Home
Jobs

1331 Ids Jobs - Page 20

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 5.0 years

0 - 0 Lacs

India

On-site

GlassDoor logo

Development, implementation, monitoring, maintenance, and management of threats, security controls, processes, procedures and systems. Provides trusted advisor overview and management for information security projects and technical requirements. Provides threat management support for firewalls, intrusion detection systems, enterprise anti-virus, web application firewalls, and log monitoring tools. Manages internal/external vulnerability management program and oversight for code reviews or application security scan reviews as part of the Application Security management program. Manages the company’s Incident Response process in coordination with managed SOC vendor to monitor and respond to security alerts from all assets storing, processing, transmitting company confidential/sensitive data including PCI and PII data assets. Provides technical expertise in support of information technology assessments, penetration tests, and/or audits (PCI/SOX/HIPAA/other) of organizational automated systems and processes and will play a critical role in designing, maintaining and enhancing our organization's cybersecurity posture. Works closely with cross-functional teams to identify and implement robust security measures, detect, and respond to security incidents, and ensure the overall integrity and confidentiality of our systems and data. Essential Duties and Responsibilities Other duties may be assigned. In the event of absence, duties for this position will be overseen by the position to which it reports. Conducts analysis, develops technical and programmatic assessments, evaluates security engineering and integration initiatives and provides technical support to facilitate compliance with security policies, procedures, standards and guidelines. Identifies security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives. Analyze and review recent industry breaches for preventive cyber breach strategies. Provide threat intelligence research related to malware/virus identification. Responsible for reviewing and approving corporate, PCI In-scope firewall requests and WAF changes; perform WAF tuning as necessary. Monitor, report, and aid in the resolution of all security-related problems and discrepancies by monitoring assigned systems, maintaining documentation and provide management and any other appropriate areas with reporting as requested. Manage WAF, intrusion detection systems and in coordination with vendor SOC, ensure sufficient coverage to monitor PCI, PII, and all other assets storing, processing, transmitting company confidential/sensitive data. Ensure alerts from current and future systems are properly designed and monitored. Manage internal/external vulnerability management program and as appropriate expand scope of vulnerability scans, application/network penetration tests to cover enterprise and all systems/environments storing, processing, transmitting company confidential/sensitive data. Monitor intelligence sources for newly identified vulnerabilities, evaluate the risk such vulnerabilities pose to the organization's information and systems, and advise management of appropriate measures to eliminate or reduce the organization's risk or exposure to such vulnerabilities. Performs both internal/external vulnerability scanning and penetration testing. Analyzes information from those scans, as well as penetration tests, to mitigate and help IT stakeholders address system vulnerabilities. Provide technical support/oversight for code reviews or App scan reviews as part of Application Security management program. Provide technical support/oversight for security exception request process. Provide technical support for incident management and forensics. Monitor appropriate industry sources to maintain awareness of new security tools and techniques and research those tools and techniques that have the potential to improve the organization's ability to protect its information and infrastructure. Assist in the development of appropriate information security policies, standards, procedures, checklists, and guidelines using generally-recognized security concepts tailored to meet the requirements of the organization. Provide expertise to support timely resolution of findings from information technology assessments, penetration tests, and/or audits of organizational automated systems and processes; as appropriate, develop and communicate recommendations for improvement to management. Provide reporting metrics/create and maintain dashboards for department functions. Proficient in the use of Word, Excel. Assist manager/director in planning, time budgeting and scheduling work for completion. Participate in opportunities that enhance personal and professional growth and the accomplishment of career objectives through continuing education, seminars and participation in field-related professional organizations. Accountable for execution of assigned tasks from start to finish, while fully leveraging the disciplines expected of a cybersecurity engineer according to department standards, procedures and processes. Stay current with emerging issues affecting the Cybersecurity profession. Qualifications (Include Education and Specific Experience) Strong understanding of data network configuration and infrastructure concepts, including TCP/IP, DNS, routers, firewalls, web servers and security hierarchy including the application of encryption key infrastructures and authentication processes. Knowledge of cloud security concepts (Azure/AWS). Strong experience with IT security standards and best practice frameworks. (like ISO 27001/27002, NIST/NIST CSF, ITIL, PCI, SOX) In depth experience working with internet and web application security frameworks like SANS, OWASP. Detailed technical knowledge of hardening concepts and audit for Unix, Linux, Windows servers and desktop systems, AWS EC2 instances. Excellent understanding of common application, network, and operating system vulnerabilities, current threat vectors and mitigations. Strong working knowledge of networking, routing, protocols, ports and services. Working knowledge of System Information Event Monitoring (SIEM), Intrusion Detection and Prevention System (IDS/IPS), web application firewalls, vulnerability scanning tools, encryption capabilities, Network Access Controls (NAC), Data Loss Prevention (DLP), NMAP, Vulnerability scanners, Wireshark, and other security related tools Experience working with leading security WAF like Akamai, Cloudflare. Experience working with logging and file integrity monitoring tools like LogRhythm, NXLog, Splunk. Demonstrated experience in conducting security assessments. Demonstrated experience in investigating security issues related to Internet, server, desktop, laptop, tablet, and other mobile device security issues; OS patching, hardening and anti-virus. Ability to work with subject matter experts and 3rd party MSSP to coordinate activities to complete security related projects or tasks in a timely manner. Proficient with programming logic concepts, scripting experience (like Python, JavaScript, PowerShell) Strong communication and teamwork skills to collaborate with cross-functional teams and convey complex security concepts to non-technical stakeholders. Security certifications like CEH or CISSP are desired. • Bachelor’s degree in Computer Science, Information Security Management, Engineering or equivalent is required. • 3-5 years of experience in network and application security in a multiple operating system environment. Job Type: Full-time Pay: ₹7,000.00 - ₹20,000.00 per month Schedule: Monday to Friday Night shift US shift Work Location: In person

Posted 1 week ago

Apply

4.0 - 5.0 years

4 - 5 Lacs

Greater Noida

Remote

GlassDoor logo

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role We are seeking a Security Architect who will join our team and take the lead on developing, implementing, and maintaining our security strategy within our Service Provider organization. As our Security Architect, you will work closely with our leadership team to design and implement effective security solutions that not only protect our business objectives and regulatory requirements, but also provide innovative solutions to stay ahead of emerging threats. Work with Project and Customer resources to continue design and deployment activities and further enhance the PAM solution. Design the Architecture for PAM Solutions using Beyond Trust products. Installation and configuration of Password Safe & Secure Remote Access appliance and its administration. Onboard the servers into Beyond Trust PAM Solution for managing the privilege IDs in the servers and Ensure that least privilege model is pursued. Configuration of smart rules and workflows for managing the PAM environment. Configuration of Access policies, session policies and group policies in Beyond Trust PAM Solutions. Enable session recording and generation of required reports as per customer audit requirements. Optimize session reporting and archiving of session reecords and ensure the customers security policy requirements. Install and configure the software for ensuring the privilege access management for unix & linux environment. Configuring the privileged ids for application-to-application integration Configuring the ssh key based authentication for the privileged ids Integration of Active Directory or any LDAP Directory with Beyond Trust appliances for ensuring the centralized authentication. Implementation of SAML or OAuth for SSO with Beyond Trust Appliances. Demonstrate strong project delivery experience with regard to estimates, planning and deliverables using project management methodologies Provides mentoring and guidance to junior engineers Perform assessment and IGA roadmap for clients Help shape proposal for BT deployments and assessments Help shape statements of work for BT related work Develop deliverable templates and act as subject matter expert for client discussions Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career, from a Junior Architect to Principal Architect – we have opportunities for that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Professional and Technical Expertise: Senior Level consultant with demonstrable experience of 4-5 years in Beyond Trust Privileged Access Management solutions like Secure Remote Access (SRA), Password Safe, Active Directory Bridge, Privilege Management for Unix & Linux. Experience of using Beyond Trust to secure privileged credentials, sessions and endpoints against cyber threats. Good general understanding of Identity & Access Management concepts. Understanding of client security and risk posture of the client. Experience in implementing the functional and non-functional requirements of PAM system. Beyond Trust certification in either of tools like Secure Remote Access (SRA), Password Safe, Active Directory Bridge, Privilege Management for Unix & Linux. Experience in handling incidents, service requests and changes as per ITIL principles. Preferred Professional and Technical Expertise: Integration between SailPoint and Beyond Trust for the provisioning of privileged access to administrators. Knowledge and experience in Unix, Windows, MacOS and Hyper Scalar administration. Understanding of cloud computing technologies, business drivers, and emerging computing trends Experience in Root Cause analysis and problem management skills. Strong verbal and written skills to develop technical documentation and presentations Knowledge and experience in other IAM Infrastructure products. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 1 week ago

Apply

3.0 - 5.0 years

9 - 12 Lacs

Noida

Remote

GlassDoor logo

Lead and manage the IT infrastructure with a focus on secure network design and maintenance. Design, deploy, and manage internet and intranet-based hosting environments with strict data privacy controls. Architect and maintain servers optimized for AI model hosting and high-performance computing. Ensure end-to-end cybersecurity for networks, servers, and intranet operations, following best practices. Implement and oversee restricted physical access protocols for critical hardware and server rooms. Monitor, update, and harden all systems to defend against cyber threats and vulnerabilities. Configure and manage secure web-socket communications within intranet and internal network applications. Plan and execute scalable network architecture to support AI workloads, including bandwidth and latency requirements. Collaborate with AI development teams to forecast and fulfil evolving hardware and networking needs. Maintain robust backup, disaster recovery, and failover systems for all critical infrastructure. Document system architecture, security protocols, and operational guidelines for audit and compliance purposes. Continuously assess and upgrade security measures, ensuring alignment with industry standards and project goals. Support secure deployment of internal applications and manage internal DNS, firewalls, and access controls. CCNA certification preferred; strong grasp of enterprise networking principles, VLANs, VPNs, and secure routing. Qualifications: Candidate must have Bachelor's/Master’s degree in Computer Science Engineering, Information technology Engineering or a related field; Proven professional experience (3-5 years) in Network management and Server Design. Certifications such as CCNA, CISSP, etc. Technical and Inter-personal skills: Network design, configuration, and security (LAN, VLANs, VPNs, firewalls) Server architecture and management (physical and virtual servers) Securing physical and logical access to critical hardware Hosting and managing applications over secure intranet spaces Cybersecurity frameworks (hardening servers, IDS/IPS, encryption, access control) WebSocket communication setup and secure management AI infrastructure requirements (GPU clusters, data handling, scalable storage) Backup, recovery, and disaster recovery planning Experience with private cloud or hybrid network models Knowledge of SSL/TLS, certificates, and secure communications protocols Familiarity with Linux and Windows Server environments Proficiency in setting up and managing databases securely (SQL/NoSQL) CCNA-level networking proficiency (even if not certified) Experience with monitoring tools (e.g., Nagios, Zabbix) and SIEM solutions Job Types: Full-time, Permanent Pay: ₹900,000.00 - ₹1,200,000.00 per year Benefits: Flexible schedule Paid sick time Paid time off Provident Fund Work from home Schedule: Day shift Monday to Friday Work Location: In person Application Deadline: 12/06/2025 Expected Start Date: 23/06/2025

Posted 1 week ago

Apply

1.0 years

0 - 0 Lacs

Noida

On-site

GlassDoor logo

Urgent Hiring: Email Marketing Executive We're looking for a talented Email Marketing Specialist to help us generate international leads from the US, UK, Canada, Singapore, and UAE for our Website Designing and Digital Marketing services. Candidate must have Gmail, Outlook, and Hotmail IDs (minimum 200+) for bulk emailing. Role:* Develop and execute email marketing strategies to engage leads* Optimize ad performance to drive quality leads Target international markets and generate high-quality conversions Location: H-161, Suit No : 203, BSI Business Park, Sector-63, Noida, 201301. What We're Looking For:* 1+ years of experience in email marketing Must have Prior Experience of Min. 6 Month in same line of Business. Proficiency in email marketing platforms and automation tools A proven track record of increasing email engagement and lead generation Immediate Joining Apply Now : DM me or send your CV to careers@elbroz.com to apply! Job Type: Full-time Pay: ₹15,000.00 - ₹35,000.00 per month Benefits: Paid sick time Paid time off Schedule: Day shift Monday to Friday Morning shift Supplemental Pay: Performance bonus Work Location: In person

Posted 1 week ago

Apply

5.0 - 10.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Job Description The role of Senior Network Security Engineer is to design, implement, maintain and improve security compliance protecting our organization's network infrastructure from Cyber Threats, vulnerabilities, and unauthorized access. This role is primarily responsible for rolling our network security monitoring and visibility tools like Arista, Gigamon, Viavi, Plixer and NDR. This focuses on ensuring that security technologies are optimized for detecting, preventing, and responding to security threats in real-time. This also involves collaboration with Network engineers, IT, and security operations to deploy and support enterprise-level Cyber security platforms and solutions. Responsibilities Define and enforce network security policies, standards, and best practices. Setup network port, IP, rack and stack the hardware for the network visibility tools like Arista, Gigamon & Viavi. Design, deploy, and manage security solutions such as firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and endpoint protections. Conduct regular security assessments, vulnerability scans, and penetration tests to identify and mitigate risks. Monitor network activity, analyse traffic logs, and investigate security incidents or breaches. Perform root cause analysis on incidents and coordinate incident response and remediation efforts to improve security posture and prevent security breaches. Maintain and update security documentation, including policies, incident reports, and network diagrams. Build observability dashboard on the health of the network monitoring tools and the traffic visibility on various network infrastructure and tools. Collaborate with stakeholders, network and cross-functional teams to align security with organizational goals and compliance requirements. Lead or participate in security projects, disaster recovery planning, and business continuity initiatives. Stay updated on emerging threats, vulnerabilities, and security technologies, and recommend improvements. Optimize network security tools and platforms for performance and effectiveness, ensuring they meet compliance and organizational requirements. Maintain comprehensive documentation for network configurations, troubleshooting guides, and operational procedures. Qualifications Technical Skills: Experience with IDS/IPS, and security frameworks (e.g., NIST, ISO 27001). Strong scripting skills in Python, PowerShell, or Bash for automation and tool integration. Experience in Cloud security tools and platforms (GCP, AWS, Azure) and DevOps. Experience in Observability tools (Dynatrace, Splunk, Prometheus Grafana). Understanding of the SIEM tools (e.g., Splunk, QRadar, SecOps or equivalent) Familiarity with ITSM processes, Agile practices, ServiceNow, JIRA. Proficiency with network monitoring tools such as Gigamon, Viavi, Arista or equivalent, NDR tools like Arista, Cisco or equivalent, NetOps like Plixer and SIEM tools like (e.g., Splunk, QRadar, SecOps or equivalent). Strong experience in rack & stack and rolling out network security tools and architecting various tools to build an optimized solution. Strong knowledge of network architectures, protocols (TCP/IP, UDP), routing, switching, and load balancing. Expertise in firewall technologies (e.g., Check Point, Cisco, Fortinet), VPNs (SSL, IPSec), authentication protocols (LDAP, RADIUS), load balancers and cloud security. Experience: Bachelor's or Master’s degree in Computer Science, Information Security, or related field, or equivalent practical experience. Minimum 5-10 years of experience in network engineering and security management. Proven experience in managing security platforms and tools in a large, complex environment. Experience with Network security, analysis, and response, including knowledge of common attack vectors. Certifications: Relevant certifications such as CISSP, CEH, CCNA/CCNP Security, NSE (Fortinet), or equivalent. Cybersecurity certificates (preferred) Show more Show less

Posted 1 week ago

Apply

0 years

0 - 0 Lacs

India

Remote

GlassDoor logo

AMC Manage, Documentation, Vendor Relation, Mail Communication. IDS & WINHMS Support / All type of Network and Computer Equipment Setup and Troubleshoot / All type of printer troubleshoot / Computer hardware Assemble and Troubleshoot / Computer BSOD Repair / ILL Management / VOIP and EPABX Manage and new connection installation / SV9100 PC Pro EPABX Software manage / WIFI Login and User Manage / Outlook Configuration / MICROSENSE WiFi Manage Portal Manage / HT28W Door Lock App user Manage / Hospitality Cloud Software "Wincloud" Manage and User Control / PRINTER, SCANNER CONFIGURATION / Network support / CCTV Installation and support / KOT & BOT & SLIP Printer support / Server data store and maintenance / All Type of Fault Rectifying Electronics Network and hardware Tools Handle / Remote Desktop Services / Telephone Line Fault Rectify / DHCP / Router to Switch Configuration / OS Installation / crimping RJ45 cable. Job Types: Full-time, Permanent Pay: ₹15,000.00 - ₹20,000.00 per month Benefits: Cell phone reimbursement Food provided Paid sick time Paid time off Shift: Day shift Evening shift Night shift Education: Higher Secondary(12th Pass) (Preferred) Work Location: In person Application Deadline: 13/06/2025 Expected Start Date: 14/06/2025

Posted 1 week ago

Apply

7.0 years

0 Lacs

Delhi, India

On-site

Linkedin logo

This role is located in Noida. Candidates willing to relocate are welcome to apply. Note: If shortlisted, we’ll contact you via WhatsApp and email. Please monitor both and respond promptly. Location: Noida, India Work Mode: Financials SuppoWork from Office Salary 5–7 years: Up to INR 20,00,000 per annum 8–10 years: Up to INR 25,00,000 per annum Joining Time / Notice Period: Immediate – 30 days About The Client Hiring for a technology-driven organization with a strong focus on cybersecurity, cloud infrastructure, and risk management practices. The company supports global clients in achieving compliance and robust information security postures. Job Overview Seeking a Cyber Risk Management Lead to drive enterprise-level risk governance, compliance assessments, and security control implementation across on-premise and cloud environments. The ideal candidate has 5+ years of experience in cybersecurity risk, infrastructure audits, and cloud (AWS) security. Key Responsibilities Ensure alignment with regulations, guidelines, and industry best practices (e.g., NIST, ISO, OWASP, ITIL) Maintain, develop, and audit security documentation: policies, standards, procedures Monitor control effectiveness for EDR, cloud, email, and server security Conduct internal security risk assessments for ongoing compliance Guide cross-functional teams on their roles in risk management Lead SOC 2 Type 2 assessments and evidence collection Review and respond to cybersecurity-related RFPs Oversee AWS and Office365 security governance and implementation Track and close audit findings; support internal and external audits Create and manage dashboards for tracking IT and IS events Minimum Qualifications Bachelor's degree in IT, Computer Science, or related field 5+ years of relevant experience in cybersecurity and risk management In-depth knowledge of enterprise IT components: O365, firewalls, VPN, IDS/IPS, proxy, AV/EDR, DHCP/DNS, MFA, WAF, DLP Strong experience with AWS Cloud Security (mandatory) and Azure (preferred) Experience with audit frameworks (SOC2, HIPAA, ISO27001) At least one security certification preferred (e.g., CISM, CRISC, CISSP) Strong communication, documentation, and stakeholder management skills Show more Show less

Posted 1 week ago

Apply

4.0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

Bounteous x Accolite is a premier end-to-end digital transformation consultancy dedicated to partnering with ambitious brands to create digital solutions for today’s complex challenges and tomorrow’s opportunities. With uncompromising standards for technical and domain expertise, we deliver innovative and strategic solutions in Strategy, Analytics, Digital Engineering, Cloud, Data & AI, Experience Design, and Marketing. Our Co-Innovation methodology is a unique engagement model designed to align interests and accelerate value creation. Our clients worldwide benefit from the skills and expertise of over 4,000+ expert team members across the Americas, APAC, and EMEA. By partnering with leading technology providers, we craft transformative digital experiences that enhance customer engagement and drive business success. Information Security Responsibilities Promote and enforce awareness of key information security practices, including acceptable use of information assets, malware protection, and password security protocols Identify, assess, and report security risks, focusing on how these risks impact the confidentiality, integrity, and availability of information assets Understand and evaluate how data is stored, processed, or transmitted, ensuring compliance with data privacy and protection standards (GDPR, CCPA, etc.) Ensure data protection measures are integrated throughout the information lifecycle to safeguard sensitive information Senior Network Administrator Maintaining and administering computer networks that are related computing environments including systems software, applications software, hardware, and configurations. Maintain, monitor, and analyses system components to make recommendations regarding network system security. Troubleshooting, diagnosing, and resolving hardware, firmware related to LAN/WAN Networks. Roles And Responsibilities Maximizes performance by troubleshooting network problems and outages and scheduling upgrades. Replacing faulty network hardware components when required. Protecting data, software, and hardware by coordinating, planning, and implementing network security measures. Performing VLAN, IP address, asset auditing and redundancy mock test. Perform technical analysis and design to execute, test, and rollout solutions. Collaborates with network architects/specialist and ISPs on network optimization. Vendor management related to procurement, maintenance, support, and replacement. Provide support to Team members who escalate network related issues up to the network administration group. Remote assistance to the global helpdesk team on basic network related issues. Preferred Qualifications Strong understanding of network infrastructure and network hardware. Strong knowledge of Ethernet standards 802.3, Wireless standards 802.11 and VLAN 802.1q , 802.1x ., 802.1p Strong knowledge of STP, LACP, EtherChannel. Strong knowledge of BGP, OSPF, EIGRP, route redistribution, PBR, PfR routing. Strong knowledge of Next Generation Firewalls and SASE Cloud Firewalls (Web/App Filtering, IDS/IPS, Sandbox, DLP, Zero Trust etc). Knowledge of redundancy protocols HSRP, VRRP, GLBP. Knowledge of RADIUS, SCEP, EAP-TLS, PEAP-MSCHAPv2. Knowledge of passive networks IO ports, cables, rack design. Ability to create accurate network diagrams and documentation for design and planning network communication systems. Ability to quickly learn new or unfamiliar technology and products using documentation and internet resources. Working knowledge of web servers hosting, SSL, DNS, SNMP, TCP/IP & UDP. Working knowledge of Logging & Monitoring with NMS Tools Working knowledge of SSL VPN, Split Tunneling, IPSEC, Route and Policy based VPN. Knowledge of Linux shell, Windows power shell and/or Ansible scripts. Good analytical and problem-solving skills. Understanding of security implications of architecture decisions. 4-5 Years’ relevant experience in Cisco, Meraki, Fortinet, HPE Aruba, Zscaler network products. Certification in any of the above switching, routing, firewall network technologies. Willingness to work in cross time zones. We invite you to subscribe to our monthly and quarterly newsletters to stay up to date with the latest job openings as well as resources and tips for job seekers here . Research shows that women and other underrepresented groups apply only if they meet 100% of the criteria of a job posting. If you have passion and intelligence, and possess a technical knack (even if you’re missing some of the above), we encourage you to apply. Bounteous is focused on promoting an inclusive environment and is proud to be an equal opportunity employer. We celebrate the different viewpoints and experiences our diverse group of team members bring to Bounteous. Bounteous does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, physical or mental disability, national origin, veteran status, or any other status protected under federal, state, or local law. In addition, you have the opportunity to participate in several Team Member Networks, sometimes referred to as employee resource groups (ERGs), that host space with individuals with shared identities, interests, and passions. Our Team Member Networks celebrate communities of color, life as a working parent or caregiver, the 2SLGBTQIA+ community, wellbeing, and more. Regardless of your respective identity, there are various avenues we involve team members in the Bounteous community. Bounteous is willing to sponsor eligible candidates for employment visas. Apply for this job Bounteous x Accolite is proud to be an equal opportunity employer. Bounteous x Accolite does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, physical or mental disability, national origin, veteran status, or any other status protected under federal, state, or local law. Bounteous x Accolite is willing to sponsor eligible candidates for employment visas. Show more Show less

Posted 1 week ago

Apply

8.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

Our Company Techvantage.ai is a next-generation technology and product engineering company at the forefront of innovation in Generative AI, Agentic AI , and autonomous intelligent systems . We build intelligent, secure, and scalable digital platforms that power the future of AI across industries. Role Overview We are looking for a Senior Security Specialist with 8+ years of experience in cybersecurity, cloud security, and application security. You will be responsible for identifying, mitigating, and preventing threats across our technology landscape — particularly in AI-powered, data-driven environments. This role involves leading penetration testing efforts , managing vulnerability assessments , and implementing best-in-class security tools and practices to protect our platforms and clients. What we are looking from an ideal candidate? Design and implement robust security architectures for cloud-native and on-prem environments. Conduct penetration testing (internal/external, network, application, API) and deliver clear remediation strategies. Perform regular vulnerability assessments using industry-standard tools and frameworks. Lead threat modeling and risk assessments across systems, services, and data pipelines. Collaborate with development and DevOps teams to integrate security in SDLC and CI/CD pipelines (DevSecOps). Define and enforce security policies, incident response procedures, and access controls. Monitor for security breaches and investigate security events using SIEM and forensic tools. Ensure compliance with global standards such as ISO 27001, SOC 2, GDPR, and HIPAA. Provide guidance on secure implementation of AI/ML components and data protection strategies. Preferred Skills What skills do you need? Requirements 8+ years of experience in information security, application security, or cybersecurity engineering. Proficient in penetration testing methodologies and use of tools such as Burp Suite, Metasploit, Nmap, Wireshark, Nessus, OWASP ZAP, Qualys, etc. Deep experience in vulnerability management, patching, and security hardening practices. Strong understanding of OWASP Top 10, CWE/SANS Top 25, API security, and secure coding principles. Hands-on experience with cloud security (AWS, Azure, or GCP), IAM, firewalls, WAFs, encryption, and endpoint security. Familiarity with SIEM, EDR, IDS/IPS, and DLP solutions. Knowledge of DevSecOps and tools like Terraform, Kubernetes, Docker, etc. Excellent problem-solving, analytical, and incident-handling capabilities. Preferred Qualifications Certifications such as CISSP, CISM, CEH, OSCP, or AWS Security Specialty. Experience working on security aspects of AI/ML platforms, data pipelines, or model inferencing. Familiarity with governance and compliance frameworks (e.g., PCI-DSS, HIPAA). Experience in secure agile product environments and threat modeling techniques. What We Offer A mission-critical role securing next-gen AI systems Opportunity to work with an innovative and fast-paced tech company High visibility and leadership opportunities in a growing security function Compensation is not a constraint for the right candidate Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Job Title: Senior SOC Analyst Department: IT Infrastructure Location: Bangalore / Coimbatore Job Type: Full-Time Experience: 7+ years Immediate joiners or notice period of less than 30days are needed. Job Role: A Senior SOC Analyst is a cybersecurity professional responsible for proactively monitoring, analyzing, and responding to security threats within Logixhealth network and systems. They play a crucial role in detecting, investigating, and containing security incidents, as well as developing and improving security solutions. SOC 24/7, SOC monitoring Role Description: The analyst performs monitoring, research, assessment and analysis on Intrusion Detection and Prevention tools as well as Anomaly Detection systems, Firewalls, Antivirus systems, proxy devices (IPS IDS) which requires demonstrable security incident response experience. Perform initial risk assessment on new threats and vulnerabilities, perform assessment phase of Vulnerability and Threat Management process. Perform assessment as well as troubleshooting and help isolate issues with IDS/IPS sensors, Antivirus Cloud MS O365 Defender, Application monitor control, Mobile management (Intune), Vulnerability scanners Nessus professional ,Qualys PCI DSS scanners or other vulnerability Management tools. Patch management & MS O365 Defender Console monitoring. Participate in daily and ad-hoc conference calls as well as compliance and controls, self-assessment processes and documentation related tasks. Log and event management log monitoring and share the daily report. Exposure to User behavior analytics tools. MS Azure sentinel Vulnerability Management. Compliant / Non-Compliant (Devices) Management using Intune. Application control using MS Cloud App security. Working Knowledge of Taegis Secure works or any XDR/EDR/MDR Products Working Knowledge of Password management tools similar tool Bit warden Microsoft Purview and Entra (Azure AD Identity Management) working knowledge. Key Deliverables: Being Proactive and handling SOC Alerts Provide analysis and trending of security log data from a large number of heterogeneous security devices. Analyze and respond to previously undisclosed software and hardware vulnerabilities Zero Day Exploits Coordinate with Intel analysts on open source activities impacting SLTT governments. Integrate and share information with other analysts and other teams Compliance ISO 27001-2022 ,SOC 2 type 2,HIPAA,Hi-Trust Flexible, quick learning, willing to work 24/7 and rotational shifts. Senior Security analysts are expected to be on-call to respond to incidents that arise outside of business hours Monitor, Manage, Remediate (Vulnerability Management) Advise based Vulnerability advisories (CISA, MS-ISAC,USCERT) and escalate to respective teams. Other duties as assigned Independent worker Able to read and Analyze Counter Threat Intelligence Reports and suggest appropriate actions. Manage SIEM and On board devices and respond to Alerts and Analyze and remediate. Skills: Incident response, Security posture management vulnerability Management in Hybrid environment (Cloud and Onsite) Creating and managing security tools and policies in tools such as SIEM, EDR, and DLP, Exposure to Application vulnerability management, API security. Strong understanding of networking, operating systems, and security technologies. Ability to analyze data, identify patterns, and draw conclusions. Ability to investigate and resolve security incidents effectively. Ability to communicate technical information clearly and concisely with all stakeholders and advise appropriate action. Significant experience in security operations, incident response, and threat analysis. Identifying areas for improvement in security processes and tools. Developing and implementing new security solutions Using threat intelligence to identify and mitigate potential risks. Staying up-to-date on the latest cyber threats and attack vectors. Ability to lead Security Projects and Programs and drive towards closure and stakeholder satisfaction. Other skills: Excellent knowledge of Intrusion Detection (TCP/IP knowledge, and Cyber security), various operating systems (Windows, and web technologies (focusing on Internet security) Ability to read and understand packet level data Intrusion detection and prevention and Network Security Products (IDS/IPS, firewalls, etc) Host Security Products (HIPS, AV, scanners, XDR,EDR) Knowledge of threats and technologies effecting Web Application vulnerabilities and recent internet threats Exposure on Vulnerability assessment as well as penetration testing Preferred Certifications from EC-Council, GIAC, (ISC)² are preferred [CISSP, CEH, GCIA, CCNA-Security] Good knowledge of forensics and Log analysis. Incident response and remediation Knowledge of Playbooks. Qualification: Any degree/BE/B. Tech (computer science, Cybersecurity) with technical certification from EC-Council, GIAC, (ISC)² [CISSP, CEH, GCIA, CCSP, CCNA-Security] Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Delhi, India

On-site

Linkedin logo

This role is located in Noida. Candidates willing to relocate are welcome to apply. Note: If shortlisted, we’ll contact you via WhatsApp and email. Please monitor both and respond promptly. Location: Noida, India Work Mode: Financials SuppoWork from Office Salary 5–7 years: Up to INR 20,00,000 per annum 8–10 years: Up to INR 25,00,000 per annum Joining Time / Notice Period: Immediate – 30 days About The Client Hiring for a technology-driven organization with a strong focus on cybersecurity, cloud infrastructure, and risk management practices. The company supports global clients in achieving compliance and robust information security postures. Job Overview Seeking a Cyber Risk Management Lead to drive enterprise-level risk governance, compliance assessments, and security control implementation across on-premise and cloud environments. The ideal candidate has 5+ years of experience in cybersecurity risk, infrastructure audits, and cloud (AWS) security. Key Responsibilities Ensure alignment with regulations, guidelines, and industry best practices (e.g., NIST, ISO, OWASP, ITIL) Maintain, develop, and audit security documentation: policies, standards, procedures Monitor control effectiveness for EDR, cloud, email, and server security Conduct internal security risk assessments for ongoing compliance Guide cross-functional teams on their roles in risk management Lead SOC 2 Type 2 assessments and evidence collection Review and respond to cybersecurity-related RFPs Oversee AWS and Office365 security governance and implementation Track and close audit findings; support internal and external audits Create and manage dashboards for tracking IT and IS events Minimum Qualifications Bachelor's degree in IT, Computer Science, or related field 5+ years of relevant experience in cybersecurity and risk management In-depth knowledge of enterprise IT components: O365, firewalls, VPN, IDS/IPS, proxy, AV/EDR, DHCP/DNS, MFA, WAF, DLP Strong experience with AWS Cloud Security (mandatory) and Azure (preferred) Experience with audit frameworks (SOC2, HIPAA, ISO27001) At least one security certification preferred (e.g., CISM, CRISC, CISSP) Strong communication, documentation, and stakeholder management skills Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

New Delhi, Delhi, India

On-site

Linkedin logo

Job Summary: We seek an experienced Cyber Security Manager to lead our cybersecurity team and protect our organization's information systems. The ideal candidate will have a strong cybersecurity, risk management, and team leadership background. Key Responsibilities: Develop and implement cybersecurity policies and procedures. Manage and oversee the cybersecurity team. Conduct risk assessments and vulnerability analyses. Ensure compliance with regulatory requirements and industry standards. Monitor and respond to security incidents and breaches. Collaborate with IT and other departments to enhance security measures. Provide training and support to staff on cybersecurity best practices. Prepare reports and documentation on security strategies and risks for upper management. Qualifications: Bachelor’s degree in Computer Science or equivalent, Information Technology, or a related field. Proven experience as a Cyber Security Manager or similar role. Proficiency in security technologies such as firewalls, VPNs, IDS/IPS, and SIEM, Cloud Security, Vulnerability management Strong understanding of network protocols, encryption, and authentication methods. Excellent problem-solving and analytical skills. Strong communication and leadership abilities. Preferred Qualifications: Master’s degree in Cybersecurity or a related field. Certifications such as CISSP, CISM, or CEH. Experience with cloud security and DevOps practices. Knowledge of ethical hacking and penetration testing. Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Role Description L1 SOC Lead Experience : 7 to 9 years Location : Hyderabad/Trivandrum/Kochi Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence Job Description SOC Lead Position Overview: We are seeking an experienced and technically proficient SOC Lead to manage a medium-sized SOC team. The ideal candidate will provide technical mentorship, effectively manage security incidents, and ensure efficient project management within the SOC environment. This role requires a strategic leader with strong technical expertise and excellent management skills to oversee daily SOC operations and support team development. Under leadership's guidance, responsibilities include P&L, delivery, compliance, and other operational goals. Key Responsibilities Effectively lead a medium-sized cybersecurity SOC team accountable for delivering cybersecurity services to global customers. Effectively manage the deliverables for SOC for an MSSP team Manage resources, headcount, and profitability objectives under leadership guidance. Ensure the team's quality of deliverables aligns with organizational standards. Manage stakeholder relationships and ensure effective communication. Drive initiatives to promote continuous improvement, innovation, and customer satisfaction under leadership's guidance. Job Requirements Required Skills: Previous operational experience in cybersecurity incident management and response teams like CSIRT, CIRT, SOC, or CERT. Experience with MSSP teams. Proven experience in leading/managing a team size of 10 or more. Proficiency with SIEM tools such as ArcSight, Splunk, QRadar, etc. Strong ability to write technical documentation and present technical briefings to varying audiences. Desired Skills Cybersecurity Fundamentals: In-depth understanding of cybersecurity concepts, threats, vulnerabilities, and attack vectors. Knowledge of security technologies, including SIEM, EDR, firewalls, IDS/IPS, and vulnerability scanners. o Familiarity with network protocols, operating systems, and cloud environments. Incident Response Expertise in incident handling, investigation, and remediation. Knowledge of forensic analysis techniques. Ability to develop and implement incident response plans. Experience Atleast 3 years of experience managing a team of SOC Analysts 5+ years of information security experience is required. At least 3 years of experience in security monitoring, digital forensic analysis, or incident response is preferred. Show more Show less

Posted 1 week ago

Apply

6.0 years

0 Lacs

Chandigarh, India

On-site

Linkedin logo

Job Title: Security Operations Center (SOC) L3 . LinkedIn IDs must . Mode of hire : C2H mode only Experience – 6 to 10 Years Notice period : Immediate. Location: Bangalore/Chandigarh Work Mode - Hybrid Job description ACCOUNTABILITIES • Develop, enhance, and operationalize IT Security processes. • Lead, coach, and mentor a high-performing, highly engaged team, supporting initiatives covering Information Security, Incident Management, and Vulnerability Management. • Develop, measure, analyze, and maintain the internal and external service metrics for Security Service Operations, providing timely reports to leadership teams. • Lead, coordinate, and train others on effective management of security incidents and operational responses • Collaborate across various business units to deliver the most Resource work in shifts - 2:30AM till 10:3AM or 10:30AM to 7:30PM IST comprehensive security response • Implement security and risk programs to ensure operational efficiency and auditability. • Understand business needs and intuitively recommend secure solutions. • Lead and manage IR issues and provide timely feedback to management and supervisor • Provide guidance to the IT security team members. • Assign tasks and projects to team members based on their skills and expertise. • Assess and prioritize security risks and vulnerabilities and develop mitigation strategies. • Lead the response to security incidents, including breaches, attacks, and data breaches. • Conduct post-incident reviews to identify lessons learned and improve incident response processes. • Monitor security alerts and events, and coordinate appropriate responses • Collaborate with other IT teams, departments, and business units to integrate security measures and requirements • Provide regular reports to Leadership on the productivity, Team performance • Maintain comprehensive documentation of security procedures, incident responses, and configurations • Develops and maintains a productive work teams by hiring qualified personnel, training, and managing performance. • Manages teams with integrity, ethical business practices, and in accordance with Mouser policies, procedures, and practices. • Customarily and regularly directs the work of two or more full-time employees or their equivalent. Makes suggestions and recommendation for these employees regarding performance, including hiring, transfer, advancement, and termination. • Manages daily operations to meet department and company objectives. • Works with minimum supervision and makes independent judgments. • Flexible to meet the changing needs of the business and willingness to take on new responsibilities and assignments. • Initiates, establishes and maintains highly effective relationships with internal and external business contacts of various cultures, and at all levels. • Extremely confidential and trustworthy. • Demonstrates knowledge, experience and understanding of critical job functions of the team. • Assists management with development of results oriented strategies. • Regular attendance at work is an essential part of the job. SKILLS & CERTIFICATIONS • Extensive knowledge of key IT Security Technologies • Preferred to have an Industry respected Certification (CISSP, CISM, CRISC, CISA) • Maintain current and extensive knowledge of emerging security threats • Possess excellent verbal, interpersonal and written technical and non-technical communication skills. EDUCATION & EXPERIENCE • Bachelor’s Degree in any field, or minimum of 3 years prior work experience that is relevant to the team you will supervise. Including: • 6+ years of experience working with SIEM, EDR, Email Security Gateways, Vulnerability Management Software, Firewalls, etc. • 6+ years of experience working with security systems, user authentication and management Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Delhi, India

On-site

Linkedin logo

This role is located in Noida. Candidates willing to relocate are welcome to apply. Note: If shortlisted, we’ll contact you via WhatsApp and email. Please monitor both and respond promptly. Location: Noida, India Work Mode: Financials SuppoWork from Office Salary 5–7 years: Up to INR 20,00,000 per annum 8–10 years: Up to INR 25,00,000 per annum Joining Time / Notice Period: Immediate – 30 days About The Client Hiring for a technology-driven organization with a strong focus on cybersecurity, cloud infrastructure, and risk management practices. The company supports global clients in achieving compliance and robust information security postures. Job Overview Seeking a Cyber Risk Management Lead to drive enterprise-level risk governance, compliance assessments, and security control implementation across on-premise and cloud environments. The ideal candidate has 5+ years of experience in cybersecurity risk, infrastructure audits, and cloud (AWS) security. Key Responsibilities Ensure alignment with regulations, guidelines, and industry best practices (e.g., NIST, ISO, OWASP, ITIL) Maintain, develop, and audit security documentation: policies, standards, procedures Monitor control effectiveness for EDR, cloud, email, and server security Conduct internal security risk assessments for ongoing compliance Guide cross-functional teams on their roles in risk management Lead SOC 2 Type 2 assessments and evidence collection Review and respond to cybersecurity-related RFPs Oversee AWS and Office365 security governance and implementation Track and close audit findings; support internal and external audits Create and manage dashboards for tracking IT and IS events Minimum Qualifications Bachelor's degree in IT, Computer Science, or related field 5+ years of relevant experience in cybersecurity and risk management In-depth knowledge of enterprise IT components: O365, firewalls, VPN, IDS/IPS, proxy, AV/EDR, DHCP/DNS, MFA, WAF, DLP Strong experience with AWS Cloud Security (mandatory) and Azure (preferred) Experience with audit frameworks (SOC2, HIPAA, ISO27001) At least one security certification preferred (e.g., CISM, CRISC, CISSP) Strong communication, documentation, and stakeholder management skills Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Role Description The Cybersecurity Incident Management and Response Team is responsible for effectively and efficiently managing all information and cybersecurity incidents across the Group on a 24x7 basis. This function is structured into two primary missions: Incident Management: Coordinating and orchestrating the global technical response to cybersecurity incidents, and ensuring timely, effective communication to Global Business and Functional stakeholders, Senior Executive Leadership, and relevant regulatory bodies. Incident Response: Conducting technical and forensic investigations arising from threat intelligence, security testing, and user-reported incidents. The goal is to effectively contain, mitigate, and remediate both active and potential attacks. Key Responsibilities Lead and perform technical and forensic investigations into global cybersecurity events, ensuring timely threat identification and mitigation. Conduct post-incident reviews to assess the effectiveness of controls and response capabilities; drive improvements where necessary. Deliver forensic services including evidence collection, processing, preservation, analysis, and presentation. Stay updated on emerging technology trends and cybersecurity best practices to provide guidance to business and IT functions. Collaborate with Global Cybersecurity Operations (GCO) and business teams to develop and maintain effective incident response playbooks. Contribute to the creation and enhancement of detection mechanisms (use cases) and security automation workflows. Define and refine detailed processes and procedures for managing cybersecurity events. Enhance technical capabilities of security platforms and incident response tools. Support the development of the team’s capabilities, including training and mentoring junior team members. Promote a culture of transparency and continuous improvement by identifying and addressing weaknesses in people, processes, and technology. Drive self-improvement and maintain subject matter expertise in cybersecurity. Engage with global stakeholders to improve cybersecurity awareness and communicate the impact of cybersecurity initiatives. Generate and present management information and incident reports tailored for various audiences, supported by data and expert analysis. Required Skills & Competencies Strong understanding of cybersecurity incident management and investigation techniques. Hands-on experience with IDS/IPS systems, TCP/IP protocols, and common attack vectors. Ability to independently analyze complex problems and determine root causes. Effective communication skills with the ability to convey technical issues clearly to both technical and non-technical audiences. Sound decision-making abilities under pressure, with a focus on risk mitigation and operational resilience. Strong collaboration and stakeholder engagement skills across diverse teams. High level of integrity, urgency, and personal accountability. Demonstrated ethical conduct and commitment to organizational values. Knowledge of cybersecurity principles, global financial services, compliance requirements, and regulatory standards. Familiarity with industry frameworks and standards such as OWASP, ISO 27001/27002, PCI DSS, GLBA, FFIEC, CIS, and NIST. Experience in responding to advanced threats, including offensive security knowledge or experience with deception technologies (honeypots, tripwires, honey tokens, etc.). Preferred Technical Skills Cybersecurity Incident Management Intrusion Detection/Prevention Systems (IDS/IPS) TCP/IP Protocols and Network Analysis Forensics Tools and Techniques Security Automation & Orchestration Platforms Threat Intelligence Integration SIEM Tools (e.g., Splunk, QRadar, etc.) Skills Incident response,Forensic Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

This role is located in Noida. Candidates willing to relocate are welcome to apply. Note: If shortlisted, we’ll contact you via WhatsApp and email. Please monitor both and respond promptly. Location: Noida, India Work Mode: Financials SuppoWork from Office Salary 5–7 years: Up to INR 20,00,000 per annum 8–10 years: Up to INR 25,00,000 per annum Joining Time / Notice Period: Immediate – 30 days About The Client Hiring for a technology-driven organization with a strong focus on cybersecurity, cloud infrastructure, and risk management practices. The company supports global clients in achieving compliance and robust information security postures. Job Overview Seeking a Cyber Risk Management Lead to drive enterprise-level risk governance, compliance assessments, and security control implementation across on-premise and cloud environments. The ideal candidate has 5+ years of experience in cybersecurity risk, infrastructure audits, and cloud (AWS) security. Key Responsibilities Ensure alignment with regulations, guidelines, and industry best practices (e.g., NIST, ISO, OWASP, ITIL) Maintain, develop, and audit security documentation: policies, standards, procedures Monitor control effectiveness for EDR, cloud, email, and server security Conduct internal security risk assessments for ongoing compliance Guide cross-functional teams on their roles in risk management Lead SOC 2 Type 2 assessments and evidence collection Review and respond to cybersecurity-related RFPs Oversee AWS and Office365 security governance and implementation Track and close audit findings; support internal and external audits Create and manage dashboards for tracking IT and IS events Minimum Qualifications Bachelor's degree in IT, Computer Science, or related field 5+ years of relevant experience in cybersecurity and risk management In-depth knowledge of enterprise IT components: O365, firewalls, VPN, IDS/IPS, proxy, AV/EDR, DHCP/DNS, MFA, WAF, DLP Strong experience with AWS Cloud Security (mandatory) and Azure (preferred) Experience with audit frameworks (SOC2, HIPAA, ISO27001) At least one security certification preferred (e.g., CISM, CRISC, CISSP) Strong communication, documentation, and stakeholder management skills Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

This role is located in Noida. Candidates willing to relocate are welcome to apply. Note: If shortlisted, we’ll contact you via WhatsApp and email. Please monitor both and respond promptly. Location: Noida, India Work Mode: Financials SuppoWork from Office Salary 5–7 years: Up to INR 20,00,000 per annum 8–10 years: Up to INR 25,00,000 per annum Joining Time / Notice Period: Immediate – 30 days About The Client Hiring for a technology-driven organization with a strong focus on cybersecurity, cloud infrastructure, and risk management practices. The company supports global clients in achieving compliance and robust information security postures. Job Overview Seeking a Cyber Risk Management Lead to drive enterprise-level risk governance, compliance assessments, and security control implementation across on-premise and cloud environments. The ideal candidate has 5+ years of experience in cybersecurity risk, infrastructure audits, and cloud (AWS) security. Key Responsibilities Ensure alignment with regulations, guidelines, and industry best practices (e.g., NIST, ISO, OWASP, ITIL) Maintain, develop, and audit security documentation: policies, standards, procedures Monitor control effectiveness for EDR, cloud, email, and server security Conduct internal security risk assessments for ongoing compliance Guide cross-functional teams on their roles in risk management Lead SOC 2 Type 2 assessments and evidence collection Review and respond to cybersecurity-related RFPs Oversee AWS and Office365 security governance and implementation Track and close audit findings; support internal and external audits Create and manage dashboards for tracking IT and IS events Minimum Qualifications Bachelor's degree in IT, Computer Science, or related field 5+ years of relevant experience in cybersecurity and risk management In-depth knowledge of enterprise IT components: O365, firewalls, VPN, IDS/IPS, proxy, AV/EDR, DHCP/DNS, MFA, WAF, DLP Strong experience with AWS Cloud Security (mandatory) and Azure (preferred) Experience with audit frameworks (SOC2, HIPAA, ISO27001) At least one security certification preferred (e.g., CISM, CRISC, CISSP) Strong communication, documentation, and stakeholder management skills Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

This role is located in Noida. Candidates willing to relocate are welcome to apply. Note: If shortlisted, we’ll contact you via WhatsApp and email. Please monitor both and respond promptly. Location: Noida, India Work Mode: Financials SuppoWork from Office Salary 5–7 years: Up to INR 20,00,000 per annum 8–10 years: Up to INR 25,00,000 per annum Joining Time / Notice Period: Immediate – 30 days About The Client Hiring for a technology-driven organization with a strong focus on cybersecurity, cloud infrastructure, and risk management practices. The company supports global clients in achieving compliance and robust information security postures. Job Overview Seeking a Cyber Risk Management Lead to drive enterprise-level risk governance, compliance assessments, and security control implementation across on-premise and cloud environments. The ideal candidate has 5+ years of experience in cybersecurity risk, infrastructure audits, and cloud (AWS) security. Key Responsibilities Ensure alignment with regulations, guidelines, and industry best practices (e.g., NIST, ISO, OWASP, ITIL) Maintain, develop, and audit security documentation: policies, standards, procedures Monitor control effectiveness for EDR, cloud, email, and server security Conduct internal security risk assessments for ongoing compliance Guide cross-functional teams on their roles in risk management Lead SOC 2 Type 2 assessments and evidence collection Review and respond to cybersecurity-related RFPs Oversee AWS and Office365 security governance and implementation Track and close audit findings; support internal and external audits Create and manage dashboards for tracking IT and IS events Minimum Qualifications Bachelor's degree in IT, Computer Science, or related field 5+ years of relevant experience in cybersecurity and risk management In-depth knowledge of enterprise IT components: O365, firewalls, VPN, IDS/IPS, proxy, AV/EDR, DHCP/DNS, MFA, WAF, DLP Strong experience with AWS Cloud Security (mandatory) and Azure (preferred) Experience with audit frameworks (SOC2, HIPAA, ISO27001) At least one security certification preferred (e.g., CISM, CRISC, CISSP) Strong communication, documentation, and stakeholder management skills Show more Show less

Posted 1 week ago

Apply

12.0 years

0 Lacs

Vadodara, Gujarat, India

On-site

Linkedin logo

Job Title: IT Infrastructure – Senior Executive / Executive Location: Vadodara, Gujarat Experience Required: 8–12 Years Company: NHR Technologies About NHR Technologies NHR Technologies is a forward-looking HR Tech startup that partners with organisations on their transformation journeys. Our mission is to enable businesses to achieve their goals through cutting-edge, reliable, and scalable digital solutions. We are committed to driving innovation while delivering consistent value and exceptional service to our clients. Role Overview We are looking for a seasoned and proactive IT Infrastructure Executive / Senior Executive to join our growing IT team. The incumbent will be responsible for the efficient management, maintenance, and optimization of our IT infrastructure. The role demands a strong technical foundation, practical problem-solving capabilities, vendor coordination experience, and the ability to manage priorities in a fast-paced environment. Key Responsibilities Core Infrastructure & Operations (Must-Have) Administration of Windows Server environments Active Directory and user access management LAN/WAN configuration, routing, and switching basics Cloud fundamentals – AWS, Azure, or GCP (basic knowledge) Endpoint management and hardware troubleshooting IT security hygiene – antivirus, firewall, and access control Backup, recovery, and disaster preparedness ITSM process adherence and ticket lifecycle management Critical Soft Skills Vendor and procurement coordination Effective incident handling and troubleshooting Documentation, SOPs, and change management Clear and empathetic user support communication Preferred Capabilities (Good to Have) Not mandatory but advantageous if the candidate can manage or oversee the following: Advanced Networking VPN and NAC implementation Advanced firewall setup and network optimization Cybersecurity SIEM solutions and threat monitoring IDS/IPS, DLP, and security audits Cloud & Virtualization Multi-cloud architecture Load balancers, auto-scaling, and cloud cost control Virtualization (VMware/Hyper-V) at scale Enterprise Systems SAN/NAS architecture Disaster recovery with Veeam/Commvault Linux administration (beneficial but not core) Integration of enterprise-level applications Strategic & Oversight Capabilities In areas requiring specialized skills or outsourced delivery, the candidate should be able to: Scope requirements for external support Define and manage SLAs and vendor deliverables Evaluate technical proposals and partner recommendations Coordinate outsourced implementations Maintain governance, quality checks, and compliance Tools & System Knowledge The ideal candidate should be familiar with: CMDB (Configuration Management Database) IT Asset & Service Management ISO 27001 Compliance & Audit Access Control & Identity Management Business Continuity & Disaster Recovery Vendor and Contract Lifecycle Management Documentation and Knowledge Base Systems Key Skills & Experience 8–12 years in IT infrastructure, networking, or cloud ops Expertise in Windows/Linux server and virtual environments Exposure to cloud platforms (AWS/Azure/GCP) Understanding of cybersecurity protocols and tools Familiarity with ITSM tools (ServiceNow, BMC Remedy, etc.) Basic scripting/automation knowledge (PowerShell, Python, etc.) Strong communication and documentation abilities Preferred Qualifications Bachelor’s degree in IT, Computer Science, or related field Certifications such as CCNA, Network+, MCSE, AWS Solutions Architect, or equivalent Show more Show less

Posted 1 week ago

Apply

8.0 years

0 Lacs

Indore, Madhya Pradesh, India

On-site

Linkedin logo

EXPERIENCE: 5 – 8 Years RESPONSIBILITIES (INCLUDES TASKS AND AUTHORITIES): Key Responsibilities Detect, identify, and promptly alert on potential attacks, intrusions, anomalous activities, and misuse, distinguishing them from benign events. Conduct research, analysis, and correlation across diverse data sets to identify indications and warnings of threats. Analyze network alerts from multiple sources and determine their root causes and potential impact. Provide daily summary reports of relevant network and security events. Notify and coordinate with managers and incident responders, clearly articulating event history, status, and potential business impact as per the incident response plan. Analyze and report on system security posture trends. Assess access controls based on the principles of least privilege and need-to-know. Perform vulnerability management, including scanning, analysis, and follow-up on critical vulnerabilities. Lead and participate in incident response activities, including root cause analysis and remediation recommendations. Develop, review, and maintain SIEM correlation rules and incident response playbooks. Provide mentorship and guidance to L1 SOC analysts, reviewing and escalating tickets as needed. Stay current with emerging threats, vulnerabilities, and regulatory security requirements. Required Skills & Experience 2–4 years of experience in a SOC environment, with at least 1 year in a Level 2 (L2) role Proficiency in Splunk SIEM: log analysis, rule creation, dashboarding, and incident investigation1 Hands-on experience with Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms. Strong knowledge of network security protocols, intrusion detection/prevention systems (IDS/IPS), and firewall/VPN technologies Ability to perform packet-level analysis using tools such as Wireshark or tcpdump Experience in malware analysis, digital forensics, and threat intelligence platforms1 Familiarity with authentication, authorization, and access control methods. Strong understanding of incident response and handling methodologies. Experience interpreting data from network tools (e.g., nslookup, ping, traceroute). Knowledge of Windows/Unix ports, services, and operating system command-line tools. Understanding of key security management concepts (e.g., patch management, release management). Excellent analytical, problem-solving, and communication skills Experience in documenting and reporting security incidents and trends. CERTIFICATIONS(Any three): Relevant certifications such as SPLUNK, Certified SOC Analyst (CSA) , CompTIA Security+: TECHNICAL SKILLS /COMPETENCIES: MANDATORY Experience with SIEM (e.g. Splunk, XDR) SIEM tools (e.g., Splunk, QRadar) Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) Firewall and VPN technologies Threat intelligence platforms & Endpoint detection and response tools Hands-on experience with Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms. Strong knowledge of network security protocols, intrusion detection/prevention systems (IDS/IPS), and firewall/VPN technologiesa Show more Show less

Posted 1 week ago

Apply

3.0 years

0 Lacs

Delhi, India

On-site

Linkedin logo

About Café Coffee Day Café Coffee Day is India's largest café chain in terms of the number of café outlets with more than 460 cafes across the country. CCD, as it is popularly called, opened its first café in Bengaluru in 1996 and has pioneered the coffee culture in the chained café segment in India by bringing in a range of delectable food and beverage products served in a contemporary, youthful ambience, and offering a variety of novel experiences - all with a promise of “A lot can happen over coffee!". CCD operates through Coffee Day Global Limited (CDGL), a subsidiary of Coffee Day Enterprises Limited. CDGL is arguably India’s largest coffee retail conglomerate with leadership position also in the automated beverage dispensing solutions under the brand name Coffee Day Beverages with distribution across more than 1330+ towns and cities across India. CDGL also operates a network of 280+ refreshment kiosks offering affordable food and beverages for on-the-go customers under the Coffee Day Xpress brand name. Roles and Responsibilities Manage end to end mass/volume recruitment includes sourcing, screening, initiating salary negotiation, releasing offers and induction Achieving direct and teams joining target Evaluate available sourcing channels and ensure right source mix Organizing job fairs, pooled drives and build right branding for the company to attract talent Creating an ongoing pipeline for specific roles identifying upcoming opportunities Ensuring the talent acquisitio n cost is maintained at the minimal level Prepare & present performance related report periodically Ensuring the key employees are retained Organize engagement activities, contests Compliance of HR Practices & policies in conjunction with management pertaining to exit, F&F settlement & induction Ensure supply of Uniforms, employee handbooks in the respective region and issuance of IDs, name badges & official documentation Handle & resolve all employee grievance Regular cafe visits to engage employees at work place. Timely updating of documents & employee details, post recruitment Ensuring training & development activities for the growth of team Tracking team performance & ensuring periodical appraisals of the team Criteria Any Graduation/MBA/ PGDBM 3-6 years in Recruitment/HR generalist role preferably from F&B/Retail/FMCG Experience in hiring with good network preferably in hotel management, hospitality colleges/institutions Knowledge on HR practices and employment legislation Business and Industry knowledge and acumen Leadership skills with high levels of integrity, professionalism and diplomacy Conflict management Analytical and organizational focus Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Mohali district, India

On-site

Linkedin logo

Responsibilities: Designs training & test modules based on needs Maintains regular correspondence with the clients to clarify process updates and percolates it to Operations Resolves issues pertaining to process knowledge with clients Ensures that Quality, CSAT, Resolution scores for the batch meets the defined norms within the first month of production Conducts interviews & coordinates with HR for recruiting trainers / trainees Ensure 100percent adherence on client driven SOP & BEST T&D compliance Prepare Trainers through TTT/ Platform skills certification Liaises with Central MIS / Admin dept / HR / Payroll for training resource availability Coordinates with all stakeholders to ensure New Hire training process runs effectively Prepare and attend all business / client reviews& work on the action plans to improve business performance Understanding of root cause analysis & reasons to better performance Interacts with IT team for creation and deletion of Ids for new team members Delivers Customer Service with Sales Process Excellence and Process Improvement Initiatives Supports Innovation & Continues Improvement to uplift sales performance Engaging Communication Coaches & Develops Others Support and monitor new trainees during the OJT (On the Job Training) period Create new product specific sales training curriculum Knowledge of training ideologies (Kirkpatrick model, KSA, TNA, TNI etc) Should have mandate experience in sales training from BPO Background Please share resume at Vaishali.vaishali27@teleperformance.com Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Assam, India

On-site

Linkedin logo

Job Details ASSAM UNIVERSITY; SILCHAR-788011 Employment Notification Applications in plain paper from eligible candidates having a consistent good academic record and qualifications mentioned against the post below are invited for filling up the following temporary position in the Department of Business Administration, Assam University, Silchar. The position and the respective qualifications: 1. Junior Consultant -(SC) Qualification: MBA with proficiency in English and Computer Knowledge Desirable qualification: Relevant work experience in a comparable role or field. This contractual engagement is purely temporary, and service after appointment may be terminated at any time without prior notice to the incumbent. Honorarium: Rs 25,000.00 per month. Desirous candidates may submit their application to the office of the Department of Business Administration or via email at "choudhurydeepiyoti@gmail.com" on or before 09" July, 2025. In the application, candidates should mention clearly the Post applied for, their contact numbers, and email IDs, and should enclose copies of all testimonials and one copy of a passport-size photograph. Interview shall be held on 11th July 2025 at 11.00 a.m. in the department of Business Administration, Assam University, Silchar. No separate call letter shall be issued for the interview. The candidates are to report to the venue at 10.30 a.m. on the date of the interview with all their original testimonials. कुलसचिव Registrar असम विश्वविद्यालय, सिलचर Assam University, Silchar Ph. 03842-270368/270806 Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Cisco Firewall Good to have skills : Checkpoint Next Generation Firewall Minimum 5 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. A typical day involves collaborating with various teams to assess security needs, implementing protective measures, and continuously monitoring systems to ensure they are safeguarded against potential cyber threats. You will engage in problem-solving activities, providing solutions to enhance the security posture of the organization while ensuring compliance with industry standards and best practices. Roles & Responsibilities: - Expected to be an SME. - Collaborate and manage the team to perform. - Responsible for team decisions. - Engage with multiple teams and contribute on key decisions. - Provide solutions to problems for their immediate team and across multiple teams. - Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements. - Develop and implement security policies and procedures to ensure compliance with regulatory requirements. Professional & Technical Skills: - Must To Have Skills: Proficiency in Cisco Firewall. - Strong understanding of network security protocols and technologies. - Experience with intrusion detection and prevention systems. - Familiarity with security information and event management tools. - Knowledge of risk assessment methodologies and frameworks. - Excellent knowledge in Information Technology, specifically with network and connectivity security in an hybrid cloud network environment (GCP & Azure) (3-5 years experience). - Very good knowledge of the following solutions and technologies: Cisco & Check Point firewalls, IDS and IPS, Tufin Orchestration Suite, Ansible, Terraform, Jira. - Very strong customer-oriented mindset and attitude, experience in interacting with both internal and external customers. - Previous experience (1-3 years) in a similar role operating a complex and highly critical network security infrastructure within a financial environment. Additional Information: - The candidate should have minimum 5 years of experience in Cisco Firewall. - This position is based at our Hyderabad office. - A 15 years full time education is required. Show more Show less

Posted 1 week ago

Apply

Exploring ids Jobs in India

The ids job market in India is rapidly growing with the increasing demand for professionals who can design, implement, and manage information security systems. With the rise in cyber threats and data breaches, companies across various industries are actively hiring ids professionals to secure their networks and safeguard their sensitive information.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Mumbai
  5. Delhi

These cities are known for their thriving tech industries and offer abundant opportunities for ids professionals.

Average Salary Range

The average salary range for ids professionals in India varies based on experience and expertise. Entry-level positions can expect to earn around INR 4-6 lakhs per annum, while experienced professionals with advanced skills can earn upwards of INR 15 lakhs per annum.

Career Path

A typical career path in ids may include roles such as: - Junior Security Analyst - Security Engineer - Senior Security Consultant - Chief Information Security Officer (CISO)

With continuous learning and upskilling, ids professionals can progress to higher levels of responsibility and leadership within the field.

Related Skills

In addition to ids expertise, professionals in this field are often expected to have skills in: - Network security - Vulnerability assessment - Incident response - Penetration testing - Security compliance

Interview Questions

  • What is IDS and how does it differ from IPS? (basic)
  • Describe a recent cyber attack you have encountered and how you responded to it. (medium)
  • Can you explain the difference between symmetric and asymmetric encryption? (medium)
  • How do you stay updated on the latest trends and technologies in information security? (basic)
  • What is the importance of threat intelligence in IDS? (advanced)
  • Can you walk us through your experience with setting up and configuring IDS systems? (medium)
  • Explain the concept of zero-day vulnerability and how IDS systems can detect such threats. (advanced)
  • How do you handle false positives in IDS alerts? (medium)
  • Describe a time when you successfully prevented a data breach in your organization. (medium)
  • What is the role of machine learning in IDS? (advanced)
  • How would you prioritize security vulnerabilities in a network? (medium)
  • Can you discuss a challenging IDS project you have worked on and how you overcame obstacles? (medium)
  • What are the common types of IDS evasion techniques used by attackers? (advanced)
  • How do you ensure compliance with data protection regulations in your IDS work? (medium)
  • Explain the concept of signature-based vs. anomaly-based IDS detection. (medium)
  • How do you handle incidents of insider threats in an organization? (medium)
  • What are the key components of a comprehensive IDS strategy? (medium)
  • Describe your experience with conducting security audits and assessments. (medium)
  • How do you collaborate with other IT teams to enhance overall security posture? (medium)
  • Can you discuss a time when you had to make a critical decision under pressure in an IDS incident? (medium)
  • How do you approach continuous monitoring and improvement of IDS systems? (medium)
  • What role does encryption play in IDS operations? (medium)
  • How do you ensure IDS systems are aligned with business goals and objectives? (medium)
  • Can you provide an example of a successful IDS implementation you have led? (medium)
  • How do you communicate security risks and findings to non-technical stakeholders? (medium)

Closing Remark

As you explore ids jobs in India, remember to continuously enhance your skills, stay updated on industry trends, and prepare thoroughly for interviews to showcase your expertise confidently. Good luck on your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies