Jobs
Interviews

519 Incident Response Jobs - Page 18

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 7.0 years

7 - 11 Lacs

Kochi

Work from Office

Job Title Security Analyst Role and Responsibilities The security Analyst is a member of the CISO Regulatory & Compliance Team and will assist in ensuring the associated business units / accounts comply with applicable Conduent and NIS 2 security standards, regulations, and policies.The Security analyst will be professional, independent, impartial, and fair in all interactions. The security resource is accountable for procedures and processes that ensure the integrity, confidentiality, and availability of assigned Business units\u2019 information, applications, and infrastructure. Resource will perform routine risk assessments, security audits, and vulnerability scans to identify, evaluate, document, and remediate organization risk, control gaps and vulnerabilities. This position will be responsible for developing security reports, security recommendations, and security policies and procedures that are meaningful, defensible, and actionable for a variety of audiences as pertained to assigned business units. Perform log collection, correlation, reviews, archival, retention, and monitoring of automated alerts for items such as, and not limited to IPS/IDS alerts; change detection (FIM) alerts application firewall alerts; malware alerts rogue wireless network alerts security system health alerts; exploit attempt alerts Participate and be an integral component of audit, compliance, and regulatory functions, including and not limited to audits of system security to ensure compliance with Corporate security framework NIS 2, NIST 800-53, ISO 27001/2, PCI-DSS emerging country, state, and Federal privacy laws Primary POC in a vulnerability management program of the account that includes external and internal vulnerability scans of applications and systems external and internal penetration tests of applications and systems documentation and remediation of identified vulnerabilities and exploits routinely monitoring various communication avenues for security vulnerabilities and security patches taking a risk-based approach comparing those security vulnerabilities and security patches across the operating environments making recommendations to various IT teams on the mitigation process for those identified security vulnerabilities Coordinate with business units, operations, and technology teams for incident response, remediation, and improvement Acts as the initial point of contact to facilitate the handling of security audits and client requests Supports the creation of business continuity/disaster recovery plans, to include conducting disaster recovery tests, publishing test results, and making changes necessary to address deficiencies Maintain documentation that supports the annual Security compliance attestation as it is relevant to the assigned Business units Qualifications and Education Requirements CIPP, CRISC, CISA, CISSP, CISM, ISO or any security/IT audit certification is a plus. Minimum of Five (3 to 5) Years of experience in IT Security compliance, or Security Auditing is required. Knowledge and understanding of security controls across all security domains, such as access management, encryption, vulnerability management, authentication, authorization, network security, physical security, etc. Ability to identify security risks in application, system, and network architecture, data flow, and processes or procedures Ability to assess the organizational impact of identified security risks and recommend solutions or mitigating controls. Knowledge of security technologies, devices, and countermeasures, as well as the threats they are designed to counter. Experience with developing security reports, recommendations, policies, and procedures that are meaningful, defensible, and actionable for a variety of audiences. Familiarity with more than one framework (NIST 800-series, ISO 27000-series, PCI DSS and ISO, HIPAA, HITRUST, FISMA, FedRAMP other common security control frameworks). Experience in PowerPoint, Word, Excel; experience with Visio and MS Project. Communication skills (interpersonal, verbal, presentation written, email). Experience to write report segments and to participate in presentations. Familiarity with security, workflow, and collaboration tools such Nessus Tenable, Splunk, SharePoint and ServiceNow (Snow) is a plus Positive attitude, team player, self-starter; takes initiative, ability to work independently and effectively with all levels of staff and management both internally and externally Preferred Skills Creating and Maintaining NIST 800-53-rev5 based SSP and POAM Familiarity with more than one framework (NIST 800-series, ISO 27000-series, PCI DSS and ISO, HIPAA, HITRUST, FISMA, FedRAMP other common security control frameworks). Conduent is an Equal Opportunity Employer and considers applicants for all positions without regard to race, color, creed, religion, ancestry, national origin, age, gender identity, gender expression, sex/gender, marital status, sexual orientation, physical or mental disability, medical condition, use of a guide dog or service animal, military/veteran status, citizenship status, basis of genetic information, or any other group protected by law. People with disabilities who need a reasonable accommodation to apply for or compete for employment with Conduent may request such accommodation(s) by submitting their request through this form that must be downloaded:click here to access or download the form. Complete the form and then email it as an attachment toFTADAAA@conduent.com.You may alsoclick here to access Conduent's ADAAA Accommodation Policy. At Conduent we value the health and safety of our associates, their families and our community. For US applicants while we DO NOT require vaccination for most of our jobs, we DO require that you provide us with your vaccination status, where legally permissible. Providing this information is a requirement of your employment at Conduent.

Posted 1 month ago

Apply

12.0 - 15.0 years

13 - 17 Lacs

Gurugram

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Delivery Governance Good to have skills : NAMinimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and overseeing the transition to cloud security-managed operations. You will engage in strategic discussions to align security measures with organizational objectives, ensuring a robust security posture while adapting to evolving threats and compliance requirements. Roles & Responsibilities:- SOC Operations:Lead and manage day-to-day operations of the SOC, including Tier 13 security analysts.Oversee security monitoring, threat detection, incident response, and threat intelligence activities.Ensure continuous tuning and enhancement of SIEM and EDR tools.Create and maintain incident response playbooks and workflows.Collaborate with infrastructure and application teams during security events.Security Governance, Risk & Compliance:Develop and enforce cybersecurity policies, standards, and procedures aligned with business objectives and regulatory requirements.Coordinate risk assessments, audits, and compliance initiatives (e.g., ISO 27001, NIST, GDPR, HIPAA).Lead security awareness and training initiatives across the organization.Track and report on cybersecurity risks, mitigation plans, and audit findings.Partner with legal, audit, and compliance teams to ensure alignment with industry and legal frameworks.Strategic Leadership:Provide executive-level reporting on threat posture, key risks, and SOC performance.Guide long-term planning and roadmap development for security operations and governance initiatives.Mentor and develop SOC staff and GRC team members.Stay current with industry trends, threat landscape changes, and evolving compliance standards. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Delivery Governance.- Strong understanding of cloud security principles and frameworks.- Experience with risk assessment and management methodologies.- Ability to design and implement security policies and procedures.- Familiarity with compliance standards such as ISO 27001, NIST, and GDPR.-Reccomend use case fine tuning-Regularly review use cases and suggest enhancements. -Run internal Table top exercises to help train the team-Maintain IR quality as per industry standards Additional Information:- The candidate should have minimum 12 years of experience in Security Delivery Governance.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

2.0 - 6.0 years

3 - 7 Lacs

Gurugram

Work from Office

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Security Delivery Governance Good to have skills : NAMinimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Your day will involve ensuring the security of critical assets and systems. Roles & Responsibilities:- Expected to be an SME, collaborate, and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Develop and implement security policies and procedures.- Conduct security assessments and audits.- Monitor security incidents and respond to breaches promptly.- Stay updated on the latest security trends and technologies. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Delivery Governance.- Strong understanding of security frameworks and compliance standards.- Experience in conducting risk assessments and vulnerability scans.- Knowledge of security tools and technologies.- Good To Have Skills: Experience with Security Incident Response.- Hands-on experience in implementing security controls and measures. Additional Information:- The candidate should have a minimum of 12 years of experience in Security Delivery Governance.- This position is based at our Gurugram office.- A 15 years full-time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

9.0 - 14.0 years

27 - 42 Lacs

Bengaluru

Work from Office

Job Summary: We are seeking a highly experienced SOC SME to lead complex incident response, design advanced detective controls, and perform proactive threat hunting across multi-platform environments. This role demands strong technical expertise in security operations and a proactive approach to threat mitigation. Work from Office - Bangalore location [Brookfield] Rotational and Night Shift applicable Mandatory Skill Set: 8+ years in Security Operations/Incident Response Hands-on with SIEM, SOAR, XDR platforms (e.g., Cortex XSIAM, Torq) Expertise in threat hunting and event analysis Knowledge of cyber frameworks: MITRE ATT&CK, NIST, Kill Chain Experience with EDR tools , network forensics , and log analysis Strong understanding of incident lifecycle and post-incident reporting Excellent analytical and communication skills Bachelor's degree in Computer Science or related field Key Responsibilities: Lead incident response (IR) and analyze complex security events Design and improve detective controls and alert use cases Conduct proactive threat hunting and trend analysis Stay updated on cyber threat landscape and threat actor TTPs Contribute to security innovation , tool enhancement, and process maturity Deliver detailed incident reports and post-mortem reviews Preferred Skills: Scripting: Python, PowerShell Cloud Security: AWS, Azure, GCP Certifications: CISSP, GIAC, CEH Strong grasp of defense-in-depth and layered security strategies

Posted 1 month ago

Apply

0.0 - 3.0 years

3 - 4 Lacs

Mohali

Work from Office

Job Description: We are looking for an enthusiastic and dependable Entry-Level NOC/SOC Support Analyst to join our on-site team in ChandigarhMohali. This position is suited for individuals at the early stages of their IT or cybersecurity careers, with a passion for monitoring, troubleshooting, and continuous learning. As part of a rostered shift, you will be responsible for monitoring and managing both NOC (Network Operations Centre) and SOC (Security Operations Centre) support queues ensuring timely responses, accurate escalation, and clear communication. Key Responsibilities Monitor networks, systems, and security alerts using various NOC and SOC platforms. Respond to and triage incidents raised in the support queue (network/system/security related). Perform initial investigation and analysis of events to determine severity and priority. Escalate incidents according to predefined workflows and procedures. Conduct basic troubleshooting on infrastructure or endpoint issues before escalation. Maintain accurate and detailed incident documentation in the ticketing system. Run scheduled infrastructure and security health checks and log observations. Coordinate with internal and external stakeholders during incident resolution. Follow shift handover procedures to ensure continuity. Participate in the 24x7 rotating roster (including nights, weekends, and holidays). Requirements A degree/diploma in Information Technology, Computer Science, Cybersecurity, or a related field. Basic understanding of: Networking (TCP/IP, LAN/WAN, DNS, firewalls, etc.) Operating systems (Windows/Linux basics) Cybersecurity fundamentals (threats, vulnerabilities, malware types) Clear written and verbal communication skills. Excellent problem-solving and team collaboration abilities. Willingness to work on-site and in a rotating 24x7 shift pattern. Preferred Qualifications Exposure to network and system monitoring along with monitoring over EDR or SIEM tools. Familiarity with ticketing systems like ServiceNow, Jira, Fresh Service or similar. Entry-level certifications such as CompTIA Security+, CCNA, or equivalent (desirable but not mandatory). What We Offer Hands-on exposure to both network and security operations. Clear career growth path with mentorship and learning support. Opportunity to work with cutting-edge cybersecurity and infrastructure technologies. A supportive team culture focused on professional development

Posted 1 month ago

Apply

10.0 - 13.0 years

35 - 50 Lacs

Chennai

Work from Office

Job Summary We are seeking an experienced R2 Architect with 10 to 13 years of experience in SRE DevOps and SRE Concepts. The ideal candidate will work in a hybrid model primarily during the day shift. This role does not require travel. The candidate will play a crucial role in ensuring the reliability and efficiency of our systems contributing to the companys overall success and societal impact. Responsibilities Lead the design and implementation of SRE practices to enhance system reliability and performance. Oversee the development and maintenance of automated solutions for system monitoring and incident response. Provide technical guidance and mentorship to the SRE team to ensure best practices are followed. Collaborate with cross-functional teams to identify and address system bottlenecks and performance issues. Implement and manage CI/CD pipelines to streamline software delivery processes. Develop and maintain comprehensive documentation for SRE processes and procedures. Conduct regular system audits and performance reviews to ensure optimal operation. Implement robust incident management protocols to minimize downtime and service disruptions. Monitor system health and performance metrics to proactively address potential issues. Drive continuous improvement initiatives to enhance system reliability and efficiency. Ensure compliance with industry standards and best practices in SRE and DevOps. Facilitate effective communication and collaboration between development and operations teams. Utilize data-driven insights to inform decision-making and optimize system performance. Qualifications Possess extensive experience in SRE DevOps and SRE Concepts. Demonstrate proficiency in implementing and managing CI/CD pipelines. Exhibit strong problem-solving skills and the ability to address complex system issues. Have a solid understanding of automated monitoring and incident response solutions. Show excellent communication and collaboration skills to work effectively with cross-functional teams. Maintain a proactive approach to system health and performance monitoring. Display a commitment to continuous improvement and staying updated with industry trends. Hold relevant certifications in SRE or DevOps practices. Bring a proven track record of enhancing system reliability and efficiency. Demonstrate the ability to mentor and guide team members in best practices. Exhibit strong organizational skills and attention to detail. Have experience in developing and maintaining comprehensive documentation. Show a commitment to ensuring compliance with industry standards and best practices.

Posted 1 month ago

Apply

2.0 - 5.0 years

5 - 6 Lacs

Mohali

Work from Office

Job Description- Cyber Defense Analyst We are looking for the next superstar Cyber Security Analyst to join our managed services team. Youll be part of a team responsible for the delivery of 24x7 security monitoring and analysis, with a primary focus on incident response and threat hunting. This is a customer-facing role and top-notch communication skills are absolutely essential. The Role Monitor, triage and respond to reported security incidents. Proactively hunt and manage unreported (aka. silent) phishing attacks (Intrusion Detection) Gather information, run correlation analysis and forensics to inform risk assessment Actively and timely communicate information about incidents or potential incidents to the wider team as per escalation policies Write post-incident reports Where required, develop security frameworks, contribute to run books, and lead the implementation of new security tools Work across multiple domains and technology stacks to identify vulnerabilities Ideal Personality Passion for cybersecurity Perseverance and tenacity Strong willingness to learn Logical problem-solver with a strongly analytical bent of mind Detail-oriented Ability to maintain a cool head and take decisive action in time-critical situations Natural team player. Good at building and maintaining relationships across the team, as well as getting others on board Understands the importance of proactive and clear communication in a large, busy environment Skills Very strong communication skills, report-writing and verbal communication. You must be excellent at explaining what's happening to other people in a clear and timely manner. Ability to identify, classify and breakdown the taxonomy of various types of phishing attacks. Good understanding of networks, applications, databases, systems, Active Directory, Cloud platforms and how they work together. PowerShell or Python scripting knowledge. Demonstrable expertise in any 4 of the following: Incident Management & Response, Threat Hunting with EDR & SIEM, IPS/IDS, Endpoint Monitoring & Detection, and Forensics Good understanding of Information Security Standards and Frameworks like NIST, GDPR, ISO27001, CIS Benchmarks Knowledge of information security tools and techniques and current industry best practices Qualifications & Experience: 2-3 years of real-world experience dealing with wide-ranging Incident Response with a strong understanding of phishing incidents and their mitigation steps. 2-3 years of real-world experience working with SEGs or general email systems 2-3 years of real-work experience working with the SIEM solutions. 2-3 years of real-world experience working with EDR solutions. 2-3 years of experience with Threat Assessment and Mitigation methods, Vulnerability Analysis, risk mitigation, information gathering and reporting 2-3 years of experience working in enterprise security operations Security qualifications i.e. a relevant security-related certification or degree

Posted 1 month ago

Apply

4.0 - 9.0 years

10 - 17 Lacs

Bengaluru

Work from Office

Hiring for SOC Analyst Experience- 6+ Years Position Title - SOC Analyst Experience- 4+ Skills - soc Work location- Bangalore Shift - Rotational 24/7 IF interested please share your profile on- ekta11.kumari@global.ntt Please share profiles with below details Total exp - Rel Exp NP - C CTC - E CTC - C Location. Preferred candidate profile Role & responsibilities Preferred candidate profile

Posted 1 month ago

Apply

5.0 - 7.0 years

10 - 12 Lacs

Bengaluru

Work from Office

OPPORTUNITY OVERVIEW As a Platform Specialist Team Lead at ZeroFOX, you will join a team of highly skilled individuals working to prevent cyber attacks for enterprise-level commercial and government customers. Using our proprietary hybrid intelligence platform, this role specifically focuses on supporting existing customers by providing detailed analysis and contextualization regarding a variety of cyber risks. You will have the opportunity to research these risks, develop notification and alert packages, and present your findings to customers. Your goal: Keep our customers safe with detailed threat intelligence information, and present findings in a professional manner. Responsibilities: Analyze large volumes of data for customer-related risks. Create risk notification and alert packages for customers. Interface with customers and stakeholders to provide analysis reports and details. Support and respond to customer requests for further information and analysis. Responsible for communications with the customers including: phone, video, email, and authoring reports. Triage alerts for customers to give real time intelligence. Act as an escalation point for Tier 1 alert analysis, platform configuration, and trend analysis; Managing the team based on metric driven outcomes Serve as a resource for the Account Management team to explain the managed service. Act as a customer advocate internally, working across appropriate teams to solve customer challenges Support team productivity and outputs during assigned shifts. Identify opportunities for process improvement and efficiency. Provide coaching, training, and mentorship to team members. Act as a liaison between team members and upper management. Conduct regular performance evaluations and provide feedback to team members. Provide regular updates and reports on team progress to upper management. Required Qualifications: Attention to detail Experience working in a team environment and responsible for certain aspects of service delivery Ability to lead a team and be a point of contact as a subject matter expert Knowledge of the cyber threat environment including how the following sources of data enable cyber operations: major social networks (knowledge of emerging networks a big plus); dark web; domain abuse; analyze security incidents, such as account breaches, unauthorized access, or malicious content etc. Superior research and analysis skills Ability to convey complex ideas, trends, and information in a simple way (a writing sample will be requested as part of the interview process) Ability to extrapolate trends from mass amounts of disparate data Solid interpersonal and social skills Experience with other SaaS, cyber security, or social media products or services is preferred Must be willing to work alternative work schedule including partial weekends Big Bonus: Basic scripting capabilities: JavaScript, Python, or similar; at minimum being able to review and edit basic code structure Comfort working with a quickly growing team Ability to quickly adapt and recommend solutions as needed A self-starting mentality, when you find a problem, you alert the team, and fix ityou dont wait for the next task. Familiarity and comfort with producing superior work while meeting aggressive deadlines Benefits Competitive compensation Community-driven culture with employee events Generous time off Best-in-class benefits Fun, modern workspace Respectful and nourishing work environment, where every opinion is heard and everyone is encouraged to be an active part of the organizational culture

Posted 1 month ago

Apply

2.0 - 7.0 years

6 - 14 Lacs

Hyderabad, Bengaluru

Work from Office

Shift - Sun-Thu, Tue - Sat Timings - 6:30 AM- 3 PM IST, 2:30-11 PM IST Hybrid - 3 days per week (No cab facilities from Uber) Location : Hyderabad / Bangalore (India) Skills: Digital Forensic and Incident Response. Security Investigation and Triage. 2+ years of experience are mandatory in the security domain. Certification: Any Security Certification is a plus. Title: Security Analyst About the Role: Uber's Security Response and Investigations (SRI) team is the cybersecurity incident response body at Uber. SRI responds to security incidents and mitigates security threats across the company. The SRI team is made of three teams: vSOC (virtual Security Operations Center), Investigations and Automation, and Incident Command. You will be joining the vSOC team. As a Security Analyst on the vSOC team, You will be on the front-line of defense for the Uber Security Incident Response program. You will be handling triage for all security alerts for Uber globally across all environments (cloud, prod, corp). You will build Standard Operating Procedures (SOP) and help improve the incident response program. You will serve as an incident coordinator during high and critical severity incidents. Expect to work weekend shift (Saturday / Sunday) Basic Qualifications: Good understanding of cybersecurity fundamentals. This includes but is not limited to network protocols (e.g. TCP/IP stack) and security, system security, email security, etc. 2+ years of hands-on experience in a cybersecurity role. 1+ year of hands-on experience with security monitoring and response in a SOC environment. Strong problem-solving skills. Good communication skills. Preferred Qualifications: Experience with cybersecurity forensic methodologies and software. Experience driving complex incidents or leading investigations end-to-end. Threat hunting and Automation experience(SOAR/Python). Applied knowledge of cyber intel frameworks such as ATT&CK framework and kill-chain model. Experience working crisis events for a global company. Ability to work across geographically distributed teams.

Posted 1 month ago

Apply

2.0 - 5.0 years

5 - 9 Lacs

Noida

Work from Office

Optum is a global organization that delivers care, aided by technology to help millions of people live healthier lives. The work you do with our team will directly improve health outcomes by connecting people with the care, pharmacy benefits, data and resources they need to feel their best. Here, you will find a culture guided by inclusion, talented peers, comprehensive benefits and career development opportunities. Come make an impact on the communities we serve as you help us advance health optimization on a global scale. Join us to start Caring. Connecting. Growing together. Primary Responsibilities Monitor and analyze attempted efforts to compromise security protocols. Identify and investigate activities and conduct and provide analyses regarding results Collaborate with other Cyber Defense teams Review SIEM alerts and logs to identify and report possible security issues Serve as an escalation resource and mentor for other SOC analysts Perform investigations and escalation for complex or high severity security threats or incidents Work across the organization to define, develop, and refine correlation rules Participate in writing security status reports to provide system status, report potential and actual security violations and provide procedural recommendations Participate in knowledge sharing with other team members and industry collaboration organizations to advance the security monitoring program Participate in developing and supporting strategic plans and projects to meet Global Security and SOC goals and objectives Maintain an in-depth knowledge of common attack vectors, common security exploits, and countermeasures. Maintain a solid working knowledge of Information Security principles and practices Research the current information security and event monitoring trends, and keep up to date with SOC issues, technology, and industry best practices Coordinate evidence/data gathering and documentation and review Security Incident reports Assist in strategic initiatives Provide recommendations for improvements to security operational monitoring and incident response procedures based on operational insights Comply with the terms and conditions of the employment contract, company policies and procedures, and any and all directives (such as, but not limited to, transfer and/or re-assignment to different work locations, change in teams and/or work shifts, policies in regards to flexibility of work benefits and/or work environment, alternative work arrangements, and other decisions that may arise due to the changing business environment). The Company may adopt, vary or rescind these policies and directives in its absolute discretion and without any limitation (implied or otherwise) on its ability to do so Required Qualifications BS in Computer Science, Computer Engineering, Cyber Security, Forensics and/or equivalent work experience Security certifications (e.g. Security+, Network+, Cloud+, AZ-900 (Microsoft Azure Fundamental), SC-200 (Microsoft Security Operations Analyst, etc.) Experience in incident detection and response Experience working with network tools and technologies such as firewall (FW), proxies, IPS/IDS devices, full packet capture (FPC), and email platforms Willing to work in a team-oriented 24/7 environment; schedule flexibility as needed to work with a global team Preferred Qualifications Experience building use cases and performing log analysis using technology like KQL, Splunk, AlienVault, Q-radar etc. SOAR or Scripting experience using Python, PowerShell etc. At UnitedHealth Group, our mission is to help people live healthier lives and make the health system work better for everyone. We believe everyone-of every race, gender, sexuality, age, location and income-deserves the opportunity to live their healthiest life. Today, however, there are still far too many barriers to good health which are disproportionately experienced by people of color, historically marginalized groups and those with lower incomes. We are committed to mitigating our impact on the environment and enabling and delivering equitable care that addresses health disparities and improves health outcomes — an enterprise priority reflected in our mission.

Posted 1 month ago

Apply

4.0 - 9.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Optum is a global organization that delivers care, aided by technology to help millions of people live healthier lives. The work you do with our team will directly improve health outcomes by connecting people with the care, pharmacy benefits, data and resources they need to feel their best. Here, you will find a culture guided by inclusion, talented peers, comprehensive benefits and career development opportunities. Come make an impact on the communities we serve as you help us advance health optimization on a global scale. Join us to start Caring. Connecting. Growing together. As a Senior Information Security Engineering Consultant, your responsibilities include administration, maintenance, architecture, and engineering related to on-premise and cloud security solutions. This includes, direct support, technical ownership, and leading others with regards to the platforms. Additional responsibilities as needed, but may include security posture review and analysis, security vulnerability scanning, monitoring and alerting development and tooling, and security incident response. Primary Responsibilities Work on-call and non-standard hours when necessary Support team leads and Subject Matter Expert (SME) for approaches, procedures, and implementation of Cybersecurity systems, specifically perimeter firewalls Be able to troubleshoot in highly complex, technical situations within an enterprise organization Be able to identify and mitigate risks Capable of formulating and implementing procedures and systems Be able to document and communicate on an expert level Have or be in process of obtaining advanced certifications pertinent to area of expertise Collaborate in the development of training content for issues related to IT Cybersecurity Develops and oversees the development of innovative approaches and solutions to complex problems and issues Supports the monitoring and responses to security incidents, offering expertise to ensure prompt and effective resolution Collaborates with director, managers, project managers, architects and other technical personnel to ensure mitigation of risks to the company Comply with the terms and conditions of the employment contract, company policies and procedures, and any and all directives (such as, but not limited to, transfer and/or re-assignment to different work locations, change in teams and/or work shifts, policies in regards to flexibility of work benefits and/or work environment, alternative work arrangements, and other decisions that may arise due to the changing business environment). The Company may adopt, vary or rescind these policies and directives in its absolute discretion and without any limitation (implied or otherwise) on its ability to do so Required Qualifications Graduate degree or equivalent experience 6+ years of experience in IT Security for large enterprise environments 5+ years of experience with next gen/firewall (ex. Palo Alto) 5+ years of experience with WAN/LAN routing, switching, proxy and firewall environments Work experience as a system security engineer or information security engineer Proven solid planning and problem-solving skills Proven ability to troubleshoot in highly complex, technical situations within a matrixed organization Preferred Qualification CompTIA Security +, or related certification, PCNSE, CCNA, Network +

Posted 1 month ago

Apply

10.0 - 12.0 years

15 - 18 Lacs

Hyderabad

Hybrid

The Role: The Senior Information Security Engineer is for responsible for implementing industry best security practices, will design, implement, maintain, and document the security measures to protect the organization against cyber threats and attend all ISO audits and requirements. Your Responsibilities: Ensuring that an ISMS system is established, implemented, and maintained in accordance with the ISO 27001:2013 and/or ISO 27001:2022. Lead all ISO and customer security audits/meetings and compliance activity. Contributing to Request for Proposal (RFPs) and supporting IT in CAPA management and Change Controls. Conducting regular internal security audits (Quarterly basis) to assess the effectiveness of security controls and identify areas for improvement. IT tickets handling related to security related incidents. Security Incident Reporting - Generating and presenting regular reports on the organization's security posture(weekly/quarterly/annual), including incidents, vulnerabilities, and risk mitigation efforts. Organization wide Security Awareness - Contributing to and developing security awareness by way of email leaflet/posters on monthly basis and training materials to improve security posture among the organization's staff. Security Policies and Procedures - Developing and implementing security policies, standards, and procedures to safeguard the organization's information assets. Review process documentation to ensure adequacy and consistency is maintained. Risk Assessment - Contribute to the team on regular assessments to identify potential security risks and vulnerabilities in the organization's IT infrastructure. Vulnerability Management - Monitoring and managing vulnerabilities in the organization's systems, including applying patches and updates in a timely manner. Running and automation of vulnerability scans and responsible for closure. Penetration Testing - Gathering penetration test requirements and performing internal pen tests on a scheduled basis. Should be adaptable for 24x7x365 availability for new security related projects/tasks. Preferred Qualifications, Training and Experience: Engineering degree in Computer Science, Information Technology, or a related field. Certifications such as CISSP, CISA/CISM, CEH and ISO 27001 demonstrating expertise in information security management and practices. Minimum of 10 years’ experience in information security roles, with a focus on security architecture, ISO Audits, incident response, and risk management. In-depth knowledge of security technologies such as firewalls, intrusion detection/prevention systems, encryption, and endpoint security solutions. Proficiency in security monitoring tools and techniques for detecting and responding to security incidents in real-time.

Posted 1 month ago

Apply

6.0 - 9.0 years

8 - 10 Lacs

Chennai

Work from Office

We Have opening on both L2/L3 SOC Analyst Experienced SOC L3 Analyst is needed to expand our group. You will oversee managing and resolving complicated cybersecurity events that have been escalated from L1 and L2 Analysts as an L3 Analyst. To find the underlying cause of security events and offer suggestions for correction, you will be expected to conduct extensive investigations and forensic analyses. Key Responsibilities for this job: Represent the highest level of escalation for cybersecurity issues. To identify the underlying causes of occurrences, carry out comprehensive investigations and forensic analysis. Provide remediation advice and collaborate with L1 and L2 analysts to implement it into practice. Create and maintain playbooks and incident response plans. Conduct penetration tests and vulnerability assessments. Analyze and evaluate the organization's cybersecurity threats. Take part in security audits and assessments. Create and uphold security standards, rules, and procedures. Instruct and guide young analysts in incident response best practices. Knowledge and experience required: Bachelor's degree in computer science, Cybersecurity, or a related field. 5+ years of experience in a SOC environment, with a focus on incident response and forensic analysis. Strong knowledge of cybersecurity frameworks, such as NIST and ISO. Experience working with security tools such as SIEM, IDS/IPS, endpoint detection and response, and firewalls. Excellent analytical and problem-solving skills. Strong communication and collaboration skills. Relevant certifications, such as CISSP, GCIA, GCIH, and/or CISA are highly preferred. Preferred Tool: Rapid7, LogRhythm, Sentinel, Fortinet SOAR, etc Shift flexibility, including weekends and holidays (24*7) Jumping on the call with Vendors and other teams to discuss issues with partners/ to get their requirements and deliver the same in the form of projects Tuning of rules, filters, and policies for detection-related security technologies to improve accuracy and visibility. Providing weekly/monthly reports to the Upper Management.

Posted 1 month ago

Apply

7.0 - 12.0 years

5 - 15 Lacs

Kottayam, Pune, Thiruvananthapuram

Hybrid

Security Specialist, Incident Response Responsibilities includes • Lead security incident response in a cross-functional environment and drive incident resolution. • Lead and develop Incident Response initiatives that improve Allianz capabilities to effectively respond and remediate security incidents. • Perform digital forensic investigations and analysis of a wide variety of assets including endpoints. • Perform log analysis from a variety of sources to identify potential threats. • Build automation for response and remediation of malicious activity. • Write complex search queries in the EDR as well as SIEM tools for hunting the adversaries. • Works on SOAR cases, automation, workflow & Playbooks. • Integrating and working on Identity solutions. • Developing SIEM use cases for new detections specifically on identity use cases. Minimum Qualifications: • 5-10 years of experience in Security Incident Response, Investigations • Working experience in Microsoft On-prem and Entra ID solutions • Good knowledge in Active Directories and Tier 0 concepts • Very good knowledge of operating systems, processes, registries, file systems, and memory structures and experience in host and memory forensics (including live response) on Windows, macOS and Linux. • Experience investigating and responding to both external and insider threats. • Experience with attacker tactics, techniques, and procedures (MITRE ATT&CK) • Experience analyzing network and host-based security events

Posted 1 month ago

Apply

2.0 - 6.0 years

8 - 9 Lacs

Mumbai

Work from Office

Diverse Lynx is looking for SOC Analyst to join our dynamic team and embark on a rewarding career journey. Monitor and analyze security events and incidents, identifying and investigating potential threats Maintain the security of our network and systems by implementing security controls and best practices Work closely with the rest of the security team to ensure that our systems and networks are secure and compliant with industry standards Maintain accurate documentation and reports on security events and incidents Communicate effectively with team members and other stakeholders to ensure that security issues are addressed in a timely and effective manner Stay up to date with the latest security technologies and threats

Posted 1 month ago

Apply

4.0 - 9.0 years

9 - 13 Lacs

Bengaluru

Work from Office

Diverse Lynx is looking for SOC Lead to join our dynamic team and embark on a rewarding career journey. Lead the SOC team and manage the organization's security operations Ensure that the SOC is staffed with skilled analysts and that the SOC team is executing their tasks efficiently and effectively Monitor and respond to security events and alerts to detect potential security incidents Manage security incidents and provide guidance on remediation Develop and maintain incident response plans and playbooks Collaborate with cross-functional teams to ensure security technologies, policies, and procedures align with business needs Develop and maintain security policies, standards, and procedures Conduct security awareness training for employees and contractors Experience with security information and event management (SIEM) tools such as Splunk or QRadar Excellent problem-solving and analytical skills Strong communication and interpersonal skills

Posted 1 month ago

Apply

15.0 - 24.0 years

0 - 0 Lacs

Vadodara

Work from Office

Job Title: Deputy Director (System Support Cell) Position Overview: We are seeking an experienced IT Infrastructure & Security Leader with a robust background in strategic planning, risk management, and project execution to lead the organization's cybersecurity and IT infrastructure efforts. This role will be responsible for driving organizational security, enhancing operational efficiency, and ensuring the protection of critical business assets through effective leadership, planning, and policy development. Key Responsibilities: 1. Security Leadership & Strategic Planning: - Develop and implement cybersecurity policies, risk mitigation strategies, and incident response plans to protect business assets. - Align IT and security strategies with organizational goals, ensuring technology supports business objectives. - Create long-term roadmaps for IT infrastructure and security enhancements, identifying emerging technologies for scalability, performance, and security. - Deliverables: Comprehensive IT and Security Strategy Document, IT and Security Roadmap for growth and innovation. 2. IT Infrastructure & Operations Management: - Oversee daily IT and security operations, ensuring systems run efficiently and securely. - Lead and mentor staff to foster teamwork, innovation, and professional growth. - Manage IT and security budgets, optimizing resource allocation without compromising quality. - Deliverables: Monthly Operations Performance Reports, Staff Training Programs, Annual Budget Proposals, and Quarterly Expenditure Reports. 3. Policy Development & Compliance: - Create and enforce policies for data protection, secure access, and operational efficiency while ensuring compliance with regulations like GDPR, HIPAA, and industry standards. - Regularly review and update policies to adapt to evolving threats and technologies. - Deliverables: Comprehensive Policy Handbook, Compliance and Policy Review Reports. 4. Risk Management & Compliance: - Identify and mitigate IT and security risks, conducting risk assessments and implementing frameworks like NIST or ISO 27001. - Ensure compliance with legal and regulatory requirements. - Deliverables: Risk Assessment and Mitigation Plans, Audit Reports for compliance and risk evaluations. 5. Project Management: - Plan and execute IT and security projects, including infrastructure upgrades, security implementations, and process improvements, coordinating with stakeholders to meet timelines, budgets, and objectives. - Deliverables: Project Plans, Post-Project Reports evaluating success and lessons learned. 6. Incident Detection, Response & Recovery: - Develop and implement an Incident Response Plan (IRP) to detect, respond to, and recover from security breaches. - Lead cyber incident investigations and implement remediation measures to prevent future risks. - Deliverables: Tested Incident Response and Recovery Plans, Post-Incident Analysis Reports. 7. Technical Support & Services: - Oversee technical support efforts, ensuring reliable IT services, addressing escalated technical issues, and optimizing system performance. - Deliverables: Help Desk Metrics, troubleshooting processes, and user guides. 8. Communication & Liaison: - Act as a bridge between IT, security, and other departments to ensure alignment with organizational goals. - Communicate IT and security performance, challenges, and opportunities to senior management. - Deliverables: Periodic Performance Reports, meeting summaries with actionable recommendations. 9. Innovation & Technology Adoption: - Identify and integrate emerging technologies to improve productivity, scalability, and security. - Continuously evaluate and enhance IT and security systems to ensure resilience and innovation. - Deliverables: Feasibility studies for New Technologies, Continuous Improvement Plans. 10. Network Architecture & Performance Monitoring: - Design secure and scalable networks supporting availability, performance, and security, including network components like switches, firewalls, and load balancers. - Implement cloud and hybrid infrastructures for scalability and flexibility, monitoring network performance and optimizing reliability. - Deliverables: Network Architecture Diagrams, Scalability and Optimization Plans, Performance Metrics Reports. 11. Security Technologies & Monitoring: - Deploy and manage security tools (e.g., firewalls, SIEM tools, IDS/IPS) to safeguard against threats. - Utilize monitoring tools for traffic analysis, threat detection, and compliance. - Deliverables: Security Toolset for continuous monitoring, Analytics-based threat reports. 12. Team Training & Mentorship: - Provide training and mentorship to IT and security staff, promoting technical expertise and leadership development. - Deliverables: Training programs and mentoring initiatives for team growth. Qualifications & Experience: - 15+ years of leadership experience in IT infrastructure and cybersecurity. - Bachelors degree in a relevant field. - Certifications Preferred CISSP, CISM, CCNP Security, MCSE, CEH. - Extensive knowledge of virtualization, backup solutions, SAN storage, and security tools. - Proven expertise in network architecture, IT governance, disaster recovery, and business continuity planning. - Strong analytical, problem-solving, and communication skills to drive innovation, resilience, and business continuity. Core Competencies: - Strategic thinking and leadership in IT and security. - Expertise in risk management, compliance, and incident response. - Ability to drive technological innovation and improvement. - Excellent team management, mentorship, and communication skills. This position offers a unique opportunity to lead a dynamic IT and security environment while directly influencing the organization’s overall business objectives. If you have a strong track record in both IT infrastructure management and cybersecurity, this role offers the chance to make a significant impact on both operational efficiency and security resilience. Job applications are accepted till 05-March-2025, interested candidates can send their most updated resumes on preetesh.ranjan32970@paruluniversity.ac.in

Posted 1 month ago

Apply

9.0 - 14.0 years

40 - 50 Lacs

Bengaluru

Remote

Principal Engineer, Security Operations The Principal Engineer, Security Operations at Vimeo will play a pivotal role in leading and implementing security strategies and initiatives designed to protect our vast user base of over 300 million users and their valuable content. This role requires close collaboration with multiple teams across the organization, including Development, DevOps, Infrastructure Security, Compliance, IT, and Product, to ensure a holistic and effective security posture. You will be at the forefront of safeguarding sensitive user data and critical systems from a constantly evolving threat landscape. This includes proactively identifying and addressing vulnerabilities, implementing industry-standard security best practices, and driving the automation of security processes to enhance efficiency and scalability. Additionally, you will participate in incident response activities, conducting thorough investigations and implementing corrective actions to minimize the impact of security breaches. The ideal candidate for this position is a highly motivated and skilled security professional with a proven ability to solve complex problems and work effectively in a team environment. You should have a strong understanding of security principles and technologies, as well as a passion for staying ahead of emerging threats. Excellent communication and interpersonal skills are also essential, as you will need to clearly articulate security risks and recommendations to both technical and non-technical stakeholders. This role is remote and should be expected to overlap with US (EST) Business hours.. What you'll do: Incident Response Act as the primary point of contact for security incidents detected by the MDR solution. Analyze and triage alerts generated by the MDR platform, prioritizing based on severity and potential impact. Coordinate and manage the incident response process, working closely with the MDR provider and internal teams. Escalate incidents to appropriate internal teams or external parties as needed, following established procedures. Develop and maintain incident response playbooks specific to MDR-related incidents. Track and report on incident response metrics, including detection time, containment time, and resolution time. Collaborate with the MDR provider to optimize detection rules and improve the overall effectiveness of the solution. Security Engineering Conduct security assessments of our systems and infrastructure to identify vulnerabilities and risks, identify risk owners and implement mitigating controls. Implement and maintain security controls, including access controls, Zero trust network access (ZTNA), network segmentation, and security monitoring tools. Design and operate identity management, lifecycle, governance and SSO. Implement and operate cloud security hardening and cloud security posture management across Google cloud and AWS. Develop and maintain security policies and procedures, and ensure compliance with industry and regulatory standards. Collaborate with SRE, AppSec and Information technology around vulnerability management, endpoint hardening, detection and response. Participate in incident response activities, including investigating security incidents and responding to security alerts. Collaborate with development and DevOps teams to implement security best practices throughout the software development and infrastructure lifecycle. Automate security processes using scripting and other automation tools. Stay up-to-date with the latest security threats, vulnerabilities, and technologies. Collaboration with the compliance and privacy team help ensure that our company complies with industry best practices and standards Process improvements help strengthen our own internal processes and procedures. Skills and knowledge you should possess: 4+ years of experience in a security or operations role, preferably in a cloud-based Linux environment. 2+ years experience with container and container orchestration systems Bachelor's degree in Computer Science, Information Technology, or a related field, or equivalent work experience. Strong knowledge of security best practices and industry standards, such as NIST, CIS, and ISO. Relevant certifications such as CISSP, CCSP, GCP, or AWS Certified Security Specialty are a plus. Experience with security tools such as IDS/IPS, SIEM, vulnerability scanners, and endpoint protection. Experience with automation tools such as Terraform, Ansible, or Chef. Strong scripting skills using Python, shell, or other scripting languages. Excellent problem-solving skills and the ability to work well under pressure. Good communication and interpersonal skills.Confident working in and across cloud environments like AWS and GCP. Detailed knowledge of at least one cloud environment. Confident with common SDLC components, like git, Jira, Jenkins, etc At least an upper-intermediate level of English Bonus points (nice skills to have, but not needed): Familiarity with common security tools and technologies, such as SIEM, EDR, and threat intelligence platforms. Experience implementing zero trust network access such as Z-Scaler, Warp, Google beyondCorp etc. Experience implementing identity lifecycle including provisioning, quarterly access reviews, role management and deprovisioning. Understanding of FIDO2 and machine certificate authentication flowsExperience with Crowdstrike and WizExperience with system security hardening guidelines and SDLC principlesExperience with implementing Fedramp and/or HIPAA.

Posted 1 month ago

Apply

9.0 - 14.0 years

10 - 20 Lacs

Nashik, Pune, Bengaluru

Work from Office

Job Title: Threat Intelligence Analyst Corporate Title: AVP Location: Pune, India Role Description As a Threat Intelligence AVP in the Threat Intelligence and Assessment function, you will play a critical role in safeguarding the organization from cyber threats. In this role, you will be responsible for identifying, assessing, and mitigating threats, you will provide mitigation recommendations in response to evolving threats. You will be required to analyse complex technical issues and develop bank specific solutions while collaborating with diverse teams and stakeholders. This role will also consist of delivering against projects and strategic initiatives to continuously enhance the banks capabilities in responding to threats. What we’ll offer you As part of our flexible scheme, here are just some of the benefits that you’ll enjoy, Best in class leave policy. Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Pro-actively identify threats and track threat actors, TTPs, and ongoing campaigns to produce timely actionable intelligence. Produce threat assessments to support threat mitigation activities. Analyse multiple data/intelligence sources and sets to identify patterns of activity that could be attributed to threats and develop informed recommendations. Conduct analysis on files/binaries, packet captures, and supporting materials to extract relevant artifacts, observables, and IOCs. Proactively drive improvements of internal processes, procedures, and workflows. Participate in the testing and integration of new security monitoring tools. Meet strict deadlines to deliver high quality reports on threats, findings, and broader technical analysis. Take ownership for personal career development and management, seeking opportunities to develop personal capability and improve performance contribution. Develop and maintain relationships with internal stakeholders, external intelligence sharing communities. Your skills and experience Requirements 5+ years of experience in cybersecurity, with a focus on threat intelligence, analysis, and mitigation Strong operational background in intelligence related operations with experience in Open-Source Intelligence (OSINT) techniques Operational understanding of computing/networking (OSI Model or TCP/IP). Knowledge on the functions of security technologies such as IPS/IDS, Firewalls, EDR, etc A good or developing understanding of virtual environments and cloud (e.g., VSphere, Hypervisor, AWS, Azure, GCP) Demonstrated knowledge and keen interest in tracking prominent cyber threat actor groups, campaigns and TTPs in line with industry standards Knowledge of or demonstratable experience in working with intelligence lifecycle, intelligence requirements and Mitre ATT&CK Framework Non-Technical Experience Investigative and analytical problem solving skills Excellent verbal and written communication; to both technical and non-technical audiences. Self-motivated with ability to work with minimal supervision. Education and Certifications Preferred - Degree in computer science, networking, engineering, or other field associated with cyber, intelligence or analysis. Desired Experience or Certifications CISSP, CISM, GIAC, GCTI, GCIH, GCFE, GCFA, GREM, GNFA, Security+, CEH How we’ll support you Training and development to help you excel in your career. Coaching and support from experts in your team. A culture of continuous learning to aid progression. A range of flexible benefits that you can tailor to suit your needs. About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htmRole & responsibilities Preferred candidate profile

Posted 1 month ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Security Incident Response. Experience5-8 Years.

Posted 1 month ago

Apply

3.0 - 7.0 years

2 - 6 Lacs

Bengaluru

Work from Office

Drive projects and initiatives to improve and expand existing DLP platform capabilities. Implement and manage DLP solutions, including data labeling technologies. Work directly with stakeholders to define requirements and develop security solutions. Ensure the security of endpoint devices, including data protection and behavior analysis. Deploy and manage endpoint DLP solutions, such as those offered by Proofpoint. Manage email security policies and configurations, including DLP for email. Detect and prevent data loss through email channels, such as by identifying sensitive content and usebehavior. Gain deep knowledge of the Proofpoint platform, including its various modules (e.g., Endpoint DLP, Email DLP) Be proficient in using the Proofpoint console to manage alerts, investigate incidents, and analyze user behavior. Primary Skills DLP Endpoint Security Email Security Secondary Skills Data Labeling Behavior Analysis Incident Response

Posted 1 month ago

Apply

4.0 - 8.0 years

12 - 18 Lacs

Hyderabad

Work from Office

Exp. in a SOC, incident detection and response,SIEM platform and EDR. understanding of networking principles, TCP/IP, WANs, LANs, and Internet protocols (SMTP, HTTP, FTP, POP, LDAP). cloud security concepts & platforms (e.g., AWS, Azure, GCP).

Posted 1 month ago

Apply

15.0 - 25.0 years

15 - 25 Lacs

Gurugram

Work from Office

JLL empowers you to shape a brighter way . Our people at JLL and JLL Technologies are shaping the future of real estate for a better world by combining world class services, advisory and technology for our clients. We are committed to hiring the best, most talented people and empowering them to thrive, grow meaningful careers and to find a place where they belong. Whether you’ve got deep experience in commercial real estate, skilled trades or technology, or you’re looking to apply your relevant experience to a new industry, join our team as we help shape a brighter way forward. Key Responsibilities of India Labor Compliance Head: Critical Tasks: 1. Timely Compliance Assurance: Regulatory ComplianceEnsure strict adherence to all applicable labor and employment laws, encompassing wages, working hours, overtime, leave policies, and worker safety. Policy Development and ImplementationFormulate, update, and execute company policies in alignment with current labor laws and industry best practices. Statutory FilingsOversee timely submission of all required statutory filings, including provident fund contributions, professional tax, and other mandatory payments. License and Registration ManagementDiligently track and renew all necessary licenses and registrations for the companys real estate operations. Audit PreparednessConduct comprehensive internal audits to identify and address compliance gaps, ensuring readiness for external regulatory audits. Employee Grievance ResolutionEstablish and manage an efficient system for addressing employee grievances in compliance with labor laws. Training and AwarenessOrganize and facilitate regular training sessions on labor laws, company policies, and compliance requirements for staff. ReportingPrepare and present detailed compliance reports to management, highlighting areas of concern and potential improvements. Stay UpdatedContinuously monitor and adapt to changes in labor and employment laws, ensuring prompt implementation of new regulations. Contractor and Vendor ComplianceEnsure all contractors and vendors engaged by the company adhere to relevant labor laws and regulations. Health and Safety ComplianceOversee the implementation of robust health and safety measures in accordance with occupational health and safety regulations. Team ManagementLead and manage a team of Compliance Officers responsible for administering the compliance program. 2. Legal Notice Management: Notice Reception and TrackingImplement and maintain an efficient system for receiving, logging, and tracking all incoming legal notices related to labor and employment matters. Timely ResponseEnsure prompt responses to all legal notices within stipulated timeframes to avoid default judgments or penalties. Legal AnalysisConduct thorough preliminary analysis of each legal notice to determine validity, potential impact, and appropriate course of action. CoordinationLiaise effectively with internal stakeholders, consultants, and the internal litigation team to ensure timely compliance with notices. 3. Compliance Tracker Oversight: Tracker Development and MaintenanceOversee the compliance tracker covering all relevant laws, regulations, and internal policies received from respective consultants. ManagementEnsure accurate recording of all compliance deadlines in the tracker, with reminders set for upcoming due dates and follow-ups. Responsibility AssignmentClearly delegate compliance task responsibilities to specific individuals or departments within the organization and to consultants. Reporting and AnalyticsGenerate comprehensive reports from the tracker, providing insights on compliance status, trends, and potential areas of concern. Escalation ProcessEstablish and manage an effective escalation process for high-risk or overdue compliance issues flagged in the tracker. 4. Document Repository Maintenance: Ensure adherence to the current Legal Repository process within the L&E function, maintaining access to online and original documents (statutory documents, licenses, registration certificates, etc.). 5. Consultant & Cross-Functional Liaison and Coordination: Serve as the Single Point of Contact (SPOC) for all L&E compliance-related tasks, coordinating effectively with consultants and cross-functional teams. Regular Tasks: 6. Internal Stakeholder Advisory: Provide expert guidance on policy interpretation, risk assessment and mitigation, HR support, policy development, compliance program design, regulatory updates, audit support, incident response, and compliance reporting. 7. Compliance Tool Administration: Monitor all requisite compliances on the PWC tool as per individual task timelines, serving as a Checker and providing analysis and reports to management as required. 8. Miscellaneous Tasks: Oversee financial operations (provisioning & invoicing) and internal tools management. 9. Average Number of Annual Tasks: Reports filed with labor authorities950 Statutory remittances600 Registrations/licenses350 Remittances pertaining to PDS120 Labor authority assessments (PDS)15 Compliance monthly audit reports3,000 Inspections200 We are seeking a highly qualified professional with the following credentials LLB specializing in Labor Laws Company Secretary certification with extensive experience in Labor laws Master’s degree in social work, PMIR, or MBA with a focus on Labor & Compliance management from a prestigious Indian institute The ideal candidate will possess a minimum of 15 years of post-qualification experience in Labor & Compliance management. This experience should demonstrate expertise in vendor management and client/employee grievance resolution. The successful applicant will play a crucial role in ensuring regulatory compliance and fostering positive labor relations within our organization. The successful candidate will be responsible for leading a team of Compliance officers and facilitating seamless coordination across various departments and business lines. Strong communication skills are essential, including fluency in spoken and written English, as well as proficiency in multiple Indian languages, to effectively navigate our diverse corporate environment. Location On-site –Bengaluru, KA, Gurugram, HR Scheduled Weekly Hours: 40 If this job description resonates with you, we encourage you to apply even if you don’t meet all of the requirements. We’re interested in getting to know you and what you bring to the table! JLL Privacy Notice Jones Lang LaSalle (JLL), together with its subsidiaries and affiliates, is a leading global provider of real estate and investment management services. We take our responsibility to protect the personal information provided to us seriously. Generally the personal information we collect from you are for the purposes of processing in connection with JLL’s recruitment process. We endeavour to keep your personal information secure with appropriate level of security and keep for as long as we need it for legitimate business or legal reasons. We will then delete it safely and securely. Candidate Privacy Statement . For candidates in the United States, please see a full copy of our Equal Employment Opportunity and Affirmative Action policy here. Jones Lang LaSalle (“JLL”) is an Equal Opportunity Employer and is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process – including the online application and/or overall selection process – you may contact us at Accommodation Requests . This email is only to request an accommodation. Please direct any other general recruiting inquiries to our Contact Us page I want to work for JLL.

Posted 1 month ago

Apply

10.0 - 15.0 years

12 - 16 Lacs

Bengaluru

Work from Office

Youll make a difference by As a Cybersecurity Engineer Metro you will be responsible for the following: Cybersecurity Strategy Development: Develop and implement cybersecurity strategies specifically for rolling stock, ensuring alignment with overall metro rail security objectives for SMO RS India Evaluate and recommend security technologies and processes to safeguard train control systems, onboard communication systems, and other critical infrastructure. Rolling Stock Cybersecurity Management: Oversee the cybersecurity of all rolling stock systems, including train control systems, signaling, onboard diagnostics, and passenger information systems. Conduct regular security assessments of rolling stock software, hardware, and communication protocols to identify vulnerabilities. Collaborate with engineering teams to integrate cybersecurity measures into the design and maintenance of rolling stock. Incident Response and Management: Develop and implement incident response plans specific to rolling stock cybersecurity incidents. Lead investigations and coordinate responses to cybersecurity incidents affecting rolling stock, ensuring minimal disruption to rail operations. Work with operations and maintenance teams to implement corrective actions and prevent future incidents. Compliance and Risk Management: Ensure that all rolling stock cybersecurity measures comply with relevant industry standards, regulations, and best practices, such as IEC 62443 and CENELEC EN 50126/50128/50129. Conduct risk assessments related to rolling stock cybersecurity, identifying and mitigating potential threats to safety and service continuity. Vendor and Stakeholder Management: Collaborate with rolling stock manufacturers, suppliers, and service providers to ensure that cybersecurity requirements are met throughout the supply chain. Serve as the primary point of contact for cybersecurity issues related to rolling stock, liaising with internal teams and external stakeholders. Policy and Procedure Development: Develop and enforce cybersecurity policies and procedures for rolling stock, including guidelines for software updates, data protection, and secure communications. Ensure that all relevant personnel are trained and aware of cybersecurity policies, particularly those involved in the operation and maintenance of rolling stock. Training and Awareness: Lead cybersecurity training initiatives focused on rolling stock systems for relevant staff, including engineers, operators, and maintenance personnel. Promote a culture of cybersecurity awareness within the rolling stock domain, ensuring that all employees understand the importance of protecting critical systems. Desired Skills: Education: Bachelors degree in computer science, Cybersecurity, Electrical Engineering, or a related field. Basic knowledge in requirements engineering is a prerequisite. Experience: 10+ years of experience in cybersecurity, with at least 2-3 years in the rail transportation or industrial control systems (ICS) sector. Proven experience in securing control systems and communication networks, preferably within the rolling stock or rail industry. Certifications: Relevant certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), GICSP (Global Industrial Cyber Security Professional), or CISA (Certified Information Systems Auditor) Skills: In-depth understanding of cybersecurity principles as they apply to industrial control systems and rolling stock. Proficient in cybersecurity tools and technologies relevant to the transportation sector, including network security, endpoint protection, and intrusion detection systems. Strong leadership and communication skills, with the ability to manage cross-functional teams and interact with technical and non-technical stakeholders. Ability to work under pressure and manage multiple priorities in a safety-critical environment. Work Environment: Primarily office-based, with frequent visits to rail depots, control centers, and onboard rolling stock. May require availability outside regular working hours for emergency response and coordination. This role is based in Bangalore. You might be required to visit other locations within India and outside. In return, you'll get the chance to work with teams impacting - and the shape of things to come.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies