Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 15.0 years
0 Lacs
pune, maharashtra
On-site
You are a seasoned professional with expertise in the Cyber Security Domain and Cloud, specifically focused on Telecom, IT Security & AI/ML. As a Practice Specialist, your role will involve utilizing your strong technical background and hands-on experience to drive innovation and design solutions that meet client needs within these domains. This customer-facing position requires you to be adept at developing and enhancing service offerings that leverage AI/ML, collaborating with internal teams and customers, and ensuring the efficient implementation of solutions. Your responsibilities will include: - Leading practice innovation by developing service offerings that leverage AI/ML in Telecom, Security, and Cloud domains. - Acting as a subject matter expert to guide internal teams and customers in adopting advanced technologies. - Consulting on Cyber Security and Cloud domain towards Architecture, Design, Compliance Audits, etc. - Building trusted relationships with customers and providing strategic advice on technology solutions. - Collaborating with sales, solution & delivery teams to design solutions in IT Security, Cloud, and AI/ML. - Identifying and implementing AI/ML-driven use cases in IT Security and Cloud. - Staying updated on emerging technologies in Security, Cloud, and AI/ML. Qualifications and Experience: - Education: Bachelor's or master's degree in computer science, Information Technology, Data Science, or related field. - Experience: 15+ years of experience in Telecom, Security, and Cloud technologies, with at least 2+ years of experience in AI/ML use cases. - Skills: Deep knowledge of Security standards, cloud computing architectures, and AI/ML techniques. Hands-on experience with cloud platforms (AWS, Azure, GCP) and security tools (SIEM, firewalls, SASE). - Certifications like CISSP, CCSP, AWS/Azure Solutions Architect, and AI/ML certifications are highly desirable.,
Posted 1 week ago
2.0 - 6.0 years
0 Lacs
karnataka
On-site
I'm sorry, but I will need the complete job description text in order to provide the revised version.,
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
pune, maharashtra
On-site
As an IT Security Manager at Staff4Me, you will be responsible for ensuring the overall security of the company's information systems. Your primary role will involve developing and implementing security strategies and policies to protect against cyber threats and ensure compliance with industry standards. Additionally, you will lead incident response efforts and provide guidance to the IT team in managing security incidents. Your responsibilities will include: - Developing and implementing comprehensive security strategies and policies - Ensuring compliance with industry standards and regulations - Performing risk assessments and identifying potential security vulnerabilities - Monitoring and analyzing security events and incidents to identify threats - Leading incident response efforts, including investigation and containment of security incidents - Collaborating with cross-functional teams to address security risks - Providing guidance and support to IT team members involved in managing security incidents and implementing security controls - Staying up-to-date with emerging threats and proposing proactive measures - Conducting security awareness training for employees - Managing relationships with external security vendors and consultants To be successful in this role, you should have: - 5+ years of experience in IT security management or a similar role - Strong knowledge of information security standards and best practices - Experience in developing and implementing security strategies and policies - Proficiency in risk assessments and vulnerability management - Hands-on experience with security tools and technologies - Knowledge of network and cloud security principles - Experience in incident response and security investigations - Excellent problem-solving and decision-making skills - Strong leadership and communication abilities - Professional certifications such as CISSP, CISM, or CISA are preferred Join our team at Staff4Me as an IT Security Manager and play a key role in safeguarding our company's information systems against cyber threats.,
Posted 1 week ago
5.0 - 10.0 years
0 Lacs
karnataka
On-site
As a passionate member of Advarra, you will play a crucial role in overseeing the information security compliance program for the relevant region. Your responsibilities will include identifying areas of non-compliance and directing corrective action while serving as a consultant and advisor to regional site leadership on information security and related matters. You will take the lead in initiating, facilitating, and promoting activities that enhance information security awareness within your area of responsibility. Your role at Advarra will involve fostering a culture of cybersecurity within the organization, driving behavioral changes for the business, and providing insightful reports and communications to regional and site-level leadership on security trends and statistics. You will also be instrumental in assisting the Chief Information Security Officer (CISO), Security Operations Lead, Privacy, and Compliance in responding to regional security incidents and potential breaches of electronic protected health information (ePHI) and electronic personally identifiable information (ePII). In addition to these duties, you will be responsible for developing and implementing risk management strategies and corrective action plans for your designated region or business area. This will involve conducting risk assessments, analyzing potential risks, and implementing mitigation and remediation measures. You will also coordinate both external and internal security and privacy audit controls to monitor activity on electronic systems containing sensitive information. Furthermore, you will ensure that disaster recovery, business continuity, risk management, and access control needs are documented and addressed for your region or business area. You may also lead strategic projects with regional and national scope, such as Data Leak Protection, Vulnerability Management, and Phishing Simulation reporting. This individual contributor role does not involve managing direct reports and requires a Bachelor's degree in computer science, information systems, or a related field, along with 5-10 years of experience leading an information security program. A CISSP or CISM certification is preferred, and experience in regulated industries such as Life Science, Health Care, or manufacturing is beneficial. Your ability to lead audits and assessments related to ISO27001, HIPAA, and HITRUST, as well as experience in vendor and product selections, will be valuable in this role. Located in Bengaluru, India, this position offers a hybrid work option. While CRISC, CGEIT, CISA GSEC, and GCIH certifications are helpful, they are not mandatory. The role may involve sitting or standing for extended periods, carrying objects, and focusing on tasks with verbal communication skills being essential for effective collaboration.,
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
maharashtra
On-site
The main responsibilities for this position include implementing security controls, risk assessment framework, and programs in alignment with regulatory requirements to ensure documented and sustainable compliance that supports business objectives. You will be responsible for evaluating risks and developing security standards, procedures, and controls to manage risks effectively. Additionally, you will work on improving security positioning through process enhancement, policy development, automation, and continuous evolution of capabilities. Your role will involve implementing processes like GRC (governance, risk and compliance) to automate and monitor information security controls, exceptions, risks, and testing. You will be required to develop reporting metrics, dashboards, and evidence artifacts. Updating security controls and providing support to stakeholders on security controls, including internal assessments, regulations, and protection of Personally Identifying Information (PII) data will also be part of your responsibilities. You will perform internal and external information security risk and exceptions assessments, including incident assessments, vulnerability management, scans, patching status, secure baselines, penetration test results, phishing, and social engineering tests. Documenting and reporting control failures and gaps to stakeholders, providing remediation guidance, and preparing management reports to track remediation activities will be crucial aspects of your role. Furthermore, you will facilitate the remediation of control gaps, escalate critical issues to leadership, manage an exception review and approval process, and ensure exceptions are documented and periodically reviewed. Collaborating closely with control owners and internal and external auditors to ensure timely completion of requests is essential. As part of your responsibilities, you will assist in evaluating the effectiveness of the information security program by developing, monitoring, gathering, and analyzing information security and compliance metrics for management. Identifying, analyzing, evaluating, and documenting information security risks and controls based on established risk criteria will also be a key aspect of your role. Additionally, you will conduct security risk assessments of planned and installed information systems to identify vulnerabilities and risks, recommend controls to mitigate security risks identified through the risk assessment process, and communicate risk findings and recommendations clearly to business stakeholders. Your role will involve researching, recommending, and contributing to information security policies, standards, and procedures, as well as assisting with the lifecycle management of information security policies and supporting documents. You will also be responsible for performing third-party supplier risk assessments to ensure supply chain risk management throughout the supplier's lifecycle, assessing and reporting risks and benefits for the business, and mandating supplier compliance. Lastly, you will assist with the review of information security sections within supplier contracts, identify gaps, recommend security and data privacy content to close gaps, and maintain an inventory of relevant suppliers/vendors, controls, and risks for ongoing vendor risk management activities.,
Posted 1 week ago
8.0 - 13.0 years
0 Lacs
chennai, tamil nadu
On-site
As a NOC Monitoring Lead with 8 to 13 years of experience, you will be responsible for overseeing the Network Operations Center (NOC) activities in Chennai. You will play a key role in monitoring network performance, troubleshooting issues, and ensuring smooth operations. The mode of interview for this position is Face-to-Face, and the interview is scheduled for 1st March, 2025 (Saturday) at EB-3, SIPCOT IT Park, Hexaware Technologies, H5, Chennai, Tamil Nadu 603103. Your point of contact for the interview process will be Sushmita Sen.,
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
ahmedabad, gujarat
On-site
You are an experienced Senior Site Reliability Engineer (SRE) with a strong background in Release Management, Linux (L3), and Oracle Cloud Infrastructure (OCI). In this role, you will lead OCI migrations, Cloud.Next projects, and software releases to ensure system reliability and performance. Your responsibilities will include troubleshooting, automation, incident response, and root cause analysis. It is essential to have expertise in CI/CD, containerization (Docker/Kubernetes), and Infrastructure-as-Code (Terraform/Ansible). Collaborating with cross-functional teams, managing on-call duties, and documenting best practices are key aspects of this role. Experience in high-availability environments, excellent problem-solving skills, and multi-cloud experience (AWS, Azure, GCP) are highly desirable. As an IC3 level professional, your responsibilities will include Release Management & Automation, Incident Response & Root Cause Analysis (RCA), Monitoring, Observability & Performance Optimization, Security, Compliance & Best Practices, Disaster Recovery & Business Continuity, Collaboration & Knowledge Sharing, and Continuous Improvement & Innovation. Your duties will involve designing, deploying, and maintaining highly available, scalable, and secure cloud environments in Oracle Cloud Infrastructure (OCI) and AWS. You will optimize cloud infrastructure for performance, cost, and security, manage multi-cloud and hybrid cloud architectures, and streamline software release processes. Developing and managing CI/CD pipelines, automating infrastructure provisioning, and serving as an L3 escalation point for complex issues are vital aspects of this role. Real-time troubleshooting, root cause analysis, monitoring, logging, alerting, and cloud security best practices will be part of your daily tasks. You will also ensure compliance with industry standards, perform security audits, vulnerability assessments, and manage disaster recovery strategies. Additionally, you will work closely with development, DevOps, and security teams to enhance system reliability, mentor junior engineers, and evaluate emerging cloud technologies for operational improvements. Your role will contribute to the continuous improvement and innovation of cloud solutions to meet SLAs, SLOs, and SLIs. About Us: Oracle is a global leader in cloud solutions, utilizing cutting-edge technology to address current challenges. We believe that true innovation stems from diverse perspectives and backgrounds. By fostering an inclusive workforce, we encourage fresh insights and inspire groundbreaking solutions. With a commitment to integrity and decades of successful operations, we collaborate with industry leaders across various sectors. At Oracle, we prioritize work-life balance and offer competitive employee benefits that promote parity and consistency. Our inclusive culture values volunteerism and community engagement. We are dedicated to creating an accessible workplace that accommodates individuals with disabilities throughout the employment process. Disclaimer: Oracle is proud to be a United States Affirmative Action Employer.,
Posted 1 week ago
2.0 - 6.0 years
0 Lacs
cuttack
On-site
You should have at least 3+ years of relevant technical experience in Network support/operations. Your role will involve troubleshooting knowledge on VLAN/VTP/STP/Port channel/HSRP/VRRP/GLBP/VSS & VPC, as well as expertise in routing protocols such as EIGRP, OSPF, BGP, and Wireless Controller troubleshooting. You will be responsible for establishing network specifications, evaluating network performance, maintaining network performance, securing the network, and upgrading the network by conferring with vendors. Additionally, you must have a good understanding of WAN, troubleshooting knowledge on Cisco iWAN, WAAS, VPN Tunnels, ISE, Cisco ACS, Cisco Prime, DHCP server, Infoblox, and Cloud technology. Furthermore, you will be required to provide incident response & resolution as part of the 24x7 Network Operations Center, handle the Entire Network of a major Client, and provide technical leadership within a highly technical team. You should also be proficient in handling P1/P2 escalations and ensuring quick resolution during Major Issues. Your responsibilities will include translating client requirements into detailed actions for execution, following detailed change management and incident management processes, communicating with other technical teams regarding Firewall/Routing/Switching operations, and troubleshooting DC environment incidents. Moreover, you will be responsible for the daily performance and availability of the network security infrastructure, analyzing network and recommending upgrades/changes, assessing organization & a poss current and future network needs, and providing Network Evaluation & Proposals. A certification in CCNP is preferable for this role. To excel in this position, you should be customer-centric, proactive in helping junior team members, have a positive attitude, and be able to work in a fast-paced operations environment. Your performance will be measured based on achieving team and personal goals as defined by the company, following ITIL Incident Management guidelines, and adhering to ticketing processes according to the change request phases defined. Additionally, you should ensure that tickets assigned to the queue are accepted and worked on time, and add value to your team environment by maintaining enthusiasm and a positive attitude. Your network designing experience will be an add-on to your responsibilities.,
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
thane, maharashtra
On-site
The Security Analyst II is a mid-level role responsible for managing and enhancing the organization's security posture. In this position, you will lead investigations, implement advanced security measures, and provide guidance to junior analysts. Your key responsibilities will include investigating, analyzing, and responding to complex security incidents and breaches, performing advanced threat hunting, leading vulnerability management and penetration testing efforts, developing and maintaining security monitoring and detection systems, acting as an escalation point for Security Analyst I team members, collaborating with IT and DevOps teams to secure cloud and on-prem environments, delivering security awareness training for employees, providing input on strategic security initiatives and technology procurement, and contributing to and improving the organization's incident response plan. To qualify for this role, you should have a Bachelor's degree in Cybersecurity, Computer Science, or a related field (or equivalent experience), along with 3-5 years of experience in IT security or a similar role. You should possess strong knowledge of cybersecurity frameworks such as NIST, ISO 27001, and compliance standards like PCI-DSS, GDPR. Proficiency in using SIEM, EDR, IDS/IPS, and vulnerability management tools is essential, as well as hands-on experience in incident response and threat analysis. Relevant certifications such as CISSP, CISM, GIAC are highly preferred.,
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
haridwar, uttarakhand
On-site
If you are part of the Unilever Ice Cream business or are considering joining the team, you will be working for the global leading Ice Cream player with a turnover of 7.9 billion in 2023. The Ice Cream business operates in a highly attractive category within the 1 trillion snacking and refreshment industry, experiencing consistent high-paced growth. The business boasts strong brand equities, including top-selling brands like Walls, Magnum, and Ben & Jerry's. There is a significant investment focus on unlocking the full growth potential of Ice Cream as a standalone entity, separate from Unilever, with the planned separation to take place by November 2025. The Ice Cream company is dedicated to developing and nurturing talent within the organization, offering various opportunities for career growth and exploration across the new entity. Career development is a priority, with a strong commitment to supporting individual growth journeys within the company. The goal is to build a new chapter in the Ice Cream history together. About Ice Cream: Life Tastes Better With Ice Cream Unilever Ice Cream is the largest global Ice Cream Company worldwide, with over a century of experience in delivering diverse indulgent yet responsible craft food experiences to consumers. With 35 brands, including Magnum, Walls, and Ben & Jerry's, the company operates in over 60 countries, generating an annual revenue exceeding $8 billion. The focus is on innovation, quality, and sustainability, transforming moments into lasting memories through responsibly crafted products. The company is committed to delivering growth and value creation through unique and innovative Ice Cream experiences that bring joy and happiness to people and communities. Job Purpose As part of the growth strategy, the company is looking for a skilled IT Security Architect to join the team. The IT Security Architect will be responsible for designing, building, and maintaining the security architecture of the organization's IT infrastructure. This role ensures that digital assets are protected from cyber threats and that security measures are integrated across all IT aspects. The position is part of the Enterprise Architecture team and will play a crucial role in establishing the technology capabilities necessary for the Ice Cream business to operate as a standalone company. The IT Security Architect will work closely with technology and data teams, collaborating with the Cybersecurity team to ensure state-of-the-art security measures are implemented. Key Responsibilities - Design and Implementation: Develop and implement security architectures and solutions to safeguard IT systems and data. - Risk Assessment: Conduct regular security risk and vulnerability assessments to identify potential threats. - Policy Development: Create and enforce security policies to ensure compliance with industry regulations and best practices. - Incident Response: Lead the response to security incidents, including investigation, mitigation, and reporting. - Collaboration: Work with IT teams and stakeholders to integrate security into all stages of software development. - Monitoring and Analysis: Implement security monitoring tools to detect and respond to breaches. - Training and Awareness: Provide security training programs to promote a culture of security within the organization. - Documentation: Maintain comprehensive documentation of security architectures and incident reports. Skills And Experience Required - Education: Degree in Information Technology or related field, experience in Enterprise Architecture. - Experience: Minimum 5 years in IT security with a focus on architecture and design. - Technical Skills: Proficiency in security technologies such as firewalls, encryption, and identity management solutions. - Knowledge: Understanding of security frameworks and regulatory requirements. - Analytical Skills: Strong problem-solving skills to address security challenges. - Communication: Excellent interpersonal skills to collaborate effectively. - Leadership: Ability to lead security initiatives and manage cross-functional teams. In conclusion, the IT Security Architect role at Unilever Ice Cream offers an exciting opportunity to be part of a team that is driving innovation and growth in the Ice Cream business. If you are passionate about IT security and possess the required skills and experience, we invite you to join us in shaping the future of Ice Cream technology and security.,
Posted 1 week ago
7.0 - 11.0 years
0 Lacs
chennai, tamil nadu
On-site
At Allucent, we are dedicated to assisting small-medium biopharmaceutical companies in efficiently navigating the complex world of clinical trials to bring life-changing therapies to patients in need across the globe. We are seeking a Director, IT Security & Network to join our A-team (hybrid*). As the Director, Network and Security, you will be responsible for overseeing and managing the company's network infrastructure and cybersecurity operations. This role requires a strategic leader with a comprehensive understanding of network systems and cybersecurity practices. The ideal candidate will excel in technical problem-solving, strategic planning, team management, and project execution. Your key tasks in this role will include designing, implementing, and maintaining the company's network infrastructure, monitoring network performance, addressing network issues and outages, creating and executing a comprehensive cybersecurity strategy, overseeing security technologies deployment and management, leading responses to security incidents, mentoring the network and cybersecurity teams, promoting collaboration, establishing and enforcing network and cybersecurity policies, ensuring compliance with regulations and industry standards, managing vendor relationships, and leading the creation of network and security designs for the company's global cybersecurity program. Regular updates and reports to senior management and stakeholders on network performance, security posture, and ongoing projects will also be part of your responsibilities. To be successful in this role, you should possess a Bachelor's degree in network engineering, Cybersecurity, Information Technology, or a related field. A Master's degree or relevant certifications (e.g., CCNP, CISSP, CISM) are preferred. You should have a minimum of 7-10 years of experience in network management and cybersecurity, with at least 3-5 years in a leadership or managerial role. Other requirements include extensive knowledge of network infrastructure, security frameworks, risk management, incident response, leadership experience, strong interpersonal and communication skills, problem-solving abilities, familiarity with industry regulations and standards, project management skills, experience in a Pharmaceutical/biotechnology environment, knowledge of cloud networking and security solutions, and experience with Netskope SASE platform. Working at Allucent comes with a range of benefits such as a comprehensive benefits package, competitive salaries, study/training budget, flexible working hours, remote/hybrid working opportunities, leadership and mentoring programs, internal growth opportunities, employee referral program, access to online training platforms, spot bonus award program, and loyalty award program. Please note that our hybrid work policy requires 2 days in the office per week for employees within a reasonable distance from one of our global offices. Allucent does not accept unsolicited resumes from third-party recruiters or uninvited requests for collaboration on open roles. Candidates should not be submitted directly to our hiring managers, employees, or human resources.,
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
As a Cloud Security Analyst & Incident Response Specialist, you will be responsible for monitoring and investigating high-risk alerts from Wiz across AWS, Azure, and GCP environments. Your role will involve analyzing attack paths, exposed services, and identity risks using Wiz Security Graph. You will collaborate with DevSecOps and Cloud Platform teams to triage and contain incidents, correlating Wiz alerts with signals from SIEM, endpoint, and identity tools to understand the full attack context. Supporting incident response efforts by conducting root cause analysis and post-incident reviews will also be part of your responsibilities. Your critical skills should include a degree in Cybersecurity, Information Security, Computer Science, or equivalent practical experience. You should have 3-6 years of experience in security operations, incident response, or threat detection, ideally with a cloud focus. Familiarity with Wiz, including security graph analysis, alert triage, and custom WQL queries is required. Understanding common cloud threats and misconfigurations in AWS, Azure, and/or GCP is essential, along with experience in tools like Microsoft Sentinel, Defender for Cloud, or other SIEM/SOAR platforms. Knowledge of core security concepts such as IAM, network security, and the MITRE ATT&CK framework is crucial. In this role, you will develop or improve playbooks for automated cloud incident response and stay current on evolving threats in cloud environments, such as identity-based attacks, privilege escalation, and lateral movement. Documenting response workflows, findings, and lessons learned to support continuous improvement is also expected. You should be comfortable working in fast-paced environments with cross-functional teams, possessing strong analytical and communication skills for documenting and sharing threat insights.,
Posted 1 week ago
2.0 - 6.0 years
0 Lacs
karnataka
On-site
A career in our Advisory Acceleration Centre is the natural extension of PwC's leading class global delivery capabilities. We provide premium, cost-effective, high-quality services that support process quality and delivery capability in,
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
delhi
On-site
As a Threat Analyst, you will play a crucial role in proactively analyzing and mitigating cyber threats to protect the organization's information assets. Your primary responsibilities will include coordinating, validating, and managing cyber threat intelligence sources, identifying information gaps in threat intelligence, monitoring and reporting on validated threat activities, and providing real-time cyber threat intelligence analysis during cybersecurity incidents. You will also be responsible for analyzing security events, logs, and alerts to identify potential threats, conducting threat research to stay updated on the latest threats, and developing threat intelligence reports for various audiences. Collaboration with other security teams, participation in security incident response activities, and the development and maintenance of security policies and procedures will be key aspects of your role. Additionally, you will be expected to contribute to vulnerability assessments, penetration testing, and the development of detection rules and signatures for security tools. A strong understanding of cyber threats, attack vectors, and mitigation techniques, as well as familiarity with security technologies and tools, will be essential in successfully fulfilling your responsibilities. The qualifications for this role include a Bachelor's degree in Cybersecurity, Information Security, Computer Science, or a related field, along with a minimum of 5-8 years of experience in a cybersecurity role focusing on threat intelligence or security analysis. Possession of cybersecurity certifications such as Certified Threat Intelligence Analyst (CTIA), Certified Information Systems Security Professional (CISSP), SANS GIAC certifications, and CompTIA Security+ will be advantageous. Proficiency in threat intelligence concepts, methodologies, and tools, as well as strong analytical, problem-solving, and communication skills, are also required for this position. Preferred qualifications for the Threat Analyst role include a Master's degree in a relevant field, experience with scripting languages like Python and Perl, familiarity with malware analysis and reverse engineering, and knowledge of industry standards and frameworks such as MITRE ATT&CK and NIST. Your ability to work both independently and collaboratively, adapt to a fast-paced environment, and prioritize tasks effectively will be crucial to your success in this role.,
Posted 1 week ago
2.0 - 6.0 years
0 Lacs
haryana
On-site
You should have 2-5 years of experience in IT security. Your main responsibilities will include configuring, maintaining, and optimizing Email Security and EDR platforms based on security best practices and business requirements. It is essential that you possess a strong understanding of DNS-based email authentication records such as SPF, DKIM, and DMARC. Your role will involve conducting threat hunting activities to identify and respond to suspicious behavior or advanced persistent threats across endpoints and email traffic. You will also be responsible for troubleshooting security incidents, resolving user issues, and escalating to backend or vendor support when necessary. Additionally, you will be required to support the integration of Email Security and EDR solutions with other IT systems and business processes, as well as preparing and delivering regular reports. Collaboration with cross-functional teams to conduct end-user training and awareness programs on email hygiene, phishing prevention, and safe endpoint practices is also a key aspect of this role. Furthermore, you will need to provide support during audits or compliance reviews related to endpoint or email security. In the event of unplanned security events, you should respond promptly and coordinate with relevant stakeholders for containment and recovery.,
Posted 1 week ago
6.0 - 10.0 years
14 - 17 Lacs
bengaluru
Work from Office
Job Description: Minimum 5+ years of experience Use Case Development : Knowledge of organizational risks and threats to design relevant and effective detection rules. Log Sources : Understanding log formats, sources, and parsing for accurate data utilization in use cases. SIEM and Analytics Tools : Familiarity with platforms like Securonix, Sentinel, or Splunk to implement and monitor use cases. Alert Logic: Ability to define thresholds, logic, and conditions to reduce false positives and improve detection accuracy. Incident Response Needs : Awareness of incident response workflows to align use cases with actionable intelligence. Performance Metrics : Skills to create and optimize KPI/KRI reports to track detection and response performance. Fine-Tuning Methodology : Experience in analyzing alert data to refine use cases and adjust logic periodically. Detect and respond to company-wide security incidents, coordinating cross-functional teams to mitigate and eradicate threats. Incident response lead for high impact cyber security incidents Triage events, escalations and incidents to determine remediation and resolution actions Coordinate appropriate response activities across teams or directly with stakeholders to rapidly remediate potential threats Develop playbooks to improve processes and information sharing across teams Initiative and project-related support to provide Security Operations and Incident Response perspective and subject matter expertise Contribute technical and process improvements within the team Participate in current operations, on call rotation. Which includes some after-hours responsibilities and escalations.
Posted 1 week ago
5.0 - 8.0 years
6 - 10 Lacs
chennai
Work from Office
Roles and Responsibility Manage and oversee the implementation of IT security measures to ensure data integrity and confidentiality. Develop and implement incident response plans to mitigate potential security threats. Conduct regular security audits and risk assessments to identify vulnerabilities. Collaborate with cross-functional teams to align security policies and procedures. Provide training and guidance on security best practices to employees. Ensure compliance with regulatory requirements and industry standards. Job Requirements Proven experience in IT security and management services, preferably in a similar role. Strong knowledge of security frameworks, regulations, and industry standards. Excellent leadership and communication skills, with the ability to motivate and guide teams. Ability to analyze complex security issues and develop effective solutions. Experience with security tools and technologies, such as firewalls, intrusion detection systems, and encryption software. Strong problem-solving skills, with the ability to think critically and make sound decisions under pressure.
Posted 1 week ago
5.0 - 8.0 years
16 - 20 Lacs
noida
Work from Office
Summary In our global IT software delivery centers, we are looking System Admins and Cyber Security Engineers. The System Admin and Cybersecurity Engineer will work with teams comprised of Software Engineers, Quality Engineers, User Interaction Design Engineers, Infrastructure/Platform team, and the Product Owners to help lead the technical insight and industry perspective in the creation, delivery, and integration of complex and comprehensive security solutions. You will be a security evangelist helping engineers in secure implementation of technology stack in a cloud environment. This position will be working on multiple projects as a technical expert or internal consultant. You will work on projects for components of the domain. You will work on multiple technical or functional domains In this role you will: Participate in the domain technical and business discussions relative to future architect direction. Assist in the analysis, design and development of a roadmap and implementation based upon a current vs. future state in a cohesive architecture viewpoint. Gather and analyze data and develop architectural requirements at project level. Participate in the infrastructure architecture governance model. Support design and deployment of infrastructure solutions meeting standardization, consolidation, TCO, security, regulatory compliance and application system qualities, for different businesses. Serve as technical authority ongoing administration and incident management support of core infrastructure [network, security, and virtualization, patching, monitoring, backups] technologies that underpin Software Solutions Factories; Responsible for operating and maintaining security tools.Running and analyzing vulnerability and compliance scans to support continuous monitoring reporting and vulnerability management. Improve the effectiveness and efficiency of IT operations and drive significant operational, risk management, and economic benefits for their organization. Quality process: Ensure all tasks are carried out with respect to applicable processes and procedures [e.g. ISO9001 and ISO27001] applicable to site[s] and functions within job scope Desired Characteristics Technical Expertise: Ability and willingness to travel Fluent English speaker; Degree in Computer Science or equivalent knowledge with 5 to 8 years experience Proven track record of problem analysis, identification and resolution Excellent communication skills, commitment, discipline, positive attitude, following management prioritization, accountability and flexibility Strong understanding of ITIL and change management policies and procedures Strong IT experience in a technical hands-on position System administration: Windows and Linux - core competency to install, configure, manage Network hardware: Cisco enterprise hardware. VLAN, ACL, routing and VPN - install, configure, manage Security management: Enterprise firewall equipment e.g. Ciscos ASA / Fortinets Fortigate or equivalent install, configure, manage Windows / Active Directory Services install, configure, manage Virtualization: VMware vSphere clusters, experience with HA, DRS, and vStorage backup APIs Storage: Shared NAS/SAN network storage e.g. HP 3PAR/MSA/EVA, EMC DataDomain Backup Technologies Incident response and vulnerability management (NetBackup, BackupExec, Veeam, Networker) Good knowledge about anti-virus implementations (McAfee EPO, Bitdefender, Microsoft Forefront, etc.) Good knowledge working with IPAMs and password solutions Experience in implementing and/or working with monitoring tools, log monitoring tools, log correlation tools.(Nagios, Graylog, Splunk, etc.) Very good Cyber/Security foundation Skilled level expertise in design of computing or network or storage to meet business application system qualities Understands technical and business discussions relative to future architecture direction aligning with business goals. Understands concepts of setting and driving architecture direction. Familiar with elements of gathering architecture requirements. Understands architecture standards concepts to apply to project work. Personal Attributes: Applies values, policies, procedures and precedent to make timely, routine decisions of limited, clear choice. Reacts open-mindedly to new perspectives or ideas. Considers different or unusual solutions when appropriate. Resolves day-to-day issues related to strategy implementation. Escalates issues that impact the client and/or strategic initiatives.
Posted 1 week ago
8.0 - 13.0 years
3 - 7 Lacs
mumbai
Work from Office
Responsibilities :- Lead the design and implementation of SOAR playbooks for security use cases, such as phishing incident response, vulnerability triage, or threat hunting on based on specific threat models. Integration of SOAR with other security capabilities and tools such as SIEM, EDR, NDR threat intelligence platform, and ticketing systems. Design testing and conduct validation of SOAR playbooks before deployment to live environment. Write custom actions, scripts and/or integrations to extend SOAR platform functionality. Monitor performance and perform timely actions to scale SOAR deployment, especially in a high-volume security environment. Migration of existing assets from existing customers SIEM/SOAR to SecOps and assisting in implementing the SIEM/SOAR phase-out, phase-in approach. Develop SOAR playbooks to provide case handling and Incident response as per triage needs Creation of SOAR assets such as reports etc. Guide on building or maturing cloud security programs and the implementation of tools and approaches used for improving cloud security. Minimum Qualifications :- 8+ years experience in leading projects and delivering technical solutions related to security SOAR experience in the areas of responsibility for at least 1 year Coding experience in one or more general purpose languages. Experience managing customer projects to completion, working with engineering teams, sales and partners. Experience architecting, developing, or maintaining secure Cloud solutions. Strong verbal and written communication skills and the ability to develop high-quality Demonstrated experience on consulting or ownership of Security during high-speed environment migration for large-scale businesses with regulatory requirements Strong verbal and written communication skills (English), and the ability to develop high-quality technical documentation and presentation materials. Preferred Qualifications :- Experience in Prevention, Detection and response to cyber threats SIEM experience of 1 year in integration of log sources, extension of pre-built UDMs and creation of custom parsers, creation of dashboards , creation of custom rules using YARA-L 2.0 etc. Knowledge and experience in SOAR platforms Knowledge in GCP, including Google Cloud Professional Certifications (Security, Architect) and other industry certifications (CISSP, CCSP etc) Experience in security governance, security risk management, security operations, security architecture, and/or cyber incident response programs for cloud. Experience working with cloud architecture across a broad set of enterprise use cases and creating end-to-end solution architectures. Excellent organizational, problem-solving, articulating and influencing skills. Experience with industry compliance frameworks (e.g., PCI-DSS, ISO 27017/27018, GDPR, SOC). Skills: Cloud Computing English Google Cloud Platform Incident Response Security Architecture Cloud Commerce
Posted 1 week ago
3.0 - 8.0 years
13 - 17 Lacs
kolkata
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and overseeing the transition to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud security challenges. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular assessments of cloud security measures to identify potential vulnerabilities and recommend improvements.- Collaborate with cross-functional teams to ensure that security architecture aligns with business objectives and regulatory requirements. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM).- Strong understanding of cloud security principles and best practices.- Experience with security frameworks such as NIST, ISO 27001, or CIS.- Familiarity with incident response and threat detection methodologies.- Knowledge of compliance requirements related to cloud security. Additional Information:- The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM).- This position is based at our Kolkata office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 week ago
10.0 - 15.0 years
8 - 12 Lacs
mumbai
Work from Office
Position Description: Responsibilities Spearhead the architecture and implementation of on Google Cloud Platform for large scale deployments and migration. Design and implementation of data pipelines & effective data storage mechanisms to meet functional and nonfunctional requirements of customers. Design, plan and implement data migrations from existing SIEM/SOAR platforms Hardening of critical infrastructures and platform services. Integration of \other security capabilities and tools such as SOAR, EDR, NDR, threat intelligence platform, and ticketing systems. Write custom actions, scripts and/or integrations to extend platform functionality. Monitor performance and perform timely actions to scale the deployment, especially in a very high-volume security environment. Guide on building or maturing cloud security programs Minimum Qualifications (MQs) 10+ years experience in leading projects and delivering technical solutions related to security Implementation experience of YARA-L 2.0 and at least one more general purpose language. Experience managing customer projects to completion, working with engineering teams, sales and partners. Experience in architecting, developing, or maintaining secure Cloud solutions. Strong verbal and written communication skills and the ability to develop high-quality Demonstrated experience on consulting or ownership of Security during high-speed environment migration for large-scale businesses with regulatory requirements Strong verbal and written communication skills (English), and the ability to develop high-quality technical documentation and presentation materials. Hands on and deep knowledge of security principles. Demonstrated experience in Cloud Security delivered within the context of customer facing roles. Preferred Qualifications (PQs) Experience in security governance, security risk management, security operations, security architecture, and/or cyber incident response programs for cloud. Experience working with cloud architecture across a broad set of enterprise use cases and creating end-to-end solution architectures. Excellent organizational, problem-solving, articulating and influencing skills. Experience with industry compliance frameworks (e.g., PCI-DSS, ISO 27017/27018, GDPR, SOC). Google Cloud Professional Certifications Skills: Cloud Computing English Google Cloud Platform Incident Response Security Architecture
Posted 1 week ago
7.0 - 12.0 years
15 - 17 Lacs
noida, gurugram, delhi / ncr
Work from Office
Key Responsibilities: Manage and maintain Red Hat, CentOS, Oracle Linux, or Ubuntu systems across production and non-production environments. Expertise in troubleshooting, performance tuning, and security. Troubleshoot and resolve complex server, network, and application issues. Experience with enterprise monitoring tools (Zabbix, Nagios etc.). Understanding of LVM, RAID, iSCSI, and networking concepts. Lead critical incident resolution and perform root cause analysis. Plan and perform kernel upgrades, OS patching, package management, and system hardening, scripting and automation (Bash, Python, Ansible). Configure and manage system services like Apache/Nginx, SSH, FTP, DNS, NFS, LAMP, LDAP, and SMTP. Implement and monitor security compliance (e.g., CIS hardening, SELinux, UFW, firewalld, auditd). Perform backup and disaster recovery planning and execution. Participate in capacity planning, performance tuning, and system audits. Document configurations, procedures, and change management records. Good To Have: Experience with cloud environments (AWS, OCI, or Azure). Administer virtualization platforms (e.g., VMware, KVM) and cloud platforms (AWS, OCI, Azure). Networking experience. Preferred candidate profile
Posted 1 week ago
8.0 - 12.0 years
32 - 37 Lacs
chennai, gurugram, bengaluru
Work from Office
Join us as a Site Reliability Engineer In this key role, youll improve, drive, and embed non-functional and operational characteristics such as availability, performance, efficiency, change management, monitoring, security, incident response, and capacity planning of our products and services Youll enjoy significant stakeholder interaction, working in collaboration with engineers to ensure a principled approach to deliver change in a safe and secure way This is a chance to join an inclusive team with a collaborative ethos and a commitment to innovation and professional development We're offering this role at vice president level What you'll do As our Site Reliability Engineer, youll work closely with our feature team and other colleagues to meet defined service level objectives and continually improve systems and environments. Youll define error budgets that support finding the right balance between risk and reliability. Youll also provide structure and help to our release process, suggesting and making improvements where possible. Youll scale systems sustainably through mechanisms like automation, evolving them by pushing for changes that improve reliability and velocity. Well also look to you to coach and provide guidance to colleagues and the wider team, leading where required. In addition to this, youll: Proactively contribute new ideas and innovations to meet short term and longer-term goals Continually balance and manage any potential risks Be accountable for the day-to-day health of both production and non-production environments and respond to any incidents as required Provide technical expertise and input to establish the risk tolerance of products and services Communicate incident status updates clearly and frequently to other teams, customers and stakeholders The skills you'll need Were looking for someone with strong knowledge of reliability systems thinking and experience of software engineering. Youll need experience of using a data driven and scientific approach to fact finding. Well also look for financial services knowledge, and the ability to identify wider business impact, risk and opportunity, and make connections across key outputs and processes.Youll also have solid experience with public cloud platforms, preferably using AWS Were also looking for: Good knowledge and experience of data streaming platforms within the Kafka ecosystem Strong knowledge of deploy and release services, automation, and troubleshooting Experience of utilising tools and technology across the software development lifecycle Experience using mathematical and statistical models to assess trends Strong communication skills with the ability to proactively engage with a wide range of stakeholders.
Posted 1 week ago
4.0 - 6.0 years
7 - 12 Lacs
hyderabad
Work from Office
Your impact: Perform monitoring, identification, investigation, documentation, resolution and reporting of security alerts through prioritization of events based on risk/exposure. Analyze Endpoint Detection and Response (EDR), Network, Cloud and other traffic and log data for potential threats or vulnerabilities. Generating tickets and incident reports to external clients and Tier 3 analysts. Remediate and apply lessons learned to security incident investigation and resolution. Develop processes that align with enterprise incident response activities and coordinate closely with other teams within the Security Operations Center. Investigate suspicious activities and content and prevent them. Follow strict security and SOC guidelines and SOPs. Threat hunting, Threat intelligence, deep investigation of alerts Identifying the new use cases, Strong analytical skills to assess the alerts Integrate new logging sources and build playbooks to properly triage and respond to security incidents while reducing the time needed to analyze each event. Assess, design, and improve SOC processes and workflows with a focus on integrating automation through Security Orchestration, Automation and Response (SOAR) tools and technologies. Create custom content to enhance capabilities of security operations Center. Create custom analytics, dashboards, and reports. Respond to customer or Tier 1 analyst tickets within target objectives. Create new detection rules. What you need to succeed : Proven experience in a SOC with at least 4-6 years of experience Understanding of Managed Security Services. Well versed with Incident Response Framework Experience with Endpoint Detection and Response (EDR) tools Experience with an industry leading SIEM technology (SIEM administration will be a plus) Understanding of key IT/Cybersecurity concepts (Network Security, Security Operations & Administration, Managed Detection and Response, Incident Response & Recovery, Vulnerability Management, etc.) Good interpersonal skills to interact with customers, team members and support personnel. Strong analytical and problem-solving skills for investigating security issues. Strong written and verbal communication skills Ability to earn trust, maintain positive and professional relationships, and strengthen our culture of inclusion. Motivated self-starter Willing to work in 24*7 shifts on rotation basis and office based -Hyderabad location.
Posted 1 week ago
5.0 - 10.0 years
13 - 17 Lacs
bengaluru
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Saviynt Identity Platform Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. A typical day involves collaborating with various teams to assess security needs, implementing protective measures, and ensuring compliance with security protocols. You will engage in proactive monitoring and response to potential threats, while also providing guidance on best practices to safeguard information and infrastructure. Roles & Responsibilities:- The candidate will be responsible for Run support of Saviynt IGA architecture- The role also involves troubleshooting and resolving issues within the team and collaborating with Saviynt support to ensure seamless operations and system efficiency. Ensuring quality and efficiency throughout the project lifecycle is key.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Conduct regular security assessments and audits to identify vulnerabilities.- Develop and implement security policies and procedures to enhance organizational security. Professional & Technical Skills: - Must Have Skills: Proficiency in Saviynt IGA.- Strong knowledge of Saviynt IGA architecture, with hands-on experience in application onboarding, connector configurations, and workflow implementation. Solid experience in design discussions, creating design documents, and performing unit testing- Ability to troubleshoot and resolve technical issues within the team and in collaboration with Saviynt support.- Proficiency in Segregation of Duties (SOD), certifications, and custom JARs. Familiarity with identity governance processes, role management, and security protocols is essential. Experience in troubleshooting and optimizing complex systems is a must.- Detail-oriented, strong problem-solving abilities, excellent collaboration and communication skills, proactive, and able to work effectively in team-oriented environments. Focused on delivering projects on time and to specification.- Must To Have Skills: Proficiency in Saviynt Identity Platform.- Experience with identity governance and administration solutions.- Strong understanding of security frameworks and compliance standards.- Familiarity with risk management and incident response processes.- Knowledge of cloud security principles and practices. Additional Information:- The candidate should have a minimum of 5 years of experience in Saviynt IGA. Overall IT work experience should be 6 years or above- A 15 years full time education is required.- Bachelors degree in Computer Science, Information Technology, or a related field. Certifications are a plus.- The candidate should have minimum 5 years of experience in Saviynt Identity Platform.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |