Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
10.0 - 12.0 years
15 - 18 Lacs
Hyderabad
Hybrid
The Role: The Senior Information Security Engineer is for responsible for implementing industry best security practices, will design, implement, maintain, and document the security measures to protect the organization against cyber threats and attend all ISO audits and requirements. Your Responsibilities: Ensuring that an ISMS system is established, implemented, and maintained in accordance with the ISO 27001:2013 and/or ISO 27001:2022. Lead all ISO and customer security audits/meetings and compliance activity. Contributing to Request for Proposal (RFPs) and supporting IT in CAPA management and Change Controls. Conducting regular internal security audits (Quarterly basis) to assess the effectiveness of security controls and identify areas for improvement. IT tickets handling related to security related incidents. Security Incident Reporting - Generating and presenting regular reports on the organization's security posture(weekly/quarterly/annual), including incidents, vulnerabilities, and risk mitigation efforts. Organization wide Security Awareness - Contributing to and developing security awareness by way of email leaflet/posters on monthly basis and training materials to improve security posture among the organization's staff. Security Policies and Procedures - Developing and implementing security policies, standards, and procedures to safeguard the organization's information assets. Review process documentation to ensure adequacy and consistency is maintained. Risk Assessment - Contribute to the team on regular assessments to identify potential security risks and vulnerabilities in the organization's IT infrastructure. Vulnerability Management - Monitoring and managing vulnerabilities in the organization's systems, including applying patches and updates in a timely manner. Running and automation of vulnerability scans and responsible for closure. Penetration Testing - Gathering penetration test requirements and performing internal pen tests on a scheduled basis. Should be adaptable for 24x7x365 availability for new security related projects/tasks. Preferred Qualifications, Training and Experience: Engineering degree in Computer Science, Information Technology, or a related field. Certifications such as CISSP, CISA/CISM, CEH and ISO 27001 demonstrating expertise in information security management and practices. Minimum of 10 years’ experience in information security roles, with a focus on security architecture, ISO Audits, incident response, and risk management. In-depth knowledge of security technologies such as firewalls, intrusion detection/prevention systems, encryption, and endpoint security solutions. Proficiency in security monitoring tools and techniques for detecting and responding to security incidents in real-time.
Posted 1 month ago
6.0 - 9.0 years
8 - 10 Lacs
Chennai
Work from Office
We Have opening on both L2/L3 SOC Analyst Experienced SOC L3 Analyst is needed to expand our group. You will oversee managing and resolving complicated cybersecurity events that have been escalated from L1 and L2 Analysts as an L3 Analyst. To find the underlying cause of security events and offer suggestions for correction, you will be expected to conduct extensive investigations and forensic analyses. Key Responsibilities for this job: Represent the highest level of escalation for cybersecurity issues. To identify the underlying causes of occurrences, carry out comprehensive investigations and forensic analysis. Provide remediation advice and collaborate with L1 and L2 analysts to implement it into practice. Create and maintain playbooks and incident response plans. Conduct penetration tests and vulnerability assessments. Analyze and evaluate the organization's cybersecurity threats. Take part in security audits and assessments. Create and uphold security standards, rules, and procedures. Instruct and guide young analysts in incident response best practices. Knowledge and experience required: Bachelor's degree in computer science, Cybersecurity, or a related field. 5+ years of experience in a SOC environment, with a focus on incident response and forensic analysis. Strong knowledge of cybersecurity frameworks, such as NIST and ISO. Experience working with security tools such as SIEM, IDS/IPS, endpoint detection and response, and firewalls. Excellent analytical and problem-solving skills. Strong communication and collaboration skills. Relevant certifications, such as CISSP, GCIA, GCIH, and/or CISA are highly preferred. Preferred Tool: Rapid7, LogRhythm, Sentinel, Fortinet SOAR, etc Shift flexibility, including weekends and holidays (24*7) Jumping on the call with Vendors and other teams to discuss issues with partners/ to get their requirements and deliver the same in the form of projects Tuning of rules, filters, and policies for detection-related security technologies to improve accuracy and visibility. Providing weekly/monthly reports to the Upper Management.
Posted 1 month ago
7.0 - 12.0 years
5 - 15 Lacs
Kottayam, Pune, Thiruvananthapuram
Hybrid
Security Specialist, Incident Response Responsibilities includes • Lead security incident response in a cross-functional environment and drive incident resolution. • Lead and develop Incident Response initiatives that improve Allianz capabilities to effectively respond and remediate security incidents. • Perform digital forensic investigations and analysis of a wide variety of assets including endpoints. • Perform log analysis from a variety of sources to identify potential threats. • Build automation for response and remediation of malicious activity. • Write complex search queries in the EDR as well as SIEM tools for hunting the adversaries. • Works on SOAR cases, automation, workflow & Playbooks. • Integrating and working on Identity solutions. • Developing SIEM use cases for new detections specifically on identity use cases. Minimum Qualifications: • 5-10 years of experience in Security Incident Response, Investigations • Working experience in Microsoft On-prem and Entra ID solutions • Good knowledge in Active Directories and Tier 0 concepts • Very good knowledge of operating systems, processes, registries, file systems, and memory structures and experience in host and memory forensics (including live response) on Windows, macOS and Linux. • Experience investigating and responding to both external and insider threats. • Experience with attacker tactics, techniques, and procedures (MITRE ATT&CK) • Experience analyzing network and host-based security events
Posted 1 month ago
2.0 - 6.0 years
8 - 9 Lacs
Mumbai
Work from Office
Diverse Lynx is looking for SOC Analyst to join our dynamic team and embark on a rewarding career journey. Monitor and analyze security events and incidents, identifying and investigating potential threats Maintain the security of our network and systems by implementing security controls and best practices Work closely with the rest of the security team to ensure that our systems and networks are secure and compliant with industry standards Maintain accurate documentation and reports on security events and incidents Communicate effectively with team members and other stakeholders to ensure that security issues are addressed in a timely and effective manner Stay up to date with the latest security technologies and threats
Posted 1 month ago
4.0 - 9.0 years
9 - 13 Lacs
Bengaluru
Work from Office
Diverse Lynx is looking for SOC Lead to join our dynamic team and embark on a rewarding career journey. Lead the SOC team and manage the organization's security operations Ensure that the SOC is staffed with skilled analysts and that the SOC team is executing their tasks efficiently and effectively Monitor and respond to security events and alerts to detect potential security incidents Manage security incidents and provide guidance on remediation Develop and maintain incident response plans and playbooks Collaborate with cross-functional teams to ensure security technologies, policies, and procedures align with business needs Develop and maintain security policies, standards, and procedures Conduct security awareness training for employees and contractors Experience with security information and event management (SIEM) tools such as Splunk or QRadar Excellent problem-solving and analytical skills Strong communication and interpersonal skills
Posted 1 month ago
15.0 - 24.0 years
0 - 0 Lacs
Vadodara
Work from Office
Job Title: Deputy Director (System Support Cell) Position Overview: We are seeking an experienced IT Infrastructure & Security Leader with a robust background in strategic planning, risk management, and project execution to lead the organization's cybersecurity and IT infrastructure efforts. This role will be responsible for driving organizational security, enhancing operational efficiency, and ensuring the protection of critical business assets through effective leadership, planning, and policy development. Key Responsibilities: 1. Security Leadership & Strategic Planning: - Develop and implement cybersecurity policies, risk mitigation strategies, and incident response plans to protect business assets. - Align IT and security strategies with organizational goals, ensuring technology supports business objectives. - Create long-term roadmaps for IT infrastructure and security enhancements, identifying emerging technologies for scalability, performance, and security. - Deliverables: Comprehensive IT and Security Strategy Document, IT and Security Roadmap for growth and innovation. 2. IT Infrastructure & Operations Management: - Oversee daily IT and security operations, ensuring systems run efficiently and securely. - Lead and mentor staff to foster teamwork, innovation, and professional growth. - Manage IT and security budgets, optimizing resource allocation without compromising quality. - Deliverables: Monthly Operations Performance Reports, Staff Training Programs, Annual Budget Proposals, and Quarterly Expenditure Reports. 3. Policy Development & Compliance: - Create and enforce policies for data protection, secure access, and operational efficiency while ensuring compliance with regulations like GDPR, HIPAA, and industry standards. - Regularly review and update policies to adapt to evolving threats and technologies. - Deliverables: Comprehensive Policy Handbook, Compliance and Policy Review Reports. 4. Risk Management & Compliance: - Identify and mitigate IT and security risks, conducting risk assessments and implementing frameworks like NIST or ISO 27001. - Ensure compliance with legal and regulatory requirements. - Deliverables: Risk Assessment and Mitigation Plans, Audit Reports for compliance and risk evaluations. 5. Project Management: - Plan and execute IT and security projects, including infrastructure upgrades, security implementations, and process improvements, coordinating with stakeholders to meet timelines, budgets, and objectives. - Deliverables: Project Plans, Post-Project Reports evaluating success and lessons learned. 6. Incident Detection, Response & Recovery: - Develop and implement an Incident Response Plan (IRP) to detect, respond to, and recover from security breaches. - Lead cyber incident investigations and implement remediation measures to prevent future risks. - Deliverables: Tested Incident Response and Recovery Plans, Post-Incident Analysis Reports. 7. Technical Support & Services: - Oversee technical support efforts, ensuring reliable IT services, addressing escalated technical issues, and optimizing system performance. - Deliverables: Help Desk Metrics, troubleshooting processes, and user guides. 8. Communication & Liaison: - Act as a bridge between IT, security, and other departments to ensure alignment with organizational goals. - Communicate IT and security performance, challenges, and opportunities to senior management. - Deliverables: Periodic Performance Reports, meeting summaries with actionable recommendations. 9. Innovation & Technology Adoption: - Identify and integrate emerging technologies to improve productivity, scalability, and security. - Continuously evaluate and enhance IT and security systems to ensure resilience and innovation. - Deliverables: Feasibility studies for New Technologies, Continuous Improvement Plans. 10. Network Architecture & Performance Monitoring: - Design secure and scalable networks supporting availability, performance, and security, including network components like switches, firewalls, and load balancers. - Implement cloud and hybrid infrastructures for scalability and flexibility, monitoring network performance and optimizing reliability. - Deliverables: Network Architecture Diagrams, Scalability and Optimization Plans, Performance Metrics Reports. 11. Security Technologies & Monitoring: - Deploy and manage security tools (e.g., firewalls, SIEM tools, IDS/IPS) to safeguard against threats. - Utilize monitoring tools for traffic analysis, threat detection, and compliance. - Deliverables: Security Toolset for continuous monitoring, Analytics-based threat reports. 12. Team Training & Mentorship: - Provide training and mentorship to IT and security staff, promoting technical expertise and leadership development. - Deliverables: Training programs and mentoring initiatives for team growth. Qualifications & Experience: - 15+ years of leadership experience in IT infrastructure and cybersecurity. - Bachelors degree in a relevant field. - Certifications Preferred CISSP, CISM, CCNP Security, MCSE, CEH. - Extensive knowledge of virtualization, backup solutions, SAN storage, and security tools. - Proven expertise in network architecture, IT governance, disaster recovery, and business continuity planning. - Strong analytical, problem-solving, and communication skills to drive innovation, resilience, and business continuity. Core Competencies: - Strategic thinking and leadership in IT and security. - Expertise in risk management, compliance, and incident response. - Ability to drive technological innovation and improvement. - Excellent team management, mentorship, and communication skills. This position offers a unique opportunity to lead a dynamic IT and security environment while directly influencing the organization’s overall business objectives. If you have a strong track record in both IT infrastructure management and cybersecurity, this role offers the chance to make a significant impact on both operational efficiency and security resilience. Job applications are accepted till 05-March-2025, interested candidates can send their most updated resumes on preetesh.ranjan32970@paruluniversity.ac.in
Posted 1 month ago
9.0 - 14.0 years
40 - 50 Lacs
Bengaluru
Remote
Principal Engineer, Security Operations The Principal Engineer, Security Operations at Vimeo will play a pivotal role in leading and implementing security strategies and initiatives designed to protect our vast user base of over 300 million users and their valuable content. This role requires close collaboration with multiple teams across the organization, including Development, DevOps, Infrastructure Security, Compliance, IT, and Product, to ensure a holistic and effective security posture. You will be at the forefront of safeguarding sensitive user data and critical systems from a constantly evolving threat landscape. This includes proactively identifying and addressing vulnerabilities, implementing industry-standard security best practices, and driving the automation of security processes to enhance efficiency and scalability. Additionally, you will participate in incident response activities, conducting thorough investigations and implementing corrective actions to minimize the impact of security breaches. The ideal candidate for this position is a highly motivated and skilled security professional with a proven ability to solve complex problems and work effectively in a team environment. You should have a strong understanding of security principles and technologies, as well as a passion for staying ahead of emerging threats. Excellent communication and interpersonal skills are also essential, as you will need to clearly articulate security risks and recommendations to both technical and non-technical stakeholders. This role is remote and should be expected to overlap with US (EST) Business hours.. What you'll do: Incident Response Act as the primary point of contact for security incidents detected by the MDR solution. Analyze and triage alerts generated by the MDR platform, prioritizing based on severity and potential impact. Coordinate and manage the incident response process, working closely with the MDR provider and internal teams. Escalate incidents to appropriate internal teams or external parties as needed, following established procedures. Develop and maintain incident response playbooks specific to MDR-related incidents. Track and report on incident response metrics, including detection time, containment time, and resolution time. Collaborate with the MDR provider to optimize detection rules and improve the overall effectiveness of the solution. Security Engineering Conduct security assessments of our systems and infrastructure to identify vulnerabilities and risks, identify risk owners and implement mitigating controls. Implement and maintain security controls, including access controls, Zero trust network access (ZTNA), network segmentation, and security monitoring tools. Design and operate identity management, lifecycle, governance and SSO. Implement and operate cloud security hardening and cloud security posture management across Google cloud and AWS. Develop and maintain security policies and procedures, and ensure compliance with industry and regulatory standards. Collaborate with SRE, AppSec and Information technology around vulnerability management, endpoint hardening, detection and response. Participate in incident response activities, including investigating security incidents and responding to security alerts. Collaborate with development and DevOps teams to implement security best practices throughout the software development and infrastructure lifecycle. Automate security processes using scripting and other automation tools. Stay up-to-date with the latest security threats, vulnerabilities, and technologies. Collaboration with the compliance and privacy team help ensure that our company complies with industry best practices and standards Process improvements help strengthen our own internal processes and procedures. Skills and knowledge you should possess: 4+ years of experience in a security or operations role, preferably in a cloud-based Linux environment. 2+ years experience with container and container orchestration systems Bachelor's degree in Computer Science, Information Technology, or a related field, or equivalent work experience. Strong knowledge of security best practices and industry standards, such as NIST, CIS, and ISO. Relevant certifications such as CISSP, CCSP, GCP, or AWS Certified Security Specialty are a plus. Experience with security tools such as IDS/IPS, SIEM, vulnerability scanners, and endpoint protection. Experience with automation tools such as Terraform, Ansible, or Chef. Strong scripting skills using Python, shell, or other scripting languages. Excellent problem-solving skills and the ability to work well under pressure. Good communication and interpersonal skills.Confident working in and across cloud environments like AWS and GCP. Detailed knowledge of at least one cloud environment. Confident with common SDLC components, like git, Jira, Jenkins, etc At least an upper-intermediate level of English Bonus points (nice skills to have, but not needed): Familiarity with common security tools and technologies, such as SIEM, EDR, and threat intelligence platforms. Experience implementing zero trust network access such as Z-Scaler, Warp, Google beyondCorp etc. Experience implementing identity lifecycle including provisioning, quarterly access reviews, role management and deprovisioning. Understanding of FIDO2 and machine certificate authentication flowsExperience with Crowdstrike and WizExperience with system security hardening guidelines and SDLC principlesExperience with implementing Fedramp and/or HIPAA.
Posted 1 month ago
9.0 - 14.0 years
10 - 20 Lacs
Nashik, Pune, Bengaluru
Work from Office
Job Title: Threat Intelligence Analyst Corporate Title: AVP Location: Pune, India Role Description As a Threat Intelligence AVP in the Threat Intelligence and Assessment function, you will play a critical role in safeguarding the organization from cyber threats. In this role, you will be responsible for identifying, assessing, and mitigating threats, you will provide mitigation recommendations in response to evolving threats. You will be required to analyse complex technical issues and develop bank specific solutions while collaborating with diverse teams and stakeholders. This role will also consist of delivering against projects and strategic initiatives to continuously enhance the banks capabilities in responding to threats. What we’ll offer you As part of our flexible scheme, here are just some of the benefits that you’ll enjoy, Best in class leave policy. Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Pro-actively identify threats and track threat actors, TTPs, and ongoing campaigns to produce timely actionable intelligence. Produce threat assessments to support threat mitigation activities. Analyse multiple data/intelligence sources and sets to identify patterns of activity that could be attributed to threats and develop informed recommendations. Conduct analysis on files/binaries, packet captures, and supporting materials to extract relevant artifacts, observables, and IOCs. Proactively drive improvements of internal processes, procedures, and workflows. Participate in the testing and integration of new security monitoring tools. Meet strict deadlines to deliver high quality reports on threats, findings, and broader technical analysis. Take ownership for personal career development and management, seeking opportunities to develop personal capability and improve performance contribution. Develop and maintain relationships with internal stakeholders, external intelligence sharing communities. Your skills and experience Requirements 5+ years of experience in cybersecurity, with a focus on threat intelligence, analysis, and mitigation Strong operational background in intelligence related operations with experience in Open-Source Intelligence (OSINT) techniques Operational understanding of computing/networking (OSI Model or TCP/IP). Knowledge on the functions of security technologies such as IPS/IDS, Firewalls, EDR, etc A good or developing understanding of virtual environments and cloud (e.g., VSphere, Hypervisor, AWS, Azure, GCP) Demonstrated knowledge and keen interest in tracking prominent cyber threat actor groups, campaigns and TTPs in line with industry standards Knowledge of or demonstratable experience in working with intelligence lifecycle, intelligence requirements and Mitre ATT&CK Framework Non-Technical Experience Investigative and analytical problem solving skills Excellent verbal and written communication; to both technical and non-technical audiences. Self-motivated with ability to work with minimal supervision. Education and Certifications Preferred - Degree in computer science, networking, engineering, or other field associated with cyber, intelligence or analysis. Desired Experience or Certifications CISSP, CISM, GIAC, GCTI, GCIH, GCFE, GCFA, GREM, GNFA, Security+, CEH How we’ll support you Training and development to help you excel in your career. Coaching and support from experts in your team. A culture of continuous learning to aid progression. A range of flexible benefits that you can tailor to suit your needs. About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htmRole & responsibilities Preferred candidate profile
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Security Incident Response. Experience5-8 Years.
Posted 1 month ago
3.0 - 7.0 years
2 - 6 Lacs
Bengaluru
Work from Office
Drive projects and initiatives to improve and expand existing DLP platform capabilities. Implement and manage DLP solutions, including data labeling technologies. Work directly with stakeholders to define requirements and develop security solutions. Ensure the security of endpoint devices, including data protection and behavior analysis. Deploy and manage endpoint DLP solutions, such as those offered by Proofpoint. Manage email security policies and configurations, including DLP for email. Detect and prevent data loss through email channels, such as by identifying sensitive content and usebehavior. Gain deep knowledge of the Proofpoint platform, including its various modules (e.g., Endpoint DLP, Email DLP) Be proficient in using the Proofpoint console to manage alerts, investigate incidents, and analyze user behavior. Primary Skills DLP Endpoint Security Email Security Secondary Skills Data Labeling Behavior Analysis Incident Response
Posted 1 month ago
4.0 - 8.0 years
12 - 18 Lacs
Hyderabad
Work from Office
Exp. in a SOC, incident detection and response,SIEM platform and EDR. understanding of networking principles, TCP/IP, WANs, LANs, and Internet protocols (SMTP, HTTP, FTP, POP, LDAP). cloud security concepts & platforms (e.g., AWS, Azure, GCP).
Posted 1 month ago
15.0 - 25.0 years
15 - 25 Lacs
Gurugram
Work from Office
JLL empowers you to shape a brighter way . Our people at JLL and JLL Technologies are shaping the future of real estate for a better world by combining world class services, advisory and technology for our clients. We are committed to hiring the best, most talented people and empowering them to thrive, grow meaningful careers and to find a place where they belong. Whether you’ve got deep experience in commercial real estate, skilled trades or technology, or you’re looking to apply your relevant experience to a new industry, join our team as we help shape a brighter way forward. Key Responsibilities of India Labor Compliance Head: Critical Tasks: 1. Timely Compliance Assurance: Regulatory ComplianceEnsure strict adherence to all applicable labor and employment laws, encompassing wages, working hours, overtime, leave policies, and worker safety. Policy Development and ImplementationFormulate, update, and execute company policies in alignment with current labor laws and industry best practices. Statutory FilingsOversee timely submission of all required statutory filings, including provident fund contributions, professional tax, and other mandatory payments. License and Registration ManagementDiligently track and renew all necessary licenses and registrations for the companys real estate operations. Audit PreparednessConduct comprehensive internal audits to identify and address compliance gaps, ensuring readiness for external regulatory audits. Employee Grievance ResolutionEstablish and manage an efficient system for addressing employee grievances in compliance with labor laws. Training and AwarenessOrganize and facilitate regular training sessions on labor laws, company policies, and compliance requirements for staff. ReportingPrepare and present detailed compliance reports to management, highlighting areas of concern and potential improvements. Stay UpdatedContinuously monitor and adapt to changes in labor and employment laws, ensuring prompt implementation of new regulations. Contractor and Vendor ComplianceEnsure all contractors and vendors engaged by the company adhere to relevant labor laws and regulations. Health and Safety ComplianceOversee the implementation of robust health and safety measures in accordance with occupational health and safety regulations. Team ManagementLead and manage a team of Compliance Officers responsible for administering the compliance program. 2. Legal Notice Management: Notice Reception and TrackingImplement and maintain an efficient system for receiving, logging, and tracking all incoming legal notices related to labor and employment matters. Timely ResponseEnsure prompt responses to all legal notices within stipulated timeframes to avoid default judgments or penalties. Legal AnalysisConduct thorough preliminary analysis of each legal notice to determine validity, potential impact, and appropriate course of action. CoordinationLiaise effectively with internal stakeholders, consultants, and the internal litigation team to ensure timely compliance with notices. 3. Compliance Tracker Oversight: Tracker Development and MaintenanceOversee the compliance tracker covering all relevant laws, regulations, and internal policies received from respective consultants. ManagementEnsure accurate recording of all compliance deadlines in the tracker, with reminders set for upcoming due dates and follow-ups. Responsibility AssignmentClearly delegate compliance task responsibilities to specific individuals or departments within the organization and to consultants. Reporting and AnalyticsGenerate comprehensive reports from the tracker, providing insights on compliance status, trends, and potential areas of concern. Escalation ProcessEstablish and manage an effective escalation process for high-risk or overdue compliance issues flagged in the tracker. 4. Document Repository Maintenance: Ensure adherence to the current Legal Repository process within the L&E function, maintaining access to online and original documents (statutory documents, licenses, registration certificates, etc.). 5. Consultant & Cross-Functional Liaison and Coordination: Serve as the Single Point of Contact (SPOC) for all L&E compliance-related tasks, coordinating effectively with consultants and cross-functional teams. Regular Tasks: 6. Internal Stakeholder Advisory: Provide expert guidance on policy interpretation, risk assessment and mitigation, HR support, policy development, compliance program design, regulatory updates, audit support, incident response, and compliance reporting. 7. Compliance Tool Administration: Monitor all requisite compliances on the PWC tool as per individual task timelines, serving as a Checker and providing analysis and reports to management as required. 8. Miscellaneous Tasks: Oversee financial operations (provisioning & invoicing) and internal tools management. 9. Average Number of Annual Tasks: Reports filed with labor authorities950 Statutory remittances600 Registrations/licenses350 Remittances pertaining to PDS120 Labor authority assessments (PDS)15 Compliance monthly audit reports3,000 Inspections200 We are seeking a highly qualified professional with the following credentials LLB specializing in Labor Laws Company Secretary certification with extensive experience in Labor laws Master’s degree in social work, PMIR, or MBA with a focus on Labor & Compliance management from a prestigious Indian institute The ideal candidate will possess a minimum of 15 years of post-qualification experience in Labor & Compliance management. This experience should demonstrate expertise in vendor management and client/employee grievance resolution. The successful applicant will play a crucial role in ensuring regulatory compliance and fostering positive labor relations within our organization. The successful candidate will be responsible for leading a team of Compliance officers and facilitating seamless coordination across various departments and business lines. Strong communication skills are essential, including fluency in spoken and written English, as well as proficiency in multiple Indian languages, to effectively navigate our diverse corporate environment. Location On-site –Bengaluru, KA, Gurugram, HR Scheduled Weekly Hours: 40 If this job description resonates with you, we encourage you to apply even if you don’t meet all of the requirements. We’re interested in getting to know you and what you bring to the table! JLL Privacy Notice Jones Lang LaSalle (JLL), together with its subsidiaries and affiliates, is a leading global provider of real estate and investment management services. We take our responsibility to protect the personal information provided to us seriously. Generally the personal information we collect from you are for the purposes of processing in connection with JLL’s recruitment process. We endeavour to keep your personal information secure with appropriate level of security and keep for as long as we need it for legitimate business or legal reasons. We will then delete it safely and securely. Candidate Privacy Statement . For candidates in the United States, please see a full copy of our Equal Employment Opportunity and Affirmative Action policy here. Jones Lang LaSalle (“JLL”) is an Equal Opportunity Employer and is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process – including the online application and/or overall selection process – you may contact us at Accommodation Requests . This email is only to request an accommodation. Please direct any other general recruiting inquiries to our Contact Us page I want to work for JLL.
Posted 1 month ago
10.0 - 15.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Youll make a difference by As a Cybersecurity Engineer Metro you will be responsible for the following: Cybersecurity Strategy Development: Develop and implement cybersecurity strategies specifically for rolling stock, ensuring alignment with overall metro rail security objectives for SMO RS India Evaluate and recommend security technologies and processes to safeguard train control systems, onboard communication systems, and other critical infrastructure. Rolling Stock Cybersecurity Management: Oversee the cybersecurity of all rolling stock systems, including train control systems, signaling, onboard diagnostics, and passenger information systems. Conduct regular security assessments of rolling stock software, hardware, and communication protocols to identify vulnerabilities. Collaborate with engineering teams to integrate cybersecurity measures into the design and maintenance of rolling stock. Incident Response and Management: Develop and implement incident response plans specific to rolling stock cybersecurity incidents. Lead investigations and coordinate responses to cybersecurity incidents affecting rolling stock, ensuring minimal disruption to rail operations. Work with operations and maintenance teams to implement corrective actions and prevent future incidents. Compliance and Risk Management: Ensure that all rolling stock cybersecurity measures comply with relevant industry standards, regulations, and best practices, such as IEC 62443 and CENELEC EN 50126/50128/50129. Conduct risk assessments related to rolling stock cybersecurity, identifying and mitigating potential threats to safety and service continuity. Vendor and Stakeholder Management: Collaborate with rolling stock manufacturers, suppliers, and service providers to ensure that cybersecurity requirements are met throughout the supply chain. Serve as the primary point of contact for cybersecurity issues related to rolling stock, liaising with internal teams and external stakeholders. Policy and Procedure Development: Develop and enforce cybersecurity policies and procedures for rolling stock, including guidelines for software updates, data protection, and secure communications. Ensure that all relevant personnel are trained and aware of cybersecurity policies, particularly those involved in the operation and maintenance of rolling stock. Training and Awareness: Lead cybersecurity training initiatives focused on rolling stock systems for relevant staff, including engineers, operators, and maintenance personnel. Promote a culture of cybersecurity awareness within the rolling stock domain, ensuring that all employees understand the importance of protecting critical systems. Desired Skills: Education: Bachelors degree in computer science, Cybersecurity, Electrical Engineering, or a related field. Basic knowledge in requirements engineering is a prerequisite. Experience: 10+ years of experience in cybersecurity, with at least 2-3 years in the rail transportation or industrial control systems (ICS) sector. Proven experience in securing control systems and communication networks, preferably within the rolling stock or rail industry. Certifications: Relevant certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), GICSP (Global Industrial Cyber Security Professional), or CISA (Certified Information Systems Auditor) Skills: In-depth understanding of cybersecurity principles as they apply to industrial control systems and rolling stock. Proficient in cybersecurity tools and technologies relevant to the transportation sector, including network security, endpoint protection, and intrusion detection systems. Strong leadership and communication skills, with the ability to manage cross-functional teams and interact with technical and non-technical stakeholders. Ability to work under pressure and manage multiple priorities in a safety-critical environment. Work Environment: Primarily office-based, with frequent visits to rail depots, control centers, and onboard rolling stock. May require availability outside regular working hours for emergency response and coordination. This role is based in Bangalore. You might be required to visit other locations within India and outside. In return, you'll get the chance to work with teams impacting - and the shape of things to come.
Posted 1 month ago
1 - 3 years
5 - 6 Lacs
Kolkata
Work from Office
The role involves monitoring security threats, responding to emergencies, and communicating critical incidents to stakeholders while ensuring high customer service standards. A proactive, detail-oriented professional who can work under pressure Required Candidate profile Fluent English (verbal/written) with international voice support experience (US/UK/AU accents). Proven incident management skills in a BPO/SOC/security operations setting. Strong customer service
Posted 1 month ago
3 - 8 years
5 - 10 Lacs
Hyderabad
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Your typical day will involve utilizing your expertise in SailPoint IdentityIQ and other security tools to ensure the security of our organization's systems and data. You will collaborate with cross-functional teams to identify and mitigate security risks, implement security measures, and respond to security incidents. Roles & Responsibilities: Expected to perform independently and become an SME. Required active participation/contribution in team discussions. Contribute in providing solutions to work related problems. Collaborate with cross-functional teams to identify and mitigate security risks. Implement security measures to protect enterprise systems, applications, and data. Utilize SailPoint IdentityIQ and other security tools to ensure the security of systems and data. Respond to security incidents and conduct investigations to determine the root cause. Stay updated with the latest security threats and vulnerabilities to proactively address them. Assist in the development and implementation of security policies and procedures. Provide guidance and support to other team members on security best practices. Professional & Technical Skills: Must To Have Skills:Proficiency in SailPoint IdentityIQ. Strong understanding of security principles, concepts, and best practices. Experience in designing and implementing security solutions. Knowledge of network security protocols and technologies. Familiarity with security frameworks and compliance standards. Good To Have Skills:Experience with security incident response and forensic analysis. Recommendation:Familiarity with other identity and access management (IAM) tools. Additional Information: The candidate should have a minimum of 3 years of experience in SailPoint IdentityIQ. This position is based at our Hyderabad office. A 15 years full time education is required. Qualifications 15 years full time education
Posted 1 month ago
7 - 12 years
9 - 14 Lacs
Coimbatore
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Your typical day will involve designing and implementing security solutions, collaborating with cross-functional teams, and ensuring the integrity and confidentiality of data. Roles & Responsibilities: Expected to be an SME, collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Design and implement security solutions to protect the organization's cloud infrastructure. Collaborate with cross-functional teams to ensure the integrity and confidentiality of data. Conduct risk assessments and develop strategies to mitigate security risks. Stay up-to-date with the latest security trends and technologies. Ensure compliance with industry standards and regulations. Train and educate employees on security best practices. Professional & Technical Skills: Must To Have Skills:Proficiency in Security Architecture Design. Strong understanding of cloud security principles and best practices. Experience with cloud security technologies and tools. Knowledge of network security protocols and technologies. Familiarity with security frameworks and standards such as ISO 27001 and NIST. Good To Have Skills:Experience with cloud platforms such as AWS or Azure. Experience with security incident response and management. Knowledge of threat intelligence and vulnerability management. Understanding of identity and access management concepts. Solid grasp of encryption and cryptographic techniques. Additional Information: The candidate should have a minimum of 7.5 years of experience in Security Architecture Design. This position is based at our Mumbai office. A 15 years full time education is required. Qualifications 15 years full time education
Posted 1 month ago
5 - 10 years
7 - 17 Lacs
Gurugram, Bengaluru, Mumbai (All Areas)
Work from Office
Role & responsibilities JD: This position is for a core team member at best a Technical Lead” NOT “Soc Manager” to supplement the firm’s growing cyber security monitoring function, starting from 5 to max 10yrs of experience having hands on L3/Engineering level work in most recent projects. The candidate will join a team currently responsible for: Providing first level response for security events including but not limited to intrusion detection, malware infections, denial of service attacks, privileged account misuse and network breaches. The event management includes triage, correlation and enrichment of individual events to either rule out as false positive, trigger standard detective and corrective responses, or escalating as a security incident. Improving the service level for security operations and monitoring. Creating and maintaining system documentation for security event processing. Expand the usage of security monitoring tools to improve the security of the environment based on business use cases or changes in threat landscape, root causes from security incident response, or output from security analytics Monitoring the Security Information and Event Management (SIEM) platform for security alerts. Providing metrics and reports around security monitoring by designing dashboards for asset owners and management consumption. Leveraging existing technologies within the organization to expand the scope of coverage of the security monitoring service. Provide technical and thought leadership within SOC by: o Teaching other SOC Analysts about both traditional and unconventional ways to detect, analyze, and mitigate security incidents and other anomalies o Regularly recommending new SOC practices and approaches to address program and process improvement Performs analysis duties, including: o Review of available logs to confirm there are adequate quantities and content to usefully provide Security Monitoring o Triage SIEM alerts to determine False Positive, Incident, or Technology Misconfiguration o Perform research at the request of Incident Response teams Perform case management activities to ensure successful BAU Security Monitoring Operations, including: o Documenting case activities in the system of record o Documenting current case notes sufficient for effective shift handover, as well as reviewing current status via teams, email or phone call o Engaging in all forms of communications (e.g. phone calls, instant-messaging, web page updates) to ensure cases are efficiently investigated by all approved parties, regardless of what company, department, or team to which they are a member Author Standard Operating Procedures (SOPs), such as: o Incident detection “use case” needs, logic, and implementation methods o “use case” alert triage workflows o Training documentation o Recommending, then implementing approved program improvements Reviews and analyzes complex data and information to provide insights, conclusions and actionable recommendations. Provides direction and guidance on reports and analyses and ensures recommendations are aligned with customer/business needs and capabilities. Ensures that all significant security concerns are addressed. Recommends course of action to mitigate risk and ensures that appropriate standards are established and published.
Posted 1 month ago
3 - 6 years
9 - 13 Lacs
Mumbai
Work from Office
Senior Cyber Security Analyst - IND005A Company Worley Primary Location IND-MM-Mumbai Other Locations IND-KR-Bangalore, IND-AP-Hyderabad, IND-MM-Pune, IND-MM-Navi Mumbai Job Cyber Security Schedule Full-time Employment Type Employee Job Level Experienced Job Posting Apr 21, 2025 Unposting Date May 21, 2025 Reporting Manager Title Manager We deliver the worlds most complex projects Work as part of a collaborative and inclusive team Enjoy a varied & challenging role Building on our past. Ready for the future Worley is a global professional services company of energy, chemicals and resources experts headquartered in Australia. Right now, were bridging two worlds as we accelerate to more sustainable energy sources, while helping our customers provide the energy, chemicals and resources that society needs now. We partner with our customers to deliver projects and create value over the life of their portfolio of assets. We solve complex problems by finding integrated data-centric solutions from the first stages of consulting and engineering to installation and commissioning, to the last stages of decommissioning and remediation. Join us and help drive innovation and sustainability in our projects. The Role As a Senior Cyber Security Analyst with Worley, you will work closely with our existing team to deliver projects for our clients while continuing to develop your skills and experience etc. We are seeking a Senior Cyber Security Analyst -a Subject Matter Expert (SME)- to join our Information Security team. The ideal candidate will be responsible for designing, implementing, monitoring, reacting, and reporting on information security events within the DLP scope. Additionally, the role includes managing security tools and IT systems with a special focus on DLP enablement. DLP Strategy & Policy Design Serve as a Subject Matter Expert (SME)for DLP solutions, technologies, and best practices. Design, implement, and optimize DLP policiesto detect and prevent unauthorized access, sharing, and data exfiltration. Define and maintain DLP governance frameworks, aligning with regulatory requirements Identify sensitive data requiring protection across endpoints, cloud, email, and network. Implementation & Configuration Deploy and configure DLP controlsto monitor, alert, and block potential data leaks. Define and enforce DLP rules for structured & unstructured data, including Personally Identifiable Information (PII), Intellectual Property (IP), and financial data. Integrate DLP solutions with other security tools. Monitoring& Continuous Improvement Monitor and analyzeDLP alerts and incidents, identifying trends and areas for improvement. Ensuring DLP alerts and incidentsget routed to monitoring/response processes in accordance with defined internal procedures Perform regular tuning and updatesto enhance detection accuracy and reduce false positives. Develop automated response actionsto mitigate risks and ensure business continuity. Compliance & Stakeholder Collaboration Ensure compliance with data protection regulations and industry security standards. Collaborate with cross-functional teams to resolve complex technical issues and to align DLP policies with business needs. Provide guidance and training to employees on DLP policies, security best practices, and insider threat awareness. Reporting & Documentation: Define and generate DLP metric supporting the reporting needs across the organization Document DLP configurations, policies, and operational procedures. Provide technical recommendationsto enhance data security strategies. About You To be considered for this role it is envisaged you will possess the following attributes: Ability to balance security measures with business needs A proactive approach to identifying and mitigating data loss risks before they become security incidents Proven experience with DLP solutions (e.g., Microsoft Purview, Symantec, Forcepoint, McAfee/Trellix, Digital Guardian, Zscaler). Strong knowledge of DLP policies, rules, content inspection techniques, and data classification models. Experience working with cloud-based DLP (e.g., CASB, SaaS security, O365 DLP, Google Workspace DLP) Understanding of network security, endpoint security, and encryption techniques. Familiarity with SIEM, SOC workflows, and incident response processes. Moving forward together We want our people to be energized and empowered to drive sustainable impact. So, our focus is on a values-inspired culture that unlocks brilliance through belonging, connection and innovation. Were building a diverse, inclusive and respectful workplace. Creating a space where everyone feels they belong, can be themselves, and are heard. And we're not just talking about it; we're doing it. We're reskilling our people, leveraging transferable skills, and supporting the transition of our workforce to become experts in today's low carbon energy infrastructure and technology. Whatever your ambition, theres a path for you here. And theres no barrier to your potential career success. Join us to broaden your horizons, explore diverse opportunities, and be part of delivering sustainable change. Worley takes personal data protection seriously and respects EU and local data protection laws. You can read our full Recruitment Privacy Notice Please noteIf you are being represented by a recruitment agency you will not be considered, to be considered you will need to apply directly to Worley.
Posted 1 month ago
7 - 12 years
8 - 18 Lacs
Hyderabad, Bengaluru, Mumbai (All Areas)
Hybrid
Role & responsibilities Core Responsibilities Monitor security dashboards and alerts to identify potential threats. Respond to security incidents by following established response plans. Conduct threat hunting to proactively identify vulnerabilities and potential threats. Collaborate with other departments, such as network engineering and incident response teams, for coordinated threat response. Analyze security incidents and document findings to prevent future occurrences. Develop and maintain security monitoring tools and processes. Implement and optimize SIEM, SOAR, EDR, and Threat Intelligence platforms. Conduct vulnerability assessments and penetration tests to identify weaknesses. Create and maintain incident response procedures and playbooks. Provide detailed reports on security incidents and emerging threats. Stay updated with the latest cybersecurity trends and threats. Experience 7-9 years of experience in cybersecurity, with a focus on SOC operations. Extensive experience with security monitoring tools and incident response. Proficiency in threat hunting and vulnerability analysis. Strong knowledge of network protocols, operating systems, and common cybersecurity threats. Experience with SIEM, SOAR, EDR, and Threat Intelligence platforms. Ability to conduct in-depth threat intelligence analysis and develop containment strategies. Experience in conducting vulnerability assessments and penetration tests. Excellent analytical and problem-solving skills. Strong communication and collaboration skills. Knowledge of frameworks such as NIST Cybersecurity framework, MITRE ATT&CK, and Lockheed Martin Cyber Kill Chain.
Posted 1 month ago
1 - 3 years
2 - 5 Lacs
Bengaluru
Work from Office
Title: SOC Analyst Location: Bangalore, India Role overview: As a SOC Analyst, you will be a crucial first responder to cybersecurity incidents, tasked with monitoring and analyzing threats, performing vulnerability assessments, and escalating critical issues to senior analysts. This role demands proficiency in managing and operating security tools, maintaining secure network traffic, addressing suspicious activities, and ensuring compliance with SLAs in a 24x7 operational environment. How you will create impact: Responsibilities: Incident response & analysis: Serve as the first responder during security events and when analysis of cyberattacks is required. Review incident alerts, run vulnerability tests, and escalate severe incidents to senior analysts in Tier 2. Technical Knowledge: Proficiency in Windows, Linux, networking, and incident handling in a 24x7 monitoring environment. SIEM and SLA Compliance: Knowledge on SIEM, adhere to SLA. Security Tool Management: Manage security tools - firewalls, intrusion detection and prevention technology. Network Defense: Must have the ability to defend the network. Tasks include monitoring, discovering, and analyzing possible threats. A SOC analyst should have the skills needed to maintain secure network traffic and respond to suspicious activities. Cloud and Operating System Expertise: Strong knowledge of Windows, Linux, and cloud platforms, along with networking fundamentals. Advanced Security Tools: Implement and manage security tools - firewalls, intrusion detection and prevention technology, threat and vulnerability management tools, data loss prevention tools, filtering technologies, traffic inspection solutions, reporting technology and data analytics platforms. Essential qualifications: 1-3 years of relevant experience in SOC. Should have BE/ B. Tech/BCA/MCA/ ME/M.Tech /B.Sc. (Computers)/M.Sc. (Computers) degree from a reputed University. Good to have knowledge in any programming languages- Python, C, Java Should possess strong communication skills, with the ability to effectively convey technical information to both technical and non-technical audiences, collaborate with team members, and provide clear and concise incident reports. Interview rounds & assessments: Table for Two: A brief chat with one of our Recruiters to assess your foundational competencies and provide an overview of TerraPay. Beyond the Bio: A discussion with an SME or the RM to evaluate your role-specific knowledge, problem-solving abilities, and gain a deeper understanding of the company and team dynamics. Manager Meetup: A comprehensive discussion about the role and responsibilities, expectations, and mapping out potential career growth. Hot Seat: A cultural fit round that includes an overview of the companys core values and long-term plans. Why TerraPay: TerraPay is a global money movement player on a mission to build a borderless financial world. We believe payments should be instant, reliable, transparent, seamless, and fully compliant. Registered and regulated across 31 global markets, we are a leading payment partner for banks, mobile wallets, money transfer operators, merchants, and financial institutions. We are proud to be a twice-certified Great Place to Work and were featured in the 2023 CB Insights Fintech 100 and the 2024 Financial Times 1000 lists. Our culture & core values: At TerraPay, we dont just talk about our values—we live by them. Humility, ownership & responsibility, entrepreneurship, global citizenship, and trusting empowerment are the principles that guide everything we do. If you’re looking for a career that offers abundant opportunities for innovation and a culture of excellence, TerraPay is the place to be. With comprehensive healthcare benefits, cab facilities for our India-based employees, and a generous leave policy, we’ve got you covered. Join us in one of our 10 offices worldwide and collaborate with a diverse team representing 40+ nationalities .
Posted 1 month ago
2 - 3 years
7 - 11 Lacs
Bengaluru
Work from Office
Introduction Siemens Healthineers develops MedTech products that support better patient outcomes with greater efficiencies, giving providers confidence that they need to meet the clinical, operational, and financial challenges of a changing healthcare landscape. With 70,000+ employees Siemens Healthineers is one of the world"™s largest suppliers of technology to the healthcare industry. As a global leader in medical imaging, laboratory diagnostics, and healthcare information technology, we have a keen understanding of the entire patient care continuum"”from prevention and early detection to diagnosis and treatment. Brief Description: An Information Security Management system is maintained to address the complex challenges and threats in the rapidly evolving digital landscape and fulfill the organization"™s purpose and values. As an Information Security Professional, you will play an essential role in implementing and maintaining our Information Security requirements in accordance with ISO27001 and other relevant regulatory standards. You will gain expertise in driving implementation of various Information security topics in a cross-collaborative environment. What are my key Responsibilities? Assist the implementation and continuous improvement of the ISO27001 Information Security Management System (ISMS). Conduct regular risk assessments and internal audits to ensure compliance with ISO27001 standards. Ensure adherence to all relevant regulatory requirements as directed by the Global Cybersecurity Governance Organization and country specific cybersecurity requirements. Assist to Develop and maintain policies, procedures, and process documentation to meet the Information Security requirements. Work closely with various departments to collect and analyze operational security measures and help integrate measures into all aspects of operations without the need for follow-ups or reminders. Assist project teams for information security inquiries and incident response. Monitor and respond to security incidents and breaches, ensuring timely resolution and documentation of incidents. Assist with Planning, coordinating, conducting and preparing detailed audit reports for internal and external audits to assess the effectiveness of the information security program. Follow up on audit recommendations to ensure timely implementation of corrective actions. Maintain a comprehensive audit trail for all information security activities and initiatives. What do I need to qualify for this job? Bachelor"™s degree in engineering, Information Security, Computer Science, or a related field with 4-6 years of working experience. Minimum of 2-3 years of hands-on experience in information security, with a focus on implementing ISO27001. Strong understanding of ISO 27001 requirements, information security principles, risk management, IT infrastructure set up and regulatory requirements. Good understanding of ISO 27701 PIMS standards. Proven ability to work independently and collaboratively with cross-functional teams. Excellent communication, presentation and interpersonal skills. Self-directed with an ability to take ownership and accountability of assigned tasks. Familiarity with Software development best practices for ensuring security. Previous experience with Software quality assurance responsibilities will be preferred. Highly Recommended to have completed Lead Implementor certification in ISO 27001 standard . What else do I need to know? Siemens Healthineers is dedicated to equality and we welcome applications that reflect the diversity of the communities we work in. All employment decisions at Siemens Healthineers are based on qualifications, merit and business need. Bring your curiosity and imagination and help us shape tomorrow. We are looking forward to receiving your online application. Please ensure you complete all areas of the application form to the best of your ability as we will use the data to review your suitability for the role.
Posted 1 month ago
4 - 9 years
6 - 10 Lacs
Hyderabad
Work from Office
Diverse Lynx is looking for SOC L2 Engineer to join our dynamic team and embark on a rewarding career journey Security Monitoring: Monitor security alerts and events from various sources, including security information and event management (SIEM) systems. Analyze and respond to security incidents, threats, and vulnerabilities. Incident Response: Conduct incident investigations, document findings, and implement corrective actions. Collaborate with incident response teams to contain and mitigate security incidents. Vulnerability Management: Conduct regular vulnerability assessments and coordinate remediation efforts. Stay informed about the latest security threats, vulnerabilities, and technologies. Security Infrastructure Management: Manage and maintain security technologies, such as firewalls, intrusion detection/prevention systems, and endpoint protection. Configure and fine-tune security tools to enhance detection and prevention capabilities. Log Analysis and Correlation: Analyze logs and security events for unusual or suspicious activity. Develop and implement correlation rules to enhance detection capabilities. Security Policy Enforcement: Enforce security policies and procedures to ensure compliance with industry standards and regulations. Recommend and implement improvements to security policies. Collaboration: Collaborate with other IT and security teams to ensure a coordinated response to security incidents. Provide support during security audits and assessments.
Posted 1 month ago
3 - 6 years
9 - 13 Lacs
Kochi
Work from Office
We are looking for a highly skilled and experienced Senior Consultant with expertise in Microsoft Defender to join our team. The ideal candidate will have hands-on experience with Microsoft Defender and related technologies, as well as strong technical knowledge of Windows Server and Linux. ### Roles and Responsibility Architect and implement Defender XDR solutions for clients. Serve as the subject matter expert on Microsoft Defender for customers, utilizing its capabilities in daily operational work. Secure overall cloud environments by applying cybersecurity tools and best practices. Advise customers on best practices and use cases for using Defender XDR to meet their end-state requirements. Develop content, including processes for automated security event monitoring and alerting, along with corresponding event response plans. Create and maintain documentation related to Microsoft Defender configuration, policies, procedures, and incident response playbooks. ### Job Requirements Hands-on experience with Microsoft Defender and related technologies such as Windows Defender, Microsoft Defender XDR, and Defender for Cloud. Ability to work independently and collaboratively in a fast-paced environment with a strong commitment to customer service and teamwork. Expertise in use case management in Defender XDR. Strong technical knowledge of Windows Server and Linux. Identify opportunities for performance optimization and efficiency improvements within Microsoft Defender solutions and implement changes as needed. Scripting knowledge (Python, Bash, PowerShell). Extensive knowledge of different security threats. Good knowledge and experience in Security Monitoring and Cyber Incident Response. B.Tech./B.E. with sound technical skills. Strong command over verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Certification in Azure (SC-200, SC-100, SC-900,AZ-500) or any other cloud vendor certification is a plus.
Posted 1 month ago
8 - 13 years
9 - 13 Lacs
Bengaluru
Work from Office
We are looking for a skilled professional with 8 to 13 years of experience to lead our Vulnerability Discovery team, responsible for revolutionizing the way we identify and mitigate digital risks. The ideal candidate will have a strong background in vulnerability management, red teaming, or purple teaming, with expertise in automating vulnerability discovery and developing risk-based metrics to enhance EY’s digital defenses. ### Roles and Responsibility Spearhead the evaluation and management of the firm's digital exposure, identifying and mitigating risks stemming from misconfigurations, vulnerabilities, and mismanaged assets. Collaborate closely with various departments to develop comprehensive strategies to protect EY's digital assets. Develop and implement innovative solutions to complex security challenges, leveraging deep technical expertise. Manage third-party risk assessments and identify assets that fail to meet stringent EY security standards. Monitor emerging threats in the digital landscape and advise on proactive measures to safeguard the firm against potential security breaches. Lead the development of a comprehensive strategy to identify and manage the risk of the firm’s digital footprint. ### Job Requirements Minimum 8 years of experience in vulnerability management, red teaming, or purple teaming. Strong understanding of cloud services, network security, and data protection principles. Expert knowledge of offensive security principles and experience in automating vulnerability discovery. Ability to develop performance metrics and risk-based assessments of digital exposure. Excellent analytical and problem-solving skills, with the ability to translate complex technical issues into clear business impacts. Demonstrated experience in managing third-party risk assessments and vendor relationships. Exceptional communication and interpersonal skills, with leadership experience and the ability to manage and develop a high-performing team. Ability to evaluate and prioritize competing priorities from varying stakeholders. OWASP training is a plus. Incident response experience is a plus.
Posted 1 month ago
5 - 10 years
13 - 17 Lacs
Chennai
Work from Office
We are looking for a highly skilled and experienced Senior Consultant with 5 to 10 years of experience to join our team in Bengaluru. The ideal candidate will have expertise in Cloud Security solutions, particularly in Microsoft Sentinel. ### Roles and Responsibility Architect and implement cloud security monitoring platforms like MS Sentinel. Provide consulting services to customers throughout the testing, evaluation, pilot, production, and training phases to ensure successful deployment. Serve as an SME on Cloud Security solutions for customers, utilizing solution capabilities in daily operational work. Secure overall cloud environments by applying cybersecurity tools and best practices. Advise customers on best practices and use cases for using the solution to meet their end-state requirements. Develop content, including processes for automated security event monitoring and alerting, along with corresponding event response plans. ### Job Requirements A strong technical background is required, with a B.Tech./B.E. degree and sound technical skills. Excellent verbal and written English language skills are essential. Demonstrated technical acumen and critical thinking abilities are necessary. Strong interpersonal and presentation skills are needed. Certification in Azure; other cloud vendor certifications are a plus. Experience in other cloud-native security platforms like AWS and GCP is beneficial. Proficiency in scripting languages such as Python, Bash, and PowerShell is expected. Extensive knowledge of different security threats is vital. Good knowledge and experience in Security Monitoring and Cyber Incident Response are crucial.
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane