Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
6 - 10 years
8 - 12 Lacs
Bengaluru
Work from Office
Job Description Job Description As a Network Development Engineer on the Oracle Infrastructure Engineering Services (IES), Network Operations & Reliability Engineering team, your priorities include completing change requests, fulfilling service requests, incident response, and problem management. This role is also responsible for creating tools that facilitate change validation, verify service health, and expose performance metrics. This role will work closely to develop and support solutions for Oracles SaaS customers including supporting their private VPN connections. Because our team is globally distributed, on-call shift coverage is generally specific to one shift/region, but we do ask for flexibility as occasional urgent needs arise. Organizational Overview: Oracle Cloud continues innovative breakthroughs providing Autonomous Database and services to an ever-increasing customer base. Oracle's Global Business Unit Cloud Services group is an industry leader focused innovation, service delivery, and migration of traditional, on-premises workloads to the Oracle Cloud Infrastructure. Our customer base includes fortune 500 and industry leaders across a variety of sectors including Communications, Financial Services, Health Sciences, Hospitality, Retail, Utilities, Construction and Engineering. Together, we are purposeful, industry leading experts in engineering delivering the next generation of Cloud services centered on the Autonomous Database. Career Level - IC3 Responsibilities Responsibilities Leading the transformation and migration for the IES Cloud Services customers, our Cloud Networking group designs, delivers, and supports the OCI cloud infrastructure services for our hosted tenants. Ensuring Site UP is the top priority, we are laser focused on ensuring site reliability, performance, and security while leading migration efforts to the next generation cloud infrastructure. Consisting of a group of experienced Software Developers, Network Development and Network Engineers, the IES Cloud Network Engineering group is the high-octane engine powering the transformation and evolution of our Cloud based Network infrastructure Develop methods to capture metrics that show service health. Create and use pre-defined work instructions to safely deliver on change requests to the production environment. Plan and execute changes to the network as needed. Develop and maintain scripts and tools in Python or other languages to efficiently perform various changes to the network. Automate manual processes using API's and Python or other object oriented languages. Participate in weekly on-call rotation, and occasionally on weekend coverage as a member of a globally distributed on-call team. Create Postmortems and documentation of corrective actions to prevent the reoccurrence of incidents. Implement, Maintain & Support Cloud based Network SaaS components according to associated SLAs/OLAs Collaborate with peers and lead automation and innovation workshops for members of the extended organization. Active monitoring of the production environment to proactively address issues that could affect Oracles services in partnership with the Oracle Global Operations Center. Required Qualifications: Bachelor's Degree in technology related field or equivalent practical & demonstrated experience. 7+ years professional experience in supporting carrier grade, IP based ISP, Webscale, on-prem Datacenter and cloud-provider network environments. Demonstrated progressive increase in role specific responsibilities and associated complexities Advanced level knowledge of multiple network operating systems including Cisco IOS/NX-OS, and TMOS, Operational experience with internet routing protocols and concepts, including but not limited to TCP/IP, BGP, iBGP, EGP, MPLS, IS-IS, OSPF, Anycast, RHI, & Route reflection. Advanced level automation and DevOps type optimization experience including proficiency in a combination of Python, Ansible, Chef, Docker, TerraForm, Perl, JavaScript, JSON, REST, iControl, Bash, Yaml, XML, and iControlRest. Advanced level knowledge of multiple Firewall technologies, including but not limited to Cisco ASA, Palo Alto. Advanced level knowledge of Layer 4-7 protocols including TCP, UDP, AH, ESP, SMB, RCP, TLS, SSL, HTTP, HTTPS, DNS, SNMP, SMTP, and SSH Advanced level experience in cloud environment support of IaaS, PaaS, SaaS, & LBaaS offerings. Advanced level experience in capacity management, traffic engineering, and performance optimization Additional preferred skills and experience: 5 + years of experience performing peering, network design, customer turnup, provisioning, migration, and decommissioning 1-2 + years Cloud based Network service design and management Experience with Oracle Database, SQL Server, MySQL, or PLSQL Experience in Traffic Management and Load balancing technologies Experience supporting DNS infrastructure services Experience operating in a Linux/Unix environment 3+ Experience translating and managing the Incident to Problem Management workflow through a combination of process automation, defect cataloging, data warehousing, reporting and analytics. Practical experience with Apex, Oracle BI, Grafana, or Power BI for system analytics and reporting Experience with network system change management and release management programs. Demonstrated ability to define and measure performance of Objectives and Key Results (OKRs), KPIs, Operational Level Agreements (OLAs), and Service Level Agreements (SLA)
Posted 2 months ago
10 - 12 years
4 - 8 Lacs
Bengaluru
Work from Office
Job Description Minimum Qualifications 10+ years of experience in security engineering, detection engineering, or cloud security. Strong expertise in application security, API security, and SaaS-specific threat detection. Experience with SIEM, SOAR, and detection-as-code tools (e.g., Splunk, OpenSearch, KQL, Sigma). Proficiency in log analysis, security telemetry engineering, and anomaly detection in cloud applications. Experience integrating security controls into SaaS applications and microservices. Good programming and automation skills. Preferred Qualifications Experience with automated threat simulations, MITRE ATT&CK mappings, and adversary emulation. Knowledge of risk quantification methods and security metrics for executive reporting. Familiarity with cloud-native security tools. Hands-on experience in threat intelligence-driven detection engineering. Security certifications (e.g., GIAC GCDA/GCFA, AWS Security Specialty, GCP Security Engineer, OSCP). Career Level - IC5 Responsibilities 1. SaaS-Application Centric Detection Research & Engineering Develop and refine application-layer security detections for FAaaS, Spectra, and other critical LoBs, focusing on business logic abuse, API security threats, and identity-based attacks. Research and engineer detections for SaaS-specific attack vectors. Leverage detection-as-code frameworks (e.g., Sigma, OpenSearch, KQL) to automate the development and tuning of detection rules. Work closely with application security teams to enhance telemetry and ensure that security observability is embedded in SaaS products. 2. Proactive Security Controls & Mitigative Capabilities Move beyond traditional monitoring by implementing proactive security controls to mitigate threats before exploitation. Collaborate with development teams to integrate security controls into SaaS applications for real-time anomaly detection and automated response. Drive continuous security validation efforts through automated adversary simulation and detection effectiveness testing. 3. Cross-Team Integration & Real-Time Threat Intelligence Sharing Drive collaboration between Detection Engineering, Incident Response, and Red Teams by aligning detection research with real-world attack simulations and post-incident learnings. Develop automated feedback loops to reduce false positives, false negatives, and coverage gaps. Work with Incident Response to develop automated triage and enrichment mechanisms for SaaS security incidents. 4. Risk-Based Detection Engineering & Security Metrics Shift towards a risk-based detection approach, ensuring that high-impact threats are prioritized based on their potential financial and reputational consequences. Provide executive-level visibility into detection efficacy by quantifying the impact of mitigated threats and aligning detection efforts with business risk. Develop security dashboards and reporting to communicate detection outcomes, including risk coverage, adversary trends, and operational efficiency. 5. Proactive Threat Hunting & Data Anomaly Analysis Expand threat hunting and anomaly detection capabilities to identify previously unknown threats affecting SaaS customers and cloud applications. Utilize advanced data analytics and behavioral anomaly detection to identify stealthy attacks that evade traditional detection methods. Reduce reliance on SOC-driven escalations by proactively analyzing security telemetry for signs of compromise. Work closely with data scientists to enhance the use of ML/AI-driven security analytics for predictive threat detection. #LI-DNI
Posted 2 months ago
6 - 10 years
19 - 25 Lacs
Mumbai, Hyderabad, Bengaluru
Work from Office
As a member of the Customer Success Services (CSS) organization, your focus is to deliver post-sales support and solutions to the Oracle customer base while serving as an advocate for customer needs. This involves managing and supporting customer environments in the Oracle Cloud Infrastructure (OCI) and provide expert assistance to ensure the optimal performance, availability, and security of customer cloud environments. Your responsibilities include resolving technical issues, performing system monitoring, and collaborating with internal teams to implement best practices. You will also engage with customers to understand their needs, provide training, and deliver exceptional customer service. This position requires strong problem-solving skills, technical proficiency in OCI, and a commitment to enhancing customer satisfaction. As a primary point of contact for customers, you are responsible for facilitating customer relationships with Support and providing advice and assistance to internal Oracle employees on diverse customer situations and escalated issues Career Level - IC4 Responsibilities Responsibilities: Manage and support customer environments in OCI cloud. Designing a well architected cloud deployment design in OCI adhering to the best practices principles and guidelines. Applying automated configuration management infrastructure provisioning. Communicate with corporate customers via telephone, written correspondence, and electronic service regarding finding solutions for technical problems identified in Oracle Cloud products. Manage customers escalations/expectations and ensure timely delivery of high-quality resolution on technical issue focusing on root cause analysis and prevention. Develop and implement strategies for providing proactive support resulting in fewer incidents, increased availability, or accelerated deployments. The prospective candidate should draw upon all resources at Oracle, to advise and consult on the use of Oracle products to avoid such problems in the future. Educate and walk the customer through the problem-solving process. Adopt Oracle diagnostic methodology procedures when handling and documenting technical issues that comply with Support processes, policies SLAs. Collaborate on cross-team and cross-product technical issues by working with resources from other groups (e.g. Product support, Product development etc). Research and study product features and keep abreast of new releases and functionalities or related technologies to maintain product expertise. Requirements: 6+ years of relevant Cloud IAAS PASS (preferably OCI) experience and Ability to communicate effectively 6+ Years of overall experience on Any domain preferably Database or system or network administration. Experience on Cloud Database Services - preferably OCI VMDB, EXACC,EXACS,ADB,ADW,MYSQL and NOSQL DB Proven experience in implementing, monitoring, and maintaining Cloud (AWS or AZURE or OCI) solutions Like. Cloud Compute - Creation and maintenance of instances, scaling, OS Management Services. Cloud IAM and IDCS - AuthN, AuthZ, federation using SAML Identity cloud service, Create/Manage Compartments, User Groups, Policies, dynamic user groups. Cloud Networking - VCN, Subnets, Gateways (IG, NAT, DRG, Service, Local Peering), Security Lists, Route tables, Network Security Group, VPN tunnels, Fast Connect. Cloud storage - Storage best practices, storage performance metrics, Object Storage, Block Volume, File Storage, Storage Migration services. Cloud Security - Cloud guard Assessments, Configuration of Vault and Bastion. Export importing of SSL Certificate and updating of SSH Public/Private Keys Knowledge on Observability and Management - Basic concepts and MonitoringEvents IaaC tools like ansible, terraform etc. Should be able to understand Business requirements and map them to proposed solutions/enhancements Ability to drive performance issues and complex architecture issues. knowledge on OIC management of Oracle integrations Multi cloud exposure is a plus AWS,AZURE,GCP Certifications: OCI Architect Associate, OCI Architect/Operational professional Certification (preferred), or AWS Profession Architect or Azure Cloud Architect
Posted 2 months ago
3 - 7 years
10 - 20 Lacs
Pune
Work from Office
Security Operations Centre (SOC) - Lead Location: Pune(Aundh/Baner),India (On-site, In-House SOC) Department: Security Operations Center Experience: 4-6 Years Work Type: Full-time| Hybrid Model | 24x7 Rotational Shifts Role Overview: We are looking for an experienced and technically strong SOC Lead / Senior Engineer who will own and manage the core administration, tuning, detection engineering, and incident response infrastructure within the Security Operations Center. This is a hands-on technical role for someone who thrives in a high-paced, cloud-first environment and has expertise in SIEM (QRadar), XDR (CrowdStrike), DLP (Netskope), Deception (Canary), TIP/SOAR, and AWS Security. Key Responsibilities: Monitor, investigate, and close security incidents using QRadar SIEM , with deep expertise in offense triage and management. Administer and fine-tune configurations across multiple security platforms including QRadar, CrowdStrike XDR, Netskope DLP, Canary, Sysdig/Falco, and G-Suite Security to ensure optimal performance. Architect and deploy new SIEM content such as correlation rules, filters, dashboards, active lists, reports, and trends based on threat intelligence and business needs. Lead use case design and development for new detections based on the evolving threat landscape and attack techniques (MITRE ATT&CK alignment). Own the log onboarding lifecycle, including parsing, normalization, and enrichment for diverse AWS services and third-party SaaS platforms. Manage SLAs for incident detection, escalation, and resolution; ensure robust reporting and analytics for SOC operations. Conduct advanced threat hunting, packet-level analysis, and proactive detection activities using telemetry and behavioral analytics. Integrate and manage SOAR and TIP tools to drive automation and enrichment in incident response workflows. Lead vulnerability assessments and penetration testing activities in collaboration with infrastructure and DevSecOps teams. Develop and test incident response plans (IRPs) and playbooks for high-impact scenarios like ransomware, insider threats, and data exfiltration. Stay abreast of the latest threats, vulnerabilities, and exploits; conduct periodic threat briefings and internal knowledge transfers. Maintain detailed documentation of configurations, security procedures, SOPs, incident reports, and audit logs. Mentor junior SOC analysts and provide technical guidance during critical incidents and escalations. Creation of reports, dashboards, metrics for SOC operations and presentation to Sr. Management. Experience in Designing and deploying use cases for SIEM and other security devices. Continuously monitor security alerts and events to identify potential security incidents or threats. Follow standard operating procedures (SOPs), incident response runbooks, and recommend improvements where necessary. Understanding of network protocols (TCP/IP stack, SSL/TLS, IPSEC SMTP/IMAP, FTP, HTTP, etc.). Hands-on experience in security monitoring, Incident Response (IR), security tools configuration, and security remediation. Understanding of Operating System, Web Server, database, and Security devices (firewall/NIDS/NIPS) logs and log formats. Ensure all actions are compliant with internal policies, security standards, and regulatory requirements. Required Skills & Experience: Minimum 4 years of experience in SOC operations, including administrative expertise in SIEM platforms (preferably QRadar). Strong hands-on knowledge of SIEM tuning, content development, threat detection, and incident handling. Expertise in 3 or more of the following: SIEM (QRadar), XDR (CrowdStrike), SOAR/TIP Platforms, DLP (Netskope), Cloud Security (AWS), Deception Technology (Canary) Experience with network traffic analysis, packet capture tools, and deep dive investigations. Strong analytical, problem-solving, and decision-making skills. Familiarity with security frameworks such as MITRE ATT&CK, NIST, and CIS Controls. Preferred Qualifications: Professional certifications such as GCIA, GCED, GCIH, CEH, CCSP, AWS Security Specialty, or QRadar Certified Specialist. Prior experience in managing an in-house 24x7 SOC or leading shift teams. What We Offer: Work on a modern cloud-native security stack in a dynamic FinTech environment. Opportunity to lead security engineering and detection strategy for critical financial platforms. Be part of a tight-knit, expert-level team with a strong learning and innovation culture. Competitive salary, performance-based incentives, and growth opportunities.
Posted 2 months ago
6 - 10 years
14 - 16 Lacs
Hyderabad, Chennai, Bengaluru
Hybrid
Dear Professional, We are excited to present a unique opportunity at Cognizant, a leading IT firm renowned for fostering growth and innovation. We are seeking talented professionals with 5 to 10 years of experience in Splunk Administration,Splunk Development,Splunk Enterprise Security,Splunk Dashboard Creation,AlertLogic SIEM ,Threat Detection,Incident Response,Log Management,Security Analytics,Compliance Reporting,Real-time Monitoring,Alert Logic MDR,LogRhythm SIEM,LogRhythm Administration,LogRhythm Threat Detection, LogRhythm Incident Response to join our dynamic team. Your expertise in these areas is highly sought after, and we believe your contributions will be instrumental in driving our projects to new heights. We offer a collaborative environment where your skills will be valued and nurtured. To proceed to the next step of the recruitment process, please provide us with the following details with Updated resume to sathish.kumarmr@cognizant.com Please share below details (Mandatory) : Full Name(As per Pan card): Contact number:Email Current Location: Interested Locations: Total Years of experience: Relevant years of experience: Current company: Notice period: NP negotiable: if yes how many days they can negotiate? : If you are Serving any Notice period Means please mention Last date of Working: Current CTC- Expected CTC- Availability for interview on Weekdays ? Highest Qualification? Additionally, we would like to schedule a virtual interview with you on 2nd August 2024. Kindly confirm your availability for the same. We look forward to the possibility of you bringing your valuable experience to Cognizant. Please respond at your earliest convenience. Thanks & Regards, Sathish Kumar M R HR-Cognizant Sathish.KumarMR@cognizant.com
Posted 2 months ago
5 - 8 years
6 - 14 Lacs
Mumbai Suburban, Navi Mumbai, Mumbai (All Areas)
Work from Office
L2 SOC Analyst focusses on security alerts that need deeper analysis. Most of the alerts come from L1 analysts. L2 analysts also monitor alerts on sensitive assets and follow known APT. He takes part in the global SOC strategy event log collection and also participates to correlation rules and playbook definition and maintenance. He participates to the continuous improvement of the service. Role & responsibilities Experience working with ITSM ticketing system. Demonstrated understanding of various tools like SIEM, HIPS/NIPS, EDR, Packet Analysis, Network monitoring tool, AV. Demonstrated ability to improve and developpe detection rules. Demonstrated understanding of common Internet protocols and applications. Demonstrated scripting skills (bash, python). Demonstrated ability to improve and develop detection rules. Demonstrated ability to improve and develop playbooks Demonstrate understanding of internal Windows & Linux platforms Demonstrate understanding of TTPs and threads Experience with security architecture best practices Interested candidate share their profile on jyoti.mehra@safrangroup.com with CTC & Notice period details.
Posted 2 months ago
7 - 12 years
10 - 20 Lacs
Hyderabad
Work from Office
Cybersecurity Incident Response Analyst/ Threat Intelligence (Senior Person) Skills: Strong understanding of threat intelligence and cyber threat analysis methodologies. Experience in monitoring and analyzing security alerts from SIEM, EDR, IDS/IPS, and other security solutions. Proficiency in triaging security incidents, engaging stakeholders across business and technology teams. Knowledge of cybersecurity frameworks such as Mitre ATT&CK framework, Pyramid of Pain, NIST, ISO 27001, and regulatory standards like PCI DSS and GDPR . Familiarity with incident response processes for Tier 1 and Tier 2 operations, including containment, eradication, and recovery. Proven experience in Threat hunting and detection engineering. Ability to correlate security events and identify potential cyber threats. Short JD: The Cybersecurity Operations Analyst will be responsible for performing threat intelligence tasks, analyzing security alerts across multiple security solutions, and triaging incidents by collaborating with stakeholders across business and technology teams. You will follow the incident response process for Tier 1 and Tier 2 operations, ensuring timely identification, investigation, and mitigation of cyber threats.
Posted 2 months ago
4 - 9 years
5 - 15 Lacs
Hyderabad, Pune
Work from Office
Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response : Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation : Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis : Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography : Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security : Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting : Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance : Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs) : Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools : Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms : Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions : Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools : Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools
Posted 2 months ago
6 - 9 years
17 - 22 Lacs
Gurgaon
Work from Office
GRC Lead will manage and strengthen our Governance, Risk, and Compliance (GRC) initiatives for Managed Security Services (MSS) within the Telecom sector. The GRC Lead will be responsible for ensuring that the services we provide to our telecom clients adhere to industry standards, regulatory requirements, and robust risk management practices. This individual will play a key role in aligning our security services with client business objectives, improving our security posture, and ensuring compliance with telecom-specific regulations and frameworks. You have: 7+ years of experience in Governance, Risk, and Compliance (GRC), with at least 3 years in telecom or Managed Security Services (MSS) with a degree in Telecommunication Engineering, Computer Science, Information Security, or a related field (B.E/B.Tech/M.E/M.Tech/MCA). Expertise in telecom-specific security technologiesFirewalls, IDS/IPS, SIEM, encryption, access management, and incident response platforms. Experience working with security and compliance frameworksISO 27001, NIST CSF, PCI-DSS, GDPR, NIST SP 800-53, ETSI EN 303 645, also telecom infrastructure, including MPLS, 5G, IoT, and SDN/NFV. Familiarity with GRC tools such as RSA Archer, ServiceNow GRC, or MetricStream. Experience in telecom risk management processes, regulatory assessments, and vendor risk governance. It would be nice if you also had: Industry certifications such as CISM, CISA, CISSP, CRISC, ISO 27001 Lead Auditor/Implementer, TOGAF, or ITIL. Experience in stakeholder management, including executive communication, regulatory liaison, and conflict resolution with auditors or vendors. Strong analytical, negotiation, and project management skills in a cross-functional, multicultural telecom environment. Provide security governance leadership tailored to telecom networks, including mobile, 5G, SDN/NFV, and MPLS environments. Lead risk assessment, threat modeling, and management activities for telecom networks and emerging technologies like IoT and cloud. Ensure compliance with global and local telecom regulatory requirements (e.g., TRAI, DoT, GDPR, FCC, ETSI) through audits, reviews, and reporting. Manage and maintain telecom-specific security policies, technical and administrative controls, and compliance frameworks (ISO 27001, NIST, PCI-DSS). Act as the prime security and compliance interface towards customers, internal teams, auditors, subcontractors, and third-party suppliers. Develop and maintain a risk register, tracking treatment plans and mitigation strategies across client environments. Provide proactive consultation and guidance to customers regarding security best practices and compliance requirements. Oversee incident and crisis response activities to minimize business impact and regulatory exposure, ensuring adherence to notification guidelines. Ensure vendor security due diligence, contract compliance, and ongoing third-party risk monitoring within the telecom supply chain.
Posted 2 months ago
7 - 12 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:-mplement, configure, and manage PAM solutions such as CyberArk or BeyondTrust to ensure privileged access is secure, auditable, and compliant with regulatory standards.Work closely with IT, DevOps, and security teams to design and integrate secure access control systems into existing IT infrastructure.Perform security assessments and identify potential vulnerabilities in privileged accounts, systems, and services.Develop and enforce policies for privileged account management, password rotation, and access control.Monitor the activity of privileged accounts to detect any unusual or unauthorized behavior, escalating issues when necessary.Work with auditing teams to ensure compliance with security regulations and standards (e.g., NIST, PCI-DSS, GDPR).Provide guidance and support to the organization regarding security best practices for privileged access.Develop and maintain detailed documentation on the configuration, deployment, and operational procedures for PAM solutions.Participate in incident response efforts, identifying, containing, and mitigating security incidents involving privileged accounts.Stay current on emerging security threats and PAM technologies, applying this knowledge to enhance the organization's security posture. Professional & Technical Skills: Must To Have Skills: Proficiency in CyberArk Privileged Identity Access Management Strong understanding of cloud security principles Experience in designing and implementing security solutions Knowledge of security compliance standards Hands-on experience with security tools and technologies Additional Information: The candidate should have a minimum of 7.5 years of experience in CyberArk Privileged Identity Access Management This position is based at our Bengaluru office A 15 years full time education is required Qualification 15 years full time education
Posted 2 months ago
7 - 12 years
3 - 7 Lacs
Bengaluru
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Your day will involve ensuring the security of critical assets and mitigating potential risks. Roles & Responsibilities: Expected to be an SME Collaborate and manage the team to perform Responsible for team decisions Engage with multiple teams and contribute on key decisions Provide solutions to problems for their immediate team and across multiple teams Implement security measures to protect systems and data Conduct security assessments and audits Develop and implement security policies and procedures Professional & Technical Skills: Must To Have Skills: Proficiency in SailPoint IdentityIQ Strong understanding of identity and access management Experience with security tools and technologies Knowledge of security frameworks and standards Hands-on experience in incident response and threat detection Additional Information: The candidate should have a minimum of 7.5 years of experience in SailPoint IdentityIQ This position is based at our Bengaluru office A 15 years full-time education is required Qualification 15 years full time education
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
27534 Jobs | Dublin
Wipro
14175 Jobs | Bengaluru
Accenture in India
9809 Jobs | Dublin 2
EY
9787 Jobs | London
Amazon
7964 Jobs | Seattle,WA
Uplers
7749 Jobs | Ahmedabad
IBM
7414 Jobs | Armonk
Oracle
7069 Jobs | Redwood City
Muthoot FinCorp (MFL)
6164 Jobs | New Delhi
Capgemini
5421 Jobs | Paris,France