Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 7.0 years
0 Lacs
maharashtra
On-site
The ideal candidate for the position should have expertise in Microsoft Sentinel (Not Azure Sentinel) along with strong skills in KQL, Incident Response, MS Defender, Content Management, MITRE ATT&CK, MITRE DEFEND, and Kusto Query Language. Additionally, experience in Threat Intelligence, Threat Hunting, Custom Workbooks, and familiarity with the Microsoft cloud platform Azure is required. The candidate should have a notice period of 0-30 days and hold a graduate degree. The job location options include Bangalore, Pune, Mumbai, Hyderabad, Chennai, Gurgaon, and Noida. For further details and application submission, please reach out to career@krazymantra.com.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
gujarat
On-site
As a Security Supervisor, you will be responsible for supervising and managing the activities of security personnel, including security guards and desk clerks. Your duties will involve managing staff schedules, conducting performance evaluations, and providing training and development to ensure the team's efficiency. It will be crucial to ensure that security personnel are following established procedures and protocols at all times. Your role will also encompass overseeing and coordinating security operations, such as patrolling, monitoring, and access control. You will be required to monitor surveillance and alarm systems diligently, responding swiftly to security breaches or incidents. Implementing and maintaining security procedures and protocols will be essential to protect people, property, and assets under your supervision. Regular security audits and inspections will need to be conducted to identify potential vulnerabilities and address them effectively. In the event of security incidents, emergencies, or alarms, you will be expected to respond promptly and take appropriate action to ensure safety and security. This may involve liaising with law enforcement, emergency services, and relevant stakeholders to manage security emergencies efficiently. Documenting security incidents and preparing reports as needed will also be part of your responsibilities. Ensuring compliance with security policies, procedures, and regulations is paramount in this role. Staying up-to-date on security best practices and industry standards will be necessary to maintain a high level of security at all times. You will be involved in developing and implementing security plans and procedures to enhance overall security measures. Additionally, you may also be responsible for managing and implementing security protocols related to the storage of confidential information and documents. Flexibility is key as you may be required to assist with other duties as assigned. This is a full-time position with a schedule that includes day shifts and rotational shifts. The work location is in person, and your dedication to maintaining a secure environment will be instrumental in ensuring the safety and protection of individuals and assets under your watch.,
Posted 2 weeks ago
4.0 - 9.0 years
0 Lacs
hyderabad, telangana
On-site
You will be joining a market-leading company with over 30 years of experience in the industry, known for its professional services that help clients modernize technology, reimagine processes, and transform experiences to stay competitive in the fast-paced world. They specialize in Intelligent Process Automation, Digital Engineering, Industry & Platform Solutions, Internet of Things, Artificial Intelligence, Cloud, Data, Healthcare, Banking, Finance, Fintech, Manufacturing, Retail, Technology, and Salesforce. In this role as an IoT L2 support - Cloud Operation specialist, you should have a minimum of 7 to 9 years of experience in IoT L2 support and at least 4 years of experience in Cloud Operations. The position is based in Hyderabad and follows a hybrid work model under a contract type of hiring for a long-term project. As an IoT L2 support specialist, your responsibilities will include providing advanced technical support for AWS IoT services, troubleshooting technical issues related to device connectivity, data ingestion, security, and integration with other AWS services. You will interact with customers indirectly to understand their technical problems, provide timely updates, and ensure customer satisfaction through effective communication and resolution of issues via Jira Service Management (JSM). Handling escalated cases and driving them to resolution while adhering to SLAs, performing root cause analysis to minimize recurring issues, and documenting troubleshooting steps and best practices will be key aspects of your role. Furthermore, in the Cloud Operations aspect of the position, you will design, deploy, and manage cloud infrastructure solutions (AWS) to ensure scalability, reliability, and efficiency. Implementing monitoring, alerting, and logging solutions, responding to and resolving incidents promptly, and developing infrastructure as code (IaC) using tools like Terraform, CloudFormation, or Ansible will be part of your responsibilities. Enforcing security best practices, optimizing cloud resources for cost and performance, collaborating with cross-functional teams, and driving continuous improvement initiatives are also essential components of the Cloud Operations role. To excel in this position, experience in Jira, AWS Services (Lambda, CloudWatch, Kinesis Stream, SQS, IoT Core), New Relic, and proficiency in Python or node for automation tasks will be advantageous. You should stay current with industry trends, emerging technologies, and best practices in cloud operations to contribute effectively to process improvement, automation, and scalability efforts.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
maharashtra
On-site
Would you like to work with the latest technologies in security and be part of a collaborative team dedicated to solving critical issues Join our Security Team at Baker Hughes, where we are at the forefront of the digital transformation, responsible for cybersecurity architecture and data protection globally. As an OT Security Architect, you will play a crucial role in leading efforts to establish security standards and conduct cybersecurity assessments for our manufacturing environments. Your responsibilities will include architectural leadership by designing secure and resilient OT solutions aligned with business objectives, serving as a technical expert in OT security, collaborating with cross-functional teams to implement robust security solutions, conducting risk assessments and vulnerability analyses, creating detailed architectural documentation, integrating security requirements into the OT ecosystem, and staying updated on industry trends and emerging technologies to drive innovation. You will also work on incident response plans for OT systems, ensure compliance with relevant regulatory standards, and coach, mentor, and lead a diverse group of OT architecture and engineering team members. To be successful in this role, you should have a Bachelor's Degree in a relevant field, proven experience as an OT solutions architect focusing on security, strong knowledge of industrial control systems, cybersecurity principles related to OT environments, exceptional leadership and communication skills, and the ability to collaborate effectively across teams. Desired qualifications include a Master's degree or relevant industry certifications, extensive experience in architecting and securing complex OT environments, familiarity with industry-specific standards and regulations, previous experience in the oil and gas or manufacturing sector, and expertise in advanced security technologies. We offer flexible working patterns, including remote work and flexible hours, recognizing that everyone has different preferences for how they work best. At Baker Hughes, we prioritize the development and well-being of our workforce, invest in talent, and create a supportive environment where all employees can bring their authentic selves to work. Join us to be part of an energy technology company that is driving innovation and progress in the industry. Our technologies and services are shaping the future of energy, making it safer, cleaner, and more efficient for people and the planet. If you are looking for a challenging opportunity to make a real difference and contribute to a team that values innovation, join us at Baker Hughes and be part of a dynamic environment that will inspire and support you in taking energy forward.,
Posted 2 weeks ago
0.0 - 4.0 years
0 Lacs
chennai, tamil nadu
On-site
As an individual in this role, you will have the opportunity to contribute to various aspects of security assessments. Your responsibilities will include assisting with security assessments such as vulnerability scans, penetration tests, and static/dynamic code analysis to detect potential security vulnerabilities in applications. Additionally, you will be expected to familiarize yourself with secure coding practices, including principles like OWASP ASVS, and collaborate with development teams to implement these practices effectively. Furthermore, you will play a key role in supporting security testing by carrying out security tests, helping define the scope of testing activities, and analyzing the outcomes of these tests. Your involvement in creating and managing security documentation, which encompasses security plans, policies, and procedures, will be crucial to the organization's overall security posture. In this position, you will also be required to stay informed about emerging security threats, vulnerabilities, and best practices to proactively address potential risks. Moreover, you will be involved in incident response activities, including analyzing logs, determining the root causes of security incidents, and implementing appropriate remediation measures. Participation in security training sessions covering a range of topics such as application security, networking, and cybersecurity fundamentals will be an integral part of your professional development. This role is suitable for individuals seeking full-time employment opportunities and is open to freshers who are enthusiastic about starting their careers in the field of cybersecurity. The work location for this position is on-site, requiring you to be physically present at the designated workplace.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
chennai, tamil nadu
On-site
The role of Cybersecurity Specialist based in Chennai is a full-time on-site position where you will be tasked with monitoring and upholding security measures to safeguard computer systems, networks, and information. Your responsibilities will include identifying and mitigating security threats, conducting vulnerability assessments, ensuring adherence to security standards, and crafting security policies. Additionally, you will be required to promptly respond to and handle security incidents, as well as implement security enhancements based on assessment findings. To excel in this role, you should possess knowledge of Cybersecurity principles, vulnerability assessment, and incident response. Proficiency in Network Security, Firewalls, Intrusion Detection Systems (IDS), and Security Information and Event Management (SIEM) tools is essential. An understanding of regulatory compliance requirements such as GDPR, HIPAA, and ISO/IEC 27001 is also crucial. Moreover, skills in programming and scripting languages such as Python, Java, or Bash are highly valued. In addition to technical competencies, strong analytical and problem-solving abilities are key attributes for this role. You should be comfortable working both independently and collaboratively within a team environment. A Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field is required for this position. Possessing relevant certifications such as CISSP, CEH, or CISM would be advantageous.,
Posted 2 weeks ago
10.0 - 15.0 years
0 Lacs
haryana
On-site
As the Director, TSG Information Security, Cyber Threat Management at Bain's Cyber Security Department, your primary mission is to safeguard the organization's digital assets and integrity by defining and implementing effective security strategies. You will play a crucial role in aligning security measures with the organizational strategy, leading the development and implementation of security controls that meet regulatory requirements and best practices. Your responsibilities include organizing and managing a team, focusing on both defensive and offensive security strategies to support the company's overall business objectives. You will oversee the monitoring and detection of cybersecurity events, leading efforts to identify and analyze sophisticated security threats such as malware, APTs, and targeted attacks. Collaborating with cross-functional teams, you will enable the use of advanced security tools and technologies to enhance the organization's security posture. Additionally, you will be responsible for incident response management, including the evolution of security runbooks, automation technologies, and forensic investigations to enhance security measures. Your role will involve establishing a threat intelligence capability, leveraging various sources to drive awareness and improve the organization's defensive posture. You will collaborate with intelligence and incident response teams to analyze security incidents and develop methodologies to enhance threat intelligence capabilities. Furthermore, you will work on vulnerability management, proactive security testing, and enhancing security posture through penetration testing and risk assessment. Your expertise will be crucial in driving efficiencies in Cyber Threat Management responses, reducing overall risk, and improving the organization's security standards. Additionally, you will play a key role in professional development and innovation, staying informed about emerging trends and technologies in cybersecurity and driving collaboration across the organization to address security concerns. To excel in this role, you should possess a Bachelor's degree in a related field, along with 10-15 years of relevant experience in Information Security technologies. Strong knowledge of security monitoring, incident detection, response tools, and security controls frameworks is essential. You should have experience working in a global company, deploying systems or applications, and solving complex cybersecurity problems. Excellent communication skills, analytical mindset, and the ability to work independently and collaboratively are also key requirements for this position. Overall, as the Director, TSG Information Security, Cyber Threat Management, you will lead the organization in enhancing its security posture, driving innovation, and ensuring the protection of digital assets in line with industry standards and best practices.,
Posted 2 weeks ago
3.0 - 6.0 years
15 - 30 Lacs
bengaluru
Work from Office
Job Overview: Incident Response: Respond to and manage cybersecurity incidents, including threat detection, containment, eradication, recovery, and post-incident activities Threat Hunting: Proactively hunt for threats within our environment, utilizing tools such as Anomali ThreatStream to identify potential security risks. Digital Forensics : Conduct digital forensic investigations to determine the root cause of security incidents and identify areas for improvement. Correlation and Analysis: Correlate security event logs from various sources to identify potential security threats and anomalies. Documentation and Reporting: Maintain accurate and detailed records of incidents, including incident reports, root cause analysis, and lessons learned. ESSENTIAL JOB FUNCTIONS: Review security alerts escalated by SOC analysts to determine if they constitute an incident. Investigate incidents to determine scope and impact. Record incident details, artifacts, and evidence in the incident tracking system Execute response protocols and playbooks to respond to incidents Escalate incident response protocols to senior staff when necessary Communicate with end users to collect information and resolve issues Collaborate with IT, Legal, and Marketing teams during the incident response process SUPPLEMENTAL JOB FUNCTIONS: Performs additional duties as directed. Effectively accomplishes set goals while primarily working in a hybrid capacity. Will need to be available on an on-call basis for off-hours critical incident response. Key Skills - Strong understanding of digital forensics techniques, incident response processes, and cybersecurity principles. Familiarity with industry-standard tools like EnCase, FTK, Magnet Axiom, and other specialized forensic software. Using SIEM tools and other security monitoring technologies to identify and analyze security events Strong ability to analyze security events and identify patterns and anomalies Understanding data recovery techniques and tools.
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
hyderabad, telangana
On-site
Imagine what you could accomplish by joining Apple's innovative team. At Apple, new ideas are transformed into exceptional products and experiences at a rapid pace. The diverse individuals at Apple are not just product builders but creators of revolutionary wonders that redefine entire industries. The collaborative environment fosters innovation and drives everything we do, from cutting-edge technology to industry-leading environmental initiatives. Join Apple's B2B team, where critical integrations with supply chain partners are managed, and play a vital role as a motivated and technically adept Security Engineer. As a Senior Security Engineer at Apple, your responsibilities will include conducting code reviews, collaborating with development teams to ensure secure coding practices, and utilizing analysis tools to assess software security. You will lead security assessments and threat modeling exercises to identify and address potential risks. Automation of security testing using various tools and technologies, incident response, and security awareness training are also key aspects of this role. Strong analytical skills and an automation mindset are valued, as they contribute to addressing complex security challenges and driving proactive threat detection. Qualifications: - Bachelor's or Master's degree in Computer Science or related field - Proficiency in programming/scripting languages (Java, JavaScript, Python) - Experience integrating and automating security checks in CI/CD pipelines - Conducting penetration testing on diverse technologies Preferred Qualifications: - Strong knowledge of network security, encryption protocols, access control, and identity management - Hands-on experience with security technologies like SAST, IAST, and DAST - Familiarity with cloud security principles, container security, and incident response - Understanding of SDLC security practices and compliance assessments - Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ are desirable Apple is an Equal Opportunity Employer that values inclusion and diversity. We actively promote equal employment opportunities for all applicants, including minorities, women, protected veterans, and individuals with disabilities. Accommodations will be provided upon request for individuals with disabilities to ensure equal participation in the application process. If you are a talented and passionate individual looking to make a difference, we would love to hear from you. Submit your CV to join our amazing team at Apple B2B.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
kochi, kerala
On-site
As a member of the intelliflo team, you will be part of a global business that values diverse perspectives and encourages innovation. We believe in the power of growth through collaboration and continuous improvement, without the fear of failure. We are not seeking individuals who simply fit into our culture; instead, we welcome those who bring unique skills and perspectives to enhance our collective culture. Intelliflo is dedicated to making sound financial advice accessible to a wide range of individuals, using leading technology to empower financial advisors. With a focus on simplifying the digital landscape, we support over 30,000 financial advisors globally, representing millions of households and trillions of assets. As a subsidiary of Invesco, a renowned global asset management leader, intelliflo operates independently under its own brand. Your responsibilities will include: - Efficiently managing service desk requests, alerts, and escalations - Leading outage investigations and incident response life cycle - Supporting the development of corporate technology through service improvement initiatives - Managing access and identities across business IT systems - Maintaining inventory of assets, software, and network devices - Developing processes and playbooks to meet business stakeholders" needs - Mentoring and training service desk and IT infrastructure team members - Collaborating with risk, security, compliance, legal, and privacy functions on security issues - Creating metrics reports for senior management presentation - Acting as the main point of contact for business departments and functions - Maintaining a service catalog and maturity models for IT services - Ensuring patching and secure configurations of IT products and services - Communicating with stakeholders on upcoming initiatives and changes Key Deliverables: - Planning and executing improvements to corporate IT systems - Resolving outages and incidents within internal SLOs and SLAs - Reporting metrics for operations activities regularly - Managing identity and access for the enterprise - Maintaining asset inventory and overseeing software and hardware purchases - Managing a change control process for all corporate IT changes Skills And Competencies: - 5+ years of senior IT Operations role experience with direct reports management - Experience in developing IT services and cloud networking - Proficiency in identity and access management to SOC 2 standards - Strong knowledge of security technologies, network protocols, and cloud technologies - Ability to manage multiple priorities, delegate tasks, and provide progress updates - Excellent problem-solving and communication skills You will collaborate with stakeholders such as Enterprise Risk Management, Development Teams, Information Security, Cloud Operations, and Privacy. The qualifications required for this role include a Bachelor's degree or equivalent relevant work experience. This is a full-time position, and as an exempt employee, you will be part of intelliflo's workplace model that emphasizes flexibility and in-person collaboration when possible. Our commitment to diversity, equality, and inclusion is at the forefront of our values. Please note that this job description provides a general overview of the role and responsibilities expected. It is not exhaustive and additional duties may be assigned as needed.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
pune, maharashtra
On-site
The responsibilities for this role include ensuring the delivery of exceptional cloud services by focusing on optimal system performance and security through collaborative teamwork. You will be expected to promote strong leadership practices and maintain open communication channels with all team members to maximize collective effectiveness. Establishing and implementing processes to maintain a stable operational environment will be crucial. Working directly with various departments to provide timely support and resolve issues efficiently is also a key aspect of the role. Taking responsibility for daily cloud operations management while upholding high standards across all systems is a primary responsibility. The key responsibilities will involve working with Cloud Base Virtualization technologies like S3, RDS, and EC2, managing Cloud Capacity Allocations and Optimizations, handling Platform Deployments and Patching, overseeing Monitoring, incident response and security remediation, as well as focusing on Documentation, Change Management, and Reporting. Strong collaboration with Development and customer support teams is essential for successful outcomes. Minimum Qualifications: - Bachelors degree in computer science, Information Technology, or equivalent Certifications - 5+ years of experience in an Engineering or Technical Support role in an external customer-facing capacity - Strong expertise in managing and deploying cloud-based technologies - Sound cloud administration and cloud operations knowledge - Strong knowledge and experience of Linux / Unix operating systems Desired Qualifications: - Strong analytical and problem-solving skills - Strong communication skills - Proficiency in security frameworks such as NIST, ISO 27001, or CIS benchmarks - Certifications such as Certified Solutions Architect, AWS Certified SysOps Administrator CISSP, or CEH are a plus.,
Posted 2 weeks ago
5.0 - 10.0 years
0 Lacs
ahmedabad, gujarat
On-site
As a Senior Security Engineer specializing in Medical Device Cybersecurity & Compliance, you will play a crucial role in driving end-to-end cybersecurity integration throughout the product development life cycle. Your primary responsibility will be to ensure that security measures are seamlessly integrated from the initial concept phase to the final product release. You will be tasked with developing and maintaining cybersecurity protocols for medical products, which will involve creating security requirements specifications, conducting risk assessments, building threat models, and documenting product security architecture. Additionally, you will be responsible for performing gap assessments to evaluate compliance with standards such as IEC 81001-5-1, IEC 60601-4-5, AAMI TIR 57, and AAMI TIR 97, and implementing necessary remediation measures. A key aspect of your role will involve conducting hands-on vulnerability assessments, penetration testing, and secure code reviews for embedded devices, components of the Internet of Medical Things (IoMT), and connected systems. Collaboration will be essential, as you work closely with development, compliance, and regulatory teams to ensure that product security measures align with internal policies and external regulatory expectations. You will also be involved in activities such as SBOM management, software supply chain risk evaluations, and third-party component analysis to enhance software transparency and mitigate potential risks. Your expertise will be crucial in advising on secure communication protocols, encryption standards, data protection for both at-rest and in-transit data, and the cloud-based connectivity of medical systems. Furthermore, you will contribute to the development of incident response strategies and leverage your knowledge of regulations like HIPAA, GDPR, and HL7 to address data privacy and healthcare-specific concerns. Your role will also involve enhancing internal secure development processes, tools, and methodologies, while promoting security best practices within product teams. To excel in this position, you should have a minimum of 6 years of cybersecurity experience, with at least 3 years dedicated to medical devices, embedded systems, or IoT security. Your ability to author security designs, define technical requirements, and document security architectures aligned with regulatory requirements will be critical. Hands-on experience in embedded system security, familiarity with relevant standards, and expertise in vulnerability management and penetration testing are essential for success in this role. Your problem-solving skills, critical thinking abilities, and aptitude for leading gap analysis and remediation activities in regulated environments will be invaluable. Strong collaboration skills and the capacity to influence cross-functional teams, including R&D, compliance, and product management, will also be key to your success in this challenging and rewarding role.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
You are a Senior DFIR Analyst with expertise in forensic investigation and incident response. Your role involves managing cases from start to finish, which includes client interaction, reporting, and overseeing a team of forensic analysts. Your proficiency should encompass forensic examination of major operating systems like Windows Server, Linux, and Mac OS. Additionally, you will be engaged in research and development endeavors to discover new tools and methodologies for forensic analysis and incident response. Your core responsibilities entail conducting end-to-end digital forensic investigations, ranging from data acquisition to analysis of intricate digital evidence. You will delve into forensic examinations of various operating systems, system and application logs, web application logs, network traffic, and digital artifacts. Expert guidance to clients during investigations and incident response operations will be crucial, alongside leading the forensic analyst team. Moreover, you will mentor junior analysts on DFIR techniques, tools, and industry best practices. Your role also encompasses research and development activities to explore innovative tools and techniques for forensic analysis and incident response. This necessitates staying abreast of industry trends and emerging technologies to continually augment forensic capabilities. You will be responsible for documenting and presenting findings, including detailed forensic analysis reports. If you possess the requisite skills and background for this position, we encourage you to apply by submitting your resume and cover letter. Mandatory Skills Required: - Experience in leading a team of forensic analysts - Profound knowledge of digital forensic tools and techniques - Strong written and verbal communication skills - Ability to convey technical concepts effectively to non-technical stakeholders - Capacity to handle multiple cases concurrently and deliver timely updates and status reports - Capability to work autonomously and collaboratively within a team - Expertise in forensic analysis of system and application logs, web applications logs, network traffic, and digital artifacts - Strong analytical and problem-solving skills - Exceptional searching abilities and self-learning aptitude - Experience in research and development activities - Proficiency in reverse engineering and malware analysis Optional Skills: - Relevance industry certifications such as AccessData Certified Examiner (ACE), EC-Council Certified Hacking Forensic Investigator (EC-CHFI), GCFA, GCFE, EnCE, or other pertinent certifications - Familiarity with programming languages for scripting/automation of tasks - Understanding of legal and regulatory requirements associated with digital forensics and incident response Educational Requirement: - Master's degree in Digital Forensics or a related field Certifications (Optional): - Industry certifications such as AccessData Certified Examiner (ACE), EC-Council Certified Hacking Forensic Investigator (EC-CHFI), GCFA, GCFE, or EnCE,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
maharashtra
On-site
Job Description: As an MDR professional, you will play a key role in SIEM engineering, detection, and integration. Your responsibilities will include developing and optimizing detection rules and use cases in Azure Sentinel and Microsoft Defender for Endpoint. By analyzing security logs, you will identify threats and vulnerabilities, fine-tuning alerts for improved accuracy. Additionally, writing KQL queries to detect malicious activity across cloud and endpoint environments will be a crucial part of your role. In terms of incident investigation and response, you will provide advanced support to SOC L1/L2 teams in triaging complex security incidents. Collaboration with the IR team to contain and remediate security threats will also be a part of your responsibilities. Moreover, participating in proactive threat hunting to enhance detection capabilities will be essential to improving overall security posture. Your duties will also involve the configuration and management of Defender for Endpoint, Azure Sentinel, and related security tools to enhance threat detection. Implementing additional Azure security tools to broaden detection coverage will be part of your daily tasks. Integrating threat intelligence feeds to improve the detection of APTs and targeted attacks will be a critical aspect of your role. Staying updated on emerging threats and integrating new intelligence into detection strategies will be necessary to stay ahead of potential security risks. Collaboration with security teams to enhance detection and response processes will be a regular part of your work. Documenting and reporting on detection efforts, threat analysis, and incident response activities will be crucial for maintaining transparency and accountability. Continuous improvement will be a key focus, as you will mentor and train SOC L1/L2 analysts on advanced detection techniques and use cases for Azure Sentinel and Microsoft Defender for Endpoint. Your knowledge about security trends, attack vectors, and best practices within the SOC will be instrumental in driving continuous enhancement of security operations. If you are passionate about cybersecurity and ready to take on a challenging role in MDR, apply now to be a part of our dynamic team.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
pune, maharashtra
On-site
The position requires an experienced lawyer with over 5 years of expertise in contract management, including reviewing, negotiating, and redlining various types of contracts. The ideal candidate should also have knowledge and experience in data protection laws to ensure compliance with global and regional privacy regulations, such as GDPR and the India Digital Data Privacy Bill. As part of the responsibilities, you will collaborate closely with legal, compliance, IT, and security teams to oversee data privacy initiatives. This includes leading the implementation of privacy policies and risk mitigation strategies. You will be expected to independently draft, review, and negotiate various data protection documents like DPAs and Standard contractual clauses. Additionally, drafting, reviewing, and finalizing different business agreements, lease deeds, affidavits, and other legal arrangements will be part of your role to ensure alignment with legal standards and company policies. In terms of program management, you will be responsible for overseeing the company's global privacy program to ensure adherence to privacy laws and internal policies. You will also lead the execution of the India Digital Data Privacy Bill. Establishing frameworks for ongoing monitoring of privacy compliance, updating privacy policies regularly, and leading responses to data breaches, privacy complaints, and access requests are crucial aspects of the role. Conducting privacy awareness programs and training for employees, planning and executing internal audits, providing legal consultation on privacy laws, and implementing actionable guidelines across jurisdictions are all integral parts of this position. The ideal candidate should possess a law degree with at least 5 years of experience in contract reviewing, data privacy, and regulatory compliance. Expertise in GDPR, CCPA, India Digital Data Privacy Bill, and other relevant data protection laws is required. Strong communication, program management, and incident response skills, along with the ability to monitor privacy trends and adapt policies accordingly, are essential for success in this role.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
haryana
On-site
As a Senior Security Specialist at Pinkerton, you will be entrusted with the crucial task of evaluating client security requirements, devising personalized security strategies, and executing solutions to mitigate risks effectively. Your role demands a combination of strong analytical skills, technical proficiency, and exceptional communication abilities to engage with clients. Your responsibilities will include embodying Pinkerton's core values of integrity, vigilance, and excellence while showcasing expertise in project management with a profound grasp of security design principles. You will be expected to demonstrate your capability in developing and implementing standardized security processes and best practices in collaboration with subject matter experts. This entails defining project scope, creating documentation, establishing metrics, devising communication strategies, and ensuring successful implementation. Your adeptness at time management and prioritization will be essential in meeting client requirements and deadlines promptly. Crafting clear and concise security documentation, such as SOPs, guidelines, presentations, and high-quality reports, will be a key aspect of your role. Furthermore, your proficiency in communication and interpersonal skills will play a vital role in liaising effectively with clients, security leaders, and fellow team members. To excel in this role, you must possess a Project Management Professional (PMP)/CPP certification and have accumulated 5 to 7 years of relevant experience in the field. Collaborating with stakeholders to define project scope, objectives, and deliverables will be a routine part of your responsibilities. Additionally, you will be tasked with developing and implementing comprehensive security solutions encompassing physical security design, access control systems, and surveillance technologies. Maintaining accurate documentation, including project plans, risk assessments, and incident reports, will be crucial in your role. You will also be required to proactively identify and mitigate security risks, prioritize tasks effectively to meet deadlines and client expectations, and deliver security awareness training to employees. Furthermore, you will be responsible for performing other security-related duties as assigned by the client. Your proven experience as a Security Consultant or in a similar role, coupled with a solid understanding of security protocols, risk management, and incident response, will be highly advantageous. Possessing relevant certifications like CISSP (Certified Information Systems Security Professional) or CISM (Certified Information Security Manager) will be considered a plus. In this role, you will be working in various conditions, including regular computer usage, occasional reaching and lifting of small objects, operating office equipment, frequent sitting, standing, and/or walking, as well as required travel.,
Posted 2 weeks ago
9.0 - 13.0 years
0 Lacs
karnataka
On-site
Job Summary: Seeking a WAF Management and Governance Lead to oversee the security, operational integrity, and compliance of Web Application Firewall (WAF) systems. You will be responsible for ensuring robust protection against web-based threats, optimizing security policies, and governing WAF implementations across enterprise environments. Your key responsibilities will include leading the deployment, configuration, and ongoing management of Web Application Firewall solutions, defining, implementing, and refining WAF rulesets to mitigate risks such as SQL injection, cross-site scripting (XSS), and other web threats, ensuring WAF policies align with regulatory and industry security frameworks (e.g., OWASP, PCI-DSS, GDPR), collaborating with cybersecurity and internal teams to analyze threat patterns and adjust WAF settings for optimal protection, evaluating WAF impact on application performance, supporting investigation and response to security incidents related to web applications, working with IT, security, and application development teams to integrate WAF security seamlessly, establishing key security performance indicators, providing regular governance reports, and conveying security risks and technical details to non-security stakeholders effectively. Experience: You should have 9+ years of experience in web security, including WAF deployment and governance. Technical Expertise: Hands-on experience with leading WAF platforms such as AWS WAF, F5, Cloudflare WAF, Akamai Kona Security is required. Security Knowledge: A strong understanding of OWASP top 10 threats, secure coding practices, and web security protocols is essential. Additional Skills: Knowledge of DevSecOps practices and security automation, familiarity with regulatory requirements impacting web security governance, ability to communicate security risks and technical details to non-security stakeholders effectively, certifications such as CISSP, CEH, CCSP, AWS Security Specialty or equivalent, experience in DevSecOps, automation, and integrating WAF into CI/CD pipelines, knowledge of cloud security architectures and API security governance will be advantageous. Join a business powered by purpose and a place that empowers you to design your own reinvention. Realize your ambitions with Wipro. Applications from people with disabilities are explicitly welcome.,
Posted 2 weeks ago
10.0 - 14.0 years
0 Lacs
hyderabad, telangana
On-site
As an experienced R2 Architect with 10 to 13 years of expertise in SRE DevOps and SRE Concepts, your role will be vital in maintaining and enhancing the reliability and efficiency of our systems, contributing to our company's success and societal impact. You will operate primarily during the day shift in a hybrid model that does not involve travel. Your responsibilities will include leading the design and implementation of SRE practices to improve system reliability, overseeing the creation of automated solutions for system monitoring and incident response, providing technical guidance to the SRE team, collaborating with cross-functional teams to address system bottlenecks, and managing CI/CD pipelines for software delivery. Additionally, you will be responsible for developing documentation, conducting system audits, implementing incident management protocols, monitoring system health metrics, driving continuous improvement initiatives, ensuring compliance with industry standards, and fostering communication between development and operations teams. To excel in this role, you should have extensive experience in SRE DevOps and SRE Concepts, proficiency in CI/CD pipeline management, strong problem-solving skills, a good grasp of automated monitoring solutions, effective communication abilities, a proactive approach to system monitoring, commitment to continuous improvement, relevant certifications in SRE or DevOps, a track record of improving system reliability, mentoring skills, organizational capabilities, attention to detail, and experience in documentation maintenance and compliance with industry standards. If you are ready to leverage your expertise to optimize system performance, collaborate with diverse teams, and drive continuous improvement initiatives, this position offers you the opportunity to make a significant impact on our systems and overall success.,
Posted 2 weeks ago
2.0 - 6.0 years
0 Lacs
thiruvananthapuram, kerala
On-site
As a Cybersecurity Analyst with 2+ years of experience, your primary responsibility will be to monitor and respond to security alerts from various platforms such as SIEM, IDS/IPS, and firewalls. You will be tasked with investigating and triaging security incidents, ensuring quick resolution or escalation as necessary. Working closely with the incident response team, you will play a critical role in managing and containing security breaches. In addition to monitoring security alerts, you will also be involved in conducting regular vulnerability scans and assessments to identify weaknesses in the organization's IT infrastructure. Your role will include coordinating patch management efforts to keep systems up to date with security patches. You will be expected to recommend and implement strategies to mitigate vulnerabilities effectively. As part of the cybersecurity team, you will assist with security audits and assessments to ensure compliance with industry regulations such as GDPR, HIPAA, and PCI-DSS. It will be your responsibility to maintain and track security policies, procedures, and documentation to uphold security standards within the organization. Staying abreast of emerging cyber threats, trends, and vulnerabilities will be crucial in your role. You will analyze security data and reports to identify patterns and trends in cyber threats, implementing threat intelligence feeds and integrating them with security tools to enhance the organization's security posture. Furthermore, you will configure, manage, and maintain security tools like firewalls, anti-virus software, anti-malware solutions, and SIEM platforms. Collaborating with other IT teams, you will ensure consistent application of security controls across all systems. You will also contribute to training internal teams on best practices for security hygiene and incident reporting. To excel in this role, you should have a minimum of 2 years of experience in a cybersecurity or IT security-related position, with a strong understanding of network security, system security, and incident response. Proficiency in security technologies such as SIEM (Splunk, ArcSight), IDS/IPS, firewalls, and endpoint protection is essential. Familiarity with vulnerability management tools, patching processes, and knowledge of TCP/IP, firewalls, and network protocols are required. Preferred certifications include CompTIA Security+, Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or GIAC Security Essentials (GSEC). Strong analytical and problem-solving skills, excellent written and verbal communication abilities, the capacity to work independently and collaboratively, and a keen attention to detail are essential qualities for success in this role. (ref:hirist.tech),
Posted 2 weeks ago
3.0 - 5.0 years
5 - 15 Lacs
hyderabad
Hybrid
Job Summary: The GSOC Analyst is a critical member of the Global Security team, responsible for monitoring, triaging, investigating and responding to diverse security scenarios across all global locations. This role involves the implementation of function-based procedures with clear, actionable steps. The ideal candidate will possess a strong investigative skillset, a meticulous approach to data analysis, and the ability to act decisively under pressure. Key Responsibilities: Incident Management & Response: Monitor and analyze incoming alerts from various systems, including access control, other alarms, and camera feeds. Execute procedures outlined for physical security incidents, emergency responses (e.g., fire, active threat), and breaches. Initiate immediate verification and containment steps, such as reviewing live camera feeds, checking access logs, and remotely locking doors. Escalate to GSOC and security management as per protocols. Ensure all incident details, root causes, and corrective actions are meticulously documented. Access Control & Badging: Manage procedures related to employee access, including outboarding, DNA (Do Not Allow Access) requests, and badge issuance for new hires, visitors, or replacements. Verify employee identities and coordinate with HR to ensure proper access levels are granted or revoked. Investigate and respond to unauthorized access attempts, lost/stolen badges, and tailgating incidents by reviewing camera footage and access logs. Monitoring & Maintenance: Conduct daily health checks of security systems, including cameras and sensors, and log any issues for resolution by facilities or technical support via ticketing mechanism. Respond to security incident calls and system-generated alerts for camera tampering, offline devices, or doors being forced open or left open for long. Conduct yearly access privilege reviews in coordination with HR and local management to ensure compliance and revoke unnecessary permissions. Escalation & Reporting: Follow predefined escalation paths, providing real-time alerts for critical incidents to the Security management and hourly summaries to local management during active events. Generate and submit post-incident reports to all relevant stakeholders. Prepare briefings for SOC management. Shift reporting and handover/relay for the incoming shift team member. MIS creation of incidents logged and resolved on a weekly/monthly basis. Collaborate with the man-guarding team and other departments (e.g., HR, IT) to ensure a coordinated response to all security incidents. Required Skills & Qualifications: Proven 3+ years experience in a security operations center (SOC) respectively. Conduct initial analysis & day to day duties for the other member to conduct detailed investigation whenever required as per the duties assigned. Professional investigative skills with a strong ability to conduct thorough root-cause analysis and forensic review of incidents. Expertise in triage, analysis, and data mining, with the ability to quickly process large amounts of information from various sources (e.g., camera footage, access logs, incident reports) to identify patterns and threats. Familiarity with various security technologies, including access control systems, CCTV/VMS, and alarm platforms. Ability to work as a team with other stakeholders as well as external security partners. Work independently with or without supervision. Exceptional English language communication and documentation , with the ability to write clear, concise, and actionable reports. A problem solver and an ability to work in a fast-paced environment and handle multiple simultaneous incidents with a calm and decisive demeanor. Suggest improvements for effective implementations of procedures. Maintain high work discipline,attention to detail and ethical standards. Maintain confidentiality. Graduate (Bachelors Degree). Certification of PSP (‘Physical Security Professional’ by ASIS) is highly desirable. Knowledge of compliance standards such as ISO 27001 is a plus. Must be able to work flexible hours, including nights, weekends, and holidays, as part of a 24/7 operations team.
Posted 2 weeks ago
7.0 - 12.0 years
11 - 16 Lacs
mumbai
Work from Office
SUMMARY Our client is IT MNC part of one of the major insurance groups based out of Germany and Europe. The Group is represented in around 30 countries worldwide, with Over 40,000 people worldwide, focusing mainly on Europe and Asia. Our client offers a comprehensive range of insurances, pensions, investments and services by focusing on all cutting edge technologies majorly on Could, Digital, Robotics Automation, IoT, Voice Recognition, Big Data science, advanced mobile solutions and much more to accommodate the customers future needs around the globe thru supporting millions of internal and external customers with state of-the-art IT solutions to everyday problems & dedicated to bringing digital innovations to every aspect of the landscape of insurance. Job Location: Hiranandani Gardens, Powai, Mumbai Mode: Work from Office Requirements Key Responsibilities: : Business-Cybersecurity Alignment: o Work closely with business stakeholders, IT security teams, and cross-functional teams to ensure cybersecurity initiatives align with the organization’s broader business goals. o Translate business needs into technical security requirements that can be effectively executed by the security and IT teams. Risk Analysis & Security Assessments: o Conduct risk assessments in the context of hybrid IT environments (cloud, on-premises, and edge) to identify security gaps and vulnerabilities. o Collaborate with security teams to evaluate existing security controls and recommend solutions to mitigate identified risks, balancing business needs with security requirements. Cybersecurity Frameworks & Compliance: o Ensure that all business and technical security requirements comply with relevant regulatory compliance frameworks (e.g., NIST CSF, ISO 27001, GDPR, HIPAA). o Support audits and compliance assessments, identifying any gaps between current practices and regulatory standards. (must have) Security Process Improvement: o Identify opportunities for process improvements within the cybersecurity function, including streamlining security incident response, access management processes, and threat detection workflows. o Develop business cases for proposed security improvements, including cost-benefit analyses and risk assessments. The Business Analyst will have comprehensive responsibilities spanning multiple cybersecurity domains, and should have expertise in at least 5 of the following areas o SIEM Sentinel & Security Operations: Manage and optimize SIEM solutions, particularly Sentinel, for effective monitoring, incident detection, and security event correlation across hybrid environments. Collaborate with security operations teams to ensure proper configuration, tuning, and reporting within SIEM platforms to support proactive threat management. o Security Tools & Technology Integration: Work with security teams to implement and optimize security tools such as SIEM (e.g., Splunk, Microsoft Sentinel), EDR (e.g., CrowdStrike, MS Purview/Defender), SOAR platforms, CASB (Cloud Access Security Broker), and Threat Intelligence systems. Help define and document requirements for the integration of cybersecurity tools into the broader security ecosystem. o User Access Management (UAM) & RBAC: Work closely with identity and access management teams to ensure the implementation of UAM and RBACsystems that align with the organization's security policy and business requirements. Support the development of processes for managing user roles, privileges, and access rights across enterprise systems. o Cloud & Encryption Security: Ensure that security policies and controls are applied across both on-premises and cloud environments(AWS, Azure, Google Cloud), addressing challenges related to cloud security, data encryption, and access management. Collaborate with technical teams to implement strong encryption methods for data - in - transit, data-at-rest, and data-in-use in line with organizational security policies. o AI & ML in Cybersecurity: (Good to have) Contribute to the use of AI/ML technologies to enhance threat detection, anomaly identification, and predictive analytics within the organization’s security operations. Collaborate with data scientists and security teams to define requirements for AI/ML-based security models and incident response automation. o SOAR Integration & Incident Response: Assist with the integration of Security Orchestration, Automation, and Response (SOAR) solutions into the incident response lifecycle to streamline response times and automate repetitive tasks. Support the continuous improvement of incident response procedures and playbooks, ensuring a consistent, rapid, and efficient approach to security incidents. Benefits
Posted 2 weeks ago
8.0 - 12.0 years
5 - 10 Lacs
pune
Hybrid
So, what’s t he r ole all about? As a member of the Cloud Security team, a successful Cloud Security Analyst will need to be self-sufficient to collaborate effectively with multiple teams, such as Application Support, Infrastructure Operations, DevOps, Product R&D, Security teams, customers and 3 rd party auditors. This role will hold the responsibility of understanding the Cloud security policies, procedures, practices and technologies and documenting them appropriately as well as demonstrating to auditors and customers the excellent Cloud Security at NiCE. A successful candidate in this role will be able to work in production cloud environments to collect and curate evidence and explain it to anyone who asks for it. Experience with Governance, Risk and Compliance (GRC) is a big plus! How will you make an impact? You will directly impact the success of the NiCE cloud business by ensuring all customer and auditory security requirements are met and demonstrated. A diverse, merit-driven work environment which rewards a growth mindset and encourages innovation and continued professional development; The opportunity to work in a global, highly skilled, passionate workforce to deliver world-class service and products to market. Competitive pay and excellent benefits. Generous PTO policies. A highly focused security & compliance team which is collaborative, supportive, experienced, and driven to help everyone from the individual to enterprise to our customers realize the success for which they aim. Have you got what it takes? 8+ years of experience with Information Security; University-level degree in Information Security, Computer Science or other related field; knowledge of incident response, vulnerability management, cloud security, and other related topics; A burning curiosity to learn as much as you can about the NiCE cloud environment and the services and products we offer our customers as well as the existing security infrastructure we have in place today; Excellent communications skills to work collaboratively with security team members and operations and development teams around the world; Strong organization and prioritization skills to enable independent work in order to achieve tactical and strategic security goals; Education, training or experience with security and compliance fundamentals; Experience working with work tracking tools such as JIRA, ServiceNow, or others. What’s in it for you? Join an ever-growing, market disrupting, global company where the teams – comprised of the best of the best – work in a fast-paced, collaborative, and creative environment! As the market leader, every day at NiCE is a chance to learn and grow, and there are endless internal career opportunities across multiple roles, disciplines, domains, and locations. If you are passionate, innovative, and excited to constantly raise the bar, you may just be our next NiCEr! Enjoy NiCE-FLEX! At NiCE, we work according to the NiCE-FLEX hybrid model, which enables maximum flexibility: 2 days working from the office and 3 days of remote work, each week. Naturally, office days focus on face-to-face meetings, where teamwork and collaborative thinking generate innovation, new ideas, and a vibrant, interactive atmosphere. Requisition ID: 8240 Reporting into: Technical Manager Role Type: Individual Contributor
Posted 2 weeks ago
10.0 - 15.0 years
3 - 5 Lacs
gurugram, delhi / ncr
Work from Office
This is a hands-on field role focused on immediate results. You will manage the mobilization, deployment, and day-to-day supervision of our security guards. Your mission is to ensure all client sites are correctly staffed on time with professional security personnel and that field operations run smoothly. Core Responsibilities: Rapid Manpower Mobilization & Deployment: Urgently source, screen, and deploy security guards for all client requirements, especially short-notice demands, leveraging your active network. Coordinate guard movement, ensure timely site arrival, proper handovers, and swift completion of joining formalities for new recruits. Field Supervision & Attendance Management: Conduct regular site visits (commercial, corporate, residential) ensuring guard presence, alertness, correct uniform, and adherence to post orders/client expectations. Manage daily attendance, track leaves, and arrange relievers promptly for continuous coverage. Swiftly address and resolve on-site operational issues and emergencies. Guard Discipline, Basic Welfare & On-Site Training: Enforce discipline, punctuality, and professional conduct among field personnel. Serve as the first point of contact for guards' urgent operational queries. Collect essential guard data accurately and provide basic on-site operational guidance to new guards. Operational Coordination & Reporting: Liaise effectively with the operations team/management on deployment status, incidents, manpower needs, and field feedback. Maintain clear daily activity logs and prepare concise incident reports. Broader Operational Knowledge & Capabilities : Beyond core field execution, an ideal candidate will understand: Security Operations & Planning Fundamentals: Basic security planning, staffing considerations, standard protocols (access control, patrolling, CCTV monitoring), and incident/emergency response. Safety & Compliance Awareness: Site safety standards, including fire safety basics (systems, drills), and compliance for on-site work (e.g., work permits). Client & Personnel Coordination Support: Ensuring a safe environment for clients, and the ability to ensure guards maintain necessary logs and contribute data relevant to manpower scheduling. Who We Are Looking For (Essential Requirements): Proven field experience ( over 10 years ) in security manpower mobilization, deployment, and supervision in Delhi NCR. Strong, active network of security guards/supervisors in Delhi NCR for rapid deployment. Demonstrated ability to handle pressure, meet urgent staffing demands, and problem-solve effectively in the field. Practical knowledge of guard duties, discipline, attendance management, and basic incident handling. Good communication skills (Hindi essential; basic English useful). High integrity, dependability, and a hands-on "get-it-done" attitude. Willingness for extensive travel within Delhi NCR. Basic literacy for record-keeping. Mandatory Condition: A thorough Background Verification (BVG) will be conducted. Honesty and verifiable experience are paramount. What We Offer: A critical role with immediate impact on operational stability. Opportunity to tackle challenging field issues. Competitive salary based on experience, network, and capabilities. Growth potential.
Posted 2 weeks ago
4.0 - 9.0 years
8 - 15 Lacs
bengaluru
Hybrid
Key Responsibilities Process Day to day Operational issues, requests and Project tasks Incident response and resolution within SLA's with excellent analytical and troubleshooting skills Providing all the necessary details to leads about the issue, steps taken, recommendation and any other relevant information Ticket Status Check and Update Respond to False Positive Alerts Incident Escalation and Progress Monitoring Create, review, update, and maintain Standard Operating Procedures. Prepare RCA for the escalated incidents. Perform the Shift handovers Security Incident Response: Leads the escalation as a point for security incidents. Analyze & investigate cyber threats on a real-time/day-to-day basis, involving alerts review, log analysis, and event/incident correlations. Prepare Document and Maintain Procedures, Response Plan, Runbooks, and associated processes for continuous improvement. Assist Analyst for security event and initial incident response to detected threats. Regularly review and recommend changes to policies or controls as needed to enhance security. Identifies potential gaps and offers solutions to include internal team needs, product improvements and client security posture. Develop reporting with focused messages to enable the stakeholders to understand their and responsibilities. Train and mentor, the peers and juniors in the team. SPLUNK Managing Splunk components such as indexer, forwarder, search head, etc Prepare Splunk dashboards. Install, Configure and Troubleshoot Universal forwarders. Triage of non-security alerts based on priority, problem identification and escalation. Escalate to designated contacts within Stratogent and Customer for issues outside SOPs, or when SOPs fail to resolve the issue. Work directly with delivery teams or customers to gather logging requirements. Convert Logging requirements into Splunk designs following best practices. Perform environment health checks. Update and / or create technical documentation. Must-have Skills: Prior Working Experience Must have worked on Splunk Performing incident handling, evidence acquisition, endpoint and Network,and Security Incident management Customer-focused Excellent communication skills (reading, writing, speaking and listening) Highly self-motivated and directed. Excellent attention to detail. Flexibility and willingness to work on different and multiple technologies Ability to effectively prioritize, organize and execute tasks in a high-pressure environment Good to have skills: Prior Work Experience Worked on any of the IAM and PAM tools. Certifications in Enterprise Admin or Cloud Admin of Splunk is an advantage Prior training and certification in communication is added advantage
Posted 2 weeks ago
2.0 - 6.0 years
3 - 7 Lacs
bengaluru
Work from Office
About The Role Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Accenture MxDR Ops Security Engineering Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply your security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that the organization's information and infrastructure are safeguarded against potential cyber threats. You will also engage in continuous learning to stay updated on the latest security trends and technologies, contributing to a secure environment for all stakeholders. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular security assessments and audits to identify vulnerabilities.- Collaborate with cross-functional teams to implement security best practices. Professional & Technical Skills: - Must To Have Skills: Proficiency in Accenture MxDR Ops Security Engineering.- Strong understanding of security frameworks and compliance standards.- Experience with incident response and threat management.- Knowledge of network security protocols and technologies.- Familiarity with security information and event management tools. Additional Information:- The candidate should have minimum 2 years of experience in Accenture MxDR Ops Security Engineering.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |