Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
6.0 - 10.0 years
0 Lacs
hyderabad, telangana
On-site
As a Data Security Specialist, you will be responsible for developing, implementing, and optimizing our clients" Insider Risk Management (IRM) and Data Loss Prevention (DLP) strategy and policies. Working closely with cross-functional teams, you will safeguard our clients" environments, maintain their security posture, and ensure compliance with data protection regulations. Your expertise will be crucial in mitigating data security risks and upholding the highest standards of data governance. You will collaborate on implementing and managing Data Security solutions and technologies such as Microsoft Purview Insider Risk Management, Microsoft Purview Data Loss Prevention, and Microsoft Sentinel. Additionally, you will enforce and update data protection policies, procedures, and standards while contributing to data governance initiatives and ensuring adherence to best practices. Working alongside IT and security teams, you will monitor and analyze data flows to identify potential data security threats and insider risk cases. Experience with platforms like Code42, Varonis, or other third-party data security platforms and SIEMs will be valuable in this role. You will configure and manage data security policies, rules, and classifications to prevent data leaks and unauthorized access. In the event of security incidents, data breaches, or policy violations, you will investigate and respond according to established escalation paths. Furthermore, you will stay informed about the latest data security technologies and industry best practices, providing guidance and mentorship to junior team members. Your responsibilities will include analyzing irregular activities to detect security incidents, suggesting and implementing process improvements, and proactively monitoring and escalating findings from detection capabilities. You will communicate findings, risks, and gaps to stakeholders, collaborate with team members to enhance program effectiveness, and stay abreast of industry trends and emerging threats. Creating and maintaining reports on data usage, quality, and compliance, utilizing data analytics to identify trends and improvement opportunities, and collaborating with global teams to support clients worldwide will also be part of your role. Ensuring high client satisfaction scores will be essential. To be successful in this role, you should have at least 6+ years of professional experience in compliance or data security, with specific experience in Microsoft IRM, Microsoft DLP, and 3rd party DLP/SIEM technologies. You must possess a strong understanding of data security monitoring and protocols, be willing to work in 24*7 rotational shifts, and hold Microsoft Certifications such as SC-100, SC-400, SC-300, and MS-500.,
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
haryana
On-site
As a Security Incident Analyst L3 at our client site in Gurugram, you will play a crucial role in incident response, threat analysis, and security operations. Your responsibilities include leading the response to high-severity incidents, conducting advanced threat analysis, administering security tools, and mentoring junior SOC analysts. This position requires a minimum of 5 years of experience in a Security Operations Center (SOC) or Incident Response role, along with expertise in SIEM administration, network security, and incident detection. A strong knowledge of security tools such as SIEM platforms (QRadar, Splunk), EDR tools (CrowdStrike, Carbon Black), and IDS/IPS is essential. Additionally, you should have experience in correlating threat intelligence with incidents and recommending preventive measures. A bachelor's degree in Computer Science, Cybersecurity, or a related discipline is required. If you are proactive, technically proficient, and enjoy tackling complex security challenges, we encourage you to apply by sending your updated resume to recruitment@nurturehrm.com. This is a full-time position located in Gurugram with a competitive compensation package ranging from 12 to 13 LPA.,
Posted 1 month ago
7.0 - 11.0 years
0 Lacs
pune, maharashtra
On-site
Perforce is a community of collaborative experts, problem solvers, and possibility seekers who believe work should be both challenging and fun. We are proud to inspire creativity, foster belonging, support collaboration, and encourage wellness. At Perforce, you'll work with and learn from some of the best and brightest in business. Before you know it, you'll be in the middle of a rewarding career at a company headed in one direction: upward. With a global footprint spanning more than 80 countries and including over 75% of the Fortune 100, Perforce Software, Inc. is trusted by the world's leading brands to deliver solutions for the toughest challenges. The best run DevOps teams in the world choose Perforce. Position Summary: As a Sr. SecOps Engineer at Perforce, you will be responsible for designing and optimizing the security operations for Perforce's SaaS product portfolio. Your key role involves driving the design and implementation of automated tools and technologies to ensure the security, reliability, and high availability of production and CI/CD environments, applications, and infrastructure. You will lead efforts to establish SecOps best practices across the organization, ensuring adherence to the highest security standards in all environments. Responsibilities: - Develop and implement vulnerability management practices using tools like Qualys, Lacework, Prisma, and Mend (SAST and SCA). - Manage operations/cadence in Vulnerability management, SIEM, and CSPM. - Lead efforts to ensure security incident and event management (SIEM) from code repositories to operating systems, VMs, databases, networks, and applications. - Automate security processes and workflows across CI/CD pipelines, leveraging infrastructure-as-code (IaC) and security automation tools to improve efficiency. - Drive the implementation of security hardening best practices across the infrastructure layers. - Implement and maintain secret scanning tools across CI/CD pipelines to detect and mitigate the exposure of sensitive data. - Advocate and implement security best practices in agile SDLC methodologies and DevSecOps workflows. - Collaborate closely with Developer and DevOps teams to embed security at every stage of development and deployment processes. - Lead and maintain security sprint boards, monitor tasks, and manage risks via Jira and other collaboration tools. - Schedule and run monthly SecOps cadence meetings to report on the organization's security posture, discuss ongoing projects, and address security incidents and mitigations. - Prepare and present comprehensive documentation and reports on security incidents, vulnerability assessments, and audit findings to stakeholders. - Assist with incident response planning, including the triage, investigation, and remediation of security incidents. - Stay updated on the latest security threats, tools, and methodologies to continuously improve security frameworks and policies. Requirements: - Bachelor's or master's degree in computer science, Information Security, Engineering, or a related field. - 7+ years of experience in cybersecurity, security operations, or a similar role in a SaaS/cloud environment. - Strong hands-on experience with security automation tools, vulnerability management tools, and infrastructure-as-code practices. - Proficiency in automating vulnerability scanning, patch management, and compliance monitoring processes across hybrid cloud environments. - Strong understanding of Cloud Security Posture Management (CSPM) tools and practices. - Experience with SIEM tools, secret management, and scanning in CI/CD environments. - Familiarity with hardening techniques across various platforms and driving security sprint boards. - Excellent presentation, communication, and documentation skills. - Knowledge of infrastructure-as-code frameworks and experience in automating security configurations. - Strong problem-solving skills and the ability to work under pressure in a fast-paced environment. - Continuous desire to learn and stay updated on the latest cybersecurity practices and threats. Join our team at Perforce! If you are passionate about technology, want to work with talented individuals globally, and make an impact, apply today!,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
punjab
On-site
As an API and Application Security Specialist at Cywarden, you will play a crucial role in ensuring the robustness and resilience of APIs and applications. Working closely with developers, architects, and security teams, you will be responsible for implementing advanced security measures to protect critical digital assets. Your expertise will be instrumental in identifying and addressing potential security threats and vulnerabilities within API ecosystems and software applications. Your key responsibilities will include developing and implementing comprehensive security strategies aligned with organizational goals, conducting security assessments through penetration testing and code reviews, performing threat modeling and risk assessments, managing authentication and authorization mechanisms, enforcing secure coding practices, responding to security incidents, ensuring compliance with industry standards, maintaining detailed documentation, providing training to development teams, and implementing security monitoring solutions. To excel in this role, you should hold a Bachelor's degree in Computer Science, Information Technology, or a related field, along with a minimum of 3-5 years of experience in API and application security. Proficiency in security frameworks and protocols, experience with API gateways, familiarity with RESTful and GraphQL APIs, understanding of encryption mechanisms, knowledge of security testing tools, familiarity with secure coding practices, experience with programming languages, and awareness of DevSecOps practices are essential. Relevant certifications such as CISSP, CEH, CSSLP, GWAPT, or OSWE are preferred. Additionally, strong problem-solving skills, effective communication, and the ability to collaborate within a team environment are key soft skills required for this role. This is a full-time permanent position with benefits including paid sick time, paid time off, performance bonuses, yearly bonuses, and a work schedule of Monday to Friday with night shifts and rotational shifts. The work location is in Mohali, Punjab, and candidates must be willing to commute or relocate before starting work. Your dedication to securing APIs and applications at Cywarden will contribute significantly to safeguarding critical digital assets and ensuring the integrity of client systems and data.,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
maharashtra
On-site
As the Lead Security Engineer, you will play a pivotal role in ensuring the confidentiality, integrity, and availability of sensitive data across our systems. Your primary responsibility will involve leading the data security strategy and execution to mitigate risks and protect our data from evolving cyber threats. Collaboration with cross-functional teams, including engineering, compliance, and operations, will be essential to implement best practices for data protection and compliance with industry regulations such as GDPR, CCPA, PCI-DSS, and others. Your key responsibilities will include developing and executing a comprehensive data security strategy aligned with the company's business objectives and regulatory requirements. You will design and implement robust data protection frameworks encompassing encryption, data masking, tokenization, and data loss prevention (DLP) systems. Regular risk assessments will be conducted to identify data vulnerabilities, and appropriate mitigation strategies will be recommended and implemented to safeguard sensitive financial data. You will also ensure compliance with all applicable data security regulations and standards, manage audits and assessments, and lead efforts in investigating and responding to data security incidents. Collaboration with product, engineering, and IT teams will be necessary to integrate security best practices into the software development lifecycle (SDLC) and cloud infrastructure. You will design secure data architectures supporting scalable, high-performance systems while minimizing exposure to data breaches. Additionally, you will lead, mentor, and grow a team of data security engineers, fostering a culture of continuous learning and improvement. Security awareness training will be provided to internal teams, educating them on the latest data security threats, trends, and best practices. Assessing third-party vendors" security posture and collaborating on securing data exchanges with partners and clients will also be part of your responsibilities. Implementing monitoring systems to detect data security threats and providing regular reporting on the organization's data security posture to senior leadership is crucial. Qualifications: - Experience: 7+ years of experience in data security, with at least 3 years in a leadership or senior role within a fintech or similar regulated environment. - Technical Expertise: Strong knowledge of data encryption technologies, cloud security (AWS, Azure, GCP), data loss prevention (DLP), identity and access management (IAM), and security protocols (e.g., TLS, VPNs). - Regulatory Knowledge: In-depth understanding of data security regulations and standards (GDPR, CCPA, PCI-DSS, SOC 2, etc.) and experience leading compliance efforts. - Risk Management: Proven experience conducting risk assessments, threat modeling, and implementing mitigation strategies in a highly regulated environment. - Incident Response: Hands-on experience leading data breach investigations and managing data security incidents from identification to resolution. - Leadership Skills: Strong leadership, mentoring, and team-building capabilities, with a proven ability to drive cross-functional collaboration. - Problem-Solving & Analytical Thinking: Excellent analytical and troubleshooting skills with a strong attention to detail. - Certifications: CISSP, CISM, CISA, or other relevant certifications are highly desirable. Preferred Qualifications: - Experience with DevSecOps practices, security automation, and CI/CD pipeline integration. - Familiarity with advanced threat detection technologies like SIEM, EDR, and SOAR platforms,
Posted 1 month ago
6.0 - 10.0 years
0 Lacs
haryana
On-site
The Cyber Security Consulting Manager is responsible for leading client engagements in Gurgaon, Mumbai, and Bangalore to assess, design, and implement robust cyber security strategies. With a combination of deep technical expertise and strong leadership skills, you will ensure that clients" digital assets are protected, compliance requirements are met, and business risks are minimized. You will oversee project teams, manage client relationships, and deliver high-impact solutions in a fast-evolving threat landscape. Key Responsibilities: Lead and manage multiple client cyber security engagements from assessment through to solution delivery, ensuring timely completion, adherence to scope, and high-quality standards. Develop and oversee the implementation of customized cyber security strategies for clients, aligning solutions with their business objectives, regulatory requirements, and risk profiles. Conduct comprehensive risk assessments, vulnerability testing, and security architecture reviews; translate findings into actionable recommendations and remediation plans. Advise clients on cyber governance standards and frameworks such as PCI DSS, NIST CSF, ISO 27001, Data Privacy (GDPR, DPDP, etc.), and other relevant regulations. Provide expert guidance to clients" executive and technical teams on emerging threats, regulatory changes, and industry best practices; act as a trusted advisor for cyber security matters. Define, implement, and maintain information security policies, standards, and frameworks (e.g., ISO 27001, NIST), ensuring compliance and continuous improvement. Lead and mentor a team of cyber security consultants and analysts, promoting professional growth, knowledge sharing, and high performance. Manage stakeholder communication, including regular reporting to client leadership on security posture, risk exposure, and incident outcomes. Support business development activities, including proposal development, client presentations, and identification of new consulting opportunities. Required Skills and Qualifications: 6-10 years of experience in cyber security, with a minimum of 3 years in a consulting or managerial role. Proven track record in managing complex security projects and leading technical teams. Expertise in risk management, vulnerability assessment, incident response, and security architecture design. Strong knowledge of security frameworks and compliance standards such as ISO 27001, NIST, GDPR. Excellent communication and stakeholder management skills, with the ability to translate technical risks into business terms. Experience in client-facing roles, focusing on delivering value and building long-term relationships. Relevant certifications (e.g., CISSP, CISM, CISA, CEH) are highly desirable.,
Posted 1 month ago
3.0 - 6.0 years
30 - 45 Lacs
Bangalore Rural
Work from Office
Your Role Utilize your expertise as a Security Analyst to proactively identify and respond to security incidents within the organization. Take charge of vulnerability management efforts, ensuring timely identification and mitigation of potential security risks. Leverage your skills in SIEM and automation to streamline security operations and improve response times. Serve as a thought leader, effectively communicating and garnering support for innovative security ideas and strategies. Provide mentorship and guidance to junior staff, and collaborate with various teams on special security projects to contribute to the organization's overall security posture. Experience with cloud security and automation is a must What You Will Bring Must have an engineering background Should possess 3-6 years of experience Highly motivated, able to take ownership of tasks and see through completion. Must be well organized and able to leverage best practices, able to thrive in fast-paced environment, and, most importantly, have the ability to approach problems with an innovative, can-do attitude Ability to establish priorities, work independently and proceed with objective. Strong communication skills to work with both collaborative cross-functional team of peers and departments within the company. Experience deploying and managing various security technologies including system scanning, network security, SIEM, automation, etc Should have skills in Linux security, Cloud security, Automation, Incident response, and be able to clearly communicate security technology to developers Experience with cloud technologies Knowledge of enterprise logging, with a focus on security event logging. Strong understanding of security operations concepts Proven expertise with networking protocols Experience working with Cloud Architecture standards and processes. Must have Python scripting knowledge - using APIs and parsing JSON
Posted 1 month ago
1.0 - 5.0 years
4 - 6 Lacs
Pune
Work from Office
Job Summary: We are seeking a proactive and technically skilled information security (SOC) Engineer/Analyst to monitor, detect, and respond to cybersecurity threats in real-time. The ideal candidate will have strong analytical skills, be detail-oriented, and possess a sound understanding of threat landscapes, SIEM tools, and incident response. The ideal candidate will possess a strong foundational understanding of cybersecurity governance, robust technical skills in security operations, and a commitment to staying abreast of the evolving threat landscape and internal security requirements. Key Responsibilities Monitor security events and alerts from SIEM and other security tools. Perform initial triage and investigation of potential threats or anomalous behavior. Escalate incidents according to severity and defined procedures. Document incidents, provide root cause analysis, and maintain detailed logs. Analyze threat intelligence feeds and correlate with internal data. Assist in threat hunting and vulnerability management activities. Support continuous improvement of SOC processes and playbooks. Collaborate with other IT and Security teams for incident resolution. Assist in developing and tuning SIEM rules, queries, and dashboards for threat detection. Contribute to vulnerability management and secure configuration of internal systems and cloud environments. Support the testing and execution of recovery plans for security systems and data. Document incident findings, remediation steps, and contribute to post-incident reviews. Required Skills & Qualifications: Bachelors degree in Computer Science, Cybersecurity, or related field. 13 years of experience in a SOC environment or similar security operations role. Familiarity with SIEM tools (e.g., Splunk, QRadar, Sentinel). Understanding of TCP/IP, firewalls, IDS/IPS, and common attack vectors. Knowledge of malware, phishing, ransomware, and social engineering tactics. Hands-on experience with endpoint protection, network monitoring, and forensic tools. Excellent communication and documentation skills. Preferred Certifications: CompTIA Security+ or CySA+ Vendor-specific SIEM certifications.
Posted 1 month ago
4.0 - 7.0 years
15 - 25 Lacs
Bengaluru
Work from Office
Role Summary: We are looking for a skilled professional with 3–5 years of experience in monitoring, analysis, and incident handling using Palo Alto Cortex XDR/XSIAM. The ideal candidate will be responsible for managing alerts, conducting investigations, and optimizing detection capabilities within the Cortex platform. Key Responsibilities: Monitoring & Analysis: Review and analyze alerts generated by Cortex XDR/XSIAM. Perform triage and determine the relevance and severity of events. Identify patterns, anomalies, and potential risks in data. Incident Handling: Investigate and respond to events and alerts. Conduct root cause analysis and document findings. Coordinate with internal teams for resolution and follow-up. Platform Optimization: Fine-tune detection rules and response playbooks. Ensure efficient data ingestion and alert accuracy. Collaborate with engineering teams to enhance platform performance. Proactive Analysis: Conduct exploratory analysis to identify potential issues. Leverage threat intelligence and contextual data to improve detection. Develop custom queries and dashboards for visibility and reporting. Documentation & Reporting: Maintain detailed logs and reports of investigations. Provide insights and recommendations to improve processes. Required Qualifications: 3–5 years of relevant experience in monitoring, analysis, or incident response. Hands-on experience with Palo Alto Cortex XDR/XSIAM. Strong understanding of endpoint, network, and cloud data. Familiarity with detection frameworks and analytical tools. Good scripting knowledge (e.g., Python, PowerShell) is a plus. Strong analytical and communication skills. Preferred Certifications: PCCSA or PCNSE (Palo Alto Networks) CompTIA Security+, CEH, or equivalent (optional)
Posted 1 month ago
3.0 - 6.0 years
7 - 11 Lacs
Gurugram
Work from Office
We are looking for a highly skilled and experienced Cyber Security Manager to join our team at Uniqus Consultech. Roles and Responsibility Develop and implement comprehensive cyber security strategies to protect against threats and vulnerabilities. Conduct risk assessments and penetration testing to identify potential security risks. Collaborate with cross-functional teams to ensure compliance with security standards and regulations. Design and implement secure network architectures and systems. Provide training and awareness programs on cyber security best practices. Stay up-to-date with emerging trends and technologies in cyber security. Job Requirements Strong understanding of cyber security principles and frameworks. Experience with security information and event management (SIEM) systems. Knowledge of threat intelligence and incident response methodologies. Familiarity with compliance frameworks such as HIPAA or PCI-DSS. Excellent communication and collaboration skills. Ability to work in a fast-paced environment and adapt to changing priorities.
Posted 1 month ago
3.0 - 5.0 years
15 - 25 Lacs
Bengaluru
Work from Office
Role Overview: The OT Security Analyst – Level 2 (L2) plays a pivotal role in defending operational technology (OT) environments against evolving cyber threats. This role requires a deep understanding of security incident analysis, threat detection, and incident response, specifically tailored to Industrial Control Systems (ICS) and OT networks. The analyst will investigate complex security incidents within the OT infrastructure, collaborate with IT/OT teams, and enhance security posture through actionable insights. ________________________________________ Key Responsibilities: • Conduct in-depth analysis of security events and incidents within OT environments, leveraging SIEM and OT-specific monitoring tools. • Perform root cause analysis and develop incident timelines to support forensics and remediation efforts. • Apply standard incident response frameworks (e.g., NIST, MITRE ATT&CK for ICS, Cyber Kill Chain) for threat classification and response. • Use threat intelligence platforms and sandbox environments to investigate malware and suspicious artifacts in OT networks. • Analyze access logs, network traffic, and protocol behaviours across OT systems (e.g., SCADA, DCS, PLCs). • Support investigations related to unauthorized device communications, anomalous behaviours, or compromised industrial assets. • Collaborate with OT security engineers and external vendors to escalate and remediate incidents. • Refine alert rules and detection logic to reduce false positives and improve signal-to-noise ratio in OT SOC operations. • Document incident findings and support continuous improvement of the OT SOC playbooks and knowledgebase. • Liaise with the IT SOC and CIR (Cyber Incident Response) teams to align incident handling and cross-domain investigations. • Participate in threat hunting activities tailored for OT environments using behavioural analysis and attack-path simulation. ________________________________________ Technical Skills & Knowledge: • Strong understanding of OT/ICS protocols (Modbus, DNP3, OPC, etc.) and industrial network topologies. • Hands-on experience with OT cybersecurity tools and platforms (e.g., Nozomi Networks, Claroty, Dragos). • Familiar with ISA/IEC 62443, NIST SP 800-82, NIST CSF, and ISO 27001 compliance requirements for OT. • Proficiency in using SIEM systems (e.g., Microsoft Sentinel, Splunk, QRadar) for log correlation and event triage. • Understanding of firewalls, WAFs, proxies, and network segmentation principles in OT. • Working knowledge of tools such as THOR Scanner, VMRay, or Recorded Future is a plus. • Experience in vulnerability management and patch advisory for OT assets with limited patch cycles. ________________________________________ Nice to Have: • Exposure to Red Team/Blue Team exercises focused on OT/ICS. • Familiarity with GRC platforms and risk assessment tools tailored to OT.
Posted 1 month ago
2.0 - 7.0 years
4 - 9 Lacs
Bengaluru
Work from Office
Position title: Team Lead Job Location: Bangalore Shift timing: 8:30AM 5:30PM Role and responsibilities Responsible for overall performance and management of the team assigned People management that includes responsibility of performance evaluation, training, discipline, career pathing of all team members Proactive communication with client, ensuring all client requirements are met and reports are submitted on time Set goals for team members and communicate it to the team Ensuring all the key metrices are met including productivity, utilization, quality score, attendance, adherence to timelines Management Reporting: - Reports required by management relating to performance, costs, efficiency, utilization are shared with stake holders on time Actively work on skill development, engagement and retention of team members Responsible for upskilling and training the team members Provide regular feedback for performance Take necessary action including raising concern with stakeholders in case of performance or discipline related issues within the team Conduct regular 1-on-1 connects with team members Perform QC/QA checks for team members Liaison with other teams/departments Desired candidate profile Any graduate/Postgraduate with 2+ Yrs of experience as people manager or similar role with 4+ years of experience with LPO/Legal Services. Candidates with background of Document Review or e-Discovery or Contracts or Data Breach or Compliance are eligible to apply for this role. Excellent people management skills Passionate to drive business metrics – Productivity, Quality and other key deliverables Ability to priorities between multiple complex projects/timelines Excellent written and Verbal communication High level of positive attitude with good listening skills Good decision-making ability Ability to adapt to any process changes and work on different types of projects Good knowledge in Excel Ability to priorities between multiple complex projects/timelines Strong attention to detail and the ability to conduct root cause analysis Candidates with demonstrated experience in Data Breach Response, or Incident Response will be preferred. Please refer to our Privacy Policy at UnitedLex for information, https://unitedlex.com/privacy-policy/ ”
Posted 1 month ago
4.0 - 9.0 years
5 - 15 Lacs
Bengaluru
Work from Office
Position title: Manager Job Location : Bangalore Shift timing: 8:30AM 5:30PM Role and responsibilities: Responsible for overall performance and management of the team assigned Responsible for 2-3 projects, concurrently People management that includes responsibility of performance evaluation, training, discipline, career pathing of all team members Proactive communication with client, ensuring all client requirements are met and reports are submitted on time Set goals for team members and communicate it to the team Ensuring all the key metrices are met including productivity, utilization, quality score, attendance, adherence to timelines Management Reporting: - Reports required by management relating to performance, costs, efficiency, utilization are shared with stake holders on time Actively work on skill development, engagement and retention of team members Responsible for upskilling and training the team members Provide regular feedback for performance Take necessary action including raising concern with stakeholders in case of performance or discipline related issues within the team Conduct regular 1-on-1 connects with team members Perform QC/QA checks for team members Liaison with other teams/departments Desired candidate profile: Any graduate/Postgraduate with following experience grid: Mandatory experience in Incident Response (IR) Or Data Breach. Mandatory experience as people manager. Experience with LPO/Legal Services. Experience in planning and scoping the engagement, estimating the cost and time required to complete the project. Active involvement in forecasting the financial projections and budgeting the projects. Planning and setting eDiscovery process/workflow and quality control process to deliver quality work product. Excellent people management skills Passionate about driving business metrics Productivity, Quality, and other key deliverables. Ability to priorities between multiple complex projects/timelines. Excellent written and Verbal communication. High level of positive attitude with good listening skills. Good decision-making ability. Ability to adapt to any process changes and work on different types of projects. Good knowledge in Excel. Ability to priorities between multiple complex projects/timelines. Strong attention to detail and the ability to conduct root cause analysis. Candidates with demonstrated experience in Data Breach Response, or Incident Response will be preferred. Knowledge and hands-on experience in breach notification and privacy laws around data breach scenarios is desirable but not must. Please refer to our Privacy Policy at UnitedLex for information, https://unitedlex.com/privacy-policy/
Posted 1 month ago
5.0 - 9.0 years
15 - 19 Lacs
Bengaluru
Work from Office
RESG/GTS is the entity in charge of the entire IT infrastructure of Socit Gnrale. The RESG/GTS/SEC/SOC department, which corresponds to the Socit Gnrale SOC (SOC SG), is in charge of operational detection, incident response and prevention activities within the scope of GTS across the businesses. The mission of the SOC is to identify, protect, detect, respond and using the security platforms for the detection/reaction and prevention and resolution of security incidents. The SG SOC consists of Cyber Defense (incident management) Cyber Tools (management of SOC tools including the SIEM), Cyber Control (Prevention and Compliance) and Governance. This role is for a SOC L3(Lead Cyber Security Analyst) will be part of the GTS Security SOC team. In this role, you will involved in supporting India and global regional needs. The objectives of the Security Department (RESG/GTS/SEC) are to manage the strategy for all RESG/GTS in terms of security, technical standards, processes and tools, and thus to cover many cross-functional functions within the company and subsidiaries across all regions. Accountabilities Major Activities SOC Lead/L3 Lead and manage all high priority Critical Security Incidents including end to end incident mgmt. Support/help and guide the L1/L2 in managing complex issues/incidents Lead and engage in Study/POC of Tools and technologies aligning to the security roadmap Will be an expert in 1 or 2 key security technologies/tools globally and be part of the global SOC L3/Experts Example Areas: Threat Hunting, Forensic Analysis, IPS, EDR, DLP, etc. Contribution to the risk detection management approach, consistent with the SG MITRE Matrix approach and other industry standard relevant approaches Analysis support for complex investigations and improve reaction procedures/run book definitions/ enhancements Support for analyses on cybersecurity technical plans, analysis approach and incident management Identify different security tools and technologies to make security operations more effective. Identification of security gaps, mitigation strategy, implementation tracking till closure Work with various regional SOC and CERT teams on the security aspects an incidents where required Reporting to Function Head GTS SEC SOC
Posted 1 month ago
6.0 - 11.0 years
14 - 19 Lacs
Bengaluru
Work from Office
Your Role Evaluate software/product architecture to ensure security is embedded at the design phase. Develop cybersecurity artifacts such as threat models and lead mitigation discussions. Support engineering teams in triaging and resolving identified product vulnerabilities. Coordinate internal and external security and privacy assessments, including VAPT. Assist in formulating and implementing product security and privacy policies, standards, and procedures. Ensure compliance with defined security and privacy requirements and verify effectiveness of protection measures. Guide resolution of security audit findings and ensure timely closure. Provide strategic security risk management and advisory support for product and information security. Participate in incident response and assess risk and impact of security breaches. Review engineering changes, new services, and feature requests for security implications. Collaborate with tech leads and architects to ensure secure product development. Promote a culture of security awareness and continuous improvement across teams. Your Profile Strong experience in application, mobile, network, OS, and cloud security (experience range 7 to 15 years). Proficiency in AWS security, including AWS Solution Architect Associate and Security Specialty certifications. Hands-on expertise in static/dynamic code analysis, container security, and Kubernetes. Familiarity with security frameworks and standards like NIST 800-53, CIS/STIG, HI-TRUST, and SOC2. Knowledge of cryptography, PKI, OAUTH, 2FA, and secure software development lifecycle (SDLC).
Posted 1 month ago
7.0 - 11.0 years
9 - 13 Lacs
Bengaluru
Work from Office
Your role We are seeking an experienced and highly motivated Cloud Security Engineer to lead the implementation and optimization of security solutions across our public and hybrid cloud infrastructure. This role requires hands-on expertise in Microsoft Defender for Cloud, Cloud Access Security Broker (CASB), Cloud Workload Protection Platforms (CWPP), and Cloud Security Posture Management (CSPM) tools. The ideal candidate will be responsible for ensuring robust visibility, security, and compliance across all cloud-native assets, workloads, and applications. Design, deploy, and manage cloud-native security architectures across Azure, AWS, and GCP environments. Implement and optimize Microsoft Defender for Cloud, CASB solutions, and CWPP/CSPM tools to secure cloud workloads and assets. Monitor cloud environments for anomalies, vulnerabilities, and potential threats. Ensure compliance with regulatory standards (e.g., ISO, NIST, GDPR, HIPAA) and internal security policies. Conduct risk assessments and threat modeling of cloud services and applications. Collaborate with DevOps and Cloud Engineering teams to embed security into CI/CD pipelines. Develop automated security alerts, incident responses, and logging mechanisms. Provide recommendations for cloud architecture adjustments to strengthen security posture. Create and maintain documentation for cloud security strategies, policies, and procedures. Your profile Hands-on experience with Microsoft Defender for Cloud and CASB solutions (e.g., Microsoft Defender for Cloud Apps). Proven expertise with CWPP and CSPM platforms (e.g., Prisma Cloud, Wiz, Microsoft Defender CSPM). Strong understanding of cloud platforms Azure, AWS, GCP. Proficiency in scripting languages (e.g., PowerShell, Python) and infrastructure-as-code (e.g., Terraform, ARM templates). Knowledge of cloud security frameworks and best practices. Familiarity with SIEM solutions and cloud-native logging (e.g., Azure Monitor, AWS CloudWatch). Relevant certifications (e.g., Microsoft CertifiedAzure Security Engineer Associate, CISSP, CCSP, AWS Certified Security Specialty) are highly preferred. Excellent communication skills and stakeholder management experience.
Posted 1 month ago
0.0 - 5.0 years
10 - 15 Lacs
Malur, Bengaluru
Work from Office
Regulatory Compliance Radiation Safety Program Management conduct radiation safety training programs Respond to radiation safety incidents and emergencies monitoring and measurement of radiation levels in the workplace Collaboration and Communication Required Candidate profile Manage the disposal of radioactive waste as per regulatory requirements Maintain records of radiation sources, usage, and exposure levels Communicate radiation safety policies and procedures to staff Perks and benefits Insurance, Incentives, PF, Gratuity, TA DA
Posted 1 month ago
9.0 - 12.0 years
5 - 5 Lacs
Hyderabad
Work from Office
Role Proficiency: Manage a team of Threat Intelligence analysts who oversee delivering the hands-on service to customers and and act as an incident manager with highly technical skills during escalated cyber incidents. Responsible for developing the service to meet market standards. Develop forensic methodologies and dictate the threat hunting methodology to align with the changing cyber landscape and lead the forensic and proactive hunting disciplines into the most advanced techniques in the market. Develop the analysts' technical skills. Effectively communicate with stakeholder. Study the market and help expand the TI service. Outcomes: Stay on top of cyber security news from the clear deep and dark web daily. Pay attention to industry news security threats outside of their network and the intentions of potentially threatening entities. Mentor the team on best practice workflows and procedures to achieve their full potential and to increase level of security posture of customers. Solve complex forensics and hunting issues being escalated by team members and be the highest escalation point for all Operations teams. Define processes and workflows to optimize the work of the CTI analysts. Ensure documentation included in ThreatConnect/ CDC as predefined / agreed standards. Learn from review process for continuous improvement. Communicate and report appropriately as per defined process. Improve and automate response and hunting processes to increase efficiency of the services. Engage with sales teams to drive potential customers to purchase the services and increase CyberProof's margin goals Constantly strive to upgrade team workflows. Measures of Outcomes: CTI weekly recommendations tuning the hunting query etc. Number of threat intelligence finished reports including threat landscape and asset-based intelligence delivered by the analysts Customer satisfaction - upsells new customers customer engagement. Evidence of skill development including training certification etc. Ideas suggested that will help innovation and optimization of processes. Increased productivity and efficiency of the service by focusing on automating activities. Outputs Expected: Collection: Working with OSINT sources. Using WEBINT techniques to collect and enrich intelligence data. Develop and maintain deep web sources. Processing and analysis: Analyse the threat data into a finished report including technical recommendations MITRE ATT&CK mapping and valid IOCs. Complete documentation including annotation in ThreatConnect / CDC to ensure audit trail as per defined standards and quality requirements. In accordance with the defined process ensure that the defined reports are created and published to stakeholders. Continuous Learning innovation and optimization Ensure completion of analysts learning programs. Innovate new processes and workflows to deploy proactivity in all aspects to address complex threats and risks. Communicate with stakeholder: Effectively communicate with customers to deliver timely and accurate Threat Intelligence. Communicate with other teams to collaborate in the development of the Threat Intelligence service and the other offerings of the company. Present finished intelligence to team members management and clients. Learning and Development: Continuously learn new technologies and stay updated on cyber threats. Create innovative research reports (global trends cross clients collaboration with other teams in the company). Develop the analysts' technical skills Sales and service development: Understand the sales cycle and contribute to increase sales. Understand product development and influence on its design. Assist with Marketing efforts to showcase our Intelligence and research Actively help develop new services Skill Examples: User level skills in use of CDC ThreatConnect Sixgill IntSights VT Premium. Ability to manage incidents and collaborating several team activities in parallel streams to handle incident holistically. Excellent logical problem-solving ability and analytical skills for intelligence processing and analysis. Good time management skills Great oral and written communication skills. Presentation skills Sales skills to increase the uptake of services Designing skills for product development Programming languages such as Python and PowerShell Data analytics tools - SQL BI reports Knowledge Examples: Knowledge Examples Understanding of cybersecurity threat landscape and a deep understanding of computer intrusion activities incident response techniques tools and procedures. Understanding of enterprise IT Infrastructure including Networks OS Databases Web Applications etc. Deep and proven knowledge in baseline operating system internals network communications and user behavior. Thorough knowledge of digital forensics methodology as well as security architecture system administration and networking (including TCP/IP DNS HTTP SMTP) Experience conducting research in the areas of WEBINT OSINT social media platforms and virtual HUMINT. Experience with security assessment tools such as NMAP Netcat Nessus and Metasploit is a plus. Desirable - Training / Certification in Ethical Hacking etc. Additional Comments: Requirements: To be successful in this role, you should meet the following requirements: - 5+ years of technical experience in IT or IT Security, for example as a network or operating system administrator. - Expert level knowledge and demonstrated experience of common log management suites, Security Information and Event Management (SIEM), EDR, Email Protection, Case Management & other cyber security tools. - Expert level knowledge and demonstrated experience of common cybersecurity technologies such as IDS / IPS / HIPS, Advanced Anti-malware prevention and analysis, Firewalls, Proxies, MSS, etc. - Good knowledge and technical experience of 3rd party cloud computing platforms such as AWS, Azure, and Google. - Good knowledge and demonstrated experience of common operating systems and platforms to include Windows, Linux, UNIX, Oracle, Citrix, GSX Server, iOS, OSX, etc. - Good knowledge of common network protocols such as TCP, UDP, DNS, DHCP, IPSEC, HTTP, etc. and network protocol analysis suits. - Functional knowledge of scripting, programming and/or development of bespoke tooling or solutions to solve unique problems. - Good knowledge of key information risk management and security related standards including OWASP, ISO2700x series, PCI DSS, GLBA, EU data security and privacy acts, FFIEC guidelines and NIST standards - Good knowledge and demonstrated experience in incident response tools, techniques and process for effective threat containment, mitigation, and remediation. - Formal education and advanced degree in Computer Science or similar and/or commensurate demonstrated work experience in the same. - CEH, EnCE, SANS GSEC, GCIH, GCIA CISSP or any similar Certifications. Required Skills Cyber Security,Anti Malware,Firewall,Proxies
Posted 1 month ago
8.0 - 11.0 years
35 - 37 Lacs
Bengaluru
Hybrid
Key Skills: SIEM, SOAR, Azure Sentinel, FortiSOAR, Python, PowerShell, Cyber Security, Automation, Security Frameworks, Compliance, Incident Response, Playbook Creation, Log Onboarding, Cyber Kill Chain. Roles & Responsibilities: Manage and oversee SIEM and SOAR solutions, including log onboarding and creation of automated playbooks. Provide hands-on technical expertise across Cyber Security and technology domains. Collaborate with internal teams to integrate and optimize security monitoring tools and automate workflows. Maintain and ensure the performance of SIEM and SOAR platforms, enhancing detection and response capabilities. Design and implement automation solutions using scripting languages (e.g., Python, PowerShell). Support and ensure compliance with security frameworks and industry regulations. Analyze and remediate security incidents, leveraging expertise in the Cyber Kill Chain and common attack methods. Work closely with cross-functional teams to define security requirements, processes, and practices. Communicate complex security concepts to non-technical stakeholders. Monitor and report on security events and incidents to ensure continuous improvement of security posture. Experience Required: 8-11 years of experience in IT Security, with at least 6 years managing SIEM and SOAR solutions. Strong hands-on experience with SIEM (e.g., Azure Sentinel) and SOAR platforms (e.g., FortiSOAR). Experience in log onboarding for SIEM solutions and creating automated playbooks on SOAR platforms. Solid understanding of security frameworks, compliance regulations, and industry standards. Technical experience in Cyber Security and technology domains, including threat analysis and remediation. Proven ability to work under pressure and manage time effectively. Familiarity with e-commerce, logistics, supply chain, and port operations applications is a plus. Education: A ny Graduation.
Posted 1 month ago
2.0 - 3.0 years
4 - 8 Lacs
Gurugram
Work from Office
Ensure that all SOC (Security Operations Center) tickets are handled and resolved within SLAs (Service Level Agreements). Perform detailed analysis of threats and security events, using sound analytical skills, knowledge, and experience, with a clear narrative to support conclusions. Maintain records of security events investigated, detailed notes of security incident resolution, and incident response activities, utilizing ticketing systems. Make situational incident response recommendations based on best practice security policies that address the clients business need. Research and stay up to date with current security vulnerabilities, attacks, threat actors, security advisories and the MITRE Attack Framework. Manage, maintain, and monitor security alerting systems from remote communications sites to ensure company compliance. Create and run search queries in SIEM tool to help with identifying and troubleshooting security issues. Utilize tools (e.g., Wireshark, Nmap, PCap, etc.) to identify and map devices on the network. Open, track and close trouble tickets. Answer incoming hot line calls and monitor various e-mail accounts and act according to SOC procedures and processes. Interface with client through email, phone calls, and meetings or Aspire field personnel to mitigate security incidents. Assist with the preparation of SOC reports, research papers, and blog posts. Investigate and provide technical analysis of various security incidents and possible compromise of systems. Works as Tier I/L1 support and will work directly with Tier II/L2 and TIER III/L3 and NOC Engineers for issue resolution. Provide direct communication to affected users and companies on security incidents and maintenance activities. Maintain customer technical information within defined documentation standards. Obtain/maintain technical/professional certifications applicable to position or as directed. Communicate with customers, peers, team, and managers regarding incident and change management. Provide emergency on-call support on a rotating schedule. Perform other duties as assigned. Technical Skills Strong troubleshooting and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team. Strong organizational and time management skills. Willingness to work after hours and provide on-call support. Nice-to-have skills Qualifications Bachelors degree in computer science, Information Technology, or a related field. Experience of 2 to 3 years relevant experience. 1+ year of professional work experience in cyber security field 1+ year of experience with Security Event / Alert Management, Incident Response, and Change Management Processes 1+ year of experience handling security events related to Malware Detection and Analysis, Indicators of Compromise (IOC), Email Phishing, Endpoint Detection and Response (EDR) Knowledge of Runbooks, Playbooks and following Standard Operating Procedures Possession of an Industry Certification (Security+, CySA+, Cisco Cyber-Ops Associate, NSE4, or similar) 1+ years of experience in Security Management. SIEM and Log Management (MS Sentinel , IBM QRadar ,Splunk, OSSIM, FortiSIEM, LogRhythm, etc.) Experience with Firewalls (Palo Alto Networks, Cisco Firepower Manager) Experience with Endpoint Security (Cisco Secure Endpoint, CrowdStrike Falcon, Carbon Black, Microsoft Advanced Threat Protection) Experience with Network Traffic Analytics (Cisco Stealthwatch Cloud, Darktrace) Experience with DNS Security (Cisco Umbrella, Forcepoint) 2+ years of experience with Ticket Management Tools (e.g., ConnectWise, ServiceNow)
Posted 1 month ago
5.0 - 10.0 years
4 - 8 Lacs
Hyderabad
Work from Office
Job Requisite: Immediate Joiners with below experience Control Management • Define and manage access privileges based on job roles and security levels. • Maintain and review access logs regularly to detect unauthorized or suspicious activity. • Monitor visitor access, including registration, issuance of temporary badges, and escort policies. Controlled and Restricted Area Administration • Classify secure areas by security level (General, controlled, and restricted) • Monitor and maintain physical access control systems (e.g., card readers, biometric reader). • Establish surveillance zones (e.g., NCT zone) and manage physical barriers to prevent unauthorized access. CCTV and Surveillance Operations • Oversee installation and operation of CCTV systems in compliance with applicable regulations. • Ensure that video footage is securely stored, and access is restricted to authorized personnel. • Manage procedures for viewing, retaining, and releasing surveillance footage. Facility Protection and Physical Equipment Maintenance • Conduct regular inspections of physical security assets, including locks, doors, and alarm systems. • Develop and implement procedures for emergency response to fire, power outages, and intrusions. • Enforce physical access controls for external vendors, maintenance personnel, and construction workers. Policy and Procedure Documentation • Establish and maintain physical security policies and procedures, in alignment with the requirements of ISO/IEC 27001, TISAX, NCT and related regulatory frameworks. • Develop and manage checklists and manuals for access control, CCTV operations, and routine inspections. • Provide relevant documentation and evidence for internal audits and external assessments (e.g., TISAX, ISO 27001). Training and Awareness Programs • Conduct regular physical security awareness training for employees. • Promote compliance through campaigns (e.g., clean desk policy, badge wearing, door monitoring). Oversee Security Guard Training • Ensure that all contracted or in-house security personnel receive initial and recurring training aligned with company policy. ( Training should cover facility layout and access zones, emergency procedures, incident reporting protocol, visitor handling, use of security equipment (e.g., metal detectors), and service lift usage procedures, visitors personal information retention) • Maintain training records and verify completion through checklists or sign-offs. Incident Response and Reporting • Monitor for physical security breaches such as unauthorized entry, door propping, or suspicious behavior. • Collaborate with relevant departments to investigate and respond to incidents. • Maintain incident records and report findings to the information security officer or management. Roles and Responsibilities Control Management • Define and manage access privileges based on job roles and security levels. • Maintain and review access logs regularly to detect unauthorized or suspicious activity. • Monitor visitor access, including registration, issuance of temporary badges, and escort policies. Controlled and Restricted Area Administration • Classify secure areas by security level (General, controlled, and restricted) • Monitor and maintain physical access control systems (e.g., card readers, biometric reader). • Establish surveillance zones (e.g., NCT zone) and manage physical barriers to prevent unauthorized access. CCTV and Surveillance Operations • Oversee installation and operation of CCTV systems in compliance with applicable regulations. • Ensure that video footage is securely stored, and access is restricted to authorized personnel. • Manage procedures for viewing, retaining, and releasing surveillance footage. Facility Protection and Physical Equipment Maintenance • Conduct regular inspections of physical security assets, including locks, doors, and alarm systems. • Develop and implement procedures for emergency response to fire, power outages, and intrusions. • Enforce physical access controls for external vendors, maintenance personnel, and construction workers. Policy and Procedure Documentation • Establish and maintain physical security policies and procedures, in alignment with the requirements of ISO/IEC 27001, TISAX, NCT and related regulatory frameworks. • Develop and manage checklists and manuals for access control, CCTV operations, and routine inspections. • Provide relevant documentation and evidence for internal audits and external assessments (e.g., TISAX, ISO 27001). Training and Awareness Programs • Conduct regular physical security awareness training for employees. • Promote compliance through campaigns (e.g., clean desk policy, badge wearing, door monitoring). Oversee Security Guard Training • Ensure that all contracted or in-house security personnel receive initial and recurring training aligned with company policy. ( Training should cover facility layout and access zones, emergency procedures, incident reporting protocol, visitor handling, use of security equipment (e.g., metal detectors), and service lift usage procedures, visitors personal information retention) • Maintain training records and verify completion through checklists or sign-offs. Incident Response and Reporting • Monitor for physical security breaches such as unauthorized entry, door propping, or suspicious behavior. • Collaborate with relevant departments to investigate and respond to incidents. • Maintain incident records and report findings to the information security officer or management.
Posted 1 month ago
4.0 - 8.0 years
0 Lacs
punjab
On-site
As a DevOps Lead in a SaaS company, your primary responsibility will be to architect, build, and maintain the infrastructure necessary to support the company's software applications and services. You will also lead a small team of DevOps engineers, providing technical mentorship and ensuring best practices across deployments, automation, monitoring, and security. You'll work closely with developers, system administrators, and stakeholders to ensure infrastructure is secure, reliable, scalable, and cost-efficient. Lead and mentor a team of DevOps engineers, ensuring consistent delivery, training, and process improvements. Conduct regular code and infrastructure reviews, guiding team members on technical challenges and performance optimization. Designing, building, and maintaining cloud-based infrastructure such as Oracle, GCP, AWS, or Azure. Managing the company's CI/CD pipeline to ensure code changes are deployed quickly and reliably using tools like Jenkins, YAML, and Manifest. Automating deployments on Kubernetes clusters to reduce manual intervention. Proficient in Docker-based containerization; managing images and working with Docker Hub. Hands-on experience with configuration management tools like Ansible; creating and managing playbooks and roles. Strong knowledge of version control systems like Bitbucket, Git, or GitHub. Monitor infrastructure and applications using tools like New Relic, Site24x7, Prometheus, and respond to alerts in a timely manner. Hands-on experience with SQL and NoSQL databases such as MySQL, Cloud SQL, Oracle SQL, MSSQL. Collaborate with software developers for optimization, monitoring, maintenance, and troubleshooting. Experience with web servers such as Apache Tomcat, NGINX, and Apache HTTPD. Standardize and document deployment processes for client-side implementation. Ensure high availability and low downtime of servers and services by proactively monitoring cloud infrastructure. Handle incident response, troubleshooting, and support requests, acting as the escalation point for the DevOps team. Develop and implement security policies, access controls, and data protection protocols. Stay updated with trends in DevOps, automation, and cloud platforms to introduce innovation and improvements. Graduate in Computer Science/ Information Security or a related field. Strong experience in Linux/Unix systems administration and scripting (Bash/Python). Hands-on experience with cloud platforms (Oracle, GCP, AWS, or Azure). Experience in managing containerized and Kubernetes-based infrastructure. Strong leadership, communication, and team management skills. Experience working in fast-paced, SaaS-based environments is a plus.,
Posted 1 month ago
13.0 - 17.0 years
0 Lacs
ahmedabad, gujarat
On-site
As a Delivery Support & Coordination professional, you will be responsible for assisting in the day-to-day management of ongoing cybersecurity projects, including assessment, implementation, or operations. You will play a key role in maintaining project trackers, action logs, SLA dashboards, and delivery documentation. Tracking task-level progress across internal teams and external partners will be a crucial part of your role. Additionally, you will participate in client calls and internal reviews as a support owner. In the realm of Governance & Reporting, you will be expected to prepare reports, presentations, and dashboards for both internal and client stakeholders. You will ensure the accuracy and timely submission of status updates, metrics, and incident logs. Keeping risk and issue logs updated and following up on closure will also fall under your purview. Your role will also involve Process Adherence & Quality Control where you will be required to ensure compliance with internal delivery frameworks, SOPs, and documentation standards. Supporting delivery audits, knowledge management, and quality control initiatives will be part of your responsibilities. You will have the opportunity to learn and apply ITIL/NIST/ISO 27001 delivery principles under guidance. For this role, the must-have qualifications include a minimum of 3 years of experience in cybersecurity, IT operations, or project coordination. A strong interest in OT/IT security domains and service delivery is essential, along with a good understanding of cybersecurity concepts such as firewalls, IAM, and incident response. Excellent communication, documentation, and task-tracking skills are a must, along with a strong problem-solving orientation and willingness to work in client-facing settings. Preferred qualifications for this role include a Bachelor's degree in Computer Science, IT, Electronics, or equivalent. Certifications such as ISO 27001 Foundation, ITIL Foundation, or any entry-level security certification are preferred. Exposure to industrial systems, SCADA, or SOC tools would be considered a plus.,
Posted 1 month ago
8.0 - 12.0 years
0 Lacs
hyderabad, telangana
On-site
As a Senior Principal Information Security Analyst at NTT DATA, you will play a crucial role in influencing and leading the implementation of the information security strategy. Your expertise will be instrumental in aligning security measures with business goals and industry best practices. You will act as a consultant in designing and implementing security systems to safeguard the organization's computer networks from cyber threats and maintaining security standards. Additionally, you will provide guidance to junior team members and contribute high-level insights on industry best practices. Your responsibilities will include monitoring security alerts, investigating potential threats, implementing security controls, conducting vulnerability assessments, supporting incident response efforts, ensuring compliance with industry standards, and developing best practices for IT security. You will also be involved in installing and operating security software, performing penetration testing, and staying updated on security trends and standards. Collaboration with cross-functional teams and contributing to security awareness initiatives will be essential aspects of your role. To excel in this position, you should possess excellent communication skills, analytical thinking, problem-solving abilities, leadership qualities, and a strong understanding of network security concepts. Proficiency in firewalls, proxies, SIEM, antivirus, patch management, MAC and OS, security frameworks, network architecture, and system protocols is crucial. Strong analytical skills, the ability to work independently and collaboratively in a fast-paced environment are also key requirements. Academic qualifications such as a Bachelor's or Master's degree in information security, cybersecurity, computer science, or related fields are preferred. Security certifications like CompTIA Security+, CISSP, or CISM are advantageous. You should have significant experience in information security, cybersecurity, global IT organizations, network penetration testing, security assessment, and mentoring junior team members. NTT DATA is a trusted global innovator providing business and technology services to Fortune Global 100 companies. With a commitment to innovation, optimization, and transformation, NTT DATA invests in research and development to support organizations in navigating the digital future confidently. As an Equal Opportunity Employer, NTT DATA offers a hybrid working environment and values diversity, inclusion, and employee growth.,
Posted 1 month ago
8.0 - 12.0 years
0 Lacs
noida, uttar pradesh
On-site
As a Practice Delivery Executive (PDE) at NTT DATA, you will play a crucial role in leading the delivery of all NTT Data services, focusing on client transformation, delivery excellence, and building high-performance teams. Your responsibilities will include ensuring the end-to-end delivery of services for specific clients, monitoring delivery quality, managing client relationships, and driving continuous improvement. You will be accountable for maintaining financial forecasts, managing costs, and aligning operations with annual operating plans. Additionally, you will work closely with Client Executives to develop customer relationships, manage relationship risks, and provide strategic delivery advice to the executive leadership team. Your role will also involve acting as the main contact for client operations leadership, building effective communications with stakeholders, and staying updated on global industry trends. You will be expected to leverage your experience in organizational change management to guide delivery leaders, evaluate performance, and provide feedback to ensure service excellence. To succeed in this role, you must possess Delivery Leadership and Executive Level Experience, along with expertise in IT support, project management, service management, and digital transformation. Strong communication skills, ITIL certification, and the ability to work effectively across different time zones are essential. NTT DATA is a trusted global innovator of business and technology services, committed to helping clients innovate, optimize, and transform for long-term success. With a diverse team of experts and a focus on digital and AI infrastructure, NTT DATA is dedicated to driving organizations and society confidently into the digital future.,
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |