Home
Jobs

1292 Ids Jobs - Page 18

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 years

1 - 4 Lacs

Thiruvananthapuram

On-site

GlassDoor logo

Techvantage.ai is a next-generation technology and product engineering company at the forefront of innovation in Generative AI, Agentic AI , and autonomous intelligent systems . We build intelligent, secure, and scalable digital platforms that power the future of AI across industries. Role Overview: We are looking for a Senior Security Specialist with 8+ years of experience in cybersecurity, cloud security, and application security. You will be responsible for identifying, mitigating, and preventing threats across our technology landscape — particularly in AI-powered, data-driven environments. This role involves leading penetration testing efforts , managing vulnerability assessments , and implementing best-in-class security tools and practices to protect our platforms and clients. What we are looking from an ideal candidate? Design and implement robust security architectures for cloud-native and on-prem environments. Conduct penetration testing (internal/external, network, application, API) and deliver clear remediation strategies. Perform regular vulnerability assessments using industry-standard tools and frameworks. Lead threat modeling and risk assessments across systems, services, and data pipelines. Collaborate with development and DevOps teams to integrate security in SDLC and CI/CD pipelines ( DevSecOps ). Define and enforce security policies, incident response procedures, and access controls. Monitor for security breaches and investigate security events using SIEM and forensic tools. Ensure compliance with global standards such as ISO 27001 , SOC 2 , GDPR , and HIPAA . Provide guidance on secure implementation of AI/ML components and data protection strategies. Preferred Skills: What skills do you need? Requirements: 8+ years of experience in information security , application security , or cybersecurity engineering . Proficient in penetration testing methodologies and use of tools such as Burp Suite , Metasploit , Nmap , Wireshark , Nessus , OWASP ZAP , Qualys , etc. Deep experience in vulnerability management , patching, and security hardening practices. Strong understanding of OWASP Top 10 , CWE/SANS Top 25 , API security, and secure coding principles. Hands-on experience with cloud security (AWS, Azure, or GCP), IAM, firewalls, WAFs, encryption, and endpoint security. Familiarity with SIEM , EDR , IDS/IPS , and DLP solutions. Knowledge of DevSecOps and tools like Terraform , Kubernetes , Docker , etc. Excellent problem-solving, analytical, and incident-handling capabilities. Preferred Qualifications: Certifications such as CISSP , CISM , CEH , OSCP , or AWS Security Specialty . Experience working on security aspects of AI/ML platforms , data pipelines , or model inferencing . Familiarity with governance and compliance frameworks (e.g., PCI-DSS, HIPAA). Experience in secure agile product environments and threat modeling techniques. What We Offer: A mission-critical role securing next-gen AI systems Opportunity to work with an innovative and fast-paced tech company High visibility and leadership opportunities in a growing security function Compensation is not a constraint for the right candidate

Posted 1 week ago

Apply

2.0 years

0 Lacs

Cochin

On-site

GlassDoor logo

The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Requirements Must-haves: 2-3 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Knowledge of creating and modifying the dashboards. Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows Deep Knowledge in SIEM, Ticketing tool, EDR, Vulnerability Management, MimeCast, DMARC tool. Excellent written and verbal communication skills. Good to have: · Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others Main Responsibilities Tier 1 SOC analysts are incident responders, remediating serious attacks escalated from junior analyst, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments(CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Leading efforts to counter SLA breaches and anticipating the likelihood of future security alerts,incidents. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone),based on the security event severity and suspicious activities, escalate to managed service support teams, tier 2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when newthreats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. · Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Keep updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats in security perspective. Other responsibilities and additional duties as assigned by the security management team or service delivery manager. Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting Job Types: Full-time, Permanent Pay: Up to ₹70,000.00 per month Benefits: Internet reimbursement Schedule: Day shift Supplemental Pay: Performance bonus Application Question(s): Do you have any experience in SIEM Tools? Experience: minimum: 2 years (Required) Language: English (Required) Location: Kochi, Kerala (Required) Work Location: In person

Posted 1 week ago

Apply

1.0 - 3.0 years

0 - 0 Lacs

Malappuram

On-site

GlassDoor logo

SUMMARY The Customer Relationship Executive acts as the primary point of contact for all customer inquiries, order status updates, feedback collection, and client onboarding. This role ensures that every interaction reflects Zuboc’s warmth, professionalism, and emotional commitment to customer happiness. DUTIES & RESPONSIBILITIES A. Order Communication & Tracking Confirm order receipt and expected delivery dates with customers Share tracking IDs, shipping updates, and payment confirmations Coordinate with the Shipment Executive to resolve delays or issues B. Customer Interaction Management Respond to WhatsApp, Instagram DM, and phone inquiries Maintain a friendly, solution-oriented tone in all customer interactions Handle FAQs, gifting customizations, and urgent customer needs C. Issue Resolution & Feedback Document and resolve complaints, packaging concerns, or delays Follow up with clients for post-delivery feedback and reviews Escalate recurring issues to the Creative or Ops team D. Repeat Sales & Client Retention Maintain a database of regular customers and bulk order clients Proactively reach out for birthdays, anniversaries, and seasonal gifting needs Share new launches, offers, or upcoming workshops to past customers E. CRM & Records Maintain logs of conversations, complaints, returns, and follow-ups Assist in compiling testimonials, ratings, and social proof for marketing Generate weekly summary reports for management DESIRED PROFILE Education : Graduate in any discipline (Communication, Business, or Arts preferred) Experience : 1–3 years in customer support, relationship management, or social media handling Skills : Warm and articulate communicator Basic CRM and Excel knowledge Strong understanding of gifting and personalization context Social media responsiveness (especially WhatsApp & Instagram) Job Type: Full-time Pay: ₹12,000.00 - ₹20,000.00 per month Schedule: Day shift Language: English (Required) Work Location: In person

Posted 1 week ago

Apply

4.0 years

20 Lacs

India

On-site

GlassDoor logo

Application Security Perform security reviews, code audits, and threat modeling of web and mobile applications. Work with DevOps and development teams to integrate secure coding practices and tools (e.g., SAST, DAST, SCA). Conduct penetration testing and vulnerability assessments on internal and external applications. Remediate OWASP Top 10 and other emerging threats. Infrastructure & Server Security Harden Linux and Windows servers following CIS/NIST benchmarks. Implement endpoint security solutions (AV, EDR, MDM). Monitor, detect, and respond to system anomalies and unauthorized access. Manage patching and update cycles in coordination with system teams. Network Security Secure network architecture, firewall policies, VPNs, NAT, and VLAN segmentation. Analyze and mitigate threats like DDoS, MITM, spoofing, etc. Configure and manage intrusion detection/prevention systems (IDS/IPS). Perform routine audits and packet-level analysis for suspicious activity. Cloud Security Secure cloud infrastructure (Alibaba Cloud/AWS/Azure/GCP). Manage IAM, WAF, Security Groups, and cloud-native threat detection tools. Audit and improve security configurations in containers, CI/CD pipelines, and serverless deployments. Monitoring, Audit, and Compliance Work closely with compliance teams to meet standards like SAMA-CSF, ISO 27001, and PCI-DSS . Implement and tune SIEM/SOAR systems for proactive monitoring and incident response. Maintain audit trails, security reports, and logs for investigations and audits. Qualifications & Requirements Bachelor’s degree in computer science, Cybersecurity, or a related field. 4+ years of experience in cybersecurity roles with exposure to infrastructure and application security. Proficiency in tools like Burp Suite, Nessus, Wireshark, Nmap, Suricata, OSSEC/Wazuh, etc. Strong knowledge of TCP/IP, Linux security, cloud security, and secure coding principles. Experience with at least one cloud platform (Alibaba Cloud preferred). Familiarity with regulatory and compliance standards in the GCC region is a plus. Security certifications such as CEH, OSCP, CISSP, or CISM are a plus. Preferred Strong problem-solving and analytical skills. Ability to work under pressure in a fast-paced environment. Excellent communication skills to interface with technical and non-technical stakeholders. Self-motivated and able to work independently or as part of a team. Minimum 5 + yrs of exp as security specialists Job Types: Full-time, Permanent Pay: ₹2,000,000.00 per year Benefits: Health insurance Leave encashment Paid sick time Provident Fund Schedule: Day shift Monday to Friday Morning shift Education: Bachelor's (Preferred) Experience: Information security: 5 years (Preferred) audit: 4 years (Preferred) Compliance management: 4 years (Preferred) SoC: 1 year (Preferred) Work Location: In person

Posted 1 week ago

Apply

5.0 - 10.0 years

0 - 0 Lacs

India

On-site

GlassDoor logo

Experience: 5-10years Responsibilities Manage and oversee daily financial transactions and accounting activities. Prepare monthly, quarterly, and annual financial statements and reports. Reconcile account balances and bank statements. Maintain accurate records of accounts payable and receivable. Ensure compliance with financial policies and regulations. Assist in budget preparation and financial forecasting. Coordinate with auditors during financial audits. Analyze financial data to identify trends and provide insights. Handle payroll processing and tax reporting. Assist in cost management and financial planning for the hotel. Qualifications Bachelor's degree in Accounting, Finance, or a related field. Proven experience as an Accounts Executive or in a similar role, preferably in the hotel industry. In-depth knowledge of accounting principles and financial regulations. Familiarity with accounting software and MS Office, especially Excel. Excellent analytical and numerical skills. Strong attention to detail and accuracy. Good organizational and time management skills. Ability to work independently and as part of a team. Strong communication and interpersonal skills. Professional Experience in IDS Software. Job Types: Full-time, Permanent Pay: ₹25,000.00 - ₹40,000.00 per month Schedule: Day shift Work Location: In person

Posted 1 week ago

Apply

2.0 - 3.0 years

0 Lacs

Hyderābād

On-site

GlassDoor logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Description: Tier 2 Analyst Position Overview: The Tier 2 Analyst plays a vital role in the cybersecurity team, responsible for monitoring, detecting, and responding to security incidents. The position involves analyzing alerts, escalating incidents as necessary, and working closely with Tier 3 analysts and other cybersecurity professionals to ensure effective incident response and remediation. The Tier 2 Analyst is also responsible for maintaining and improving the organization's security posture through continuous monitoring and analysis. Key Responsibilities: Security Monitoring and Alert Analysis: Monitor security alerts and events from various sources, including SIEM systems, IDS/IPS, and other security technologies. Analyze alerts to determine their severity and potential impact on the organization. Incident Triage and Escalation: Perform initial incident triage, including assessing the scope and potential impact of security incidents. Escalate incidents to Tier 3 analysts or appropriate resource teams for further investigation and response, as necessary. Incident Response and Containment: Assist in the containment of security incidents by implementing pre-approved actions or recommended measures. Work with the SOC team to execute response actions on managed hosts within the scope of permissions and access rights. Communication and Coordination: Communicate incident details and recommended actions to the cyber defense team and other stakeholders. Participate in cyber defense calls to provide updates on incident status and ongoing response efforts. Documentation and Reporting: Maintain accurate and detailed documentation of all incidents, including actions taken and lessons learned. Prepare reports for stakeholders, summarizing incident findings and response actions. Peer Review and Continuous Improvement: Conduct peer reviews of incident handling and analysis performed by other Tier 2 analysts. Identify trends and areas for improvement in incident response processes and capabilities. Threat Intelligence and Analysis: Utilize threat intelligence feeds and other resources to stay informed about emerging threats and vulnerabilities. Incorporate threat intelligence into the analysis and response process to improve detection and mitigation strategies. Security Tool Management and Optimization: Assist in the configuration, tuning, and optimization of security tools and technologies. Provide feedback on the effectiveness of security controls and suggest improvements. Qualifications: 2-3 years related experience in cybersecurity operations, particularly in a SOC or similar environment. Strong knowledge of cybersecurity principles, including incident response, threat detection, and risk management. Proficiency in using security monitoring tools, such as Sentinel SIEM systems, IDS/IPS, EDR – Microsoft Defender, XSOAR – SOAR solutions. Excellent analytical and problem-solving skills. Strong communication and teamwork skills, with the ability to collaborate effectively with cross-functional teams. Basic understanding of network and infrastructure security. Familiarity with regulatory and compliance requirements related to cybersecurity. Additional Information: The Tier 2 Analyst is a crucial component of the organization's cybersecurity defense. This role requires a proactive approach to identifying and mitigating security threats, as well as a commitment to continuous learning and improvement. The Analyst must be able to work effectively under pressure and be prepared to respond swiftly to a variety of security incidents, ensuring the organization's digital assets and information remain secure. Special Factors: Willing to work from ODC as and when required in rotational shift. Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

2.0 years

10 Lacs

India

On-site

GlassDoor logo

Job Title: SOC Engineer / IT Security Specialist Exp : 2 to 4 years Job location : Mumbai - Fort (On site) Department: Information Security / SOC Reports to: CISO / Security Lead Role Summary: Responsible for managing and enhancing the organization's security posture through continuous monitoring, compliance tracking, risk assessment, policy enforcement, and incident response. Ensures alignment with internal policies, regulatory standards, and industry best practices. Key Responsibilities :Technology & Compliance: Regularly review security tools and systems for compliance and hardening. Maintain and update internal security policies and ensure adherence. Track compliance with regulatory standards (SEBI, RBI, CERT-IN, ISO 27001, etc.). Prepare compliance and audit reports for senior management. SOC Operations & Governance: Oversee 24/7 SOC operations, threat monitoring, and incident handling. Track and report actionable audit/compliance items to closure. Provide weekly/monthly security dashboards and risk summaries to CISO. Risk & Incident Management: Conduct regular risk assessments and implement mitigation strategies. Develop and maintain incident response plans and ensure timely resolution of security breaches. Lead efforts in cyber resiliency and recovery from security incidents. Security Architecture & Monitoring: Design secure network/system architectures and monitor them continuously. Manage SIEM, EDR/XDR, NAC, and other security tools for threat detection. Oversee access control, patch management, and vulnerability remediation. Cloud & Data Security: Implement and manage security measures across cloud platforms (AWS, Azure, GCP). Ensure data protection via encryption, DLP, DAM, and secure storage practices. Governance, Risk & Compliance (GRC): Maintain alignment with GDPR, HIPAA, PCI DSS, ISO 27001, and other standards. Collaborate across teams to ensure integrated GRC efforts and audit preparedness. Training & Awareness: Conduct employee security training and awareness programs. Promote a culture of cybersecurity across the organization. Preferred Skills & Qualifications:Technical Skills: Experience with tools like EDR/XDR, FIM, DAM, DLP, WAF, IPS/IDS, and firewalls. Knowledge of OS security (Windows, Linux, macOS), network security, and secure coding practices. Proficiency in encryption, vulnerability scanning, and SIEM tools. Certifications (Preferred): CISSP, CISM, CEH, CISA, CompTIA Security+, ISO 27001, ISO 22301. Soft Skills: Strong analytical thinking and problem-solving abilities. Excellent documentation and reporting skills. Collaborative mindset with the ability to train and influence others. Resilient under pressure and eager to stay current with cybersecurity trends. Job Types: Full-time, Permanent Pay: Up to ₹1,000,000.00 per year Benefits: Flexible schedule Health insurance Paid sick time Paid time off Provident Fund Schedule: Day shift Monday to Friday Application Question(s): How many relevant years of exp do you have ? What is your current location ? Work Location: In person

Posted 1 week ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Exp : 4Yrs to 8yrs Managing Joiners, Movers & Leavers tasks of user accounts, other accounts, IDs, across applications running on various platforms like PowerShell, Oracle, Mainframe, IBM-AIX, Red Hat Linux, Solaris, RACF, SQL Administrator, Windows Servers, Active Directory, etc. Applications Provisioning, Deprovisioning for the users using different IAM tools like SailPoint, Oracle, IBM ,MS, Ping ,SiteMinder, Okta etc. and IGA Solutions Service Now and other ITSM tools experience required with Incident, Change Management Skills To create and administer various shared resources e.g. Distribution Lists, Directories, Mailbox, Folders, Drives etc. To provide permissions to the user as required by their Service Requests within the SLA To setup the servers as per the customer requirement To Standardize the network resources as per the client requirement Ensure that the customer has the appropriate access to the tools to support the business in an efficient way System Administrator for the User Account To create and administer LAN accounts of the users Maintenance and Incident Management Systems including general housekeeping Create LAN and/or E-mail account for the users and administer them. Grant permissions on various network resources available to users Creation and administration of Global groups Creation and modification of exchange resources like Distribution Lists, Shared E-mail account, Shared Calendar and Conference Rooms Creation of New Directories as per the customer guidelines and grant permissions on them Setting up servers as per the client standards and granting permissions on them. Creation, modification and deletion of user accounts on Linux, Unix, Solaris, AlX Servers with Scripts usage knowledge Creation, Modification and deletion of user accounts on Mainframe/ RACF Logical Identity and Access Management – Primary and Secondary controls level UAM experience with compliance knowledge preferred Show more Show less

Posted 1 week ago

Apply

6.0 years

1 - 1 Lacs

Bengaluru

On-site

GlassDoor logo

Job Title: Security Operations Center (SOC) L3 . LinkedIn IDs must. Mode of hire : C2H mode only Experience – 6 to 10 Years Notice period : Immediate. Location: Bangalore/Chandigarh Work Mode - Hybrid Job description ACCOUNTABILITIES Develop, enhance, and operationalize IT Security processes. Lead, coach, and mentor a high-performing, highly engaged team, supporting initiatives covering Information Security, Incident Management, and Vulnerability Management. Develop, measure, analyze, and maintain the internal and external service metrics for Security Service Operations, providing timely reports to leadership teams. Lead, coordinate, and train others on effective management of security incidents and operational responses Collaborate across various business units to deliver the most Resource work in shifts - 2:30AM till 10:3AM or 10:30AM to 7:30PM IST comprehensive security response Implement security and risk programs to ensure operational efficiency and auditability. Understand business needs and intuitively recommend secure solutions. Lead and manage IR issues and provide timely feedback to management and supervisor Provide guidance to the IT security team members. Assign tasks and projects to team members based on their skills and expertise. Assess and prioritize security risks and vulnerabilities and develop mitigation strategies. Lead the response to security incidents, including breaches, attacks, and data breaches. Conduct post-incident reviews to identify lessons learned and improve incident response processes. Monitor security alerts and events, and coordinate appropriate responses Collaborate with other IT teams, departments, and business units to integrate security measures and requirements Provide regular reports to Leadership on the productivity, Team performance Maintain comprehensive documentation of security procedures, incident responses, and configurations Develops and maintains a productive work teams by hiring qualified personnel, training, and managing performance. Manages teams with integrity, ethical business practices, and in accordance with Mouser policies, procedures, and practices. Customarily and regularly directs the work of two or more full-time employees or their equivalent. Makes suggestions and recommendation for these employees regarding performance, including hiring, transfer, advancement, and termination. Manages daily operations to meet department and company objectives. Works with minimum supervision and makes independent judgments. Flexible to meet the changing needs of the business and willingness to take on new responsibilities and assignments. Initiates, establishes and maintains highly effective relationships with internal and external business contacts of various cultures, and at all levels. Extremely confidential and trustworthy. Demonstrates knowledge, experience and understanding of critical job functions of the team. Assists management with development of results oriented strategies. Regular attendance at work is an essential part of the job. SKILLS & CERTIFICATIONS Extensive knowledge of key IT Security Technologies Preferred to have an Industry respected Certification (CISSP, CISM, CRISC, CISA) Maintain current and extensive knowledge of emerging security threats Possess excellent verbal, interpersonal and written technical and non-technical communication skills. EDUCATION & EXPERIENCE Bachelor’s Degree in any field, or minimum of 3 years prior work experience that is relevant to the team you will supervise. Including: 6+ years of experience working with SIEM, EDR, Email Security Gateways, Vulnerability Management Software, Firewalls, etc. 6+ years of experience working with security systems, user authentication and management Job Type: Contractual / Temporary Contract length: 6 months Pay: ₹100,000.00 - ₹150,000.00 per month Schedule: Day shift Work Location: In person

Posted 1 week ago

Apply

7.0 - 10.0 years

6 - 8 Lacs

Bengaluru

On-site

GlassDoor logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. As a Network Specialist you will be responsible for providing high-level network consulting services, analysing complex network requirements, and recommending suitable solutions to our clients. Responsibilities: Collaborate with clients to understand their business objectives, technical requirements, and network architecture needs. Conduct thorough audits and assessments of existing network infrastructure, identifying areas for improvement and potential risks. Design customized network solutions that align with client requirements, industry best practices, and technology trends. Create detailed network design documents, including diagrams, configurations, and migration plans. Oversee the implementation and configuration of network solutions, ensuring successful deployment within defined timelines. Provide technical guidance and troubleshooting expertise to resolve complex network issues. Conduct network performance analysis, monitoring, and capacity planning to optimize network performance and scalability. Stay up-to-date with emerging technologies and industry trends related to modern networks, and make recommendations to enhance the network infrastructure. Collaborate with cross-functional teams, including project managers, engineers, and system administrators, to ensure successful project delivery. Provide mentorship and guidance to junior network engineers and technicians. Requirements : Bachelor’s degree in computer science, Information Technology, or a related field. 7-10 years of experience in network consulting, design, and implementation, preferably in a client-facing role. Must possess a strong knowledge in basic network fundamentals, including concepts such as OSI & TCP/IP model, subnetting, Layer-2 and Layer-3 technologies, etc Proficient in network protocols and technologies such as TCP/IP, DNS, OSPF, BGP, MPLS, VLANs, VPNs, and firewalls. Hands-on experience with network equipment from leading vendors, such as Cisco, Juniper, Arista, etc. Proficient in security elements such as firewalls, IDS/IPS, etc. Strong expertise in modern network technologies, including but not limited to SD-WAN, virtualization, cloud networking, software-defined networking (SDN), and network automation. Expertise on Ansible for seamless automation of IP network configurations, optimizing the deployment and management of networking infrastructure. Expertise on Terraform to define and provision IP network resources, ensuring consistent and scalable network architectures. Proficient in cloud networking technologies and Secure Access Service Edge (SASE). Familiarity with network monitoring and management tools, such as Wireshark, SolarWinds, ThousandEyes, LiveNX etc. Excellent analytical and problem-solving skills, with the ability to assess complex network requirements and propose effective solutions. Strong communication and interpersonal skills, capable of effectively presenting technical concepts to both technical and non-technical stakeholders. Industry certifications from vendors like Cisco, Juniper, Zscaler, Palo Alto, Fortinet etc. are highly desirable. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

1.0 - 4.0 years

4 - 7 Lacs

Bengaluru

On-site

GlassDoor logo

Job Description: Security analysts Bloom Energy, a solid oxide fuel cell company, is currently expanding its cybersecurity incident monitoring and response team and is looking for Security Operations Center (SoC) Analysts. The person working in the SOC team operates the security monitoring solutions, reacting timely to security events as identified. This individual should be a dynamic professional who is looking for a rewarding future in one of today’s most exciting security technologies. Location: Bangalore, Rajajinagar Requirement type: candidates having 1-4 years of experience. Role and Responsibilities: Monitoring and analysis of cyber security events with the use of Splunk (SIEM), SOAR, IDS, XDR, Antivirus and other tools. Able to perform true & false positive log line analysis with a higher degree of accuracy from multiple IT systems. Triage security events and incidents, detect anomalies, and report remediation actions. Execution of SOC procedures and ensure completeness of the incident information Escalation of incidents to be handled to senior members in the SOC team, when relevant. Demonstrate excellent professional customer service skills for reporting, alerting & escalating events for other stakeholders. Ready to learn latest Cybersecurity tools, keep the team updated with latest cyber attacks. Maintain, manage, improve and update security incident process and protocol documentation (Run Book). Strong interpersonal and communication skills with the ability to drive the work as part of a team. Stay up-to-date on the latest security threats and technologies to improve the company's security posture. Skills and Qualifications: Bachelor Degree in Computer science (Engineering & Technology desired), Management of information Systems, computer security or equivalent. Basic understanding on Malwares, CIA triad, Cyber Kill chain, Networking. Basic knowledge of Information Security, Network devices, Security devices, Server security, Application Security, etc. Keen to learn new security technologies and how information security operates. Keen on entering the information security world and developing oneself in that direction. Well-developed logical thinking capabilities, in order to be able to investigate cases. Able to work in shift schedule. Basic knowledge about Automation tool, AI and Network security Excellent social, communication, and writing skills About Bloom Energy: Bloom Energy will make clean, reliable energy affordable for everyone in the world. Our technology, first developed for NASA's Mars Program, will dramatically change the way that the world’s energy is produced, distributed and consumed. Bloom’s unique on-site power generation systems are among the most efficient on the planet, providing significantly reduced operating costs and producing dramatically lower greenhouse gas emissions. Pioneering a new class of stationary fuel cells, Bloom is not just creating a new product or company; it is driving a whole new industry. As one of Silicon Valley’s most promising startups, Bloom was the first clean energy technology investment for Kleiner Perkins and NEA, two of Silicon Valley’s most revered venture capital firms. The company has assembled a super-star board, experienced management team, and top-notch technical staff. Bloom Energy is growing quickly and is looking to add to its dynamic team. Bloom Energy is an equal opportunity employer and makes employment decisions on the basis of merit. We are committed to compliance with all applicable laws providing equal employment opportunities. Bloom Energy makes reasonable accommodations, consistent with applicable laws, for the known physical or mental limitations of an otherwise qualified applicant or employee with a disability, who can perform the essential job functions, unless undue hardship would result.

Posted 1 week ago

Apply

3.0 - 5.0 years

0 - 0 Lacs

India

On-site

GlassDoor logo

Development, implementation, monitoring, maintenance, and management of threats, security controls, processes, procedures and systems. Provides trusted advisor overview and management for information security projects and technical requirements. Provides threat management support for firewalls, intrusion detection systems, enterprise anti-virus, web application firewalls, and log monitoring tools. Manages internal/external vulnerability management program and oversight for code reviews or application security scan reviews as part of the Application Security management program. Manages the company’s Incident Response process in coordination with managed SOC vendor to monitor and respond to security alerts from all assets storing, processing, transmitting company confidential/sensitive data including PCI and PII data assets. Provides technical expertise in support of information technology assessments, penetration tests, and/or audits (PCI/SOX/HIPAA/other) of organizational automated systems and processes and will play a critical role in designing, maintaining and enhancing our organization's cybersecurity posture. Works closely with cross-functional teams to identify and implement robust security measures, detect, and respond to security incidents, and ensure the overall integrity and confidentiality of our systems and data. Essential Duties and Responsibilities Other duties may be assigned. In the event of absence, duties for this position will be overseen by the position to which it reports. Conducts analysis, develops technical and programmatic assessments, evaluates security engineering and integration initiatives and provides technical support to facilitate compliance with security policies, procedures, standards and guidelines. Identifies security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives. Analyze and review recent industry breaches for preventive cyber breach strategies. Provide threat intelligence research related to malware/virus identification. Responsible for reviewing and approving corporate, PCI In-scope firewall requests and WAF changes; perform WAF tuning as necessary. Monitor, report, and aid in the resolution of all security-related problems and discrepancies by monitoring assigned systems, maintaining documentation and provide management and any other appropriate areas with reporting as requested. Manage WAF, intrusion detection systems and in coordination with vendor SOC, ensure sufficient coverage to monitor PCI, PII, and all other assets storing, processing, transmitting company confidential/sensitive data. Ensure alerts from current and future systems are properly designed and monitored. Manage internal/external vulnerability management program and as appropriate expand scope of vulnerability scans, application/network penetration tests to cover enterprise and all systems/environments storing, processing, transmitting company confidential/sensitive data. Monitor intelligence sources for newly identified vulnerabilities, evaluate the risk such vulnerabilities pose to the organization's information and systems, and advise management of appropriate measures to eliminate or reduce the organization's risk or exposure to such vulnerabilities. Performs both internal/external vulnerability scanning and penetration testing. Analyzes information from those scans, as well as penetration tests, to mitigate and help IT stakeholders address system vulnerabilities. Provide technical support/oversight for code reviews or App scan reviews as part of Application Security management program. Provide technical support/oversight for security exception request process. Provide technical support for incident management and forensics. Monitor appropriate industry sources to maintain awareness of new security tools and techniques and research those tools and techniques that have the potential to improve the organization's ability to protect its information and infrastructure. Assist in the development of appropriate information security policies, standards, procedures, checklists, and guidelines using generally-recognized security concepts tailored to meet the requirements of the organization. Provide expertise to support timely resolution of findings from information technology assessments, penetration tests, and/or audits of organizational automated systems and processes; as appropriate, develop and communicate recommendations for improvement to management. Provide reporting metrics/create and maintain dashboards for department functions. Proficient in the use of Word, Excel. Assist manager/director in planning, time budgeting and scheduling work for completion. Participate in opportunities that enhance personal and professional growth and the accomplishment of career objectives through continuing education, seminars and participation in field-related professional organizations. Accountable for execution of assigned tasks from start to finish, while fully leveraging the disciplines expected of a cybersecurity engineer according to department standards, procedures and processes. Stay current with emerging issues affecting the Cybersecurity profession. Qualifications (Include Education and Specific Experience) Strong understanding of data network configuration and infrastructure concepts, including TCP/IP, DNS, routers, firewalls, web servers and security hierarchy including the application of encryption key infrastructures and authentication processes. Knowledge of cloud security concepts (Azure/AWS). Strong experience with IT security standards and best practice frameworks. (like ISO 27001/27002, NIST/NIST CSF, ITIL, PCI, SOX) In depth experience working with internet and web application security frameworks like SANS, OWASP. Detailed technical knowledge of hardening concepts and audit for Unix, Linux, Windows servers and desktop systems, AWS EC2 instances. Excellent understanding of common application, network, and operating system vulnerabilities, current threat vectors and mitigations. Strong working knowledge of networking, routing, protocols, ports and services. Working knowledge of System Information Event Monitoring (SIEM), Intrusion Detection and Prevention System (IDS/IPS), web application firewalls, vulnerability scanning tools, encryption capabilities, Network Access Controls (NAC), Data Loss Prevention (DLP), NMAP, Vulnerability scanners, Wireshark, and other security related tools Experience working with leading security WAF like Akamai, Cloudflare. Experience working with logging and file integrity monitoring tools like LogRhythm, NXLog, Splunk. Demonstrated experience in conducting security assessments. Demonstrated experience in investigating security issues related to Internet, server, desktop, laptop, tablet, and other mobile device security issues; OS patching, hardening and anti-virus. Ability to work with subject matter experts and 3rd party MSSP to coordinate activities to complete security related projects or tasks in a timely manner. Proficient with programming logic concepts, scripting experience (like Python, JavaScript, PowerShell) Strong communication and teamwork skills to collaborate with cross-functional teams and convey complex security concepts to non-technical stakeholders. Security certifications like CEH or CISSP are desired. • Bachelor’s degree in Computer Science, Information Security Management, Engineering or equivalent is required. • 3-5 years of experience in network and application security in a multiple operating system environment. Job Type: Full-time Pay: ₹7,000.00 - ₹20,000.00 per month Schedule: Monday to Friday Night shift US shift Work Location: In person

Posted 1 week ago

Apply

4.0 - 5.0 years

4 - 5 Lacs

Greater Noida

Remote

GlassDoor logo

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role We are seeking a Security Architect who will join our team and take the lead on developing, implementing, and maintaining our security strategy within our Service Provider organization. As our Security Architect, you will work closely with our leadership team to design and implement effective security solutions that not only protect our business objectives and regulatory requirements, but also provide innovative solutions to stay ahead of emerging threats. Work with Project and Customer resources to continue design and deployment activities and further enhance the PAM solution. Design the Architecture for PAM Solutions using Beyond Trust products. Installation and configuration of Password Safe & Secure Remote Access appliance and its administration. Onboard the servers into Beyond Trust PAM Solution for managing the privilege IDs in the servers and Ensure that least privilege model is pursued. Configuration of smart rules and workflows for managing the PAM environment. Configuration of Access policies, session policies and group policies in Beyond Trust PAM Solutions. Enable session recording and generation of required reports as per customer audit requirements. Optimize session reporting and archiving of session reecords and ensure the customers security policy requirements. Install and configure the software for ensuring the privilege access management for unix & linux environment. Configuring the privileged ids for application-to-application integration Configuring the ssh key based authentication for the privileged ids Integration of Active Directory or any LDAP Directory with Beyond Trust appliances for ensuring the centralized authentication. Implementation of SAML or OAuth for SSO with Beyond Trust Appliances. Demonstrate strong project delivery experience with regard to estimates, planning and deliverables using project management methodologies Provides mentoring and guidance to junior engineers Perform assessment and IGA roadmap for clients Help shape proposal for BT deployments and assessments Help shape statements of work for BT related work Develop deliverable templates and act as subject matter expert for client discussions Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career, from a Junior Architect to Principal Architect – we have opportunities for that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Professional and Technical Expertise: Senior Level consultant with demonstrable experience of 4-5 years in Beyond Trust Privileged Access Management solutions like Secure Remote Access (SRA), Password Safe, Active Directory Bridge, Privilege Management for Unix & Linux. Experience of using Beyond Trust to secure privileged credentials, sessions and endpoints against cyber threats. Good general understanding of Identity & Access Management concepts. Understanding of client security and risk posture of the client. Experience in implementing the functional and non-functional requirements of PAM system. Beyond Trust certification in either of tools like Secure Remote Access (SRA), Password Safe, Active Directory Bridge, Privilege Management for Unix & Linux. Experience in handling incidents, service requests and changes as per ITIL principles. Preferred Professional and Technical Expertise: Integration between SailPoint and Beyond Trust for the provisioning of privileged access to administrators. Knowledge and experience in Unix, Windows, MacOS and Hyper Scalar administration. Understanding of cloud computing technologies, business drivers, and emerging computing trends Experience in Root Cause analysis and problem management skills. Strong verbal and written skills to develop technical documentation and presentations Knowledge and experience in other IAM Infrastructure products. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 1 week ago

Apply

3.0 - 5.0 years

9 - 12 Lacs

Noida

Remote

GlassDoor logo

Lead and manage the IT infrastructure with a focus on secure network design and maintenance. Design, deploy, and manage internet and intranet-based hosting environments with strict data privacy controls. Architect and maintain servers optimized for AI model hosting and high-performance computing. Ensure end-to-end cybersecurity for networks, servers, and intranet operations, following best practices. Implement and oversee restricted physical access protocols for critical hardware and server rooms. Monitor, update, and harden all systems to defend against cyber threats and vulnerabilities. Configure and manage secure web-socket communications within intranet and internal network applications. Plan and execute scalable network architecture to support AI workloads, including bandwidth and latency requirements. Collaborate with AI development teams to forecast and fulfil evolving hardware and networking needs. Maintain robust backup, disaster recovery, and failover systems for all critical infrastructure. Document system architecture, security protocols, and operational guidelines for audit and compliance purposes. Continuously assess and upgrade security measures, ensuring alignment with industry standards and project goals. Support secure deployment of internal applications and manage internal DNS, firewalls, and access controls. CCNA certification preferred; strong grasp of enterprise networking principles, VLANs, VPNs, and secure routing. Qualifications: Candidate must have Bachelor's/Master’s degree in Computer Science Engineering, Information technology Engineering or a related field; Proven professional experience (3-5 years) in Network management and Server Design. Certifications such as CCNA, CISSP, etc. Technical and Inter-personal skills: Network design, configuration, and security (LAN, VLANs, VPNs, firewalls) Server architecture and management (physical and virtual servers) Securing physical and logical access to critical hardware Hosting and managing applications over secure intranet spaces Cybersecurity frameworks (hardening servers, IDS/IPS, encryption, access control) WebSocket communication setup and secure management AI infrastructure requirements (GPU clusters, data handling, scalable storage) Backup, recovery, and disaster recovery planning Experience with private cloud or hybrid network models Knowledge of SSL/TLS, certificates, and secure communications protocols Familiarity with Linux and Windows Server environments Proficiency in setting up and managing databases securely (SQL/NoSQL) CCNA-level networking proficiency (even if not certified) Experience with monitoring tools (e.g., Nagios, Zabbix) and SIEM solutions Job Types: Full-time, Permanent Pay: ₹900,000.00 - ₹1,200,000.00 per year Benefits: Flexible schedule Paid sick time Paid time off Provident Fund Work from home Schedule: Day shift Monday to Friday Work Location: In person Application Deadline: 12/06/2025 Expected Start Date: 23/06/2025

Posted 1 week ago

Apply

1.0 years

0 - 0 Lacs

Noida

On-site

GlassDoor logo

Urgent Hiring: Email Marketing Executive We're looking for a talented Email Marketing Specialist to help us generate international leads from the US, UK, Canada, Singapore, and UAE for our Website Designing and Digital Marketing services. Candidate must have Gmail, Outlook, and Hotmail IDs (minimum 200+) for bulk emailing. Role:* Develop and execute email marketing strategies to engage leads* Optimize ad performance to drive quality leads Target international markets and generate high-quality conversions Location: H-161, Suit No : 203, BSI Business Park, Sector-63, Noida, 201301. What We're Looking For:* 1+ years of experience in email marketing Must have Prior Experience of Min. 6 Month in same line of Business. Proficiency in email marketing platforms and automation tools A proven track record of increasing email engagement and lead generation Immediate Joining Apply Now : DM me or send your CV to careers@elbroz.com to apply! Job Type: Full-time Pay: ₹15,000.00 - ₹35,000.00 per month Benefits: Paid sick time Paid time off Schedule: Day shift Monday to Friday Morning shift Supplemental Pay: Performance bonus Work Location: In person

Posted 1 week ago

Apply

5.0 - 10.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Job Description The role of Senior Network Security Engineer is to design, implement, maintain and improve security compliance protecting our organization's network infrastructure from Cyber Threats, vulnerabilities, and unauthorized access. This role is primarily responsible for rolling our network security monitoring and visibility tools like Arista, Gigamon, Viavi, Plixer and NDR. This focuses on ensuring that security technologies are optimized for detecting, preventing, and responding to security threats in real-time. This also involves collaboration with Network engineers, IT, and security operations to deploy and support enterprise-level Cyber security platforms and solutions. Responsibilities Define and enforce network security policies, standards, and best practices. Setup network port, IP, rack and stack the hardware for the network visibility tools like Arista, Gigamon & Viavi. Design, deploy, and manage security solutions such as firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and endpoint protections. Conduct regular security assessments, vulnerability scans, and penetration tests to identify and mitigate risks. Monitor network activity, analyse traffic logs, and investigate security incidents or breaches. Perform root cause analysis on incidents and coordinate incident response and remediation efforts to improve security posture and prevent security breaches. Maintain and update security documentation, including policies, incident reports, and network diagrams. Build observability dashboard on the health of the network monitoring tools and the traffic visibility on various network infrastructure and tools. Collaborate with stakeholders, network and cross-functional teams to align security with organizational goals and compliance requirements. Lead or participate in security projects, disaster recovery planning, and business continuity initiatives. Stay updated on emerging threats, vulnerabilities, and security technologies, and recommend improvements. Optimize network security tools and platforms for performance and effectiveness, ensuring they meet compliance and organizational requirements. Maintain comprehensive documentation for network configurations, troubleshooting guides, and operational procedures. Qualifications Technical Skills: Experience with IDS/IPS, and security frameworks (e.g., NIST, ISO 27001). Strong scripting skills in Python, PowerShell, or Bash for automation and tool integration. Experience in Cloud security tools and platforms (GCP, AWS, Azure) and DevOps. Experience in Observability tools (Dynatrace, Splunk, Prometheus Grafana). Understanding of the SIEM tools (e.g., Splunk, QRadar, SecOps or equivalent) Familiarity with ITSM processes, Agile practices, ServiceNow, JIRA. Proficiency with network monitoring tools such as Gigamon, Viavi, Arista or equivalent, NDR tools like Arista, Cisco or equivalent, NetOps like Plixer and SIEM tools like (e.g., Splunk, QRadar, SecOps or equivalent). Strong experience in rack & stack and rolling out network security tools and architecting various tools to build an optimized solution. Strong knowledge of network architectures, protocols (TCP/IP, UDP), routing, switching, and load balancing. Expertise in firewall technologies (e.g., Check Point, Cisco, Fortinet), VPNs (SSL, IPSec), authentication protocols (LDAP, RADIUS), load balancers and cloud security. Experience: Bachelor's or Master’s degree in Computer Science, Information Security, or related field, or equivalent practical experience. Minimum 5-10 years of experience in network engineering and security management. Proven experience in managing security platforms and tools in a large, complex environment. Experience with Network security, analysis, and response, including knowledge of common attack vectors. Certifications: Relevant certifications such as CISSP, CEH, CCNA/CCNP Security, NSE (Fortinet), or equivalent. Cybersecurity certificates (preferred) Show more Show less

Posted 1 week ago

Apply

0 years

0 - 0 Lacs

India

Remote

GlassDoor logo

AMC Manage, Documentation, Vendor Relation, Mail Communication. IDS & WINHMS Support / All type of Network and Computer Equipment Setup and Troubleshoot / All type of printer troubleshoot / Computer hardware Assemble and Troubleshoot / Computer BSOD Repair / ILL Management / VOIP and EPABX Manage and new connection installation / SV9100 PC Pro EPABX Software manage / WIFI Login and User Manage / Outlook Configuration / MICROSENSE WiFi Manage Portal Manage / HT28W Door Lock App user Manage / Hospitality Cloud Software "Wincloud" Manage and User Control / PRINTER, SCANNER CONFIGURATION / Network support / CCTV Installation and support / KOT & BOT & SLIP Printer support / Server data store and maintenance / All Type of Fault Rectifying Electronics Network and hardware Tools Handle / Remote Desktop Services / Telephone Line Fault Rectify / DHCP / Router to Switch Configuration / OS Installation / crimping RJ45 cable. Job Types: Full-time, Permanent Pay: ₹15,000.00 - ₹20,000.00 per month Benefits: Cell phone reimbursement Food provided Paid sick time Paid time off Shift: Day shift Evening shift Night shift Education: Higher Secondary(12th Pass) (Preferred) Work Location: In person Application Deadline: 13/06/2025 Expected Start Date: 14/06/2025

Posted 1 week ago

Apply

7.0 years

0 Lacs

Delhi, India

On-site

Linkedin logo

This role is located in Noida. Candidates willing to relocate are welcome to apply. Note: If shortlisted, we’ll contact you via WhatsApp and email. Please monitor both and respond promptly. Location: Noida, India Work Mode: Financials SuppoWork from Office Salary 5–7 years: Up to INR 20,00,000 per annum 8–10 years: Up to INR 25,00,000 per annum Joining Time / Notice Period: Immediate – 30 days About The Client Hiring for a technology-driven organization with a strong focus on cybersecurity, cloud infrastructure, and risk management practices. The company supports global clients in achieving compliance and robust information security postures. Job Overview Seeking a Cyber Risk Management Lead to drive enterprise-level risk governance, compliance assessments, and security control implementation across on-premise and cloud environments. The ideal candidate has 5+ years of experience in cybersecurity risk, infrastructure audits, and cloud (AWS) security. Key Responsibilities Ensure alignment with regulations, guidelines, and industry best practices (e.g., NIST, ISO, OWASP, ITIL) Maintain, develop, and audit security documentation: policies, standards, procedures Monitor control effectiveness for EDR, cloud, email, and server security Conduct internal security risk assessments for ongoing compliance Guide cross-functional teams on their roles in risk management Lead SOC 2 Type 2 assessments and evidence collection Review and respond to cybersecurity-related RFPs Oversee AWS and Office365 security governance and implementation Track and close audit findings; support internal and external audits Create and manage dashboards for tracking IT and IS events Minimum Qualifications Bachelor's degree in IT, Computer Science, or related field 5+ years of relevant experience in cybersecurity and risk management In-depth knowledge of enterprise IT components: O365, firewalls, VPN, IDS/IPS, proxy, AV/EDR, DHCP/DNS, MFA, WAF, DLP Strong experience with AWS Cloud Security (mandatory) and Azure (preferred) Experience with audit frameworks (SOC2, HIPAA, ISO27001) At least one security certification preferred (e.g., CISM, CRISC, CISSP) Strong communication, documentation, and stakeholder management skills Show more Show less

Posted 1 week ago

Apply

4.0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

Bounteous x Accolite is a premier end-to-end digital transformation consultancy dedicated to partnering with ambitious brands to create digital solutions for today’s complex challenges and tomorrow’s opportunities. With uncompromising standards for technical and domain expertise, we deliver innovative and strategic solutions in Strategy, Analytics, Digital Engineering, Cloud, Data & AI, Experience Design, and Marketing. Our Co-Innovation methodology is a unique engagement model designed to align interests and accelerate value creation. Our clients worldwide benefit from the skills and expertise of over 4,000+ expert team members across the Americas, APAC, and EMEA. By partnering with leading technology providers, we craft transformative digital experiences that enhance customer engagement and drive business success. Information Security Responsibilities Promote and enforce awareness of key information security practices, including acceptable use of information assets, malware protection, and password security protocols Identify, assess, and report security risks, focusing on how these risks impact the confidentiality, integrity, and availability of information assets Understand and evaluate how data is stored, processed, or transmitted, ensuring compliance with data privacy and protection standards (GDPR, CCPA, etc.) Ensure data protection measures are integrated throughout the information lifecycle to safeguard sensitive information Senior Network Administrator Maintaining and administering computer networks that are related computing environments including systems software, applications software, hardware, and configurations. Maintain, monitor, and analyses system components to make recommendations regarding network system security. Troubleshooting, diagnosing, and resolving hardware, firmware related to LAN/WAN Networks. Roles And Responsibilities Maximizes performance by troubleshooting network problems and outages and scheduling upgrades. Replacing faulty network hardware components when required. Protecting data, software, and hardware by coordinating, planning, and implementing network security measures. Performing VLAN, IP address, asset auditing and redundancy mock test. Perform technical analysis and design to execute, test, and rollout solutions. Collaborates with network architects/specialist and ISPs on network optimization. Vendor management related to procurement, maintenance, support, and replacement. Provide support to Team members who escalate network related issues up to the network administration group. Remote assistance to the global helpdesk team on basic network related issues. Preferred Qualifications Strong understanding of network infrastructure and network hardware. Strong knowledge of Ethernet standards 802.3, Wireless standards 802.11 and VLAN 802.1q , 802.1x ., 802.1p Strong knowledge of STP, LACP, EtherChannel. Strong knowledge of BGP, OSPF, EIGRP, route redistribution, PBR, PfR routing. Strong knowledge of Next Generation Firewalls and SASE Cloud Firewalls (Web/App Filtering, IDS/IPS, Sandbox, DLP, Zero Trust etc). Knowledge of redundancy protocols HSRP, VRRP, GLBP. Knowledge of RADIUS, SCEP, EAP-TLS, PEAP-MSCHAPv2. Knowledge of passive networks IO ports, cables, rack design. Ability to create accurate network diagrams and documentation for design and planning network communication systems. Ability to quickly learn new or unfamiliar technology and products using documentation and internet resources. Working knowledge of web servers hosting, SSL, DNS, SNMP, TCP/IP & UDP. Working knowledge of Logging & Monitoring with NMS Tools Working knowledge of SSL VPN, Split Tunneling, IPSEC, Route and Policy based VPN. Knowledge of Linux shell, Windows power shell and/or Ansible scripts. Good analytical and problem-solving skills. Understanding of security implications of architecture decisions. 4-5 Years’ relevant experience in Cisco, Meraki, Fortinet, HPE Aruba, Zscaler network products. Certification in any of the above switching, routing, firewall network technologies. Willingness to work in cross time zones. We invite you to subscribe to our monthly and quarterly newsletters to stay up to date with the latest job openings as well as resources and tips for job seekers here . Research shows that women and other underrepresented groups apply only if they meet 100% of the criteria of a job posting. If you have passion and intelligence, and possess a technical knack (even if you’re missing some of the above), we encourage you to apply. Bounteous is focused on promoting an inclusive environment and is proud to be an equal opportunity employer. We celebrate the different viewpoints and experiences our diverse group of team members bring to Bounteous. Bounteous does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, physical or mental disability, national origin, veteran status, or any other status protected under federal, state, or local law. In addition, you have the opportunity to participate in several Team Member Networks, sometimes referred to as employee resource groups (ERGs), that host space with individuals with shared identities, interests, and passions. Our Team Member Networks celebrate communities of color, life as a working parent or caregiver, the 2SLGBTQIA+ community, wellbeing, and more. Regardless of your respective identity, there are various avenues we involve team members in the Bounteous community. Bounteous is willing to sponsor eligible candidates for employment visas. Apply for this job Bounteous x Accolite is proud to be an equal opportunity employer. Bounteous x Accolite does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, physical or mental disability, national origin, veteran status, or any other status protected under federal, state, or local law. Bounteous x Accolite is willing to sponsor eligible candidates for employment visas. Show more Show less

Posted 1 week ago

Apply

8.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

Our Company Techvantage.ai is a next-generation technology and product engineering company at the forefront of innovation in Generative AI, Agentic AI , and autonomous intelligent systems . We build intelligent, secure, and scalable digital platforms that power the future of AI across industries. Role Overview We are looking for a Senior Security Specialist with 8+ years of experience in cybersecurity, cloud security, and application security. You will be responsible for identifying, mitigating, and preventing threats across our technology landscape — particularly in AI-powered, data-driven environments. This role involves leading penetration testing efforts , managing vulnerability assessments , and implementing best-in-class security tools and practices to protect our platforms and clients. What we are looking from an ideal candidate? Design and implement robust security architectures for cloud-native and on-prem environments. Conduct penetration testing (internal/external, network, application, API) and deliver clear remediation strategies. Perform regular vulnerability assessments using industry-standard tools and frameworks. Lead threat modeling and risk assessments across systems, services, and data pipelines. Collaborate with development and DevOps teams to integrate security in SDLC and CI/CD pipelines (DevSecOps). Define and enforce security policies, incident response procedures, and access controls. Monitor for security breaches and investigate security events using SIEM and forensic tools. Ensure compliance with global standards such as ISO 27001, SOC 2, GDPR, and HIPAA. Provide guidance on secure implementation of AI/ML components and data protection strategies. Preferred Skills What skills do you need? Requirements 8+ years of experience in information security, application security, or cybersecurity engineering. Proficient in penetration testing methodologies and use of tools such as Burp Suite, Metasploit, Nmap, Wireshark, Nessus, OWASP ZAP, Qualys, etc. Deep experience in vulnerability management, patching, and security hardening practices. Strong understanding of OWASP Top 10, CWE/SANS Top 25, API security, and secure coding principles. Hands-on experience with cloud security (AWS, Azure, or GCP), IAM, firewalls, WAFs, encryption, and endpoint security. Familiarity with SIEM, EDR, IDS/IPS, and DLP solutions. Knowledge of DevSecOps and tools like Terraform, Kubernetes, Docker, etc. Excellent problem-solving, analytical, and incident-handling capabilities. Preferred Qualifications Certifications such as CISSP, CISM, CEH, OSCP, or AWS Security Specialty. Experience working on security aspects of AI/ML platforms, data pipelines, or model inferencing. Familiarity with governance and compliance frameworks (e.g., PCI-DSS, HIPAA). Experience in secure agile product environments and threat modeling techniques. What We Offer A mission-critical role securing next-gen AI systems Opportunity to work with an innovative and fast-paced tech company High visibility and leadership opportunities in a growing security function Compensation is not a constraint for the right candidate Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Job Title: Senior SOC Analyst Department: IT Infrastructure Location: Bangalore / Coimbatore Job Type: Full-Time Experience: 7+ years Immediate joiners or notice period of less than 30days are needed. Job Role: A Senior SOC Analyst is a cybersecurity professional responsible for proactively monitoring, analyzing, and responding to security threats within Logixhealth network and systems. They play a crucial role in detecting, investigating, and containing security incidents, as well as developing and improving security solutions. SOC 24/7, SOC monitoring Role Description: The analyst performs monitoring, research, assessment and analysis on Intrusion Detection and Prevention tools as well as Anomaly Detection systems, Firewalls, Antivirus systems, proxy devices (IPS IDS) which requires demonstrable security incident response experience. Perform initial risk assessment on new threats and vulnerabilities, perform assessment phase of Vulnerability and Threat Management process. Perform assessment as well as troubleshooting and help isolate issues with IDS/IPS sensors, Antivirus Cloud MS O365 Defender, Application monitor control, Mobile management (Intune), Vulnerability scanners Nessus professional ,Qualys PCI DSS scanners or other vulnerability Management tools. Patch management & MS O365 Defender Console monitoring. Participate in daily and ad-hoc conference calls as well as compliance and controls, self-assessment processes and documentation related tasks. Log and event management log monitoring and share the daily report. Exposure to User behavior analytics tools. MS Azure sentinel Vulnerability Management. Compliant / Non-Compliant (Devices) Management using Intune. Application control using MS Cloud App security. Working Knowledge of Taegis Secure works or any XDR/EDR/MDR Products Working Knowledge of Password management tools similar tool Bit warden Microsoft Purview and Entra (Azure AD Identity Management) working knowledge. Key Deliverables: Being Proactive and handling SOC Alerts Provide analysis and trending of security log data from a large number of heterogeneous security devices. Analyze and respond to previously undisclosed software and hardware vulnerabilities Zero Day Exploits Coordinate with Intel analysts on open source activities impacting SLTT governments. Integrate and share information with other analysts and other teams Compliance ISO 27001-2022 ,SOC 2 type 2,HIPAA,Hi-Trust Flexible, quick learning, willing to work 24/7 and rotational shifts. Senior Security analysts are expected to be on-call to respond to incidents that arise outside of business hours Monitor, Manage, Remediate (Vulnerability Management) Advise based Vulnerability advisories (CISA, MS-ISAC,USCERT) and escalate to respective teams. Other duties as assigned Independent worker Able to read and Analyze Counter Threat Intelligence Reports and suggest appropriate actions. Manage SIEM and On board devices and respond to Alerts and Analyze and remediate. Skills: Incident response, Security posture management vulnerability Management in Hybrid environment (Cloud and Onsite) Creating and managing security tools and policies in tools such as SIEM, EDR, and DLP, Exposure to Application vulnerability management, API security. Strong understanding of networking, operating systems, and security technologies. Ability to analyze data, identify patterns, and draw conclusions. Ability to investigate and resolve security incidents effectively. Ability to communicate technical information clearly and concisely with all stakeholders and advise appropriate action. Significant experience in security operations, incident response, and threat analysis. Identifying areas for improvement in security processes and tools. Developing and implementing new security solutions Using threat intelligence to identify and mitigate potential risks. Staying up-to-date on the latest cyber threats and attack vectors. Ability to lead Security Projects and Programs and drive towards closure and stakeholder satisfaction. Other skills: Excellent knowledge of Intrusion Detection (TCP/IP knowledge, and Cyber security), various operating systems (Windows, and web technologies (focusing on Internet security) Ability to read and understand packet level data Intrusion detection and prevention and Network Security Products (IDS/IPS, firewalls, etc) Host Security Products (HIPS, AV, scanners, XDR,EDR) Knowledge of threats and technologies effecting Web Application vulnerabilities and recent internet threats Exposure on Vulnerability assessment as well as penetration testing Preferred Certifications from EC-Council, GIAC, (ISC)² are preferred [CISSP, CEH, GCIA, CCNA-Security] Good knowledge of forensics and Log analysis. Incident response and remediation Knowledge of Playbooks. Qualification: Any degree/BE/B. Tech (computer science, Cybersecurity) with technical certification from EC-Council, GIAC, (ISC)² [CISSP, CEH, GCIA, CCSP, CCNA-Security] Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Delhi, India

On-site

Linkedin logo

This role is located in Noida. Candidates willing to relocate are welcome to apply. Note: If shortlisted, we’ll contact you via WhatsApp and email. Please monitor both and respond promptly. Location: Noida, India Work Mode: Financials SuppoWork from Office Salary 5–7 years: Up to INR 20,00,000 per annum 8–10 years: Up to INR 25,00,000 per annum Joining Time / Notice Period: Immediate – 30 days About The Client Hiring for a technology-driven organization with a strong focus on cybersecurity, cloud infrastructure, and risk management practices. The company supports global clients in achieving compliance and robust information security postures. Job Overview Seeking a Cyber Risk Management Lead to drive enterprise-level risk governance, compliance assessments, and security control implementation across on-premise and cloud environments. The ideal candidate has 5+ years of experience in cybersecurity risk, infrastructure audits, and cloud (AWS) security. Key Responsibilities Ensure alignment with regulations, guidelines, and industry best practices (e.g., NIST, ISO, OWASP, ITIL) Maintain, develop, and audit security documentation: policies, standards, procedures Monitor control effectiveness for EDR, cloud, email, and server security Conduct internal security risk assessments for ongoing compliance Guide cross-functional teams on their roles in risk management Lead SOC 2 Type 2 assessments and evidence collection Review and respond to cybersecurity-related RFPs Oversee AWS and Office365 security governance and implementation Track and close audit findings; support internal and external audits Create and manage dashboards for tracking IT and IS events Minimum Qualifications Bachelor's degree in IT, Computer Science, or related field 5+ years of relevant experience in cybersecurity and risk management In-depth knowledge of enterprise IT components: O365, firewalls, VPN, IDS/IPS, proxy, AV/EDR, DHCP/DNS, MFA, WAF, DLP Strong experience with AWS Cloud Security (mandatory) and Azure (preferred) Experience with audit frameworks (SOC2, HIPAA, ISO27001) At least one security certification preferred (e.g., CISM, CRISC, CISSP) Strong communication, documentation, and stakeholder management skills Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

New Delhi, Delhi, India

On-site

Linkedin logo

Job Summary: We seek an experienced Cyber Security Manager to lead our cybersecurity team and protect our organization's information systems. The ideal candidate will have a strong cybersecurity, risk management, and team leadership background. Key Responsibilities: Develop and implement cybersecurity policies and procedures. Manage and oversee the cybersecurity team. Conduct risk assessments and vulnerability analyses. Ensure compliance with regulatory requirements and industry standards. Monitor and respond to security incidents and breaches. Collaborate with IT and other departments to enhance security measures. Provide training and support to staff on cybersecurity best practices. Prepare reports and documentation on security strategies and risks for upper management. Qualifications: Bachelor’s degree in Computer Science or equivalent, Information Technology, or a related field. Proven experience as a Cyber Security Manager or similar role. Proficiency in security technologies such as firewalls, VPNs, IDS/IPS, and SIEM, Cloud Security, Vulnerability management Strong understanding of network protocols, encryption, and authentication methods. Excellent problem-solving and analytical skills. Strong communication and leadership abilities. Preferred Qualifications: Master’s degree in Cybersecurity or a related field. Certifications such as CISSP, CISM, or CEH. Experience with cloud security and DevOps practices. Knowledge of ethical hacking and penetration testing. Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Role Description L1 SOC Lead Experience : 7 to 9 years Location : Hyderabad/Trivandrum/Kochi Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence Job Description SOC Lead Position Overview: We are seeking an experienced and technically proficient SOC Lead to manage a medium-sized SOC team. The ideal candidate will provide technical mentorship, effectively manage security incidents, and ensure efficient project management within the SOC environment. This role requires a strategic leader with strong technical expertise and excellent management skills to oversee daily SOC operations and support team development. Under leadership's guidance, responsibilities include P&L, delivery, compliance, and other operational goals. Key Responsibilities Effectively lead a medium-sized cybersecurity SOC team accountable for delivering cybersecurity services to global customers. Effectively manage the deliverables for SOC for an MSSP team Manage resources, headcount, and profitability objectives under leadership guidance. Ensure the team's quality of deliverables aligns with organizational standards. Manage stakeholder relationships and ensure effective communication. Drive initiatives to promote continuous improvement, innovation, and customer satisfaction under leadership's guidance. Job Requirements Required Skills: Previous operational experience in cybersecurity incident management and response teams like CSIRT, CIRT, SOC, or CERT. Experience with MSSP teams. Proven experience in leading/managing a team size of 10 or more. Proficiency with SIEM tools such as ArcSight, Splunk, QRadar, etc. Strong ability to write technical documentation and present technical briefings to varying audiences. Desired Skills Cybersecurity Fundamentals: In-depth understanding of cybersecurity concepts, threats, vulnerabilities, and attack vectors. Knowledge of security technologies, including SIEM, EDR, firewalls, IDS/IPS, and vulnerability scanners. o Familiarity with network protocols, operating systems, and cloud environments. Incident Response Expertise in incident handling, investigation, and remediation. Knowledge of forensic analysis techniques. Ability to develop and implement incident response plans. Experience Atleast 3 years of experience managing a team of SOC Analysts 5+ years of information security experience is required. At least 3 years of experience in security monitoring, digital forensic analysis, or incident response is preferred. Show more Show less

Posted 1 week ago

Apply

6.0 years

0 Lacs

Chandigarh, India

On-site

Linkedin logo

Job Title: Security Operations Center (SOC) L3 . LinkedIn IDs must . Mode of hire : C2H mode only Experience – 6 to 10 Years Notice period : Immediate. Location: Bangalore/Chandigarh Work Mode - Hybrid Job description ACCOUNTABILITIES • Develop, enhance, and operationalize IT Security processes. • Lead, coach, and mentor a high-performing, highly engaged team, supporting initiatives covering Information Security, Incident Management, and Vulnerability Management. • Develop, measure, analyze, and maintain the internal and external service metrics for Security Service Operations, providing timely reports to leadership teams. • Lead, coordinate, and train others on effective management of security incidents and operational responses • Collaborate across various business units to deliver the most Resource work in shifts - 2:30AM till 10:3AM or 10:30AM to 7:30PM IST comprehensive security response • Implement security and risk programs to ensure operational efficiency and auditability. • Understand business needs and intuitively recommend secure solutions. • Lead and manage IR issues and provide timely feedback to management and supervisor • Provide guidance to the IT security team members. • Assign tasks and projects to team members based on their skills and expertise. • Assess and prioritize security risks and vulnerabilities and develop mitigation strategies. • Lead the response to security incidents, including breaches, attacks, and data breaches. • Conduct post-incident reviews to identify lessons learned and improve incident response processes. • Monitor security alerts and events, and coordinate appropriate responses • Collaborate with other IT teams, departments, and business units to integrate security measures and requirements • Provide regular reports to Leadership on the productivity, Team performance • Maintain comprehensive documentation of security procedures, incident responses, and configurations • Develops and maintains a productive work teams by hiring qualified personnel, training, and managing performance. • Manages teams with integrity, ethical business practices, and in accordance with Mouser policies, procedures, and practices. • Customarily and regularly directs the work of two or more full-time employees or their equivalent. Makes suggestions and recommendation for these employees regarding performance, including hiring, transfer, advancement, and termination. • Manages daily operations to meet department and company objectives. • Works with minimum supervision and makes independent judgments. • Flexible to meet the changing needs of the business and willingness to take on new responsibilities and assignments. • Initiates, establishes and maintains highly effective relationships with internal and external business contacts of various cultures, and at all levels. • Extremely confidential and trustworthy. • Demonstrates knowledge, experience and understanding of critical job functions of the team. • Assists management with development of results oriented strategies. • Regular attendance at work is an essential part of the job. SKILLS & CERTIFICATIONS • Extensive knowledge of key IT Security Technologies • Preferred to have an Industry respected Certification (CISSP, CISM, CRISC, CISA) • Maintain current and extensive knowledge of emerging security threats • Possess excellent verbal, interpersonal and written technical and non-technical communication skills. EDUCATION & EXPERIENCE • Bachelor’s Degree in any field, or minimum of 3 years prior work experience that is relevant to the team you will supervise. Including: • 6+ years of experience working with SIEM, EDR, Email Security Gateways, Vulnerability Management Software, Firewalls, etc. • 6+ years of experience working with security systems, user authentication and management Show more Show less

Posted 1 week ago

Apply

Exploring ids Jobs in India

The ids job market in India is rapidly growing with the increasing demand for professionals who can design, implement, and manage information security systems. With the rise in cyber threats and data breaches, companies across various industries are actively hiring ids professionals to secure their networks and safeguard their sensitive information.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Mumbai
  5. Delhi

These cities are known for their thriving tech industries and offer abundant opportunities for ids professionals.

Average Salary Range

The average salary range for ids professionals in India varies based on experience and expertise. Entry-level positions can expect to earn around INR 4-6 lakhs per annum, while experienced professionals with advanced skills can earn upwards of INR 15 lakhs per annum.

Career Path

A typical career path in ids may include roles such as: - Junior Security Analyst - Security Engineer - Senior Security Consultant - Chief Information Security Officer (CISO)

With continuous learning and upskilling, ids professionals can progress to higher levels of responsibility and leadership within the field.

Related Skills

In addition to ids expertise, professionals in this field are often expected to have skills in: - Network security - Vulnerability assessment - Incident response - Penetration testing - Security compliance

Interview Questions

  • What is IDS and how does it differ from IPS? (basic)
  • Describe a recent cyber attack you have encountered and how you responded to it. (medium)
  • Can you explain the difference between symmetric and asymmetric encryption? (medium)
  • How do you stay updated on the latest trends and technologies in information security? (basic)
  • What is the importance of threat intelligence in IDS? (advanced)
  • Can you walk us through your experience with setting up and configuring IDS systems? (medium)
  • Explain the concept of zero-day vulnerability and how IDS systems can detect such threats. (advanced)
  • How do you handle false positives in IDS alerts? (medium)
  • Describe a time when you successfully prevented a data breach in your organization. (medium)
  • What is the role of machine learning in IDS? (advanced)
  • How would you prioritize security vulnerabilities in a network? (medium)
  • Can you discuss a challenging IDS project you have worked on and how you overcame obstacles? (medium)
  • What are the common types of IDS evasion techniques used by attackers? (advanced)
  • How do you ensure compliance with data protection regulations in your IDS work? (medium)
  • Explain the concept of signature-based vs. anomaly-based IDS detection. (medium)
  • How do you handle incidents of insider threats in an organization? (medium)
  • What are the key components of a comprehensive IDS strategy? (medium)
  • Describe your experience with conducting security audits and assessments. (medium)
  • How do you collaborate with other IT teams to enhance overall security posture? (medium)
  • Can you discuss a time when you had to make a critical decision under pressure in an IDS incident? (medium)
  • How do you approach continuous monitoring and improvement of IDS systems? (medium)
  • What role does encryption play in IDS operations? (medium)
  • How do you ensure IDS systems are aligned with business goals and objectives? (medium)
  • Can you provide an example of a successful IDS implementation you have led? (medium)
  • How do you communicate security risks and findings to non-technical stakeholders? (medium)

Closing Remark

As you explore ids jobs in India, remember to continuously enhance your skills, stay updated on industry trends, and prepare thoroughly for interviews to showcase your expertise confidently. Good luck on your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies