill sets Azure DE, ADB, ADF, ADL Preferred skill sets Azure DE, ADB, ADF, ADL Years of experience required 3 to 9 years Education qualification Graduate Engineer or Management Graduate Education Degrees/Field of Study required Master of Engineering, Bachelor of Engineering Degrees/Field of Study preferred Required Skills Microsoft Azure Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Business Case Development, Business Data Analytics, Business Intelligence and Reporting Tools (BIRT), Business Intelligence Development Studio, Communication, Competitive Advantage, Continuous Process Improvement, Creativity, Data Analysis and Interpretation, Data Architecture, Database Management System (DBMS), Data Collection, Data Pipeline, Data Quality, Data Science, Data Visualization, Embracing Change, Emotional Regulation, Empathy, Inclusion, Industry Trend Analysis {+ 16 more} Travel Requirements Government Clearance Required?

Posted 2 weeks ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

Gurugram

Work from Office

3+ Years of experience with Microsoft Purview Excellent communication and communication skills, with the ability to effectively liaise with both technical and non-technical stakeholders. Capable of generating accurate, comprehensive as-built documentation representing the total output of work delivered to the client. Strong ability to create a positive impression on clients and maintain confidence while guiding client IT teams in enterprise deployments of Purview. This includes navigating various client challenges, attitudes, concerns and expectations while achieving technical success. Strong analytical, problem-solving, and troubleshooting skills . Mastery in Microsoft Purview and its integration with other Microsoft services. Deep understanding of data security principles and best practices. Familiarity with global data privacy regulations such as GDPR, DPDPA, CCPA, and HIPAA. Strong understanding of Sensitive Infotypes, Custom and Trainable Classifiers, Records Management and Data Lifecycle Management concepts. Experience with Microsoft Purview, including data governance, compliance management, and Information Protection capabilities. Specific experience strongly recommended and will be thoroughly assessed in technical interviews. Experience in conducting risk assessments, audits, and data flow mapping in Microsoft Purview. Experience with incident response and threat detection related to data breaches. Experience in scripting and automation using PowerShell, Azure CLI, or similar technologies. Background in IT compliance, risk management, or related fields. Experience deploying other Microsoft 365 and Azure tools including Microsoft Defender, Microsoft Entra, Microsoft Intune, and more.

Posted 2 weeks ago

Apply

6.0 - 11.0 years

15 - 20 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats. Do Design and develop enterprise cyber security strategy and architecture Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses Identify risks associated with business processes, operations, information security programs and technology projects Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge Identify security design gaps in existing and proposed architectures and recommend changes or enhancements Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. Provide support during technical deployment, configuration, integration and administration of security technologies Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity Provide solution of RFPs received from clients and ensure overall design assurance Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture Depending on the clients need with particular standards and technology stacks create complete RFPs Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps Evaluate and recommend solutions to integrate with overall technology ecosystem Tracks industry and application trends and relates these to planning current and future IT needs Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers Provide training to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Program Manager/Director Regular reporting & updates Infrastructure (CIS team) For infrastructure support External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming security technologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) and understanding of compliance regulatory requirement like PCI DSS, HIPAA, etc.- Expert Systems Thinking - Understanding of the Wipro system (interrelatedness, interdependencies and boundaries) and perform problem solving in a complex environment - Expert Leveraging Technology - In-depth knowledge of and mastery over ecosystem technology that commands expert authority respect - Master Technical Knowledge - Certified Information Systems Security Professional (CISSP), Cloud Architect Certification from AWS and Azure, ToGAF or SABSA certification- Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Managing Complexity Client centricity Technology Acumen Innovation Problem Solving approach Collaborative Working Execution Excellence

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

2.0 - 6.0 years

3 - 6 Lacs

Bengaluru

Work from Office

Hiring for SQL Srver Developer- Hyderabad Design, develop, and maintain SQL Server databases and objects (tables, views, stored procedures, functions, triggers). Write complex T-SQL queries for data extraction, reporting, and application support. Optimize and fine-tune SQL queries for performance and scalability. Monitor database performance and proactively identify and resolve performance issues. Ensure data security, integrity, and consistency.

Posted 2 weeks ago

Apply

4.0 - 9.0 years

8 - 13 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

About Atos Atos is a global leader in digital transformation with c. 78,000 employees and annual revenue of c. 10 billion. European number one in cybersecurity, cloud and high-performance computing, the Group provides tailored end-to-end solutions for all industries in 68 countries. A pioneer in decarbonization services and products, Atos is committed to a secure and decarbonized digital for its clients. Atos is a SE (Societas Europaea) and listed on Euronext Paris. The purpose of Atos is to help design the future of the information space. Its expertise and services support the development of knowledge, education and research in a multicultural approach and contribute to the development of scientific and technological excellence. Across the world, the Group enables its customers and employees, and members of societies at large to live, work and develop sustainably, in a safe and secure information space. Lead and support the implementation of Microsoft Purview for data discovery, classification, labeling, and governance.Configure sensitivity labels, policies, and data loss prevention (DLP) rules aligned with business and compliance needs.Manage ongoing operations of Microsoft Purview, including data source onboarding, connector management, and regular scan scheduling.Collaborate with data owners, IT, compliance, and security teams to ensure accurate data classification and policy enforcement.Monitor platform health, troubleshoot issues, and maintain system performance and availability.Analyze scan results and generate actionable reports for risk remediation and compliance.Support compliance, audit, and incident response efforts with data visibility provided by Purview.Maintain and update documentation, runbooks, and SOPs related to Purview configuration and usage.Stay current with Microsoft Purview features, roadmap updates, and data security best practices. Here at Atos, diversity and inclusion are embedded in our DNA. Read more about our commitment to a fair work environment for all. Atos is a recognized leader in its industry across Environment, Social and Governance (ESG) criteria. Find out more on our CSR commitment. Choose your future. Choose Atos.

Posted 2 weeks ago

Apply

5.0 - 10.0 years

30 - 35 Lacs

Pune

Work from Office

Responsibilities Requisition ID R-10367289 Date posted 07/16/2025 End Date 07/31/2025 City Pune State/Region Maharashtra Country India Location Type Onsite Calling all innovators find your future at Fiserv. Job Title Tech Lead, Software Development Engineering What does a great Application Developer resource do in Fiserv Consults with project teams and functional units on the design of important projects or services. Helps support existing business systems applications and demonstrates proficiency and leadership within agile methodologies. Balances and prioritizes project work efficiently. Design applications, analyze, lead and coordinate business enterprise solutions. Develops high performance micro services and sets high standards of code quality. What you will do The candidate for this position will leverage their knowledge of Tandem systems to focus on production and non-production technology systems. Their day-to-day responsibilities will include developing support utilities and applications for managing Card Services Card Management Apllications, implementation of Card Master configurations, implementation of all code required to support the Card Management application system, addressing client/vendor/internal escalated requests for assistance; engaging with implementation, systems, and/or development teams on the build-out of Tandem services, improving execution by scripting of repetitive tasks, and automate error notification. What you will need to have: Bachelors degree in Computer Science or Engineering, or relevant work experience IT experience with background in development or operations support with hands-on using Tandem a plus. Minimum of 5 years in support of a transaction processing Internet application or Internet Banking. Working experience in COBOL85 programining, TAL, TACL, Scup, Pathway or any other switch on Tandem platform is preferred Advanced technical skills in Tandem Non-Stop environment (pathway, netbatch, enform, tacl) A good understanding of data communications protocols such as TCP/IP Experience in full software development life cycle using agile methodologies Ability to analyze business requirements, functional /technical designs, business level documentation and code development. Install code changes and identify root-cause analysis. Strong technical experience with design, development, modeling, application performance tuning, and unit/integration/performance testing. Experience working with remote and offshore development teams. Excellent written and verbal communication skills Possesses a broad and comprehensive understanding of the different systems/products and services in the market/organization and practices of relevant discipline What would be great to have Knowledge of financial technologies, standards, and industry regulations (i.e., Payment Card Industry Data Security Standards) are highly preferred Knowledge of and experience with JIRA, Service Point and Confluence products. Prior technical lead role experience. Conclusion The role demands a detail-oriented professional with a balance of development, testing, and support capabilities. Offering a combination of critical thinking and technical expertise, the successful candidate will be instrumental in delivering high-quality mainframe solutions within a dynamic working environment. Thank you for considering employment with Fiserv. Please: Apply using your legal name Complete the step-by-step profile and attach your resume (either is acceptable, both are preferable). Our commitment to Diversity and Inclusion: Fiserv is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, gender, gender identity, sexual orientation, age, disability, protected veteran status, or any other category protected by law. Note to agencies: Fiserv does not accept resume submissions from agencies outside of existing agreements. Please do not send resumes to Fiserv associates. Fiserv is not responsible for any fees associated with unsolicited resume submissions. Warning about fake job posts: Please be aware of fraudulent job postings that are not affiliated with Fiserv. Fraudulent job postings may be used by cyber criminals to target your personally identifiable information and/or to steal money or financial information. Any communications from a Fiserv representative will come from a legitimate Fiserv email address. Share this Job Email LinkedIn X Facebook

Posted 2 weeks ago

Apply

6.0 - 8.0 years

9 - 14 Lacs

Pune

Work from Office

Lead end-to-end technical implementation of AI-driven projects using Microsoft AI tools: Azure OpenAI, Copilot Studio, and Bot Framework. Design and develop intelligent copilots, multi-turn chatbots, and custom GPT solutions integrated within enterprise tools such as Microsoft Teams, SharePoint, and Dynamics 365. Translate business requirements into technical architecture and AI flows using OpenAI APIs, prompt engineering, and integration with enterprise systems. Leverage AI Foundry to manage the AI lifecycle including model selection, deployment, monitoring, and optimization. Architect AI/ML solutions that use Retrieval-Augmented Generation (RAG), semantic search, and contextual memory frameworks (LangChain, Semantic Kernel, etc.). Collaborate with product owners and business analysts to identify high-value use cases and define solution roadmaps. Develop and execute POCs and MVPs with hands-on coding, configuration, and orchestration of LLMs and chatbot pipelines. Integrate with enterprise data sources via APIs, GraphQL, and Microsoft Graph to create holistic user experiences. Mentor junior developers and work with DevOps teams to ensure stable deployment, CI/CD, and performance monitoring. Create documentation and reusable components/templates for repeated use across the organization. Stay current on Microsoft s AI advancements and recommend tools, features, or practices that improve time-to-value and performance. Must-Have Skills: 6 8 years of overall experience, including 5+ years in AI/ML or Conversational AI Deep hands-on knowledge of: Azure OpenAI services and APIs Copilot Studio for building Microsoft 365-integrated assistants Microsoft Bot Framework SDK/Composer for chatbot development Prompt engineering for LLM optimization Strong Python or Node.js development skills (for AI orchestration and integration) Experience with enterprise system integration using APIs (Microsoft Graph, REST, JSON, OAuth) Familiarity with Azure ML, Azure Cognitive Services, and Azure DevOps Ability to design RAG-based architectures, manage embeddings, and leverage vector databases (e.g., Azure AI Search) Strong understanding of natural language processing (NLP) and foundational models (GPT, BERT) Excellent communication, leadership, and stakeholder engagement capabilities. Good-to-Have Skills: Experience with Semantic Kernel or LangChain Working knowledge of AI Foundry for orchestrating AI pipelines Familiarity with Copilot extensibility and Teams App Studio Exposure to M365 Copilot APIs and custom plugin creation Knowledge of Responsible AI, data security, and compliance principles Familiarity with containerized deployment (Docker, Kubernetes) Experience in building dashboards and analytics (Kibana, Grafana) to visualize bot usage and performance Basic understanding of Power Platform (Power Automate, Power Apps) and its integration with AI

Posted 2 weeks ago

Apply

8.0 - 10.0 years

22 - 27 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do : 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Fortinet Firewall Experience : 8-10 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

22 - 27 Lacs

Chennai

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do : 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Checkpoint Firewalls and VPN Experience : 8-10 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

22 - 27 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do : 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management Experience : 8-10 Years.

Posted 2 weeks ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Mumbai

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Data Security Consulting.: Experience: 3-5 Years.

Posted 2 weeks ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Bengaluru

Work from Office

Do you want to help create the future of healthcare Siemens Healthineers is a place for people who dedicate their energy and passion to this greater cause. It reflects their pioneering spirit combined with our long history of engineering in the ever-evolving healthcare industry. We offer you a flexible and dynamic environment where you have the space to stretch beyond your comfort zone to grow personally and professionally. Sound interesting Then come in and join our team as a Senior Cybersecurity Expert (M365 security, MS Purview) Overview: We are looking for a skilled and proactive Senior Cybersecurity Expert (M365 security, MS Purview) to join our security team. This role combines the definition of the strategy and main goals of different services hosted in the Purview portal with the hands-on technical implementation to make sure we make the most of the tools we have at our disposal. Having strong knowledge and experience managing the different tools belonging to Microsoft Purview is key, as the central goal of this position will consist of assessing the current usage, define priorities, work with stakeholders and drive implementation to address our gaps in the risk & compliance, data governance and data security areas. Experience with other solutions belonging to the Microsoft 365 environment is also valued (Microsoft Defender XDR, Entra ID, Intune, etc.). Tasks and responsibilities: You drive conversations and collaboration with all relevant stakeholders, inside and outside of IT, to meet all the necessary requirements to use the different services hosted in Purview. Main stakeholders to consider: o HR o Legal o Compliance o Cybersecurity Community o Relevant business lines o Data owners You assess the current usage of tools and services within Microsoft Purview suite (including those not belonging to cybersecurity), identify potential gaps, and collaborate with relevant stakeholders to address these gaps and integrate new tools into Siemens Healthineers where applicable. You identify and collaborate with the departments responsible within IT that should act as service owners for the different services hosted in Microsoft Purview. You lead the implementation and strategic use of Microsoft Purview as the organization s central data governance solution, providing guidance and alignment across diverse business data owners to ensure consistent data policies, classification, and responsible data stewardship including clear ownership, proper documentation, access control, and data quality standards. You support organizational efforts to automate the classification of information using Microsoft Purview, enabling proactive identification and protection of sensitive data across the enterprise through scalable, policy-driven tagging and labelling. You take ownership of the Microsoft Purview portal as a whole, ensuring that the permissions granted to different stakeholders are assigned responsibly. It is important to ensure that a proper access control is in place, fulfilling the least privilege principle, conduct access reviews periodically and maintain up to date documentation in this regard. You benchmark and select Microsoft Purview products and deploy proofs of concept with relevant stakeholders to decide the new capabilities to be deployed. You provide a key role in troubleshooting, problem-solving and end-user support to ensure the seamless operation of our services. You ensure that the appropriate licensing is in place for all solutions and collaborate with relevant teams to create a budget forecast if additional licensing is required. Analyze if the current spending of the licenses needed for different services is efficient/really needed for the organization, to optimize our cost. You assist in establishing monitoring processes to ensure admin activities align with the least privilege principle, safeguarding the company against risky actions that could indicate potential compromise, and fulfilling audit requirements. You coordinate and facilitate discussions with the provider (Microsoft) for Purview-related topics. You participate in projects or activities dedicated to improve our security posture in Microsoft 365, in any of the other areas managed by our team (Data Loss Prevention, Insider Risk Management, Defender for Endpoint, Defender for Identity, Defender for Office 365, etc.). What is in it for you: You will benefit from a Hybrid work schedule, allowing you to maintain a healthy work-life balance. You will thrive in a multinational environment where you will have the chance to meet and cooperate with colleagues from all over the globe. You will be engaged in both hands-on IT/security operations and strategic security improvements. You will participate in and lead big security projects, introducing improvements that will make a difference on the daily work of more than 70k employees. Organization, coordination, and communication are key to succeed. You will have the chance to constantly increase your knowledge and develop your skills by combining training courses with on-the-job training. You will develop a successful career by participating in all relevant stages: Definition, planning, implementation, and supervision. Qualifications: You have 7+ years of relevant work experience in IT, and 5+ years working with Microsoft Compliance/Purview solutions and the field of cybersecurity. You have proven experience in Microsoft Purview and the solutions that it hosts (Data Governance, Communication Compliance, Data Lifecycle Management, etc.), with a strong focus on implementation and hands-on configuration. Possession of relevant certifications, such as Microsoft SC-400 or SC-401 is highly valued. You have experience designing, deploying, and managing Microsoft Purview policies in complex environments. You have knowledge regarding other Microsoft365 security solutions and topics (Microsoft Defender Suite, Microsoft Information Protection, Insider Risk Management ) You have advanced English, communication, and negotiation skills: clear and concise communication; able to address stakeholders of different backgrounds and technical expertise. Additionally: You enjoy engaging with different teams and facilitating discussions to find solutions that meet stakeholder s expectations. You have a proactive mindset with a passion for staying ahead of potential security risks. You are analytical and work methodically, both autonomously and in a team setting. You work or have been working in global distributed teams. You are a quick learner and have the aptitude to get into new technologies and architectures. You provide guidance and mentorship to other team members, specially on Purview and best practices. You are able to drive projects from initiation to completion, ensuring deliverables are met on time and in alignment with business objectives. Being part of our team: Our global team: Siemens Healthineers is a leading global medical technology company. 72,000 dedicated colleagues in over 70 countries are driven to shape the future of healthcare. An estimated 5 million patients across the globe benefit every day from our innovative technologies and services in the areas of diagnostic and therapeutic imaging, laboratory diagnostics and molecular medicine, as well as digital health and enterprise services. Curious about our culture Our culture embraces different perspectives, open debate, and the will to challenge convention. Change is a constant aspect of our work. We aspire to lead the change in our industry rather than just react to it. That s why we invite you to take on new challenges, test your ideas, and celebrate success. As an equal-opportunity employer we are happy to consider applications from individuals with disabilities.

Posted 2 weeks ago

Apply

5.0 - 10.0 years

9 - 13 Lacs

Pune

Work from Office

Your work days are brighter here. At Workday, we value our candidates privacy and data security. Workday will never ask candidates to apply to jobs through websites that are not Workday Careers. Please be aware of sites that may ask for you to input your data in connection with a job posting that appears to be from Workday but is not. In addition, Workday will never ask candidates to pay a recruiting fee, or pay for consulting or coaching services, in order to apply for a job at Workday. About the Team Workday s professional accountants go beyond to strive for operational efficiency through system optimization and process automation. We encourage team cross training to broaden knowledge and to continue to drive for motivation. We are committed to working hard, having fun while maintaining a culture of work-life balance. About the Role Corporate Accounting department is looking for highly motivated Senior Accountant to join a collaborative and growing team. You will report to Manager, Corporate Accounting (Shared Services). You will be a self-starter, curious, have excellent attention to detail. You will be involved in various operational activities, monthly close procedures and process improvement. Responsibilities of the position: Prepare monthly journal entries including payroll accruals, expense accruals, prepaid expense schedules, lease, fixed asset management, and other month-end close activities in accordance with close schedule Prepare monthly balance sheet account reconciliations and research any reconciling variances in a timely manner, to ensure accuracy, Document, streamline and automate workflows to maximize operational efficiencies Support external audits and reviews by interfacing with auditors and ensuring timely completion of supporting schedules Promote a culture of continuous improvement and operational innovation and regularly interact with US Corporate Accounting management on accounting matters Perform ad hoc analyses and projects from the management About You Basic Qualifications: Bachelor s Degree in Accounting (or with an emphasis in accounting) Minimum 5 years of accounting experience Other Qualifications: CPA or CA preferred Public accounting, software and/or SaaS industry preferred Experience managing accounting operations in a fast-growing company In depth knowledge of generally accepted accounting practices and principles Experience using large ERP system Ability to work with global and cross-functional teams Proficiency with MS Excel Experience with tight deadlines and timeliness for work performed High attention to details and accuracy, excellent organizational skills and the ability to multitask Excellent oral and written communication skills Strong analytical skills and problem solving abilities Collaborative teammate to work with cross-functional teams Eagerness to learn and tackle challenges in a rapidly growing and dynamic environment Our Approach to Flexible Work With Flex Work, we re combining the best of both worlds: in-person time and remote. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. We know that flexibility can take shape in many ways, so rather than a number of required days in-office each week, we simply spend at least half (50%) of our time each quarter in the office or in the field with our customers, prospects, and partners (depending on role). This means youll have the freedom to create a flexible schedule that caters to your business, team, and personal needs, while being intentional to make the most of time spent together. Those in our remote "home office" roles also have the opportunity to come together in our offices for important moments that matter. Are you being referred to one of our roles? If so, ask your connection at Workday about our Employee Referral process!

Posted 2 weeks ago

Apply

8.0 - 13.0 years

10 - 14 Lacs

Bengaluru

Work from Office

We re looking for a Staff Software Engineer to join Procore s Product & Technology Team. Procore software solutions aim to improve the lives of everyone in construction and the people within Product & Technology are the driving force behind our innovative, top-rated global platform. We re a customer-centric group that encompasses engineering, product, product design and data, security and business systems. As a Staff Engineer on our Platform team, youll be a key technical leader, partnering with engineers and product managers to develop and maintain the compute platform capabilities that enable our SaaS products. Youll have the unique opportunity to build our next-generation construction platform, translating complex problems into pragmatic solutions that open up the boundaries of technical possibilities. If you are passionate about distributed systems and operating cloud-based products at scale, wed love to hear from you. This position is a key technical leader within the engineering organization and will report to the Director of Platform Services and will be based in our Bangalore, India. We re looking for someone to join us immediately. Apply today to join our team of Groundbreakers. What youll do: Participate in the design and implementation of our next-generation platform, primarily focused on building and supporting distributed systems with the highest standards in quality and operational excellence. Lead the architecture of our core platform, focusing on cloud infrastructure, container orchestration, and developer tooling, while championing a culture of automation and Infrastructure as Code (IaC). Support our engineering teams in all phases of the software development lifecycle, including requirements gathering, functional and technical design, development, testing, and roll-out. Develop teammates by conducting constructive code reviews, providing mentorship on technical and architectural concepts, and fostering a culture of engineering excellence. Help identify and propose solutions for technical gaps in our platform by running proof-of-concepts and experiments. Work alongside our Product and UX teams, leveraging your experience and expertise in cloud technologies to influence our product roadmap and develop innovative solutions. What were looking for: 8+ years of experience building and operating cloud-based, highly available, and distributed systems at scale. Deep expertise with a major cloud provider (AWS preferred; Azure/GCP experience is a plus) and extensive, hands-on experience operating Kubernetes clusters. Strong proficiency in managing infrastructure as code using tools like Terraform or CrossPlane. Proficiency in at least one programming language (e.g., Go, Python, Java) and a solid understanding of building and maintaining distributed systems. Experience designing and implementing observability solutions using tools like Prometheus, Grafana, Datadog, or OpenTelemetry. A passion for mentoring other engineers, a demonstrated ability to lead complex technical projects, and a curious mind that is driven to innovate and solve customer problems. BS or MS degree in Computer Science, a related discipline, or equivalent experience.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

10 - 12 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management. Experience: 8-10 Years. >

Posted 2 weeks ago

Apply

7.0 - 12.0 years

9 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails

Posted 2 weeks ago

Apply

8.0 - 10.0 years

10 - 12 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Threat Protection. Experience: 8-10 Years. >

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies