Jobs
Interviews

1461 Incident Response Jobs - Page 10

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

6.0 - 10.0 years

10 - 14 Lacs

mumbai

Work from Office

Knowledge: 6+ years of progressive experience in IT, with at least 3+ years specifically in IT Governance, Risk Management, Compliance, or IT Audit. Demonstrated experience in developing and implementing IT governance frameworks (e.g., COBIT, ITIL). Proven ability to manage complex projects and drive organizational change. Required Skills: • Strong communication, presentation, and interpersonal skills, with the ability to influence stakeholders at all levels. • Strong working relationships with team members and the ability to motivate them. • Knowledge in areas such as Application Security, Data Security, Identity Access Management, Information, Infrastructure Technology, GDPR, and ISO Audits. • Solid understanding of Risk Management Lifecycle and exposure to standards like SOX, COBIT, PCI-DSS, NIST Control, etc. • Understanding of Security incident response aspects is desirable. • Good analytical, problem-solving, and interpersonal skills. • Proficiency in risk assessment methodologies and compliance frameworks. • Ability to work independently and as part of a cross-functional team. Required Experience: 6 years of experience in auditing domain within both government and public sector undertakings is preferable. Expertise in compliance audit and MIS reporting required for Goverance is mandatory. Roles and Responsibilities Responsibilities: As GRC (Governance, Risk, and Compliance) Manager is responsible for overseeing and managing the risk assessment, remediation, and monitoring of information and technology process risks. This role involves ensuring that all risk and compliance activities are performed effectively by various control functions. The GRC Manager also serves as an internal consultant, providing guidance to operating functions and business lines on risk-related matters. Additionally, they are tasked with identifying, assessing, quantifying, reporting, communicating, mitigating, and monitoring process risks to ensure the organization's overall security and compliance posture. • Ensure strong governance on risk and compliance performed by various control functions. • Manage risk assessment, remediation, and monitoring of information and technology • Identify, assess, quantify, report, communicate, mitigate, and monitor process risks. • Support the implementation of information security policies. • Discuss risk closure, mitigation, and acceptance with stakeholders. • Ensure periodic entitlement reviews are completed, and risks are managed to an acceptable level. • Collaborate with control functions to track and mitigate identified risks. • Work with technology leaders to identify control gaps. • Act as a subject matter expert for risk and controls related to operations. • Maintain strong working relationships with stakeholders. • Review and refine policies and processes based on industry best practices. • Track identified risks and ensured their closure within defined timelines. • Prepare and maintain risk heat maps and risk registers. Framework Implementation of IT Governance: Assist in Implementing a comprehensive IT governance framework for the IFTAS, policies, and procedures aligned with industry best practices (e.g., COBIT, ITIL) and organizational goals. Assist in establishing clear roles, responsibilities, and accountability for IT decision-making processes across the organization. Assist in developing and managing the IT policy lifecycle, including creation, review, approval, and communication. Strategic Alignment & Planning: Assist in ensuring IT strategies, initiatives, and investments are directly aligned with the overall business strategy and objectives. Facilitate the IT strategic planning process, translating business needs into actionable IT priorities. Assist in developing and track key performance indicators (KPIs) and metrics to measure the effectiveness of IT governance and overall IT performance. Risk Management & Compliance: Identify, assess, and monitor IT-related risks, including cybersecurity, data privacy, and operational risks. Ensure IT compliance with relevant internal policies, external regulations (e.g., GDPR, RBI guidelines, SEBI regulations if applicable), and industry standards. Manage IT audits (internal and external), facilitate responses, and track remediation efforts. Assist in financial , corporate governance, HR,Admin audits in line with CAG and other statutory requirements under the companies act 2013 and other relevant acts as applicable. Performance & Value Management: Establish processes for IT performance management, ensuring efficient and effective delivery of IT services and projects. Assist in development of mechanisms to measure and report on the business value delivered by IT investments. Drive continuous improvement initiatives within the IT organization based on governance insights. Stakeholder Engagement & Communication: Help in liaisoning between IT and business stakeholders to ensure clear communication and shared understanding of IT governance principles and outcomes. Facilitate governance committees and working groups, preparing agendas, minutes, and tracking action items. Educate and advocate for IT governance best practices across the organization.

Posted 1 week ago

Apply

4.0 - 8.0 years

8 - 13 Lacs

mumbai, hyderabad

Work from Office

The L2 analyst will be responsible for advanced monitoring, analysis, and incident response activities, acting as an escalation point for L1 analysts. The role requires strong technical expertise, problem-solving skills, and the ability to handle complex security incidents while ensuring timely containment and remediation. Experience required: Candidate must have 4-5 years of total experience with 2-3 years in a SOC or Cybersecurity Operations role. Knowledge: Incident detection, triage, containment, eradication and recovery processes. Writing incident reports with root cause analysis and recommendations. knowledge of Security Incident investigative techniques Knowledge of SOAR platorms for workflow automation Skills required: Hands-on experience with SIEM tools (e.g., Splunk, LogRhythm, QRadar, ArcSight). Strong knowledge of Windows, Linux, and network security logs. Experience in malware analysis, phishing investigation, and threat hunting. Understanding of MITRE ATT&CK framework, intrusion detection systems (IDS/IPS), and firewalls. Familiarity with EDR/XDR solutions (CrowdStrike, SentinelOne, Carbon Black, etc.). Shift: Rotational 24x7 SOC environment Roles and Responsibilities 1. Act as an escalation point for SOC L1 analysts by validating, triaging, and investigating security alerts. 2. Ensure Security Incident are handled as per SLA. 3. Perform deep-dive analysis on security events to identify malicious activity, potential threats, and false positives. 4. Investigate incidents involving malware, phishing, account compromise, lateral movement, and insider threats. 5. Respond to and manage security incidents in accordance with the Incident Response playbooks. 6. Perform root cause analysis and provide actionable recommendations to mitigate risks. 7. Collaborate with threat intelligence teams to enrich alerts and improve detection rules/use cases. 8. Assist in developing, tuning, and maintaining SIEM rules, dashboards, and correlation logic. 9. Document incidents, findings, and remediation steps in detailed incident reports. 10. Mentor and guide L1 analysts, providing knowledge transfer and training. 11. Work with IT and business stakeholders during incident containment, eradication, and recovery phases. 12. Ensure log sources are integrated. 13. Update IoC/IOA in the NGSOC solution which are manually received from threat feeds / external advisory / partner. 14. Access Management – User Creation, Deletion, Modification, and Assigning the privilege level. 15. Work with SOC Team, Threat Hunter, and IFTAS’ teams to lead the In-depth analysis of Critical / High Security Incidents. 16. Investigate and work on endpoints alerts reported by EDR and AV team. 17 .Create the SOP documents for SOC Operation. 18. Review the SOC Operation report which are shared by SOC team. 19. Review the play books created by SOC team. 20 .Creating and Publishing Weekly & Bi-weekly reports.

Posted 1 week ago

Apply

4.0 - 8.0 years

8 - 11 Lacs

hyderabad

Work from Office

Security Analyste for application support responsible for safeguarding software applications and their infrastructure.Security analysts are experts who identify and fix problems within security systems by analyzing risks, vulnerabilities, threats and incidents. They perform a ton of security analyses to recommend solutions for preventing cyberattacks. Key duties include identifying vulnerabilities through VA, PT ,security patching assessments enforcing secure coding standards, implementing security controls and responding effectively to security incidents. Ensure to work closely with developers, testers, and security teams and customers to ensure applications are designed and deployed securely, complying with industry standards and regulations. Participate in audits and compliance efforts (e.g., SOX, ISO, NIST, PCI). Technical Skills: • Applying Incident Response Frameworks and Handling Procedures. • Information security, compliance, assurance, and/or other security best practices and principles. • Possessing and fostering an inquisitive mindset amongst team members. • Assist in policy and process development related to vulnerability and patch management. • participate in audits and compliance efforts (e.g., Internal security audit ,application Security audit etc.. ). • Security Systems Documentation – Create and maintain technical and operational documentation of in-scope security systems to ensure knowledge transfer and continuity. Roles and Responsibilities • Analyse vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. • Prioritize vulnerabilities using multiple criteria, including CVSS, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), asset criticality, and business context. • Partner with IT and Businesss teams to track remediation progress and provide technical guidance on mitigation strategies. • Monitor threat intelligence feeds to correlate vulnerabilities with current exploit activity. • Create and maintain vulnerability metrics, dashboards, and reports for leadership and compliance teams. • Support vulnerability assessment activities in cloud environments (AWS, Azure, etc.). • Maintain documentation related to the vulnerability management lifecycle. • Develop a set of security controls to mitigate the risks identified • This could include implementing security software and improving physical security measures. • Document the risk assessment results, including all assets, threats, vulnerabilities, and security controls. • Develop a detailed plan to address all identified risks and vulnerabilities. • Monitor the effectiveness of the remediation plan and analyse security metrics to adjust as necessary for the ongoing protection of assets. • Assist in policy and process development related to vulnerability and patch management.

Posted 1 week ago

Apply

16.0 - 24.0 years

8 - 14 Lacs

chennai

Work from Office

Design, implement & manage enterprise InfoSec solutions. Handle IAM lifecycle, SSO/MFA, access certifications, threat detection, SIEM, security automation, compliance (SOX, GDPR). Support audits & incident response. Required Candidate profile 4–7 yrs in InfoSec/IAM. Expertise in IAM platforms, SSO/MFA, SIEM, scripting, compliance. Strong coding in Python/Java/Go. Certifications like CISSP, CISM, or Security+ preferred. Cloud IAM exposure

Posted 1 week ago

Apply

5.0 - 8.0 years

4 - 8 Lacs

bengaluru

Work from Office

Job Title: Senior Security Engineer Role Overview: The Senior Security Engineer is responsible for the secure design, development, and operation of Skyhigh products and services. This role involves a mix of proactive security design, vulnerability management, and incident response, with a strong focus on maintaining and enforcing compliance standards. You will be a key contributor to our security posture, working closely with cross-functional teams to embed security best practices throughout the entire development lifecycle. Responsibilities: As our Senior Security Engineer you'll play a pivotal role in architecting and securing our entire software ecosystem. You'll partner with engineering teams across the organization, influencing the design and development of our products to ensure they are secure by default. You'll be a key driver in maintaining our coveted security certifications, ensuring our platform adheres to stringent standards like FedRAMP and SOC 2. This is a high-impact, proactive role that goes beyond just finding flaws. You'll be instrumental in building security into our development process, from threat modeling and secure design to managing our vulnerability remediation lifecycle. You'll serve as a trusted advisor and subject matter expert, working collaboratively with all engineering teams to cultivate a robust security culture and empower them with the knowledge and tools to write secure code. Qualifications: 5 to 8 years of expertise in application security principles, methodologies, and common attack vectors (e.g., OWASP Top 10). You have hands-on experience with a variety of security tools for static and dynamic analysis (SAST/DAST) and vulnerability management. Passionate about DevSecOps and skilled in automating security tasks, integrating tools into CI/CD pipelines, and developing security policies for Infrastructure as Code (IaC). Natural problem-solver with a knack for incident detection, triage, and root cause analysis. You can provide practical, effective remediation plans for security issues across the stack. Excellent communicator who can influence and guide engineers and leadership without direct authority. You enjoy educating others and serving as a subject matter expert to build a strong security culture.

Posted 2 weeks ago

Apply

8.0 - 13.0 years

6 - 10 Lacs

gurugram

Work from Office

AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives atAHEAD. The Senior Technical Consultantis a skilled cybersecurity professional with strong expertise in at least one core XSIAM technology domain and a good working knowledge of others. They will be responsible for the technical execution of XSIAM deployments, handling complex configurations, and mentoring junior team members. Key Responsibilities Take a hands-on role in the end-to-end delivery of Palo Alto Networks XSIAM solutions, including deployment, configuration, and customization to meet specific client requirements. Develop and implement custom XSIAM content, such as tailored correlation rules, data models for unique log sources, and automation playbooks that streamline client SOC workflows. Integrate a variety of data sources into XSIAM, ensuring comprehensive visibility across endpoint, network, cloud, and identity layers. Configure and fine-tune XSIAM functionalities, including TIM for threat intelligence enrichment and ASM for external visibility. Collaborate with clients to optimize their XSIAM deployment, provide guidance on alert tuning, and assist in operationalizing the platform. Act as a technical resource for troubleshooting and resolving complex XSIAM-related issues during and post-implementation. Contribute to project documentation, ensuring clarity and completeness of Solution Designs and As-Built configurations. Skills Required 8 years of dedicated experience in cybersecurity, with a strong practical background in SIEM, SOAR, EDR/XDR, or SOC operations. 5 years of demonstrated threat intelligence and Incident response experience A minimum of 2 years of direct experience implementing and configuring Palo Alto Networks XSIAM or similar advanced SecOps platforms. Demonstrated expertise in at least one of the following: SIEM administration, including log collection, parsing, and normalization (XDM). SOAR development, including creating playbooks and leveraging scripting (Python preferred). EDR/XDR deployment and management, particularly with Cortex and Crowdstrike Proficiency with XQL for data analysis and rule creation. Solid understanding of network security concepts, cloud environments (AWS, Azure, GCP), and identity management. Strong analytical and troubleshooting capabilities. Effective communication skills, with the ability to engage with clients and team members. Palo Alto Networks certifications (e.g., PCNSE) or other relevant industry certifications are a plus. Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include - Medical, Dental, and Vision Insurance - 401(k) - Paid company holidays - Paid time off - Paid parental and caregiver leave - Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings ("OTE") for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidates relevant experience, qualifications, and geographic location.

Posted 2 weeks ago

Apply

4.0 - 7.0 years

2 - 6 Lacs

gurugram

Work from Office

AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives atAHEAD. SOC Analysts at AHEAD monitor customer environments and perform Incident Detection, Validation, and Incident Reporting. SOC Analysts are the frontline of SOC and are customer-facing representatives. SOC Analysts are responsible for triaging events, incidents, and reporting validated incidents to the customer for incident response. Incumbents will possess strong technical and analytical skills while providing accurate analysis of security related problems. They have a well-rounded networking background and are responsible for performing troubleshooting of customer issues. This individual is user focused and works to resolve client needs in a timely manner. These needs may involve resolving hardware/software failures, investigating, and responding to security threats, and making change request to the security policy of company devices. The SOC Analystis expected to monitor security feeds streaming from client servers, network devices, and end user workstations, operate and maintain network security equipmentat client locations. The Analystis expected to be familiar with a wide range of security tools and understand basic security fundamentals. TheAnalystwill perform information security event analysis and must possess knowledge of operating systems, TCP/IP networking, network attacks, attack signatures, defense countermeasures, vulnerability management, and log analysis. Roles & Responsibilities: Monitor and analyze network traffic and alerts Investigate intrusion attempts and perform in-depth analysis of exploits Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident Conduct proactive threat research Review security events that are populated in a Security Information and Event Management (SIEM) system Tuning of rules, filters, and policies for detection-related security technologies to improve accuracy and visibility Data mining of log sources to uncover and investigate anomalous activity, along with related items of interest Independently follow procedures to contain, analyze, and eradicate malicious activity Document all activities during an incident and provide leadership with status updates during the life cycle of the incident Incident management, response, and reporting Provide information regarding intrusion events, security incidents, and other threat indications and warning information to the client Track trends, statistics, and key figures for each assigned client Assist with the development of processes and procedures to improve incident response times, analysis of incident, and overall SOC functions Reporting Incident reports Security status reports Client-facing security meetings Position Requirements: Incident handling/response experience Experience with Automation tools. Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles Understanding ofanda strong desire to learn common security technologies (IDS, Firewall, SIEM, etc.) The ability to think creatively to find elegant solutions to complex problems Excellent verbal and written communication skills The desire to work both independently and collaboratively with a larger team A willingness to be challenged along with a strong appetite for learning 8-10years of experience in Information Security, Incident Response, etc. (or related field) Hands-on experience with common security technologies (IDS, Firewall, SIEM, etc.) Knowledge of common security analysis tools & techniques Understanding of common security threats, attack vectors, vulnerabilities and exploits Knowledge of regular expressions Education: BachelorsDegree in Computer Science, Information Security or related/equivalent educational or work experience One or more of the following certificationsCISSP, GCIA, Security+, CEH, ACSE Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include - Medical, Dental, and Vision Insurance - 401(k) - Paid company holidays - Paid time off - Paid parental and caregiver leave - Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings ("OTE") for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidates relevant experience, qualifications, and geographic location.

Posted 2 weeks ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

gurugram

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : One Identity Manager Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitating the transition to cloud security-managed operations. You will engage in discussions to align security strategies with organizational objectives, ensuring that all security measures are effectively integrated into the cloud environment. Your role will also require you to stay updated on the latest security trends and technologies to enhance the overall security posture of the organization. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills.- Develop and maintain comprehensive documentation of security policies and procedures. Professional & Technical Skills: - Must To Have Skills: Proficiency in One Identity Manager.- Good To Have Skills: Experience with cloud security frameworks and compliance standards.- Strong understanding of identity and access management principles.- Experience with security risk assessment methodologies.- Familiarity with security incident response processes. Additional Information:- The candidate should have minimum 5 years of experience in One Identity Manager.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

gurugram

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : One Identity Manager Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitating the transition to cloud security-managed operations, ensuring that all security measures align with organizational objectives and compliance standards. You will engage in discussions to refine security strategies and provide insights that enhance the overall security posture of the organization. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Develop and maintain comprehensive documentation of cloud security architecture and controls.- Conduct regular assessments of cloud security measures to identify areas for improvement. Professional & Technical Skills: - Must To Have Skills: Proficiency in One Identity Manager.- Good To Have Skills: Experience with cloud security frameworks and compliance standards.- Strong understanding of identity and access management principles.- Experience with security incident response and risk management.- Familiarity with cloud service provider security offerings and best practices. Additional Information:- The candidate should have minimum 3 years of experience in One Identity Manager.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

bengaluru

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 15 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and overseeing the transition to cloud security-managed operations. You will engage in strategic discussions to align security measures with organizational objectives, ensuring a robust security posture in the cloud environment. Roles & Responsibilities:- Expected to be a Subject Matter Expert with deep knowledge and experience.- Should have influencing and advisory skills.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Facilitate training sessions to enhance team understanding of cloud security practices.- Evaluate emerging security technologies and recommend enhancements to existing security frameworks. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM).- Strong understanding of cloud security principles and best practices.- Experience with security incident response and management.- Knowledge of compliance frameworks and regulatory requirements.- Familiarity with risk assessment methodologies and threat modeling. Additional Information:- The candidate should have minimum 15 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

7.0 - 11.0 years

12 - 16 Lacs

bengaluru

Work from Office

About The Role Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 15 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability. You will be responsible for ensuring the successful execution of projects, utilizing our method, tools, training, and assets. Your role will involve overseeing the entire project lifecycle, from planning and design to implementation and post-implementation support. You will collaborate with cross-functional teams and stakeholders to ensure the delivery of high-quality security solutions. Roles & Responsibilities:- Expected to be a SME with deep knowledge and experience.- Should have Influencing and Advisory skills.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Lead the implementation and delivery of Security Services projects.- Utilize global delivery capability, including method, tools, training, and assets.- Oversee the entire project lifecycle, from planning and design to implementation and post-implementation support.- Collaborate with cross-functional teams and stakeholders to ensure the delivery of high-quality security solutions. Professional & Technical Skills: - Must Have Skills: Proficiency in Security Information and Event Management (SIEM). Proficiency in consulting (solutioning work with presales, RFP's, estimation), client management, SOC Delivery- Strong understanding of security principles and best practices.-Deep expertise in SIEM, SOAR and Incident Response- Experience in designing and implementing security solutions.- Knowledge of security frameworks and standards (e.g., ISO 27001, NIST).- Experience in conducting security assessments and audits.- Good To Have Skills: Experience with security incident response and threat intelligence.- Familiarity with security technologies and tools (e.g., firewalls, IDS/IPS, SIEM).- Knowledge of cloud security and emerging trends in the security industry. Additional Information:- The candidate should have a minimum of 15 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A B.e B.tech M.tech is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

bengaluru

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Endpoint Protection Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitate the transition to cloud security-managed operations, ensuring that all security measures align with organizational objectives and compliance standards. You will engage in discussions to refine security strategies and provide insights that enhance the overall security posture of the organization. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Assist in the development and refinement of security policies and procedures.- Evaluate and recommend security technologies and tools to enhance cloud security. Professional & Technical Skills: - Must To Have Skills: Proficiency in Endpoint Protection.- Good To Have Skills: Experience with cloud security frameworks and compliance standards.- Strong understanding of risk assessment methodologies and threat modeling.- Experience in implementing security controls in cloud environments.- Familiarity with incident response and security monitoring tools. -Microsoft Defender and KQL queries Additional Information:- The candidate should have minimum 3 years of experience in Endpoint Protection.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

3.0 - 8.0 years

3 - 7 Lacs

hyderabad

Work from Office

About The Role Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Product Security Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply your security skills to design, build, and protect enterprise systems, applications, data, assets, and people. A typical day involves collaborating with various teams to assess security risks, implementing protective measures, and ensuring compliance with security policies. You will engage in proactive monitoring of systems and respond to potential threats, all while maintaining a focus on safeguarding information and business processes against cyber threats. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular security assessments and audits to identify vulnerabilities.- Develop and implement security policies and procedures to enhance organizational security. Professional & Technical Skills: - Must To Have Skills: Proficiency in Product Security.- Good To Have Skills: Experience with threat modeling and risk assessment.- Strong understanding of security frameworks and compliance standards.- Experience with security tools and technologies for monitoring and incident response.- Knowledge of secure coding practices and application security testing. Additional Information:- The candidate should have minimum 3 years of experience in Product Security.- This position is based at our Hyderabad office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

4.0 - 7.0 years

11 - 15 Lacs

bengaluru

Work from Office

Company Overview: Stratogent does IT and Cybersecurity operations. We build and operate complex infrastructure across on-premise, data centers, and clouds. We wrap any compute-storage-network platform with monitoring, automation and security services so customers can sleep while we cure failures and block threats. If Googles mission is to “organize the world’s information”, ours is to “operate the world’s infrastructure”. We aren’t quite there yet, so we focus on being the best at knowing and doing operations for mid-size, high-touch and high-change IT environments. Our customer base is made up of progressive companies who are flag bearers of new technology adoption and are risk-takers. We have participated in successful (and failed) projects and bring that accumulated experience to each of our clients. Since 2008, we have acted as an extension of internal IT and Security teams and along the way achieved a community of highly satisfied clients who rave about our “no-fluff just stuff” style. Job description: The primary responsibility is to work on the existing or new Incidents, Service Requests, and Tasks Triage the unresolved incidents or Requests to Leads Business Relationships: Continually communicates with Leads and Customers Key Responsibilities Process Day to day Operational issues, requests and Project tasks Incident response and resolution within SLA's with excellent analytical and troubleshooting skills Providing all the necessary details to leads about the issue, steps taken, recommendation and any other relevant information Ticket Status Check and Update Respond to False Positive Alerts Incident Escalation and Progress Monitoring Create, review, update, and maintain Standard Operating Procedures. Prepare RCA for the escalated incidents. Perform the Shift handovers SPLUNK Configure and troubleshoot Splunk components such as indexer, forwarder, search head, etc Comfortable with Splunk queries to create Splunk dashboards. Configuring Splunk as per the Best Practices (apps, add-ons, searches, etc). Creates, modifies, and updates Security Information Event Management rules. Recognizes potential, successful and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail. Triage of non-security alerts based on priority, problem identification and escalation. Escalate to designated contacts within Stratogent and Customer for issues outside SOPs, or when SOPs fail to resolve the issue. Utilize Security Information and Event Management to monitor data flow between networks. Work directly with delivery teams or customers to gather logging requirements. Convert Logging requirements into Splunk designs following best practices. Perform environment health checks. Troubleshoot Issues Update and / or create technical documentation. Security: Leads the escalation as a point for security incidents. Analyze & investigate cyber threats on a real-time/day-to-day basis, involving alerts review, log analysis, and event/incident correlations. Prepare Document and Maintain Procedures, Response Plan, Runbooks, and associated processes for continuous improvement. Assist L1/L2 for security event and initial incident response to detected threats. Regularly review and recommend changes to policies or controls as needed to enhance security. Identifies potential gaps and offers solutions to include internal team needs, product improvements and client security posture. Develop reporting with focused messages to enable the stakeholders to understand their and responsibilities. Train and mentor, the peers and juniors in the team. Must-have Skills: Prior Working Experience Must have worked on Splunk Performing incident handling, evidence acquisition, endpoint and Network,and Security Incident management Customer-focused Excellent communication skills (reading, writing, speaking and listening) Highly self-motivated and directed. Excellent attention to detail. Flexibility and willingness to work on different and multiple technologies Ability to effectively prioritize, organize and execute tasks in a high-pressure environment Good to have skills: Prior Work Experience Worked on any of the IAM and PAM tools. Certifications in Enterprise Admin or Cloud Admin of Splunk is an advantage Prior training and certification in communication is added advantage KRA Adherence to ticket creation within SLA Adherence to SLA in incident/request handling Make the incident handling experience better for the customer (internal team/ external customer) High quality ticket updates Troubleshooting tasks with proper perspective Keep the Leads informed of task accomplishment, issues and status Training and mentoring peers and Juniors Soft skills Excellent communication skills – Written and Verbal Enjoys sharing information with others Team player Passion for work Learning Orientation

Posted 2 weeks ago

Apply

3.0 - 7.0 years

7 - 11 Lacs

indore, bengaluru

Work from Office

ECI is the leading global provider of managed services, cybersecurity, and business transformation for mid-market financial services organizations across the globe. From its unmatched range of services, ECI provides stability, security and improved business performance, freeing clients from technology concerns and enabling them to focus on running their businesses. More than 1,000 customers worldwide with over $3 trillion of assets under management put their trust in ECI. At ECI, we believe success is driven by passion and purpose. Our passion for technology is only surpassed by our commitment to empowering our employees around the world . The Opportunity: ECI has an exciting opportunity for a SOC Engineer , who is responsible for analyzing and responding to network security events. The SOC Engineer will work collaboratively to detect and respond to information security incidents, maintain and follow procedures for security event alerting, and participate in security investigations. The SOC Engineer will perform tasks including monitoring, research, classification, and analysis of security events that occur on the network or endpoint. In this role, you will act as a shift lead and review tickets before they are being escalated to clients. You will Investigate intrusion attempts and perform an in-depth analysis of exploits. This is an Onsite role. Rotational Shift What you will do: Acts as shift lead by managing the incident queue and assign incidents to available analysts based on priority. Make sure the incident is handled from end to end with defined SLA. Conduct expert analysis of SIEM logs to drive event and incident analysis. Provide expertise in categorizing and deep dive event logs to support timely and effective decision making in handling security breach cases. Launch and track investigations until resolution. Work with client or internal support teams to mitigate security threats and help them in improving the security posture of client environment. Perform threat hunt activities based on latest security vulnerabilities, advisories, and penetration techniques. Mitigate security threats and notify client. Contribute to the creation of SOC policies, procedures, and configuration standards. Manage and Administer security tools such as SIEM, EDR, Email gateway, etc. Advanced working skills with any one of the SIEM tools (ELK, Splunk, Qradar). Rule base Management, SOC Fine tuning. (Administer SIEM tool) Maintain 'On Call' availability for critical incident response scenarios and urgent threats. Demonstrate strong analytical, diagnostic, innovation, and collaboration skills. Exhibit enthusiasm, adaptability, and a passion for continuous learning, growth, and sharing of knowledge. Showcase exceptional presentation and communication abilities. Who you are: 3-5 years experience in the IT security industry, preferably working in a SOC environment. Bachelors in computer science/IT/Electronics Engineering, M.C.A. or equivalent University degree Certifications: CCNA, CEH, CHFI, GCIH, ITIL Experience with Security Information Event Management (SIEM) tools, creation of correlation rules and fine-tuning rules to administration of SIEM. Administration of Email security gateways, EDR, Antivirus Solutions. Should have expertise on TCP/IP network traffic and event log analysis. Configuration and Troubleshooting experience on Cisco ASA, PaloAlto firewalls would be an added advantage. Ability to work with minimal levels of supervision. Willingness to work in a job that involves 24/7 operations. Shift management and scheduling. Remain vigilant while continuing to maintain and enhance the overall security of ECI and the clients receiving our services. Maintain awareness about the potential risks based on the environment they are operating in and the clients they are working on Bonus points if you have: Knowledge and hands-on experience of implementation and management of IDS/IPS, Firewall, VPN, and other security products Knowledge and hands-on experience with SIEM tools Knowledge of ITIL disciplines such as Incident, Problem and Change Management Strong verbal and written English communication. Strong interpersonal and presentation skills ECIs culture is all about connection - connection with our clients, our technology and most importantly with each other. In addition to working with an amazing team around the world, ECI also offers a competitive compensation package and so much more! If you believe you would be a great fit and are ready for your best job ever, we would like to hear from you! Love Your Job, Share Your Technology Passion, Create Your Future Here!

Posted 2 weeks ago

Apply

8.0 - 12.0 years

25 - 35 Lacs

bengaluru

Work from Office

DUTIES & RESPONSIBILITIES Owns and leads individual incident response activities by analyzing security alerts and coordinating responses. Perform in-depth event review and analysis where appropriate. Analyze events, research the potential cause, and recommend a course of action Designs modern detective controls for emerging security risks and involved in innovative programs to enhance the firms security posture Hunts for indications of compromise across multiple technology platforms Continuously improves our alerting use cases and the threat hunting program Stays updated on the latest security trends, vulnerabilities, and threat actors to continually improve the organizations security posture Participates in on-call rotation schedule to provide 24/7 coverage for security incidents and emergencies Documents/generates reports detailing security incidents for security leaders and the business Conducts postmortem reviews of incident response (IR) activities, to facilitate continuous improvement Researches security trends with the goal of improving our processes and tools MINIMUM REQUIREMENTS Bachelor's degree in computer science or related field Requires 8+ years of experience working in a Security Operations role Threat hunting experience Familiarity with known cyber security frameworks including NIST and Mitre, ATT&CK, and fundamentals of kill chain analysis Hands-on working knowledge of SIEM/SOAR/XDR Tools (Cortex XSIAM, Torq, etc.) PREFERRED EXPERIENCE Familiarity with the principles of network and endpoint security, current threat, and attack trends, and have working knowledge of security principles such as “defense in depth” Familiarity with performing security Incident Response (IR) activities in complex organizations, with familiarity of the following: Endpoint Detection and Response (EDR) or Endpoint Forensics, Network Log Analysis, Public Cloud Defense (Azure, AWS, GCP, etc.) Relevant industry certifications such as CISSP, GIAC, or CEH Scripting knowledge (Python, PowerShell, etc.) Forensic knowledge Ability to assess and prioritize risks associated with alerts and events based on both industry knowledge and organizational context Excellent analytical and problem-solving skills Strong communication skills, both spoken and written

Posted 2 weeks ago

Apply

8.0 - 12.0 years

0 Lacs

karnataka

On-site

As an Engineering Manager Security Operations, your primary responsibility will be to define and lead the charter for infrastructure security, endpoint security, and security operations. This includes overseeing incident detection and response processes. You will be tasked with building and managing a high-performing team of security engineers who specialize in defensive operations and platform resilience. Additionally, you will be required to develop and uphold incident response plans, detection strategies, and escalation protocols. Collaboration with platform, SRE, and IT teams is essential as you work towards implementing secure configurations and controls across cloud and endpoint environments. Leading incident triage, forensic investigations, root cause analysis, and postmortem processes will also be part of your role. It will be crucial to enhance visibility into the environment through security tooling, logging, and telemetry while driving metrics-based reporting for operational excellence, incident trends, and risk posture. To qualify for this position, you must hold a Bachelor's degree in Computer Science, Engineering, or a related field (Masters preferred) and possess at least 8 years of experience in software engineering, infrastructure, or security-focused roles. Demonstrated leadership in infrastructure security, incident response, or security operations is a must. A strong understanding of cloud security (preferably AWS), endpoint hardening, and threat detection technologies such as SIEM and EDR is required. You should also showcase the ability to perform effectively in ambiguous environments with tight timelines, along with exceptional communication skills to articulate technical risks to non-technical stakeholders. Strong collaboration and stakeholder management skills are essential for this role. It would be beneficial to have exposure to product security and vulnerability management processes, familiarity with regulatory frameworks like SOC 2, ISO 27001, and PCI DSS, experience in fintech or high-growth startup environments, and knowledge of modern DevSecOps tools and practices.,

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

pune, maharashtra

On-site

The Global Security Operations organization is looking for a Mid to Senior/expert level Cyber Threat Intelligence Analyst to join the Threat Intelligence (TI) team. As a Cyber Threat Intelligence Analyst, you will be a key member of the team that supports the Chief Information Security Officers (CISOs) organization by providing Cyber Threat Intelligence (CTI) to security operation teams. Your role will involve leading cyber risk reduction efforts by identifying emerging Cyber Threats facing Northern Trust and Northern Trust technologies. Your responsibilities will include acting as a Technical Liaison between CTI and Global Threat Management (GTM) to lead cyber exposure/risk assessment activities from emerging threats. You will enable Threat Hunting operations by identifying technical indicators (such as IOCs) and Techniques, Tactics, and Procedures (TTPs) from emerging threat activity. Additionally, you will identify high and critical Vulnerabilities being exploited by Cyber Criminals and Nation State groups to support the Vulnerability Management (VM) teams prioritization efforts. Your role will also involve leading Intelligence-Driven Risk Identification and Risk Reduction Efforts across the organization. To excel in this role, you should maintain knowledge of changing technologies, attack methods, and the emerging threat landscape. You will be responsible for producing and delivering operational written and oral threat intelligence briefings tailored to the business interests of non-technical and technical stakeholders across the organization. Furthermore, you will track intelligence gaps and support Requests for Information (RFIs) efforts across the organization to fill identified intelligence gaps. In terms of qualifications, you should have a BA/BS in Computer Science or equivalent practical experience. Experience in cybersecurity consulting and/or cybersecurity operations, including Vulnerability Management, Incident Response, Threat Hunting, and Cyber Threat Intelligence, is required. Extensive knowledge of the MITRE ATT&CK framework and the ability to apply the framework to support threat detection and reduction efforts are essential. Detailed knowledge of global cyber threats, threat actors, and the tactics, techniques, and procedures used by cyber adversaries, particularly those targeting the financial services sector, is crucial. Additionally, experience in large-scale information technology implementations and operations is preferred. Industry certifications such as the GIAC Cyber Threat Intelligence (GCTI) certification would be beneficial but not mandatory. Demonstrated ability to produce concise, refined, written threat intelligence assessments and briefings, as well as experience tailoring oral threat intelligence briefings to non-technical and technical leaders across the organization, are required. You should be a proactive communicator and team-player with a proven ability to independently identify, analyze, and share relationships and technical, geopolitical, business, and financial implications between persisting and emerging cyber threats and threat vectors.,

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

pune, maharashtra

On-site

HMH is a learning technology company committed to delivering connected solutions that engage learners, empower educators, and improve student outcomes. As a leading provider of K12 core curriculum, supplemental and intervention solutions, and professional learning services, HMH partners with educators and school districts to uncover solutions that unlock students" potential and extend teachers" capabilities. HMH serves more than 50 million students and 4 million educators in 150 countries. HMH Technology India Pvt. Ltd. is our technology and innovation arm in India focused on developing novel products and solutions using cutting-edge technology to better serve our clients globally. HMH aims to help employees grow as people, and not just as professionals. The Senior Manager of Information Security (External Role Description Application / Product Security Architect) will report to the Chief Information Security Officer. As a leader in the Information Security organization, this role will lead the task of refining, managing, and executing a strategic product/application security roadmap that is based on industry-standard software security frameworks. You will plan, implement, and track key initiatives focused on product/application security strategy, metrics, compliance, policy, developer awareness, training, and stakeholder engagement. You will work closely with multiple teams that make up Information Security, Product Management, Engineering, Legal, Risk, and Compliance to improve product/application security controls and drive impactful change to the team and its members. Responsibilities: - Bring a deep background and broad experience in Information Security, Application Security, & Application Development or related business areas. - Lead a team of high-performing individuals who create remediation plans, perform security reviews, and recommend security solutions to meet current and future needs for HMH products and applications. - Drive the development and implementation of product and application standard security review processes that result in effective methods for reducing security risks before product releases. - Demonstrate an ability to influence all project and portfolio stakeholders; communicate relevant security information to both executive leaders and individual contributors in an effective manner. - Provide input into the Information Security strategy to ensure that future security investments are aligned appropriately when considering key priorities such as business requirements, industry threat landscape, and risk appetite of HMH. - Collaborate closely with the Architecture teams. - Demonstrated experience handling the demand/supply of project and program resources and tracking allocation. - Track policy exceptions and remediation dates through active engagement with development teams and operations teams. Partner with Audit teams to periodically audit controls and secure coding practices being followed by development teams. - Staying abreast of the latest cybersecurity threats both internal and external. - Oversee projects, program delivery, daily monitoring, response; review of cloud infrastructure, physical infrastructure, and the full life cycle of alerts through incident response; and the threat landscape to ensure ongoing and continued maturity of the organization's security controls in addition to service support. - Drive operational efficiency and excellence leveraging tools, process, and automation with appropriate and transparent visibility and metrics that can meet SLAs/SLOs. - Support and implement controls and visibility to meet third-party attestations (SOC2, ISO27001, GDPR, SOX). - Balance being collaborative, open, and approachable while still being firm on security policies and in facilitating progress and compromise. What you should have: - 5 to 6+ years hands-on experience in application security utilizing SAST, DAST, IAST, RASP, and WAF. - 5+ years of application engineering, architecture, or development management experience. - Proficient in analyzing ambiguous problems, compelling communicator with the ability to receive and analyze information, translating security risk to business risk to driving actionable decisions across multiple levels and departments. - Experience in leading application security remediation work, leading the mitigation initiative to accommodate the developer community priority. - Proficient experience with common web application attack vectors and related mitigation strategies that translate to controls within the organization. - Highly organized. With many people doing many things in a fast-moving company, strong organizational skills both for yourself and for the team will be required.,

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

hyderabad, telangana

On-site

You will be hired as an Associate Director of Cyber Security for our client, a US-based F100 GCC, located in Hyderabad, India. In this role, you will play a crucial part in the Cyber Security leadership team by creating and executing the enterprise-wide cyber security strategy. Your responsibilities will include leading various functional areas such as security operations, engineering, governance, risk management, and compliance. Reporting directly to the Head of I/O & Cyber Security, you will provide strategic direction, operational oversight, and technical leadership to safeguard the organization's information assets, systems, and infrastructure from both internal and external threats. Your main tasks will involve leading and managing a team of technical resources, overseeing the Security Operations Center (SOC), incident response, vulnerability management, threat intelligence, and endpoint protection. You will also be responsible for directing the development and implementation of security architecture, tools, and frameworks across cloud, on-premises, and hybrid environments. Collaboration with IT, legal, compliance, risk, privacy, and business stakeholders to manage security risk and ensure adherence to industry frameworks will be a critical aspect of your role. Additionally, you will drive the maturity of identity and access management (IAM), data loss prevention (DLP), zero trust architecture, and secure DevOps initiatives. It will be your responsibility to develop and maintain security policies, standards, metrics, and reporting to executive leadership and audit bodies. Building, leading, and mentoring a high-performing, diverse cybersecurity team across technical and GRC domains will also be part of your duties. Managing relationships with external vendors, partners, auditors, and regulatory entities will be essential, as well as supporting cyber incident response planning, tabletop exercises, and executive-level simulations. Furthermore, you will oversee the planning, execution, and delivery of technical projects, ensuring they are completed on time, within scope, and within budget. Collaboration with onshore teams to align offshore activities with overall business objectives and project goals will be crucial. Efficiently allocating and managing technical resources to meet project/operation demands and optimize productivity will also be one of your responsibilities. Implementing and maintaining quality assurance processes to ensure the highest standards of technical delivery, as well as facilitating effective communication between offshore and onshore teams, ensuring transparency and alignment on project status, risks, and issues, will be critical aspects of your role. To qualify for this position, you should hold a Bachelor's degree in computer science, Information Technology, or a related field, with a Master's degree being preferred. You should have at least 10+ years of progressive experience in cyber security, including a minimum of 5 years in senior leadership roles. Deep understanding of cyber security frameworks such as NIST CSF, NIST 800-53, MITRE ATT&CK is essential. Demonstrated experience in building and managing enterprise security programs in complex, regulated environments is required, along with the ability to influence at all levels, including executives and board members. Excellent leadership, communication, and stakeholder engagement skills are also necessary. Preferred qualifications include experience working in a global organization with distributed teams, certifications such as CISSP, CISM, CISA, CCSP, etc., and experience and certifications in ITIL, Agile, and DevOps practices. Experience working in Retail & Manufacturing and knowledge of managing regulatory environments such as HIPAA, SOX, PCI-DSS, GDPR, as well as experience integrating security in agile, DevOps, and CI/CD pipelines are also desirable.,

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

pune, maharashtra

On-site

HMH is a learning technology company dedicated to providing connected solutions that engage learners, empower educators, and enhance student outcomes. With a focus on K12 core curriculum, supplemental and intervention solutions, as well as professional learning services, HMH collaborates with educators and school districts to discover solutions that unlock students" potential and extend teachers" capabilities. Serving over 50 million students and 4 million educators in 150 countries, HMH Technology India Pvt. Ltd. is the technology and innovation arm in India, striving to develop innovative products and solutions using cutting-edge technology to better serve clients globally. HMH values the personal growth of employees alongside their professional development. The Senior Manager of Information Security (External Role Description Application / Product Security Architect) will report to the Chief Information Security Officer. In this leadership position within the Information Security organization, you will be responsible for refining, managing, and executing a strategic product/application security roadmap based on industry-standard software security frameworks. Your role will involve planning, implementing, and monitoring key initiatives focused on product/application security strategy, metrics, compliance, policy, developer awareness, training, and stakeholder engagement. Collaboration with various teams, including Information Security, Product Management, Engineering, Legal, Risk, and Compliance, is essential to enhance product/application security controls and drive impactful changes within the team and its members. **Responsibilities:** - Bring a deep background and broad experience in Information Security, Application Security, & Application Development or related business areas. - Lead a team in creating remediation plans, conducting security reviews, and recommending security solutions for HMH products and applications. - Develop and implement product and application standard security review processes to reduce security risks before product releases effectively. - Influence project and portfolio stakeholders by effectively communicating relevant security information to executive leaders and individual contributors. - Provide insights into the Information Security strategy to align future security investments with key priorities such as business requirements and the industry threat landscape. - Collaborate closely with Architecture teams and manage project and program resources effectively. - Monitor policy exceptions and remediation dates by engaging with development and operations teams actively. - Stay updated on the latest cyber security threats and oversee projects, program delivery, incident response, and overall security controls maturity. - Drive operational efficiency leveraging tools, processes, and automation while ensuring transparency and visibility through appropriate metrics. - Support and implement controls to meet third-party attestations such as SOC2, ISO27001, GDPR, and SOX. **What You Should Have:** - 5 to 6+ years of hands-on experience in application security using SAST, DAST, IAST, RASP, and WAF. - 5+ years of experience in application engineering, architecture, or development management. - Strong analytical and communication skills to translate security risks into actionable decisions across different levels and departments. - Proficiency in leading application security remediation work and implementing mitigation initiatives. - Familiarity with common web application attack vectors and related mitigation strategies. - Highly organized with strong organizational skills required for both personal and team efficiency in a fast-paced environment.,

Posted 2 weeks ago

Apply

2.0 - 6.0 years

0 Lacs

karnataka

On-site

About KPMG in India KPMG entities in India are professional services firms affiliated with KPMG International Limited. Established in August 1993, KPMG professionals in India leverage a global network of firms while being well-versed in local laws, regulations, markets, and competition. With offices located in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Jaipur, Hyderabad, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara, and Vijayawada, KPMG entities in India offer services to national and international clients across various sectors. The firm aims to provide rapid, performance-based, industry-focused, and technology-enabled services that demonstrate a deep understanding of global and local industries, as well as extensive experience in the Indian business environment. Equal Employment Opportunity Information QUALIFICATIONS,

Posted 2 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

pune, maharashtra

On-site

The Technology Risk Analyst plays a crucial role in identifying, assessing, and mitigating technical risks within an organization. You will have an understanding of Enterprise Risk Management practices in a technical environment and be responsible for developing and implementing risk management strategies to safeguard technology assets, systems, and operations. Additionally, you will provide guidance on information security processes, controls, and compliance, and information security risk management to key stakeholders. This role requires a combination of technical expertise, risk analysis skills, and the ability to collaborate with cross-functional teams to ensure the effective management of technical risks. Your key responsibilities will include conducting comprehensive assessments of potential technical risks associated with the organization's systems, infrastructure, and technology projects. You will need to stay abreast of industry trends, emerging technologies, and potential vulnerabilities that may impact the organization's technical landscape. Evaluating the potential impact and likelihood of identified risks, considering both internal and external factors will also be a crucial part of your role. Working closely with technical teams to assess the security posture of systems and applications through vulnerability assessments and penetration testing will be necessary. You should also be able to articulate the business risks associated with technical vulnerabilities and risks. As a Technology Risk Analyst, you will be responsible for developing and implementing risk mitigation strategies and action plans to address identified technical risks. Collaboration with IT teams to prioritize and implement security measures, controls, and safeguards to mitigate potential threats will be essential. Establishing and maintaining an incident response plan to address technical incidents promptly and effectively will also fall under your purview. You will need to coordinate with relevant stakeholders to investigate and resolve technical security incidents, ensuring lessons learned are incorporated into future risk management strategies. Ensuring that the organization complies with relevant regulatory requirements and industry standards related to technical risk management will be a key responsibility. You should stay informed about changes in regulations and standards, adjusting risk management processes accordingly. Facilitating the deployment and maintenance of Technology risk and controls model with assigned Technology teams using globally known and industry standard models (e.g., COBIT5, OCTAVE, FAIR, NIST, ISO) as references will also be important. Managing and providing leadership on all key information security processes and procedures will be part of your role. Communication of technical risk information to both technical and non-technical stakeholders, including executives and board members, and providing regular reports on the status of technical risks, mitigation efforts, and key performance indicators to demonstrate the effectiveness of risk management strategies will be required. Directing the activities of project managers and project teams to ensure quality and timeliness of project completion, developing project business cases, charters, plans, and execution approach, and demonstrating strong stakeholder engagement and management capabilities will also be part of your responsibilities. You will be expected to develop and deliver training programs to enhance the awareness and understanding of technical risks among employees and foster a culture of security awareness and responsibility throughout the organization. Evaluating and managing risks associated with third-party vendors and partners, ensuring they meet the organization's security standards will also be a part of your role. Additionally, you will be responsible for developing and implementing strategies to protect the company's cybersecurity, including firewalls, security software, data encryption tools, safety protocols, etc. Qualifications: - Total work experience of 6+ years with a minimum of 3 years in a relevant field of work. - Bachelor's or Master's degree in Computer Science, Information Security, Risk Management, System Resiliency & Availability & Software development practices and frameworks, Products and operations, Access and identity management, application security, assurance programs, or a related field. - Proven experience in technical risk management, information security, or a related role. - Industry Relevant Certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Auditor (CISA), Certified Information Security Manager (CISM), Certificate of Cloud Security Knowledge (CCSK), CPA, CIA, AWS, CIPP, CBCP, CRM or equivalent are highly desirable. - Strong understanding of technology, information security principles, and risk management frameworks. - Excellent analytical, communication, and interpersonal skills. - Ability to work collaboratively with cross-functional teams and stakeholders. - Knowledge of widely known Enterprise Architecture frameworks like TOGAF, SABSA, etc. - Project Management Certification (PRINCE II, PMP, Agile or otherwise) and be an outcome-focused self-starter. - Current knowledge of best practice IT controls, risk management techniques, ISO27001, SOC1/2/3 SSAE18, CSA Star (CCM), PCI DSS and familiarity with GRC tools. - Hands-on product experience on Qualys Enterprise Tru-Risk Platform and similar leading security automation products with broad market presence shall be an added advantage.,

Posted 2 weeks ago

Apply

1.0 - 5.0 years

0 Lacs

maharashtra

On-site

The role involves actively monitoring multiple screens to identify suspicious behavior, unusual activities, or potential security breaches. You will be required to take immediate action upon detecting security alerts or incidents, which may include notifying security personnel or relevant authorities. Keeping accurate records of surveillance activities, incidents, and responses will be a key responsibility. Effective communication with on-site security personnel and other relevant parties is essential. In addition to surveillance duties, troubleshooting minor technical issues related to the CCTV system will be part of your daily tasks. Ensuring strict compliance with data protection and privacy regulations is crucial for this role. You will be expected to prepare detailed reports for management review, documenting incidents and security measures implemented. This position involves working in shifts, with each shift lasting 8 hours. The job location is in Belapur, Navi Mumbai, and the position is full-time. The schedule includes day shifts, and the work is to be carried out in person.,

Posted 2 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

You are invited to join our Information Security team as an Enterprise IT Security Analyst specializing in Security Operations Center (SOC) activities. In this role, you will play a crucial part in maintaining the security and effectiveness of our security operations by monitoring security alerts, analyzing incidents, and contributing to incident response processes. Your expertise in SOC operations, incident response, and security monitoring tools will be invaluable in supporting SOC initiatives. Your key responsibilities will include monitoring security alerts and events using tools such as Splunk, Microsoft Sentinel, Kusto (KQL), or Splunk Search Processing Language (SPL). You will be tasked with analyzing and triaging security incidents, assisting in incident response processes, handling security incidents and tickets, conducting security assessments, and contributing to the design of SOC use cases. Additionally, you will provide technical support for SOC-related issues, leverage AWS skills for cloud security monitoring, and stay up-to-date with the latest SOC trends and technologies. To excel in this role, you must possess a Bachelor's degree in computer science or a related field, along with 3 years of experience in SOC operations. A CompTIA Security+ certification or similar qualification is required, as well as experience with SIEM technologies and a strong understanding of SOC principles, practices, and frameworks. Your proven experience in incident response and management will be highly beneficial. While not mandatory, proficiency in AWS cloud security and Windows Defender, excellent problem-solving and analytical skills, strong communication abilities, and the capacity to work both independently and as part of a team are considered advantageous. Experience in a SOC analyst role within a security operations team and knowledge of cloud security challenges will also be beneficial. At Notified, we value diversity and are committed to providing equal opportunities for all. This role is based out of The Leela Office in Bangalore, with a hybrid work schedule that allows flexibility in your working arrangements. By joining our team, you will have the opportunity to work in an international environment, foster innovation and creativity, and benefit from comprehensive health insurance and extensive learning opportunities. Your contributions will help us amplify stories globally and support our clients in reaching their audiences effectively.,

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies