Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
5 - 10 years
7 - 12 Lacs
Udaipur
Work from Office
Senior information security engineer Job Name: Senior information security engineer Job Role: Sr. IT Security Engineer Industry:IT, Software, Bpo Job Location:Udaipur (Rajasthan) Experience:5- 10 yearSkills:Team Handling, information security controls, VPN, Cloud Server Salary:Best in the Industry Education:BCA, MCA, B.tech(CS/IT) Job Summary: Looking for Sr.information security engineer. Should have strong work exposure in the IT Security department. having work exposure in the IT security environment to identify cybersecurity gaps in systems, processes, and controls and evaluate the potential risk exposure. Work with IT management to develop opportunities for improvement. Architect, configure, manage, and deploy devices including firewalls, IPS, and IDS to improve our ability to prevent and detect intrusions in real-time. About The Role :: Should have strong work exposure in the IT Security department. having work exposure in the IT security environment to identify cybersecurity gaps in systems, processes, and controls and evaluate the potential risk exposure. Work with IT management to develop opportunities for improvement. Architect, configure, manage, and deploy devices including firewalls, IPS, and IDS to improve our ability to prevent and detect intrusions in real-time.To develop and maintain the information security policy and accompanying standards, procedures, and guidance. Research and stay informed of potential information security threats, breaches, industry trends, emerging technologies, and response alternatives. Conduct research and provide insight to identify, assess, and deploy security technology solutions and partners including but not limited to encryption, firewalls, authorization, authentication, intrusion detection, and gateway security controls. To develop and deliver a programme of planned compliance reviews and ensure any gaps are addressed. Engage in regular assessment of the current IT security environment to identify cybersecurity gaps in systems, processes and controls and evaluate the potential risk exposure. Work with IT management to develop opportunities for improvement. Architect, configure, manage and deploy devices including firewalls, IPS and IDS to improve our ability to prevent and detect intrusions in real-time. Monitor and proactively recommend solutions for correcting issues related to security technology performance and capabilities of vendors. Collaborate on critical technology projects to ensure that security issues are addressed throughout the project life cycle. Develop and implement recommendations for security technology solutions, which may include technology for encryption, firewalls, authorization, authentication, intrusion, detection, and gateway security controls. Work in an advisory role in application development or acquisition projects to assess security requirements and implement controls as planned. Perform day- to- day security log review and analysis in adherence to company requirements and industry security best practices. Do static scanning (code, open-source libraries) and dynamic scanning. The log reviews include:operating systems, databases, applications, networks and security applications. Work with auditors to demonstrate processes and ensure appropriate levels of access are applied throughout the information lifecycle. Lead the design, development, and delivery of security training programs. 24x7 on-call availability as required. Knowledge of trends and developments in technology relating to security and risk management. Strong understanding of information security controls, risks and threats. Strong knowledge of enterprise security technologies, e.g., Virtual Private Network (VPN), Encryption, Firewalls, Intrusion Detection/ Prevention, and Anti- Virus. Working knowledge of Linux, Windows,Cloud Server, and other enterprise- wide applications. Knowledge of information security standards (ISO, SOC), data privacy laws, computer crime laws, and federal data protection laws, etc. Knowledge of vulnerability analysis tools, OWASP Zap, Veracode, Qualys, Sonarqube, Acunetix, Burp Suite, etc. Knowledge of information security audit and assessment methodologies, policies, standards, procedures and best practices. Ability to conduct risk management assessments; provide assistance in identification, prioritization and remediation of information systems vulnerabilities. Strong technical depth and passion for security. Experience working with 3rd party vendors and service providers.
Posted 2 months ago
4 - 9 years
7 - 11 Lacs
Bengaluru
Work from Office
Job Title Cyber Security Responsibilities Detailed insights of a variety of attack patterns, threats, malicious actors, exploits and common vulnerabilities, monitor threat intelligence and analyze CWEs and CVEs.? Commendable knowledge of current and emerging threats, Cloud Security and Application Security Concepts, and Enterprise Security Architecture.? Deep insights of Application Security S-SDLC Lifecyle framework with OWASP TOP 10, SANS 25, Public Cloud Security and tooling (Axure, AWS, Prisma Cloud, Twistlock etc).? Application Security (AppSec,VA/PT,DevSecOps, DevOps) and DevOps security and related software such as Blackduck, AquaSec, Synk, Coverity, etc.? Familiarity with cybersecurity frameworks and standards - NIST, MITRE ATT&CK, ISO, CMMC 2.0, PCI DSS etc Preferred Skills: Foundational->Cybersecurity Competency Management->Cyber Competency Strategy Planning Educational Requirements Bachelor of Engineering Service Line Quality * Location of posting is subject to business requirements
Posted 2 months ago
8 - 13 years
18 - 33 Lacs
Bengaluru
Work from Office
Hope you are doing good! Excellent Opportunity with LKQ India (Fortune 500 Company & Nasdaq Listed) at Bangalore location. Experience: 7 to 15 Years Work Location: Bannerghatta Rd, Bangalore Role:: Permanent Job Description: Configure and Administer Splunk SIEM (Security Incident and Event Management) tool. Administer Email Gateway technologies (Microsoft Defender /Abnormal Security). Zscaler proxy log analysis and leverage for investigation. Crowdstrike Endpoint detection and response platform and policy management. Analyze and assess security incidents and escalate to appropriate internal teams for additional assistance. Responsible for investigating incidents, analyzing attack methods, researching new defense techniques and tools, developing security policy, and documenting procedures for SOC. Malware analysis and other attack analysis to extract indicators of compromise. Perform data security event correlation between various systems. Prepare reports, summaries, and other forms of communication that may be both internal and client facing. Periodic upgradation/creation of correlation rules based on emerging threats and requirement following MITRE Attack US-Cert and other TTP sources. Lead Information security analyst, having an experience of 4+ years in incident management, log analysis and troubleshooting of network and security related issues. Comprehensive management and technical experience in building and leading large-scale SOC (Security Operations Center) Strong hands-on experience in security management tools like Splunk Security Incident and Event Management (SIEM) Good experience in working/communicating with cross-functional IT infrastructure teams like network, system, database, application, security to build and manage effective security operations. Building Security Operations Center and/or Incident Response Team from scratch. Implementation-of and building-content-in technologies like SIEM, SOAR and Cloud Security Solutions. Building Security Metrics that will help customers/management to understand the effectiveness and gaps in Incident Management and over all Cyber Security posture. Working with customers requirement gathering, on-boarding, technical discussions, report walk-throughs. Working alongside teams like Compliance and VAPT Exposure to related areas of cybersecurity including Host Security, Network Security, IAM, Vulnerability Management, Penetration Testing, Compliance etc. Develop security scope, KPIs, policies and procedures for various SOC activities. Defined workflows for the day-to-day operations of SOC Ensure timeline, scope, quality & resource is managed accordingly with committed deliverables. Developed Playbooks for analysis and incident remediation Participate in security design discussion with various teams (technical and management) and provide advice on how SOC can be used effectively. Installing, updating, upgrading SIEM solution. On-boarding log sources and working on log source issues. Create and fine-tune content in SIEM Correlation Rules, Dashboards, Reports, Lists etc. Interact with SIEM vendor TAC (support) to fix any issues with SIEM. Mentor L1 and L2 security analyst. Assist in analysis of P1 alerts and alerts that require involvement of multiple teams. Evaluate new solutions for SOC team. Experience in creating reports and KPIs for C-level audience. Experience of Integrating tools with SOAR and designing incident response workflows in SOAR platform. Hands-on Experience in writing custom scripts (Python and Regex) for task automation. Interested candidates, kindly fill up the below details and share updated resume to ajupendra@LKQCORP.com Years of Experience:: Current CTC :: Excepted CTC :: Current Location :: Currently you have PF / Provident Fund deduction with your company ? :: Notice Period ::
Posted 3 months ago
5 - 10 years
35 - 45 Lacs
Gurgaon
Work from Office
Position in this function within the Enterprise Security and Resilience Office (ESRO) we are the first-line defense against securing the largest healthcare company in the world against security threats. We are focused on transformation by strengthening our cyber defenses, ransomware resiliency, mitigating vulnerabilities, and better securing all aspects of our company, globally. We are vigilant and passionate about protecting the sensitive data of our members and providers and are committed to leveraging every tool, partnership and process needed to enhance our security posture. It is our duty to protect the information of those we serve and help fulfill our mission of making the health care system work better for everyone. Primary Responsibilities: This position serves as an all-hazards incident commander, with a focus on responsibility for the overall leadership of large and complex cyber incidents. This position is expected to lead events to resolution as quickly and completely as possible, managing the resources, plans, and communications involved in that resolution. Effective management is key to limiting the disruption caused by an incident and restoring normal business operations as quickly as possible. This position will work closely with senior leaders from response teams across the enterprise to assure effective coordination and resolution of incident response. This position will help develop and maintain Global Crisis Management cyber response plans and processes to assure efficient and coordinated response to events and maintain a continuous improvement process to keep the program aligned with company goals and strategies, and to align with industry standards and best practices. As an all-hazards leader, this role will lead other major non-technology incidents as needed. Position will lead and participate in exercises to test plans and processes as outline in the multi-year training and exercise plan. Incident Preparation: sets up communication channels, invites the appropriate people into those channels during an incident, and trains team members on best practices for not only incident management, but also communication during an incident Decision Making: quickly assesses an incident and makes decisions about what to do, which team members are needed, and what actions come next at every stage of the resolution process Delegation: delegates tasks to appropriate teams and know when to expand the team by pulling in additional developers, communication experts, etc. Oversight: oversees the response and resolution process from start to finish, asks the right questions, gets regular status reports from each team member, and prioritizes next steps Team Alignment: oversees communication and makes sure everyone is on the same page; keeps conversations focused and brief to minimize time to resolution Escalation and Resource Management: escalates issues to more senior or specialized resources and/or brings in additional resources to speed up resolution After-Action: creates documents where teams can share their thoughts, plans after-action meetings, and makes recommendations on how to prevent or reduce the impact of future incidents As a leader on the Global Crisis Management team, incumbent will be part of the all-hazards response team with response duties outside of cyber events. 24x7 on-call support Required Qualifications: 5+ years of technical, hands-on experience in one or more cyber security domains - security operations, forensics, incident response, IAM, pen testing, red teaming, hunt, cyber intelligence, etc. 5+ years of responsibility for planning, development, and maintenance of cyber and/or all-hazard response plans 3+ years of experience leading significant cyber-security and/or all-hazards incidents. 3+ years of experience developing and facilitating exercises, and conducting after-action reviews 3+ years of experience interfacing with senior executives Proven solid communication: ability to communicate ideas clearly and concisely Problem-solving: Proven to identify and solve complex problems in high-pressure situations; ability to think critically and creatively to come up with practical solutions Decision-making: Proven to weigh the pros and cons of different options and quickly make confident decisions; ability to make decisions with limited information Listening and synthesis: Proven to efficiently seek out and understand different perspectives; use that information to make better decisions Leadership: Proven to take command in high-stress situations; inspire and motivate the team, while also providing clear guidance and direction; prioritize tasks based on their urgency Preferred Qualifications: Demonstrated high-level knowledge of incident management best practices and systems Demonstrated understanding of risk management, mitigation, and incident response Demonstrated experience communicating with senior management and executives.
Posted 3 months ago
6 - 9 years
8 - 12 Lacs
Gurgaon
Work from Office
As a part of the team the candidate is expected to drive customer and partner enablement for increased adoption of some of the key technologies mentioned above through trainings (virtual/onsite), workshops, POC/POV and deployment support Key Skills required :- Expertise in configuring Cisco SDWAN (Viptela), ISE & SD-Access with a good understanding of the following : Architecture and Components Use Cases & Integrations Implementation approach and best practices Products/Protocols: Controllers Cisco Catalyst Center , Cisco Catalyst SDWAN Manager Cisco Switches Entire Catalyst 9K Portfolio (Switches, WLC and APs) Routers ISR 1K/4K , ASR 1K Cisco Catalyst 8K series Protocols - OMP, OSPF, ISIS, BGP, EIGRP, MPLS, VRF, IPSec Experience of designing and deploying Cisco Wireless portfolio would be an added advantage Working knowledge of Virtualization and Cloud required for installation, integrations and management of technologies and products in scope Basic knowledge of AI, API Scripting and Automation (i.e. Python, XML/JSON, Restful APIs) CCNA/CCNP qualification would be an added advantage Excellent communication / presentation skills
Posted 3 months ago
12 - 17 years
14 - 19 Lacs
Mumbai
Work from Office
Project Role : Technology Architect Project Role Description : Design and deliver technology architecture for a platform, product, or engagement. Define solutions to meet performance, capability, and scalability needs. Must have skills : Solution Architecture Good to have skills : NA Minimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Technology Architect, you will be responsible for designing and delivering technology architecture for a platform, product, or engagement. You will define solutions to meet performance, capability, and scalability needs, contributing to the success of the projects and initiatives. Roles & Responsibilities: Expected to be an SME, collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Expected to provide solutions to problems that apply across multiple teams. Lead the technology architecture design and implementation process. Provide technical guidance and mentorship to team members. Collaborate with stakeholders to understand business requirements. Ensure the technology solutions align with the overall business strategy. Professional & Technical Skills: Must To Have Skills:Proficiency in Solution Architecture. Strong understanding of cloud technologies and architectures. Experience in designing and implementing scalable and reliable systems. Knowledge of enterprise integration patterns and best practices. Hands-on experience with architecture modeling tools. Good To Have Skills:Experience with enterprise security frameworks. Additional Information: The candidate should have a minimum of 12 years of experience in Solution Architecture. This position is based at our Mumbai office. A 15 years full time education is required. Qualifications 15 years full time education
Posted 3 months ago
4 - 8 years
10 - 15 Lacs
Chennai
Work from Office
Maintain security architecture frameworks for enterprise systems/networks/cloud environments Design secure solutions as per NIST/ISO 27001 Implement secure cloud solutions for AWS/Azure environments & Zero Trust security models Required Candidate profile 5+ yrs exp in cyber/cloud security Expert in a-NIST, MITRE ATT&CK b)Cloud security risks-AWS c)security solutions/integration CISSP, CISM, CCSP, AWS/Azure Security Specializations
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2