Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
1.0 - 3.0 years
4 - 7 Lacs
Ahmedabad
Work from Office
Narnarayan Shastri Institute of Technology IFSCS is looking for Forensic Science Professional to join our dynamic team and embark on a rewarding career journey Provide specialized expertise and advice in a particular field or industry. Analyze complex problems and develop effective solutions. Collaborate with stakeholders to implement best practices and strategies. Conduct research and stay updated on industry trends and advancements. Mentor and support team members in their professional development. Develop and present reports, recommendations, and technical documentation. Ensure compliance with relevant regulations and standards.
Posted 3 weeks ago
0.0 - 5.0 years
15 - 30 Lacs
Udaipur, Jaipur
Work from Office
Hiring SR/AP Professor Ophthalmology Pediatrician General Medicine Surgeon Orthopedic Gynecology Emergency Medicine Anesthesia Community medicine Radiology Pharmacology Forensic Biochemistry Physiology for Medical College in Jaipur & Udaipur
Posted 3 weeks ago
5.0 - 10.0 years
12 - 20 Lacs
Pune
Work from Office
About the Role We are seeking a highly skilled Security Analyst (Level 2) to join our MSSP SOC team. The ideal candidate will have expertise in SIEM (Splunk, QRadar), XDR/EDR solutions, and security analysis with hands-on experience in investigating and responding to security alerts. This role requires proficiency in reviewing and analyzing Level 1 alerts, providing detailed recommendations, and engaging with customers for incident handling. The candidate should also have basic SIEM administration knowledge and Python scripting skills for troubleshooting and playbook development. Key Responsibilities Threat Detection & Response: Analyze and investigate security alerts, events, and incidents generated by SIEM, XDR, and EDR solutions. Incident Investigation & Handling: Conduct in-depth security incident investigations, assess impact, and take appropriate actions. Incident Escalation & Communication: Escalate critical incidents to Level 3 analysts or senior security teams while maintaining detailed documentation. Content Management: Develop and fine-tune correlation rules, use cases, and alerts in SIEM/XDR platforms to improve detection accuracy. Malware Analysis: Perform basic malware analysis and forensic investigation to assess threats. Customer Request Handling: Collaborate with customers to address security concerns, provide recommendations, and respond to inquiries. SIEM Administration: Assist in the administration and maintenance of SIEM tools like Splunk or QRadar, ensuring smooth operations. Automation & Playbooks: Utilize Python scripting for automation, troubleshooting, and playbook development to enhance SOC efficiency. Reporting & Documentation: Prepare detailed reports on security incidents, trends, and mitigation strategies. Basic Qualifications B.E/B. Tech degree in computer science, Information Technology, Masters in Cybersecurity 3+ years of experience in a SOC or cybersecurity operations role. Strong knowledge of SIEM tools (Splunk, QRadar) and XDR/EDR solutions. Hands-on experience in threat detection, security monitoring, and incident response. Knowledge of network security, intrusion detection, malware analysis, and forensics. Basic experience in SIEM administration (log ingestion, rule creation, dashboard management). Proficiency in Python scripting for automation and playbook development. Good understanding of MITRE ATT&CK framework, security frameworks (NIST, ISO 27001), and threat intelligence. Strong analytical, problem-solving, and communication skills. Ability to work in a 24x7 SOC environment (if applicable) Preferred Qualifications Certified SOC Analyst (CSA) Certified Incident Handler (GCIH, ECIH) Splunk Certified Admin / QRadar Certified Analyst CompTIA Security+ / CEH / CISSP (preferred but not mandatory
Posted 3 weeks ago
6.0 - 9.0 years
5 - 9 Lacs
Gurugram
Work from Office
> Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT
Posted 3 weeks ago
0.0 - 8.0 years
4 - 5 Lacs
Bengaluru
Work from Office
Complete quality control post loan closing/Pre-funding. Review pre-closing/Prefunding documentation to ensure accuracy prior to document release and review post-closing documentation to ensure accuracy after loan closing and confirm supporting documents are all present and correctly executed. Record and report loan exceptions. Expertise on RADD, Forensic review, QM(Conventional, FHA, VA and USDA), non-QM and Portfolio loans review. Credit and Income review; Income calculation; Employment Income, self-employed income, rental income and other income. Identify red flags on loan file(Income documents review, asset documents review, credit report, Fraud report, exclusionary list). Review entity documentation to understand business structure and authorized signers. Knowledge of applicable federal regulations and state laws a plus. Ability to prioritize and decipher policies, programs, and guidelines. Strong attention to detail, organizational and communication skills. Ability to handle multiple tasks, take on new responsibilities, and prioritize work in a deadline-intensive environment. Strong interpersonal and teamwork skills and ability to influence through collaboration. Self-motivated, high level of personal energy and commitment. Flexible to work on Night shifts. Bachelors Degree, Masters Degree. 5+ years of experience in retail US residential mortgage banking and QC/post-closing/Prefunding is required.
Posted 3 weeks ago
4.0 - 6.0 years
8 - 12 Lacs
Bengaluru
Work from Office
We are seeking a highly skilled OT Security Expert with 4-6 years of experience to join our team in the automotive industry. The ideal candidate will have hands-on experience in OT security, proficiency with the Otorio tool, and the ability to draft process documents. This role requires a deep understanding of operational technology security and its application within the automotive sector. Bachelors degree in Computer Science, Information Technology, Cybersecurity, or a related field. 4-6 years of experience in OT security, preferably within the automotive industry. Hands-on experience with the Otorio tool and other OT security technologies. Strong understanding of OT systems, networks, and protocols. Experience in drafting and maintaining process documents and security protocols. Relevant certifications such as GICSP, ISA 62443 related are highly desirable. Key Responsibilities: Develop and implement OT security strategies and policies to protect automotive manufacturing systems and networks. Conduct risk assessments and vulnerability analyses to identify and mitigate security threats. Utilize the Otorio tool to monitor, detect, and respond to security incidents within OT environments. Draft and maintain comprehensive process documents, including security protocols, incident response plans, and compliance reports. Collaborate with cross-functional teams to ensure the integration of security measures into automotive production processes. Provide training and guidance to staff on OT security best practices and procedures. Stay updated with the latest industry trends, threats, and technologies in OT security. Design and implement network segmentation and access control measures to safeguard OT systems. Perform regular security audits and assessments to ensure compliance with industry standards and regulations. Develop and execute incident response plans to effectively address and recover from security breaches. Work closely with IT and engineering teams to ensure seamless integration of OT security measures with existing infrastructure. Conduct forensic analysis and root cause investigations of security incidents to prevent future occurrences. Participate in the development and testing of disaster recovery and business continuity plans.
Posted 3 weeks ago
1.0 - 6.0 years
12 - 22 Lacs
Khammam, Hyderabad, Ambala
Work from Office
Hiring in Forensic medicine department in Medical college. Position Assistant Professor Associate Professor Qualification MD/DNB Experience as per NMC Norms Location Khammam, Telangana For Details call 7347489001 Regards Akanksha 9041479508
Posted 3 weeks ago
5.0 - 8.0 years
30 - 35 Lacs
Pune
Work from Office
: Job Title Information Security Specialist Corporate Title Assistant Vice President LocationPune, India Role Description Everyday DB observes thousands of cyber security intrusion attempts. Deutsche Banks COO Chief Security Office (CSO) integrates both Corporate Security (CS) and Information Security (CISO) as both teams are responsible for mitigating these risks. The CSO team enables the business of Deutsche Bank by providing agile security operational capabilities. With their expertise in Threat Intelligence, Cyber Threat Analytics, Malware Response & Research, Security Monitoring, Incident Response, Forensics and Vulnerability Management, they provide global services from key locations in Frankfurt, Jacksonville and Singapore while leveraging offshore capabilities in Pune and Bucharest. Deutsche Bank AG is looking for Cyber Security professional to support the banks global security monitoring and threat detection capabilities. This role requires a heavy focus on all areas of security monitoring, risk management on privileged access management and familiarity with regulations impacting technology (e.g. MAS TRM Guidelines), requiring at least 5 to 8 years of experience. Candidate will be responsible to provide an oversight of the various security monitoring process to manage security risks and to drive the organizations compliance to regulatory and audit requirements including facilitation of audit activities, address process related queries and drive automation and audit remediation projects. The candidate will need to drive process improvements, procedure document updates, KPI monitoring and operations team management. Candidate will engage across all functional areas of business, operations, and global technologies working in a dynamic, multi-OS environment. This role will play a vital role in present organizations compliance to regulators and managing interactions with auditors. The chosen candidate will be required to provide a degree of strategic, tactical, and day-to-day operational experience to enhance the overall security monitoring, detection, and mitigation process. Candidate must also possess excellent soft skills and verbal communications dealing with senior executive management, customers, clients, auditors, and third-party vendors. What well offer you , 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Oversee the performance, efficiency, and accuracy of security monitoring operations team ensuring SLAs are met. Proactively review, propose, and implement process changes and monitoring improvements to remediate most significant risks including audit findings, self-identified issues, compliance issues, control gaps and regulatory requirements. Identify opportunities for streamlining of control processes, develop and socialize potential risk mitigation strategies particularly in privileged access management (e.g., bypass monitoring, session log review), and work with various divisions to execute. Improve the delivery of effective control process through technical review and process quality checks. Provide support in the delivery of effective governance including tracking and reporting. Ensure proper training of monitoring teams on new coverage and use cases. Offer subject-matter expertise and act as escalation point when required. Prepare and present monthly functional and operational report. Manage stakeholder queries, facilitate audit activities, and address data requests in a timely manner. Collaborate across CSO and technology teams to respond to internal and external audits, and regulatory inquiries and assessments. Drive automation projects and manage audit remediation deliverables to closure. Practice and promote good risk culture and risk management to manage the risks within banks appetite. Act as primary point-of-contact for regulatory inquiries and engagements. Collaborate with internal and external auditors and stakeholders, providing necessary evidence and artefacts, to facilitate audit processes. Your skills and experience Minimum 5 to 7 years of working Experience with security monitoring platforms and workflows. Proven Experience in area of privileged access management specifically in session log review and bypass monitoring. Proven experience and In-depth knowledge of technology regulations and understanding of regulatory risk management specially of MAS requirements and guidelines. Proven experience and strong understanding of audit process and compliance monitoring and reporting. Analytical mindset and ability to identify, assess and address compliance gaps and security risks. Strong operational background in risk analysis and risk identification. Degree from a university or major course work in computer science, networking, engineering, or other computer-related field of study. One of the following certifications will be an advantageCISSP, CISM, CISA, CRISC Expectations It is the Banks expectation that employees hired into this role will work in the office at least 2-3 days a week in accordance with the Banks hybrid working model. How well support you . . . .
Posted 3 weeks ago
0.0 - 2.0 years
7 - 9 Lacs
Mumbai, Lower Parel
Work from Office
Financial accounting requirements, record keeping & reporting the auditing functions. Responsible for supporting Executives and Managers on research assignments/Forensic assignments and compliance related work. Evaluating internal control systems / procedures, preparing reports & analysis with a view to highlight the shortcomings and necessary recommendations. Assist in preparation of Audit Programs. Involved in following up and gathering information from the clients. Continually updated with the developments in Audit related areas and have responsibility for updating their teams Audit & Assurance Knowledge Sound understanding of statutory, internal, and tax audits Familiarity with audit planning, execution, and reporting procedures Accounting Standards & Regulations Working knowledge of Indian Accounting Standards (Ind AS) and Accounting Standards (AS) Awareness of Companies Act, 2013, and other applicable regulatory frameworks Internal Controls & ICFR Ability to evaluate and document internal control systems Basic understanding of Internal Control over Financial Reporting (ICFR) Financial Analysis Strong skills in ledger scrutiny, ratio analysis, variance analysis, and financial reporting Excel Proficiency Advanced Microsoft Excel skills (pivot tables, VLOOKUP, conditional formatting, etc.) Accounting Software Experience using Tally ERP Exposure to ERP systems like SAP/Oracle and audit tools like CaseWare or IDEA (preferred) Documentation & Report Writing Ability to draft clear and structured audit working papers, checklists, and reports Communication Skills Effective verbal and written communication for interacting with clients and team members Analytical & Problem-Solving Skills Strong attention to detail with an analytical approach to identify discrepancies or anomalies Time Management & Multitasking Ability to manage multiple assignments and meet deadlines in a time-bound audit environment
Posted 3 weeks ago
4.0 - 9.0 years
3 - 7 Lacs
Chennai
Work from Office
The Cyber Incident Responder will be responsible for managing the organisation s response to all severity levels (Sev 1-4) of security incidents. The role involves leading the investigation, recovery, and follow-up of security incidents, allocated based on time of day, business area, and the individual s skills and experience. The responder will work closely with the team to ensure timely recovery from security incidents and collaborate with other departments to implement processes, procedures, and technologies to prevent future occurrences. Additionally, the role includes reviewing, improving, and maintaining a comprehensive suite of security incident response procedures and playbooks. The Cyber Incident Responder will also be expected to conduct threat analysis, provide incident reports, and participate in post-incident reviews to identify lessons learned and areas for improvement. What youll be doing: Manage Security Incidents: Effectively oversee the management, investigation, and forensic analysis of security incidents. Team Collaboration: Collaborate with team members to optimise incident response processes, procedures, and approaches. Procedure and Playbook Maintenance: Continuously review, enhance, and maintain security incident response procedures and playbooks. Stakeholder Engagement: Develop and maintain strong relationships with internal stakeholders, suppliers, and external agencies. Incident Simulations: Participate in and enhance regular cyber security incident simulations and exercises to ensure preparedness. Threat Analysis and Reporting: Conduct threat analysis, generate incident reports, and participate in post-incident reviews to identify lessons learned and areas for improvement. What youll need: Computer Science Degree (desirable but not essential) CISSP or similar Certified Incident Handler or similar Certified Forensic Analyst or similar Experience of managing security incidents within a large multinational organisation Experience of driving security investigations and forensics Experience of working within a high pressured security incident response team Experience of working with suppliers, external stakeholder and internal teams and developing strong and trusting working relationships
Posted 3 weeks ago
0.0 - 2.0 years
7 - 8 Lacs
Mumbai, Lower Parel
Work from Office
Financial accounting requirements, record keeping & reporting the auditing functions. Responsible for supporting Executives and Managers on research assignments/Forensic assignments and compliance related work. Evaluating internal control systems / procedures, preparing reports & analysis with a view to highlight the shortcomings and necessary recommendations. Assist in preparation of Audit Programs. Involved in following up and gathering information from the clients. Continually updated with the developments in Audit related areas and have responsibility for updating their teams. Audit & Assurance Knowledge Sound understanding of statutory, internal, and tax audits Familiarity with audit planning, execution, and reporting procedures Accounting Standards & Regulations Working knowledge of Indian Accounting Standards (Ind AS) and Accounting Standards (AS) Awareness of Companies Act, 2013, and other applicable regulatory frameworks Internal Controls & ICFR Ability to evaluate and document internal control systems Basic understanding of Internal Control over Financial Reporting (ICFR) Financial Analysis Strong skills in ledger scrutiny, ratio analysis, variance analysis, and financial reporting Excel Proficiency Advanced Microsoft Excel skills (pivot tables, VLOOKUP, conditional formatting, etc.) Accounting Software Experience using Tally ERP Exposure to ERP systems like SAP/Oracle and audit tools like CaseWare or IDEA (preferred) Documentation & Report Writing Ability to draft clear and structured audit working papers, checklists, and reports Communication Skills Effective verbal and written communication for interacting with clients and team members Analytical & Problem-Solving Skills Strong attention to detail with an analytical approach to identify discrepancies or anomalies Time Management & Multitasking Ability to manage multiple assignments and meet deadlines in a time-bound audit environment.
Posted 3 weeks ago
3.0 - 8.0 years
5 - 10 Lacs
Pune
Work from Office
Are you a high-energy, motivated, smart individual who thrives in a dynamic environment? As a member of a talented and progressive security team, your contributions will immediately affect the organizations success. The Acoustic Security team is looking for an experienced Security Analyst to join a team focused on threat detection, incident response, and cloud security, securing the next-generation digital marketing platform. Work alongside passionate security professionals in a complex environment. This position protects Acoustic products and platforms, to be used by thousands of customers worldwide. This role protects scalable systems to manage our customers data consisting of hundreds of millions of contacts and associated attributes. You will research innovative security technologies and processes and work with fresh solutions that can be used to improve security within a cloud environment. This is a small team so we need team members that can work independently with minimal guidance, that can think strategically to make our program better, and who want to learn and grow. What will you do: Respond to and resolve cybersecurity incidents, and proactively prevent the reoccurrence of these incidents Perform proficient forensic analysis using security tools and monitoring systems to discover the source of anomalous security events. Manage and document security incidents following documented Incident Response plans and playbooks. Identify and onboard necessary log sources to ensure visibility across the enterprise. Enhance detection and alert maturity Create dashboards, reports, and metrics. Manage tools such as EDR, AV, SIEM, IPS/IDS, HIDS, and other security systems Recommend implementation of countermeasures or mitigating controls Perform vulnerability scanning and remediation management. Perform cloud security compliance scans and remediation management. Regularly check the work queue for incoming assignments and complete all work daily and respond to work queue items utilizing pre-defined procedures. Participate in a weekly team meetings to share updates and discuss projects. 3 years of experience as a SOC Analyst, Security Content Developer and/or Security Engineer in a complex cloud based enterprise Willing to work a pre-scheduled shift, work 1-2 on call weekends a month, and remain on-call as necessary
Posted 3 weeks ago
2.0 - 6.0 years
5 - 9 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Fortinet Firewall. Experience5-8 Years.
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Security Log Monitoring. Experience5-8 Years.
Posted 3 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Vulnerability Assessment Penetrationtest. Experience3-5 Years.
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Data Security Consulting. Experience5-8 Years.
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The Cyber Security Analyst - L4 is pivotal in safeguarding sensitive organizational information by systematically analyzing, identifying, rectifying, and recommending specific improvements to enhance the security posture of Wipro Technologies. You will proactively assess security risks and implement strategies that protect against potential threats, ensuring compliance with industry standards and regulations. In this role, you will be at the forefront of our cyber defense initiatives, utilizing advanced security measures to protect our assets and reputation. You will work collaboratively with various teams to integrate cybersecurity practices seamlessly into our operations, promoting a culture of security awareness throughout the organization. Key Responsibilities Customer Centricity Deliver exceptional cybersecurity services by ensuring that all customer needs are promptly addressed and resolved. Monitor all log sources and maintain security access protocols to prevent unauthorized access. Develop comprehensive disaster recovery plans to respond to potential security breaches effectively. Continuously monitor for unauthorized, suspicious, or illegal activities within the system. Conduct detailed log reviews and forensic analysis to examine any unauthorized access to sensitive data. Execute security assessments and root cause analyses on security incidents to devise effective improvements. Provide technical support and guidance on escalated incidents from the L1 team, available for 24x7 rotational shifts. Utilize advanced analytics tools to assess emerging threat patterns and vulnerabilities. Complete all tactical security operations tasks related to incident management effectively. Analyze security incidents to provide detailed reports and actionable insights. Coordination & Audit Foster clear communication with stakeholders to address cybersecurity concerns and recommend future security enhancements. Keep an updated information security risk register and assist with internal and external security audits. Support the creation and dissemination of cybersecurity awareness initiatives for all employees. Provide advice and training to staff concerning risks associated with emails, including spam and malicious threats. Desired Competencies The ideal candidate will possess the following competencies Client CentricityAbility to prioritize client needs and deliver tailored solutions. Passion for ResultsA results-oriented mindset to achieve objectives efficiently. Execution ExcellenceCommitment to executing tasks with high-quality standards. Collaborative WorkingCollaborate effectively across different teams and disciplines. Learning AgilityAbility to rapidly adapt and respond to changing situations. Problem Solving & Decision MakingStrong analytical skills to assess issues and make informed decisions. Effective CommunicationAbility to convey complex information clearly and effectively. Security SME Qualifications 8+ years of experience working with enterprise customers on Azure solutions implementation Strong engineering troubleshooting skills to solve complex problems Knowledge of ITIL processes Working on ServiceNow ticketing tool for performing various activities (Incidents/RITM/Change Requests) Strong awareness of networking and internet protocols like TCP/IP, DNS, SMTP, HTTP etc. Expertise on Azure IaaS and PaaS network NPS Radius Server Design, Implementation and Management of Azure Load Balancers Design, Implementation and Management of Azure Application Gateways Design, Implementation and Management of Azure VNet, VNet Peering, VNet Integration etc. Design, Implementation and Management of NSG and ASG Design, Implementation and Manage name resolutions via DNA Zones Design, Implementation and Management of Azure Subnets, Azure UDR and Azure NSG Design, implement and manage Azure Private Link service, Azure Service Endpoints and Azure Private Endpoint Keep an External IP Address inventory with documented owners and purpose Working knowledge on Azure Connection Monitor, NSG Flow Logs, Azure Network watcher and other monitoring tools Mandatory Skills: Palo Alto Networks - Firewalls. Experience5-8 Years.
Posted 3 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: F5 Load Balancers. Experience3-5 Years.
Posted 3 weeks ago
2.0 - 6.0 years
5 - 9 Lacs
Gurugram
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT
Posted 3 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
Gurugram
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: UAM - User Access Management. Experience3-5 Years.
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: BeyondTrust. Experience5-8 Years.
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Vulnerability Assessment Penetrationtest. Experience5-8 Years.
Posted 3 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Forgerock Access Manager. Experience3-5 Years.
Posted 3 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
Mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Zscaler Web Security. Experience3-5 Years.
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough