Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 6.0 years
3 - 4 Lacs
Ahmedabad
Work from Office
Manage IT infrastructure (hardware, software, network) Troubleshoot systems and applications Ensure data security and compliance Handle IT support across departments Manage vendors and licenses Train staff on IT tools and usage Required Candidate profile Comfortable with frequent Travel Server management Email system administration Implementing two-factor authentication Hardware procurement and deployment Understanding departmental IT needs
Posted 1 month ago
1.0 - 5.0 years
0 - 3 Lacs
Pune, Chennai, Bengaluru
Work from Office
Role & responsibilities Job Responsibilities: Maintain usage reports and logs as per business and statutory requirements. Perform networking tasks, including switching, routing, and liaising with service providers and vendors. Implement and troubleshoot switch and router networks. Possess strong communication skills, both verbal and written. Ensure accurate and detailed documentation of networking activities and processes. Have hands-on experience in network designing with a strong understanding of LAN and WAN networking concepts. Demonstrated experience in working with routers, firewalls, switches, IP data networks, and integration/operations related to upstream providers (e.g., international bandwidth).
Posted 1 month ago
4.0 - 9.0 years
7 - 17 Lacs
Bengaluru
Work from Office
About this role: Wells Fargo is seeking a Senior Technology Operations Analyst In this role, you will: Lead or participate in initiatives and projects within technology operations Contribute to planning related to technology operations projects or deliverables Analyze moderately complex technology operations issues which require in depth review Review and approve release change documents Execute and oversee production deployments, including but not limited stop and start job, updating processing tables, and write script Plan and design, document and enforce escalation policies and procedures Provide activity, progress and status reports to management and keeps management posted of any critical issues Provide accurate problem identification, ticket documentation, customer and vendor dialogue Troubleshoot and triage job failures and work closely with AD Production support and vendors to drive towards root cause identification and resolution Act as a subject matter professional on research issues escalated from Operations internal alerts, Help Desks, Support Groups and other departments Improve deployment processes and tools, architecture, design and day-to-day technical support, scheduling and governance models Direct the daily Risk and Control flow of operations, focusing on policies, procedures, and work standards to ensure success; re-engineering and driving continual service improvement Contribute to the resolution of complex issues Partner with others to meet technology operations deliverables while leveraging solid understanding of policies and procedures Collaborate with management and teams to handle questions or problems Act as a mentor for individuals Required Qualifications: 4+ years of Technology Operations experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education Desired Qualifications: Experienced in supporting Apple Operating Systems and Servers. (Apple ACSP or ACTC Certification would be advantageous) Knowledge of Apple hardware Microsoft Experience (preferably but not essential MSCE) incl. AD, Exchange, Office 365, Intune MDM Experience of Network/Firewalls/Printers setup and maintenance Experience with Mobile Phone/Ipad setup Ability to Manage SLAs and Priorities Good Customer Service skills Able to communicate clearly and precisely Excellent background in Technical Support Managed services environment an advantage Knowledge of ITIL an advantage & certification is a plus Knowledge on VMWare Concepts, Azure Cloud Concepts, SNOW, OS troubleshooting skills
Posted 1 month ago
5.0 - 10.0 years
15 - 30 Lacs
Vijayawada
Work from Office
We're Hiring: Cyber Security Analyst Location: Vijayawada Experience: 5-10 Years | Type: Full-Time | Industry: Cybersecurity, IT Security, Risk & Compliance Are you passionate about protecting digital assets and staying ahead of cyber threats? Join our cybersecurity team and help defend against evolving threats while ensuring enterprise-wide security and compliance. Role Overview We are seeking a Cyber Security Analyst to play a critical role in threat detection, vulnerability management, and compliance enforcement across our security infrastructure. Key Responsibilities Threat Detection & Response: Monitor security tools and logs, detect potential threats, and respond to incidents Vulnerability Management: Perform regular assessments, patch vulnerabilities, and enforce security standards Security Operations & Compliance: Operate and maintain SIEM tools, support internal/external audits, and ensure adherence to security policies Required Skills Proficiency in SIEM tools (Splunk, Microsoft Sentinel, IBM QRadar) and threat analysis techniques Strong understanding of network security, firewalls, antivirus, and endpoint protection Familiarity with compliance and risk frameworks: ISO 27001, NIST, GDPR, SOC 2 Ability to work collaboratively in a fast-paced security operations environment Preferred Certifications CISSP Certified Information Systems Security Professional CEH – Certified Ethical Hacker
Posted 1 month ago
6.0 - 11.0 years
20 - 25 Lacs
Pune, Chennai, Bengaluru
Work from Office
7+ years of experience in Software development with excellent understanding ofdesign principles and considerations, best practice 3 -5 years of experience with medium to large scale cloud platform development, deployment, automation, and support. 3-5 years of experience with administration and deployment of Kubernetes, Helm, primarily in Azure, with additional capability with AWS. Experience using IaC using Terraform/Go, scripting with Terraform, Terragrunt and/or Ansible. Networking in the Cloud (DevOps), knowledge of firewalls, load balancers. Familiarity with build pipeline tools and technologies such as: Jenkins, Gitlab, Gradle. Solid understanding of security principles and technologies such as OWASP Top 10 Experience with Identify Management services such as Active directory, OKTA Experience writing unit tests Working in an Agile development environment and actively contributing to Sprint planning and other ceremonies Must be self-motivated but needs to work well in a team environment Excellent analytical, communication and problem-solving skills Self-Starter; willing to learn new technologies, ability to learn fast Team player; willing to coach junior team members and cooperate on problem solving Work Experience Required : - 6+ Year Job Location(s) : - Chennai, Bangalore , Pune, Trichy , Noida Qualification : - B.E/B.Tech
Posted 1 month ago
2.0 - 5.0 years
1 - 5 Lacs
Mumbai
Work from Office
Experienced Linux Administrator needed to install, configure, and maintain RHEL/CentOS/Ubuntu servers. Must have skills in Bash/Python scripting, performance monitoring, firewall/security configs, backups, and Linux certifications preferred.
Posted 1 month ago
15.0 - 20.0 years
10 - 15 Lacs
Mumbai
Work from Office
Roles & Responsibilities: Be part of Banks GRC program and handle regulatory characteristics focused in cybersecurity Identify and Drive improvement initiatives to Enhance Risk posture of the Bank Face off to Various regulators and drive programs for compliance to the Regulatory requirements Be a champion of ITGC initiatives Provide guidance to group companies to ensure consistency in risk governance, cyber risk management and compliance. Be the focal of Group companies for all IRM requirements Collaborate with group companies on IT governance, cybersecurity and control measures across Groups IT landscape. Present cyber risk posture in quarterly IT Strategy meetings for group companies. Promote a strong risk culture within the bank and group companies fostering awareness of risk management principles. Validate Security Policies and Procedures in conjunction with IT controls Manage internal and external stakeholders Ability to endorse cyber risks through publication of dashboards and drive initiatives to Improve Risk posture Job Requirement: Experience required for the Job: 15+ years in information technology & security; Engineer / Post Graduate / MBA Strong understanding of IT governance frameworks, risk management practices and regulatory requirements. Industry acknowledged certifications like CISA / CISSP / CRISC Experience in Team handling / management is must Knowledge on Layered Security - Firewalls, Intrusion Detection, OS Hardening, Project Management, Security Training. Experience in handling regulatory matters will be an added advantage Strategic thinking and strong analytical skills Excellent communication and inter personal skills with focus on verbal, written communication & presentation skills
Posted 1 month ago
15.0 - 20.0 years
20 - 25 Lacs
Mumbai
Work from Office
Roles Responsibilities: Be part of Banks GRC program and handle regulatory characteristics focused in cybersecurity Identify and Drive improvement initiatives to Enhance Risk posture of the Bank Face off to Various regulators and drive programs for compliance to the Regulatory requirements Be a champion of ITGC initiatives Provide guidance to group companies to ensure consistency in risk governance, cyber risk management and compliance. Be the focal of Group companies for all IRM requirements Collaborate with group companies on IT governance, cybersecurity and control measures across Groups IT landscape. Present cyber risk posture in quarterly IT Strategy meetings for group companies. Promote a strong risk culture within the bank and group companies fostering awareness of risk management principles. Validate Security Policies and Procedures in conjunction with IT controls Manage internal and external stakeholders Ability to endorse cyber risks through publication of dashboards and drive initiatives to Improve Risk posture Job Requirement: Experience required for the Job: 15+ years in information technology security; Engineer / Post Graduate / MBA Strong understanding of IT governance frameworks, risk management practices and regulatory requirements. Industry acknowledged certifications like CISA / CISSP / CRISC Experience in Team handling / management is must Knowledge on Layered Security - Firewalls, Intrusion Detection, OS Hardening, Project Management, Security Training. Experience in handling regulatory matters will be an added advantage Strategic thinking and strong analytical skills Excellent communication and inter personal skills with focus on verbal, written communication presentation skills
Posted 1 month ago
5.0 - 7.0 years
8 - 10 Lacs
Bengaluru
Work from Office
Position Purpose The role of the Third-Party Technology Risk Management Analyst / Consultant is to implement the set of operational activities to be carried out within BNP Paribas (Group entities) to manage ICT Cyber risks for the beneficiaries of sourcing (Outsourcing, purchasing shoring) initiatives supported by ICT service providers and third parties involved in ICT projects or business projects with ICT components. She/he can operate within TPTRM scope governance, providers, beneficiaries SMEs spread throughout global region. As part of his role, she/ he will have to work closely with German stakeholders. Especially, she / he will help clients assess the risks associated to their arrangement and provide recommendations for managing those risks.. Responsibilities Direct Responsibilities Perform third-party technology risk assessments to help beneficiaries/contract owners identify and evaluate business and technology risks related to their arrangements, and provide recommendations for managing those risks Define the contractual ICT security requirements applicable to the arrangement to protect confidentiality, integrity and availability of Beneficiary data and systems Provide periodic status updates (KPIs/KRIs) including potential risks and delays to the project delivery to beneficiary project manager, conduct workshops wherever necessary Review thoroughly asset classifications and pre-existing asset related risks control responses ensuring sync with TPTRM assessments responses Select the requirements to include in the specific ICT due diligence questionnaires to be sent to the shortlisted suppliers and analyze the providers feedback Support the Beneficiary answering ICT Security questions from the provider as part of the contract negotiation process List of the risks that should be formalized in a risk management plan given the third party's answers and report on the third party's ability to manage risks Support the Beneficiary recording the arrangement data in the various Group registers (ServiceNow, RISK360, etc.) Ensure periodic review of ICT arrangements and contracted ICT services Demonstrate knowledge in one or more of the following cyber risk domains, including: Security Governance and Management, Security Policies and Procedures, Application Security Controls, Access Controls, Incident Response, Risk Management, Privacy and Data Protection, Encryption. Contributing Responsibilities Direct Responsibilities Perform third-party technology risk assessments to help beneficiaries/contract owners identify and evaluate business and technology risks related to their arrangements, and provide recommendations for managing those risks Define the contractual ICT security requirements applicable to the arrangement to protect confidentiality, integrity and availability of Beneficiary data and systems Provide periodic status updates (KPIs/KRIs) including potential risks and delays to the project delivery to beneficiary project manager, conduct workshops wherever necessary Review thoroughly asset classifications and pre-existing asset related risks control responses ensuring sync with TPTRM assessments responses Select the requirements to include in the specific ICT due diligence questionnaires to be sent to the shortlisted suppliers and analyze the providers feedback Support the Beneficiary answering ICT Security questions from the provider as part of the contract negotiation process List of the risks that should be formalized in a risk management plan given the third party's answers and report on the third party's ability to manage risks Support the Beneficiary recording the arrangement data in the various Group registers (ServiceNow, RISK360, etc.) Ensure periodic review of ICT arrangements and contracted ICT services Demonstrate knowledge in one or more of the following cyber risk domains, including: Security Governance and Management, Security Policies and Procedures, Application Security Controls, Access Controls, Incident Response, Risk Management, Privacy and Data Protection, Encryption. Contributing Responsibilities Instruct the 5 European Bank Authority ICT risks categories and follow them throughout TPTRM assessments Participate in Initialization Committee/ Validation Committee Go-Live committee for Supporting specific arrangements and results Provide support to beneficiary / contract owner to implement residual actions Facilitate the business/sponsor/beneficiary/SME decision-making with deep analysis based on relevant flagged risk families Provide support to contract owners and coordinate/ assist to ensure proper assessments are done Manage TPTRM inventory with follow-up tracker management Contribute to process improvement, upkeep with new policies, regulations, standards guidelines Technical Behavioral Competencies Functional Skills Experience in IT Risk and Cyber Security domains in a financial institution demonstrating a high-level of commitment and self-motivation. Experience in the Finance IT industry with a strong exposure to IT Operations, Application Security, and/or network administration, IPS Demonstrate knowledge of Risk Compliance, cybersecurity, cyber risk, cyber threats, Third Party Technology Risk Management/ Vendor assessments Working knowledge of global regulations, frameworks and standards (ISO, NIST, COBIT, PCI-DSS, HIPAA) and conversant in the tactics, techniques and procedures used by Risk adversaries. Demonstrates a calm professional approach, with a good understanding of delivery within time constraints and the need to escalate/inform departmental management as appropriate. Good IT knowledge Technical : - Good understanding of organizations and IT Businesses - Good technical understanding of infrastructures and IT Security Productions and Systems - IT risk /Third Party risk analysis and management methods and should have worked on Risk Management Tools like, ServiceNow etc. - Knowledge of Cyber Resilience, IT continuity and business continuity - GRC - Governance, Risk Management and Compliance Management. - Firewall and Internet technologies; Cloud Security, Banking Tools Technologies. - Secure access control mechanisms; Encryption and Key management technics Behavioral : - Strong Communication, Analytical and problem-solving skills. - Proven organizational skills with excellent multi-tasking, result oriented and prioritization skills - Good documentation and reporting skills - Ability to work independently - Strong communication and interpersonal skills, able to communicate and relate easily with IT, Finance and back-office users - Good communication, technical writing/diagramming skills - Attention to detail and accuracy Specific Qualifications (if required) - One or more Industry-recognized information Security certifications such as CISSP, CISA, GCCC, CISM, CEH, CRISC, OSCP or Security+. - IT Security tools like Firewalls, IPS, WAF, Endpoint protection, Network security, etc. - IT Auditing (ISO27001/2, NIST 800 Series, ISO27005, ISO42001) - Regulatory Compliance MBA in Finance/Systems/IT, Masters in Technology, Bachelor of Commerce, Masters in Commerce, Bachelor in Science, Bachelor in Technology Skills Referential Behavioural Skills : (Please select up to 4 skills) Communication skills - oral written Attention to detail / rigor Ability to deliver / Results driven Creativity Innovation / Problem solving Choose an item. Choose an item. Choose an item. Transversal Skills: (Please select up to 5 skills) Analytical Ability Ability to manage a project Ability to understand, explain and support change Ability to develop and adapt a process Ability to anticipate business / strategic evolution Other/Specific Qualifications (if required) CISA/CISSP/CISM/CRISC
Posted 1 month ago
12.0 - 20.0 years
20 - 35 Lacs
Bengaluru
Work from Office
Role: Senior Engineer Experience: 12+ years Budget: Max 35 LPA Must Have: Networking & IT Infrastructure, Cisco, Checkpoint, Data Network. Location: Bangalore Imm to 30 Days
Posted 1 month ago
5.0 - 10.0 years
18 - 22 Lacs
Gurugram, Bengaluru
Hybrid
Job ID - 35584 Job Title - Technical Lead, Security Operations (Zscaler & Fortinet) Location- Gurgaon/ Bangalore Reports To - Customer Security Operations Centre Manager Role Purpose The Customer Security Operations Centre (CSOC) is responsible for operation, maintenance and monitoring of Colts Managed Security product portfolio as Technical Lead in Security Operations, primary responsibilities are to provide support for Colt Customer Security services, with expert level knowledge on technology and operations skills. Responsible for 24/7 security operations, managing and implementing advanced customer trouble and change requests for DDoS mitigation and managed firewall services, as well as active monitoring and response to security alerts and events. Key Responsibilities Participate in 24/7 rotational Shift Monitor and react to all Customer security alerts / events Manage customer faults, service outages, and service impairments to resolution, on Managed Security products Provide regular and accurate customer updates Implement changes within customers managed security environment and for Managed Security products Escalate customer incidents to other support teams, vendors, management as per escalations policies and procedures Participate in preventative maintenance, technical training, process improvement, and information sharing activities to improve the team Role Specific Requirements Skills & Responsibilities Self-driven individuals with 5+ years of relevant information/network security experience Experience and certifications in specific security technologies such as Zscaler, Fortinet , Arbor, Radware, Palo Alto, Cisco, Checkpoint, Cloud Security (SSE/SASE, CASB, ZTNA, DLP,SWG) Previous experience on medium and large platforms, with multiple security technologies/products Worked under high pressure situations. Good Incident and Problem Management skills.
Posted 1 month ago
8.0 - 12.0 years
10 - 16 Lacs
Hyderabad
Work from Office
Job Title: Network Operations Center (NOC) Lead Offshore Support Location: Hyderabad (Offshore Center) + On call Shift: 24/7 Rotational Shifts (Including Nights/Weekends) Certifications Required: CompTIA Network, ITIL v3/v4 Experience: 8+ years in NOC/IT operations, with 3+ years in leadership Key Responsibilities: Team Leadership & Supervision: Lead a team of NOC Engineers for 24/7 offshore monitoring and incident management. Mentor engineers, conduct training, and ensure adherence to SLAs. Incident & Problem Management: Act as escalation point for critical outages (P1/P2 incidents). Coordinate with onshore teams/vendors for RCA and resolution. Process Compliance: Enforce ITIL-based workflows (Incident, Change, Problem Mgmt.). Ensure compliance with CompTIA security/network standards. Reporting & Metrics: Generate daily/weekly reports on uptime, MTTR, and incident trends. Drive continuous improvement in NOC operations. Skills & Qualifications: Technical: Expertise in network monitoring tools (SolarWinds, Nagios, PRTG). Strong knowledge of TCP/IP, VPN, Firewalls, and cloud networks (AWS/Azure). Soft Skills: Excellent communication (English fluency for global stakeholders). Decision-making under pressure.
Posted 1 month ago
5.0 - 7.0 years
45 - 50 Lacs
Udaipur
Work from Office
7+ years of experience in DevOps or related roles with strong Linux/Unix administration skills Expertise in AWS, Azure, and on-premise environments; capable of designing scalable, secure, and cost-efficient hybrid/cloud infrastructure Proficient in scripting (JavaScript, Python, Groovy, Bash) and using infrastructure as code tools like Terraform, Ansible, and CloudFormation Deep understanding of CI/CD tools (Jenkins, GitHub Actions, CircleCI, Azure DevOps) and automation practices Skilled in database systems including SQL, NoSQL, MySQL, MS SQL, Hadoop, MongoDB, Cassandra, Elasticsearch, and Redis Strong knowledge of Kubernetes, ECS, Docker Swarm, and building high-availability systems Experience in network and security engineering (kernel tuning, DNS, SSL, IAM, load balancing, firewalls) Familiar with governance, compliance (SOC2/HIPAA), access control, and centralised identity management (AD, Entra ID)
Posted 1 month ago
3.0 - 5.0 years
6 - 10 Lacs
Mumbai, Bengaluru
Work from Office
6 - 8 year s experience in incident management ITIL certified Able to communicate crisp and firm - written and verbal Able to run incident calls and drive them to closure Good understanding of IT infra - firewalls, networks, routers, switches and load balancers Good basic understanding of databases
Posted 1 month ago
8.0 - 12.0 years
10 - 16 Lacs
Mumbai, Bengaluru
Work from Office
6 - 8 year s experience in incident management ITIL certified Able to communicate crisp and firm - written and verbal Able to run incident calls and drive them to closure Good understanding of IT infra - firewalls, networks, routers, switches and load balancers Good basic understanding of databases
Posted 1 month ago
5.0 - 10.0 years
2 - 2 Lacs
Mohali, Chandigarh
Work from Office
Job Details: Designation Senior System Administrator Location Bestech Business Tower, Mohali, sector 66 (work from office) Shift – Night Shift Office Working Days & Hours: 5 days a week, 8 (Work) + 1 (Break) hours shift Desire candidate: Minimum 4 years in IT or related domain. Excellent written and verbal communication skills. Excellent customer service skills Education: Graduate (Any stream) preferably in computer science, B. Tech, or related field Education. Should be ready for the client facing engagement. MCSE or CCNA or CCNP, Network+ or Security+ or VMware or Azure or ITIL foundation. JOB Requirements and Responsibilities : Should have experience on windows server and Domain controller Group Policy , troubleshooting skills. Should have experience on windows server and Domain controller upgrades, Group Policy troubleshooting skills. Working knowledge of MS Azure, MDM, Intune , SharePoint, Project Migration. Experience will File and Print Servers , File Server Migrations to Azure. Experience with Microsoft Exchange Server and Office365 . Working experience in VMWare / Hyper-V . Working knowledge of Firewalls , VPN Technologies, Network routers , Wi-Fi Access points, Port forwarding Sound understanding of DNS, DHCP , Active Directory servers. Excellent troubleshooting and analytical skills. Hands-on experience on Backups Desktop troubleshooting experience hands-on experience on Firewalls. Alaric Benefits: Competitive salary and benefits Accidental policy Term Life insurance Medical insurance Trainings and Certifications-Webinars, Workshops to upgrade their skills according to the current working environment. Wellness Programs for employees
Posted 1 month ago
10.0 - 15.0 years
1 - 1 Lacs
Mohali, Chandigarh
Work from Office
Work From Office, Chandigarh Location Required skills: • The candidate should have hands-on experience on windows servers upgrades/migrations. Perform Domain controller upgrades and troubleshoot group policy implementation. • Hands on experience on Exchange servers to Office 365 migrations projects. • Hands on experience on Prem to cloud migrations (Azure) migrations projects. • Must have hands on experience on Azure and Azure AD. • Working knowledge of Firewalls, VPN Technologies, Network Routers, Wi-Fi Access points and Port forwarding. • Sound understanding of DNS, DHCP servers, MDM Intune. • Good Interpersonal and client handing skills. • Excellent troubleshooting and Analytical skills. Education and/or Experience: • Any Technical qualifications (BCA, Btech, B.Sc IT). • Desirable Microsoft Technology Associate (MTA) and MCSA certifications • Preferably AZ900/AZ104 certification. • Cisco CCNA / CCNP certification is highly valued. • This position offers the opportunity to work with a variety of clients, ensuring their network infrastructures are secure, efficient, and capable of supporting their business objectives. Join our team and apply your skills in a dynamic, supportive environment that values professional growth and client success Client Service: • Provide outstanding client service, responding promptly and professionally across communication channels. • Cultivate and maintain long-term client relationships, emphasizing exceptional service and understanding of client needs. Shift timing and working hours: • Night shifts /EST • Monday to Friday Fixed working days Benefits and compensation: • Group Health insurance and other benefits. • The Best working culture and growth opportunities. • Learning opportunities in leading technologies • Compensation as per Market Standard
Posted 1 month ago
4.0 - 8.0 years
6 - 10 Lacs
Bengaluru
Work from Office
Senior SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This Senior SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Senior SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred Experience: Experience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures
Posted 1 month ago
6.0 - 9.0 years
8 - 11 Lacs
Pune
Work from Office
Role Description ITAO is the custodian of the application and is responsible to apply and enable during Life-Cycle of the application the IT policies and procedures with specific consideration to IT management and Information Security. The ITAO ensures a clear separation of the responsibility within the project, aimed at achieving a safe and secure running of the application and compliance to regulations, policies and standards. ITAO is responsible for application documentation, application infrastructure reliability and compliance, and is usually the IT SPOC for audit initiatives. . What well offer you As part of our flexible scheme, here are just some of the benefits that youll enjoy, Best in class leave policy. Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Strategy & Architecture Enterprise IT governance Reviews current and proposed information systems for compliance with the organisation's obligations (including legislation, regulatory, contractual and agreed standards/policies) and adherence to overall strategy. Provides specialist advice to those accountable for governance to correct compliance issues. Cloud Security & Governance Migration on Cloud from on-prem setup end to end with ensuring application/infrastructure and Data Security Information security Communicates information security risks and issues to business managers and others. Performs basic risk assessments for small information systems. Contributes to vulnerability assessments. Applies and maintains specific security controls as required by organisational policy and local risk assessments. Investigates suspected attacks. Responds to security breaches in line with security policy and records the incidents and action taken. Information content publishing Understands technical publication concepts, tools and methods and the way in which these are used. Uses agreed procedures to publish content. Obtains and analyses usage data and presents it effectively. Understands, and applies principles of usability and accessibility to published information. Specialist advice Actively maintains knowledge in one or more identifiable specialisms. Provides detailed and specific advice regarding the application of their specialism(s) to the organisation's planning and operations. Recognises and identifies the boundaries of their own specialist knowledge. Collaborates with other specialists, where appropriate, to ensure advice given is appropriate to the needs of the organisation. Knowledge management Maintains knowledge management systems and content to meet business needs. Supports others to enable them to complete knowledge management activities and form knowledge management habits. Reports on progress of knowledge management activities. Configures and develops knowledge management systems and standards. Supports changes to work practices to support capture and use of knowledge. Business risk management Investigates and reports on hazards and potential risk events within a specific function or business area. Continuity management Implements and contributes to the development of a continuity management plan. Coordinates the assessment of risks to the availability, integrity and confidentiality of systems that support critical business processes. Coordinates the planning, designing, and testing of maintenance procedures and contingency plans. Data management Assists in providing accessibility, retrievability, security and protection of data in an ethical manner. Methods and tools Provides support on the use of existing method and tools. Configures methods and tools within a known context. Creates and updates the documentation of methods and tools. Change and Transformation definition and management Assists in the definition and management of requirements. Uses standard techniques to elicit, specify, and document requirements for simple subject areas with clearly-defined boundaries. Assists in the creation of a requirements baseline and in investigating and applying authorised requests for changes to base-lined requirements, in line with change management policy. Delivery and operation Availability management Contributes to the availability management process and its operation and performs defined availability management tasks. Analyses service and component availability, reliability, maintainability and serviceability. Ensures that services and components meet and continue to meet all of their agreed performance targets and service levels. Implements arrangements for disaster recovery and documents recovery procedures. Conducts testing of recovery procedures. Service acceptance Engages with project management to confirm that products developed meet the service acceptance criteria and are to the required standard. Feeds into change management processes. Configuration management Applies tools, techniques and processes to track, log and correct information related to configuration items. Verifies and approves changes ensuring protection of assets and components from unauthorised change, diversion and inappropriate use. Ensures that users comply with identification standards for object types, environments, processes, lifecycles, documentation, versions, formats, baselines, releases and templates. Performs audits to check the accuracy of information and undertakes any necessary corrective action under direction. Asset management Applies tools, techniques and processes to create and maintain an accurate asset register. Produces reports and analysis to support asset management activities and aid decision making. Change management Develops implementation plans for complex requests for change. Evaluates risks to the integrity of service environment inherent in proposed implementations (including availability, performance, security and compliance of the business services impacted). Seeks authority for those activities, reviews the effectiveness of change implementation, and suggests improvement to organisational procedures governing change management. Leads the assessment, analysis, development, documentation and implementation of changes based on requests for change. Security administration Investigates minor security breaches in accordance with established procedures. Assists users in defining their access rights and privileges. Performs non-standard security administration tasks and resolves security administration issues. Application support Drafts and maintains procedures and documentation for applications support. Manages application enhancements to improve business performance. Advises on application security, licensing, upgrades, backups, and disaster recovery needs. Ensures that all requests for support are dealt with according to set standards and procedures. Problem management Ensures that appropriate action is taken to anticipate, investigate and resolve problems in systems and services. Ensures that such problems are fully documented within the relevant reporting system(s). Enables development of problem solutions. Coordinates the implementation of agreed remedies and preventative measures. Analyses patterns and trends. Incident management Ensures that incidents are handled according to agreed procedures. Investigates escalated incidents to responsible service owners and seeks resolution. Facilitates recovery, following resolution of incidents. Ensures that resolved incidents are properly documented and closed. Analyses causes of incidents, and informs service owners in order to minimise probability of recurrence, and contribute to service improvement. Analyses metrics and reports on performance of incident management process. Skills and quality Quality assurance Contributes to the collection of evidence and the conduct of formal audits or reviews of activities, processes, data, products or services. Examines records for evidence that appropriate testing and other quality control activities have taken place and determines compliance with organisational directives, standards and procedures. Identifies non-compliances, non-conformances and abnormal occurrences. Conformance review Collects and collates evidence as part of a formally conducted and planned review of activities, processes, products or services. Examines records as part of specified testing strategies for evidence of compliance with management directives, or the identification of abnormal occurrences. Digital forensics Contributes to digital forensic investigations. Processes and analyses evidence in line with policy, standards and guidelines and supports production of forensics findings and reports. Relationships and engagement Relationship management Identifies the communications and relationship needs of stakeholder groups. Translates communications/stakeholder engagement strategies into specific activities and deliverables. Facilitates open communication and discussion between stakeholders, acting as a single point of contact by developing, maintaining and working to stakeholder engagement strategies and plans. Provides informed feedback to assess and promote understanding. Facilitates business decision-making processes. Captures and disseminates technical and business information. Experience/Exposure Autonomy Works under general direction. Uses discretion in identifying and responding to complex issues and assignments. Receives specific direction, accepts guidance and has work reviewed at agreed milestones. Determines when issues should be escalated to a higher level. Influence Interacts with and influences colleagues. Has working level contact with customers, suppliers and partners. May supervise others or make decisions whichimpactthe work assigned to individuals or phases of projects. Understands and collaborates on the analysis of user/customer needs and represents this in their work. Complexity Performs a range of work, sometimes complex and non-routine, in a variety of environments. Applies methodical approach to issue definition and resolution. Knowledge Has a sound generic, domain and specialist knowledge necessary to perform effectively in the organization typically gained from recognized bodies of knowledge and organizational information. Demonstrates effective application of knowledge. Has an appreciation of the wider business context. Takes action to develop own knowledge. Business skills Demonstrates effective communication skills. Plans, schedules and monitors own work (and that of others where applicable) competently within limited deadlines and according to relevant legislation, standards and procedures. Contributes fully to the work of teams. Appreciates how own role relates to other roles and to the business of the employer or client. Demonstrates an analytical and systematic approach to issue resolution. Takes the initiative in identifying and negotiating appropriate personal development opportunities. Understands how own role impacts security and demonstrates routine security practice and knowledge required for own work. Cloud Migration and Understanding Basic Knowledge on IaaS/PaaS/SaaS and migration from different environments to Cloud Your skills and experience Experience 6 to 9 years IT Service Management, IT Governance or IT Project Management background. Excellent communication and presentation skills, highly organized and disciplined. Experienced in working with multiple stakeholders. Ability to create and naturally maintain good business relationships with all stakeholders. Comfortable working in VUCA (Volatility Uncertainty Complexity Ambiguity) and highly dynamic environments. ITAO will typically have a rather limited technical hands on involvement. A high-level understanding on the products/technologies below is welcomed: Databasesmainly Oracle Application/web servers (like J2EE based, especially JBoss, Tomcat, WebLogic Server, Apache) Management of security certificates. Unix servers very basic administration Microservices and SOA Communication and encryption protocols (mainly HTTP(S), SSL) Networking (firewalls, load balancers, etc) High Availability Architecture. Reasonable understanding and relevant experience in Agile-Scrum delivery and main tools (Jira & Confluence); 4-5 years of work experience in IT; 2-3 years project management or application owner experience. Preferable skills: Experience working with distributed development teams; Experience in finance products Experience on Google Cloud Security and Management How well support you Training and development to help you excel in your career. Coaching and support from experts in your team. A culture of continuous learning to aid progression. A range of flexible benefits that you can tailor to suit your needs.
Posted 1 month ago
6.0 - 8.0 years
8 - 10 Lacs
Bengaluru
Work from Office
What youll do: Security Operations Management: Manage and support large-scale systems, complex cloud environments, and mission-critical business applications, ensuring secure and efficient operations. Security Solution Implementation: Implement and manage at least four security solutions, including but not limited to EDR, DLP, DNS, Email Protection (Mail Relay), MDM, Identity Protection, Firewall, Cloud Security, and OCR technologies. Security Monitoring & Analysis: Interpret alert logs and network traffic to identify attack patterns, recognizing typical attack scenarios to prevent or mitigate potential threats. Vulnerability Management: Lead vulnerability management efforts, create comprehensive dashboards and reports, present findings to stakeholders, and validate remediation strategies. Interpret vulnerabilities/CVEs. Conduct vulnerability assessments and provide actionable insights for remediation Platform Security Expertise: Apply in-depth knowledge of security vulnerabilities and mitigation strategies across Windows, Mac, and Linux platforms. Security Solutions Expertise: Leverage experience with tools like CrowdStrike, Cisco Umbrella, Palo Alto & Fortinet Firewalls, Forcepoint, Trend Micro, and other leading security technologies. Cloud Security: Demonstrate expertise in cloud security posture management (CSPM) and applying security best practices in cloud environments (Azure, AWS, GCP). Office 365 & Identity Security: Manage and secure Office 365 environments, ensuring effective security controls are implemented. Implement modern authentication mechanisms, such as cloud IDP, SSO, and MFA. Security Compliance & Hardening: Oversee security compliance and system hardening processes, particularly within Azure, based on known security standards (e.g., CIS, NIST). What to Have for this position: Must have Skills: - Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience). Minimum of 6-8 years of experience in cybersecurity or IT security operations. Experience: Proven track record of managing large-scale systems and complex cloud environments in a security operations context. Security Solutions Expertise: Deep understanding and hands-on experience with a variety of security technologies, including EDR, DLP, DNS protection, firewalls (Palo Alto, Fortinet), cloud security tools, and more. Alert & Traffic Analysis: Ability to interpret security alerts, network traffic logs, and identify attack vectors and patterns effectively. Vulnerability Management: Proficiency in managing vulnerability scanning and remediation workflows, with experience in dashboard creation and report generation. The ability to assess CVEs, vulnerabilities, and gaps in security controls. Platform Security: Strong knowledge of security across Windows, Mac, and Linux platforms, including server/laptop administration, and resolving platform-specific vulnerabilities. Cloud Security: Expertise in cloud security posture management (CSPM) and securing cloud environments with an emphasis on compliance and security best practices. Authentication & Identity Management: Expertise in implementing modern authentication technologies, including cloud-based Identity Providers (IDPs), Single Sign-On (SSO), and Multi-Factor Authentication (MFA). Compliance & Hardening: Experience with security compliance, hardening systems, and working with Azure security standards. Toolset Proficiency: Hands-on experience with security tools like CrowdStrike, Cisco Umbrella, Palo Alto & Fortinet firewalls, Forcepoint, Trend Micro, and Office 365 security products. Personal Traits:- Independent & Self-Managed: Strong time management skills with the ability to work independently and manage competing priorities. Proactive & Solution-Oriented: A proactive, "can-do" attitude, contributing effectively to team goals and overall organizational security. Communication Skills: Excellent verbal, written, and interpersonal communication skills with the ability to work across departments and with distributed global teams. Customer-Centric: Outstanding customer service mindset with the ability to interact with stakeholders and address security concerns in a collaborative manner. Multitasking & Stress Management: Ability to juggle multiple tasks, maintain organization, and perform effectively under pressure in a fast-paced environment. Team Player: A collaborative approach with the ability to work independently or as part of a highly proactive security team. Fluent English: Strong proficiency in both written and spoken English is a must. Security Certifications: Security-related certifications (CISSP, CISM, CEH, etc.) or specialized training is highly desirable. Networking Knowledge: Familiarity with networking and protocols (Layer 2-7, Switching, Routing) is an advantage.
Posted 1 month ago
9.0 - 14.0 years
12 - 22 Lacs
Mumbai, Hyderabad, Bengaluru
Work from Office
Network Security Architect - J49120 Key Responsibilities: Design and develop secure network architectures for on-premises, cloud, and hybrid environments. Evaluate and recommend security solutions, tools, and technologies. Conduct risk assessments and vulnerability analyses of network infrastructure. Define and enforce security policies, standards, and procedures. Collaborate with IT and DevOps teams to integrate security into system and application design. Monitor network traffic for unusual activity and respond to security incidents. Lead penetration testing and red/blue team exercises. Ensure compliance with regulatory requirements (e.g., ISO 27001, NIST, GDPR, HIPAA). Provide technical guidance and mentorship to security engineers and analysts. Stay current with emerging threats, vulnerabilities, and security trends. Required Qualifications: Bachelors or Masters degree in Computer Science, Information Security, or related field. 8+ years of experience in network security or cybersecurity roles. Strong knowledge of firewalls, VPNs, IDS/IPS, SIEM, and endpoint protection. Experience with cloud platforms (AWS, Azure, GCP) and their security models. Familiarity with Zero Trust Architecture and Secure Access Service Edge (SASE). Proficiency in scripting and automation (Python, PowerShell, etc.). Relevant certifications (e.g., CISSP, CCSP, CISM, CEH).
Posted 1 month ago
5.0 - 10.0 years
8 - 18 Lacs
Pune
Work from Office
Preferred candidate profile 3+ years of experience in network security or IT infrastructure roles. Proven hands-on experience with Zscaler ZPA and ZIA implementation and administration. Strong understanding of Zero Trust Network Access (ZTNA) principles and architecture. Experience with identity and access management (IAM) and SSO integrations. Familiarity with networking protocols, firewalls, DNS, and VPN technologies. Excellent problem-solving skills and ability to work independently or in a team
Posted 1 month ago
1.0 - 5.0 years
2 - 4 Lacs
Ahmedabad, Surat, Vadodara
Work from Office
Job Summary: We are seeking a skilled and proactive IT Specialist to join our team. The ideal candidate will be responsible for maintaining, troubleshooting, and upgrading hardware, software, and network systems to ensure seamless IT operations across the organization. Key Responsibilities: Provide technical support to employees via help desk, phone, or in-person. Install, configure, and maintain computer systems, software, networks, printers, and other technology tools. Monitor system performance and troubleshoot issues to ensure optimal functionality. Manage user accounts, permissions, and access controls. Perform regular system backups and data recovery. Ensure cybersecurity protocols are followed, including antivirus updates and firewall maintenance. Collaborate with other departments to identify IT needs and solutions. Maintain IT inventory and documentation. Assist with IT infrastructure upgrades and new technology implementations.
Posted 1 month ago
1.0 - 5.0 years
2 - 4 Lacs
Bhavnagar, Jamnagar, Rajkot
Work from Office
Job Summary: We are seeking a skilled and proactive IT Specialist to join our team. The ideal candidate will be responsible for maintaining, troubleshooting, and upgrading hardware, software, and network systems to ensure seamless IT operations across the organization. Key Responsibilities: Provide technical support to employees via help desk, phone, or in-person. Install, configure, and maintain computer systems, software, networks, printers, and other technology tools. Monitor system performance and troubleshoot issues to ensure optimal functionality. Manage user accounts, permissions, and access controls. Perform regular system backups and data recovery. Ensure cybersecurity protocols are followed, including antivirus updates and firewall maintenance. Collaborate with other departments to identify IT needs and solutions. Maintain IT inventory and documentation. Assist with IT infrastructure upgrades and new technology implementations.
Posted 1 month ago
1.0 - 5.0 years
2 - 4 Lacs
Gandhinagar, Navsari, Anand
Work from Office
Job Summary: We are seeking a skilled and proactive IT Specialist to join our team. The ideal candidate will be responsible for maintaining, troubleshooting, and upgrading hardware, software, and network systems to ensure seamless IT operations across the organization. Key Responsibilities: Provide technical support to employees via help desk, phone, or in-person. Install, configure, and maintain computer systems, software, networks, printers, and other technology tools. Monitor system performance and troubleshoot issues to ensure optimal functionality. Manage user accounts, permissions, and access controls. Perform regular system backups and data recovery. Ensure cybersecurity protocols are followed, including antivirus updates and firewall maintenance. Collaborate with other departments to identify IT needs and solutions. Maintain IT inventory and documentation. Assist with IT infrastructure upgrades and new technology implementations.
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough