Home
Jobs

2559 Information Security Jobs - Page 3

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

6.0 - 10.0 years

8 - 12 Lacs

Pune

Work from Office

Naukri logo

Mission The role of business operations is to be the production readiness steward for the platform. This is accomplished by closely partnering with developers to design, build, implement, and support technology services. A business operations engineer will ensure operational criteria like system availability, capacity, performance, monitoring, self-healing, and deployment automation are implemented throughout the delivery process. Business Operations plays a key role in leading the DevOps transformation at Mastercard through our tooling and by being an advocate for change and standards throughout the development, quality, release, and product organizations. We accomplish this transformation through supporting daily operations with a hyper focus on triage and then root cause by understanding the business impact of our products. The goal of every biz ops team is to shift left to be more proactive and upfront in the development process, and to proactively manage production and change activities to maximize customer experience, and increase the overall value of supported applications. Biz Ops teams also focus on risk management by tying all our activities together with an overarching responsibility for compliance and risk mitigation across all our environments. A biz ops focus is also on streamlining and standardizing traditional application specific support activities and centralizing points of interaction for both internal and external partners by communicating effectively with all key stakeholders. Ultimately, the role of biz ops is to align Product and Customer Focused priorities with Operational needs. We regularly review our run state not only from an internal perspective, but also understanding and providing the feedback loop to our development partners on how we can improve the customer experience of our applications. Responsibilities Engage in and improve the whole lifecycle of services from inception and design, through deployment, operation and refinement. Analyze ITSM activities of the platform and provide feedback loop to development teams on operational gaps or resiliency concerns Support services before they go live through activities such as system design consulting, capacity planning and launch reviews. Maintain services once they are live by measuring and monitoring availability, latency and overall system health. Scale systems sustainably through mechanisms like automation, and evolve systems by pushing for changes that improve reliability and velocity. Practice sustainable incident response and blameless postmortems. Take a holistic approach to problem solving, by connecting the dots during a production event thru the various technology stack that makes up the platform, to optimize mean time to recover Work with a global team spread across tech hubs in multiple geographies and time zones Share knowledge and mentor junior resources Qualifications BS degree in Computer Science or related technical field involving coding (e.g., physics or mathematics), or equivalent practical experience. Experience with algorithms, data structures, scripting, pipeline management, and software design. Systematic problem-solving approach, coupled with strong communication skills and a sense of ownership and drive. Ability to help debug and optimize code and automate routine tasks. We support many different stakeholders. Experience in dealing with difficult situations and making decisions with a sense of urgency is needed. Experience in one or more of the following is preferred: COBOL, DB2, JCL, PROC, Microfocus COBOL, TWS Scheduler and DB2 LUW. Interest in designing, analyzing and troubleshooting large-scale distributed systems. We need team members with an appetite for change and pushing the boundaries of what can be done with automation. Experience in working across development, operations, and product teams to prioritize needs and to build relationships is a must.

Posted 3 days ago

Apply

4.0 - 8.0 years

8 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less

Posted 3 days ago

Apply

2.0 - 5.0 years

3 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

We're Celonis, the global leader in Process Mining technology and one of the world's fastest-growing SaaS firms. We believe there is a massive opportunity to unlock productivity by placing data and intelligence at the core of business processes and for that, we need you to join us.. The Team:. As a member of the Information Security Organization at Celonis, you'll collaborate closely with various departments and customers to communicate and demonstrate the security posture of our products. This position is part of the Security Enablement team within the broader Security GRC (Governance, Risk, and Compliance) Department. The Information Security team plays a critical role in ensuring Celonis' technology and information assets are appropriately guarded from external and internal threats. The Security GRC Department you'll be joining is responsible for maintaining existing security attestations at Celonis globally, balancing risk with appropriate controls and assessing control effectiveness.. The Role:. As Associate Security Enablement Analyst within the Information Security GRC team, you will act as a key interface between Celonis and its customers, helping to demonstrate the strength of our security posture and ensuring a smooth, informed, and confident customer journey. In this role, you’ll handle a broad range of customer-facing security activities—from responding to security questionnaires and audits, to building scalable processes and content for security communications. You’ll work closely with internal stakeholders across Legal, Operations, and Engineering, playing a critical role in reinforcing trust and transparency around our security practices. This position is ideal for someone who thrives at the intersection of security, communication, and customer success.. The work you’ll do:. Customer Security Requests: Respond quickly and accurately to customer security inquiries, supporting business development and customer success efforts.. Technical Security Communication: Independently address technical questions from customers, ensuring their security requirements are clearly understood and met.. Audit Support: Support customer audits and remote assessments by preparing and delivering relevant security documentation and evidence.. Security Questionnaires: Lead the completion of security questionnaires and related documentation, particularly those focused on cloud security.. Cross-Functional Collaboration: Work with Legal, Operations, and Cloud Engineering to develop and maintain standardized materials that clearly explain our security controls and practices.. Knowledge Management: Build and maintain a centralized knowledge base covering key Information Security topics, making resources easily accessible to internal and external stakeholders.. Enablement & Culture: Contribute to internal initiatives that strengthen Celonis’s security culture, operational maturity, and external security presence—whether through team development, internal enablement, or customer-facing improvements.. Privacy & GenAI Readiness: Collaborate with cross-functional teams to support privacy-related initiatives and emerging GenAI-related security considerations, ensuring alignment with evolving regulatory and customer expectations.. The qualifications you need:. University degree in the field of Information Technology and Management, Business Administration, or a similar field. Experience working with Security Questionnaires, IT projects, RFX. Work experience in the field of IT Security, Auditing, Cloud Security or similar. Excellent communication skills in English (spoken and written). Excellent ability to communicate with clients, relevant departments, collaborators and other relevant actors. High professional responsibility and excellent skills to work independently. Excellent skills to learn quickly and adapt to new tasks. Ability to learn topics related to Cloud, Infrastructure, and IT Security. Ability to work under pressure andin a dynamic work environment. Excellent communication skills in German (has the advantage). What Celonis Can Offer You:. Pioneer Innovation: Work with the leading, award-winning process mining technology, shaping the future of business.. Accelerate Your Growth: Benefit from clear career paths, internal mobility, a dedicated learning program, and mentorship opportunities.. Receive Exceptional Benefits: Including generous PTO, hybrid working options, company equity (RSUs), comprehensive benefits, extensive parental leave, dedicated volunteer days, and much more.. Prioritize Your Well-being: Access to resources such as gym subsidies, counseling, and well-being programs.. Connect and Belong: Find community and support through dedicated inclusion and belonging programs.. Make Meaningful Impact: Be part of a company driven by strong values that guide everything we do: Live for Customer Value, The Best Team Wins, We Own It, and Earth Is Our Future.. Collaborate Globally: Join a dynamic, international team of talented individuals.. Empowered Environment: Contribute your ideas in an open culture with autonomous teams.. About Us:. Celonis makes processes work for people, companies and the planet. The Celonis Process Intelligence Platform uses industry-leading process mining and AI technology and augments it with business context to give customers a living digital twin of their business operation. It’s system-agnostic and without bias, and provides everyone with a common language for understanding and improving businesses. Celonis enables its customers to continuously realize significant value across the top, bottom, and green line. Celonis is headquartered in Munich, Germany, and New York City, USA, with more than 20 offices worldwide.. Get familiar with the Celonis Process Intelligence Platform by watching this video.. Celonis Inclusion Statement:. At Celonis, we believe our people make us who we are and that “The Best Team Wins”. We know that the best teams are made up of people who bring different perspectives to the table. And when everyone feels included, able to speak up and knows their voice is heard that's when creativity and innovation happen.. Your Privacy:. Any information you submit to Celonis as part of your application will be processed in accordance with Celonis’ Accessibility and Candidate Notices. By submitting this application, you confirm that you agree to the storing and processing of your personal data by Celonis as described in our Privacy Notice for the Application and Hiring Process.. Please be aware of common job offer scams, impersonators and frauds. Learn more here.. Show more Show less

Posted 3 days ago

Apply

10.0 - 14.0 years

30 - 35 Lacs

Chennai

Work from Office

Naukri logo

Title - Associate Director - Data Product Manager GCL- E Typical Accountabilities: The role holder will execute the following accountabilities autonomously with limited supervisory oversight: Works with consumers / business users on the definition of the data requirements for intended data solutions. Able to translate unstructured, complex business problems into a data design and solution Profiling of data to understand provenance, quality, metadata models, ownership and compliance to internal and external regulatory standards Ad hoc wrangling of data (sourcing, extraction, profiling, integration) to support Data Science model generation and business insight Support of data engineers in the development of Source to Target pipelines (e.g. ETL design) Design & testing of the quality and performance of derivative data models in reporting and analytics solutions Processing of requests for compliant access to data Defining and managing information lifecycle management in data solutions Provision of data understanding (structure, provenance, quality) to Architects, Data Engineers and Data Scientists to support use in Analytics projects. Supports IT and business data teams in identifying and managing Critical Data Assets and Elements including Reference, Master and Metadata. Collaborates with Risk, Assurance, Privacy, Information Security and Regulatory authorities to ensure data and information controls are in place and adhered to. Clearly and objectively communicate insights and results, as well as their associated uncertainties and limitations Guidance of junior Data Analysts - supervision of task completion, support in trouble shooting challenges and contributing to performance evaluation reports Sharing of insight and best practice in community forums supporting capability development. Personal development and training in more complex data analysis skills, techniques and tooling Provision of domain data expertise (data standards, systems, metadata models, policies, business processes) in at least 1 domain area (e.g. chemistry, finance) and will be developing expertise in further domains Working with senior personnel they will contribute to Development of best practice for Data Analysis: Methods and Technology: technology evaluation, POCs Provision of training and skill development in the best practice of Data Analysis: training materials, FAQs, Playbooks and integrated operating models. 3 key specialisms include: Source Data Analysts: Support engineers build/configure source applications by defining the data requirements and modeling the appropriate data structures for given use cases. They define data quality criteria to ensure data quality integrity of the application, develop logical data models (compliant to any RMDM standards), ensure that the project deliverable aligns with the logical design and business requirements (requirements traceability). Integration Data Analyst: Support engineers build composite analytics applications by defining data requirements, data structures and data integration paths. They will identify, profile and quality assess potential source data sets, understand and comply with any data restrictions (e.g. GDPR, License, IDAP controls, etc), develop integration patterns (ETL design), support the design of target data models (compliant to any MDM standards) and document to support re-use and management of the application. Data Steward: defining and managing data governance policies, standard and operating processes; the facilitation and operation of data and information governance activities; data quality issue management; the establishment and operation of governance controls including data access, lifecycle and metadata management; risk based approach to remediation and mitigation planning. Typical People Management Responsibility (direct / indirect reports): Approximate number of people managed in total (all levels) - 2-3 Manager of a team Matrix Manager - (projects/dotted line) Education, Qualifications, Skills and Experience: Essential: Undergraduate degree in a Computer Science, Data Management or possibly discipline area (R&D, Finance, HR etc) and cross trained or equivalent number of years of experience; Proven experience in a data analyst or business role aligned to data and information management role with practical examples of performing data analysis in terms of defining requirements, gleaning critical data elements, defining data quality criteria and checkpoints; Domain data understanding: the structure, provenance and meaning of the source data crucial to the domain (eg. SAP for Finance, SDTM for Clinical). Understanding of the business processes in the generation and consumption of data Desirable: Post-graduate degree in MIS, Data Management Skills and Capabilities: Essential: The role holder will possess a blend of data requirement analysis, data quality analysis, data stewardship skills; Experience in translating requirements into fit for purpose data models, data processing designs and data profile reports Experience in the use of data modeling technologies; Experience in working in multi-skilled, multi-location data teams, working to agile principles.; Knowledge of key AZ policies and standards for data covering areas such as privacy and security.; Excellent written and verbal communication, and consultancy skills; Awareness of the end to end processes and activities in the build and support of Data solutions; Experienced in applying a risk based methodology to data and information management; Experience in the use of metadata cataloguing tools; Experience of Data Analysis enabling tool kits Desirable: Leading the work of others - task setting, supervision and coaching of more junior staff Key Relationship to reach solutions: Internal (to AZ or team): Working with peers and team leaders in the business and IT in the delivery of data capabilities; Junior data analysts in supervising delivery; Data engineering teams to deliver data structures and data provisioning processes; Data Science teams supporting ad hoc data access and provision; Key assurance teams including Risk, Privacy Information security and audit; Other data analysts across AZ to develop and extend data analysis approaches and best practices External (to AZ): Outsource partners to deliver and support data structures and data provisioning processes 19-Jun-2025 23-Jun-2025

Posted 3 days ago

Apply

4.0 - 8.0 years

8 - 12 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

What You'll Do. Reports to: Manager Security Engineering. Avalara is seeking a Security Automation Engineer to join our Security Automation & Platform Enhancement Team (SAPET). You will be at the intersection of cybersecurity, automation, and AI, focusing on designing and implementing scalable security solutions that enhance Avalara's security posture. You will have expertise in programming, cloud technologies, security automation, and modern software engineering practices, with experience with using Generative AI to improve security processes.. What Makes This Role Unique at Avalara?. Cutting-Edge Security Automation: You will work on advanced cybersecurity automation projects, including fraud detection, AI-based security document analysis, and IT security process automation.. AI-Powered Innovation: We integrate Generative AI to identify risks, analyze security documents, and automate compliance tasks.. Impact Across Multiple Security Domains: Your work will support AML, fraud detection, IT security, and vendor risk management.. What Your Responsibilities Will Be. As a Security Automation Engineer, your primary focus will be to develop automation solutions that improve efficiency across several security teams.. Develop and maintain security automation solutions to streamline security operations and reduce manual efforts.. Work on automation projects that augment security teams, enabling them to work more efficiently.. Design and implement scalable security frameworks for Security Teams.. What You’ll Need To Be Successful. 5+ years experience. Programming & Scripting: Python, GoLang, Bash. Infrastructure as Code & Orchestration: Terraform, Kubernetes, Docker. Security & CI/CD Pipelines: Jenkins, GitHub Actions, CI/CD tools. Database & Data Analysis: SQL, security data analytics tools. Experience with RDBMS and SQL, including database design, normalization, query optimization Experience.. Hands-on experience with security automation tools, SIEM, SOAR, or threat intelligence platforms.. How We’ll Take Care Of You. Total Rewards. In addition to a great compensation package, paid time off, and paid parental leave, many Avalara employees are eligible for bonuses.. Health & Wellness. Benefits vary by location but generally include private medical, life, and disability insurance.. Inclusive culture and diversity. Avalara strongly supports diversity, equity, and inclusion, and is committed to integrating them into our business practices and our organizational culture. We also have a total of 8 employee-run resource groups, each with senior leadership and exec sponsorship.. What You Need To Know About Avalara. We’re Avalara. We’re defining the relationship between tax and tech.. We’ve already built an industry-leading cloud compliance platform, processing nearly 40 billion customer API calls and over 5 million tax returns a year, and this year we became a billion-dollar business. Our growth is real, and we’re not slowing down until we’ve achieved our mission to be part of every transaction in the world.. We’re bright, innovative, and disruptive, like the orange we love to wear. It captures our quirky spirit and optimistic mindset. It shows off the culture we’ve designed, that empowers our people to win. Ownership and achievement go hand in hand here. We instill passion in our people through the trust we place in them.. We’ve been different from day one. Join us, and your career will be too.. We’re An Equal Opportunity Employer. Supporting diversity and inclusion is a cornerstone of our company — we don’t want people to fit into our culture, but to enrich it. All qualified candidates will receive consideration for employment without regard to race, color, creed, religion, age, gender, national orientation, disability, sexual orientation, US Veteran status, or any other factor protected by law. If you require any reasonable adjustments during the recruitment process, please let us know.. Show more Show less

Posted 3 days ago

Apply

10.0 - 15.0 years

30 - 35 Lacs

Mumbai

Work from Office

Naukri logo

Job Title: Principal Information Security Specialist Job Code: 7924 Country: IN City: Mumbai Skill Category: IT\Technology Description: Overview Nomura has a robust global Information Security department, members of which are located in all of its major regions, namely Japan, Americas, India, Asia Excluding Japan (AeJ) and EMEA. This role will report directly to the Global Head of the Information Security Architecture and Engineering (SAE) located in London and will be a member of the Information Security Architecture and Engineering (SAE) Leadership team. Key objectives critical to success We are looking for a talented and experienced professional to join our team as the regional Head of Information Security Engineering in India. In this role, you will lead the engineering, development, and implementation of a robust and scalable information security solutions to protect Nomura s critical assets and infrastructure on a global scale. This role is handson as the security architecture and engineering strategy and roadmap are being developed. You will lead team of security engineers in India. It requires the development and implementation of people processes, policies, standards, and solutions in collaboration with the Global Heads of Information Security and key stakeholders (e.g., IT, business, legal, HR, compliance). You will play a key role in shaping our information security strategy and ensuring the resilience and effectiveness of our security solutions. Key Responsibilities Develop and execute the cyber security engineering strategy that aligns with the business objectives and the Security Risks and Controls Framework. Build, mentor, and manage a team of cyber security engineers. Foster a culture of continuous improvement, innovation, and collaboration within the team Develop and maintain the security solutions and products for the information security team and ensure it is fully aligned with the enterprise reference architecture developed by Security Architecture. Define and implement security standards, best practices, and guidelines for technology infrastructure, applications, and systems. Lead the engineering and implementation of secure network solutions, cloud security solutions, and endpoint protection mechanisms, including security tooling (change management, patching, upgrades etc.). Collaborate with crossfunctional teams to evaluate and select security technologies and tools that meet Nomura s requirements, including AI/ML, SaaS, security automation, and R&D. Provide technical guidance and expertise on security infrastructure design, configuration, and deployment. Provide clarity to IT (including projects) to ensure the most optimal risk reduction solutions are implemented. Establish a security lab (and sandbox) to evaluate security solutions for Nomura as well as assessing and testing emerging technologies for the business. Stay current on emerging technologies, trends, and threats in the field of information security architecture and engineering. Collaborate with internal and external stakeholders to ensure alignment with industry standards, regulatory requirements, and compliance frameworks. Skills, experience, qualifications and knowledge required Experience in managing technical security engineering functions Bachelors degree in Computer Science, Information Technology, or related field; Masters degree preferred. Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM) certification is required. Minimum of 10 years of experience in information security, with a focus on security engineering. Strong knowledge of security technologies, protocols, and frameworks, such as ISO 27001, NIST, and OWASP. Experience with engineering and implementing security controls for cloud environments, network infrastructure, data security, and software applications. Excellent analytical, problemsolving, and project management skills. Strong communication and interpersonal skills to collaborate with diverse teams and stakeholders. Ability to lead and mentor a team of security engineers in a global environment.

Posted 3 days ago

Apply

3.0 - 8.0 years

16 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

Minimum qualifications:. Bachelor's degree or equivalent practical experience.. 8 years of experience in software development, and with data structures/algorithms.. 5 years of experience with design and architecture, and testing/launching software products.. Experience in developing security or privacy products.. Preferred qualifications:. Master’s degree or PhD in Engineering, Computer Science, or a related technical field.. 3 years of experience working in an organization involving cross-functional or cross-business projects.. Experience with multiple programming languages (e.g., Java, Python, Go, etc.) and with front-end languages (e.g., Angular, TypeScript, or JavaScript).. Experience in storage services (e.g., Spanner, MySQL, NoSQL systems).. Experience in technical leadership of software groups.. About The Job. Google's software engineers develop the next-generation technologies that change how billions of users connect, explore, and interact with information and one another. Our products need to handle information at massive scale, and extend well beyond web search. We're looking for engineers who bring fresh ideas from all areas, including information retrieval, distributed computing, large-scale system design, networking and data storage, security, artificial intelligence, natural language processing, UI design and mobile; the list goes on and is growing every day. As a software engineer, you will work on a specific project critical to Google’s needs with opportunities to switch teams and projects as you and our fast-paced business grow and evolve. We need our engineers to be versatile, display leadership qualities and be enthusiastic to take on new problems across the full-stack as we continue to push technology forward.. With your technical expertise you will manage project priorities, deadlines, and deliverables. You will design, develop, test, deploy, maintain, and enhance software solutions.. Security Defense Platforms (SDP) Organization is part of the Security Foundations Organization focusing on building and running products for security engineering. SDP is composed of multiple sub-organizations that span Bay-Area, New York, Zurich and Hyderabad.. The Endpoint Protection Platform team is a cross functional organization with the core mission of building products and infrastructure that enable industry-leading device security within Google Corp.. The Core team builds the technical foundation behind Google’s flagship products. We are owners and advocates for the underlying design elements, developer platforms, product components, and infrastructure at Google. These are the essential building blocks for excellent, safe, and coherent experiences for our users and drive the pace of innovation for every developer. We look across Google’s products to build central solutions, break down technical barriers and strengthen existing systems. As the Core team, we have a mandate and a unique opportunity to impact important technical decisions across the company.. Responsibilities. Provide technical direction to the entire Security Foundations domain across the Hyderabad site which has a comprehensive ecosystem, comprising Software Engineers, Security Engineers, Security Analysts, Product and Program Managers.. Provide leadership and oversight of all the engineering efforts.. Work with cross-functional leaders in the organization to ensure the right solution is designed, built and delivered.. Lead the execution against strategy for some critical projects and areas, partnering with the relevant engineering and cross-functional directors.. Set local engineering culture for engineers (e.g., lead design reviews for the local site) while ensuring good collaboration across sites.. Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also Google's EEO Policy and EEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form .. Show more Show less

Posted 3 days ago

Apply

6.0 - 10.0 years

13 - 18 Lacs

Mumbai

Work from Office

Naukri logo

Are you a Product Security Analyst expert looking for a challenging opportunity?. Join our Product Security team.. We operate at the heart of the digital transformation of our business. Our team is responsible for Product Security including application security for our global organization.. Partner with the best.. We are looking for a Lead Product Security Analyst, with a focus in Product Security. In this role, you will work in a team and demonstrate working knowledge of systems and products and how they are secured in customers' businesses.. As a Senior Lead Product Security Engineer, you will be responsible for:. Building and executing engineering processes for early detection of design flaws, vulnerabilities, weaknesses, missing security controls, and secure implementation of product features.. Applying existing technologies, approaches, methodologies in new combinations to design new products, systems, or processes. Viewed internally and externally as a specialist in the discipline.. Presenting plans, technical roadmaps, ri Senior Lead Product Security Engineer Are you a Product Security Analyst expert looking for a challenging opportunity?. Join our Product Security team.. We operate at the heart of the digital transformation of our business. Our team is responsible for Product Security including application security for our global organization.. Partner with the best.. We are looking for a Lead Product Security Analyst, with a focus in Product Security. In this role, you will work in a team and demonstrate working knowledge of systems and products and how they are secured in customers' businesses.. As a Senior Lead Product Security Engineer, you will be responsible for:. Building and executing engineering processes for early detection of design flaws, vulnerabilities, weaknesses, missing security controls, and secure implementation of product features.. Applying existing technologies, approaches, methodologies in new combinations to design new products, systems, or processes. Viewed internally and externally as a specialist in the discipline.. Presenting plans, technical roadmaps, risks and recommendations to senior business and technical leaders. Lead programs related to Product Security Incident Response, Product Inventory, etc. Driving awareness, engagement, and improvements of Product Security metrics with business leaders. Demonstrating working knowledge of systems and products and how they are secured in a customer environment.. Implementing tools to automate and scale security processes.. Providing security leadership to the business segment product security teams. Experiencing with cyber security framework (NIST 800-53, ISO 27001, IEC 62443, etc.) implementation and governance. Familiarity with cyber regulations (EU NIS2, CRA, etc). Fuel your passion. To be successful in this role you will:. Have a bachelor’s degree in computer science or “STEM” Majors (Science, Technology, Engineering, and Math).. Have a minimum of 10 years of professional experience in a STEM-related degree preferably with a Product Security / OT Security focus.. Have project management experience, and expertise with Agile development teams.. Have prior work experience with various development tools including threat modelling, vulnerability technologies, application security, and secure coding principles.. Have experience with penetration testing and ethical hacking.. Have experience securing applications within cloud platforms such as AWS, Azure, and alike.. Have experience with a broad set of information security technologies and processes within a SaaS, IaaS, PaaS, or cloud environment.. Working with us. Our people are at the heart of what we do at Baker Hughes. We know we are better when all our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other.. Working for you. Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we must push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect:. Contemporary work-life balance policies and wellbeing activities. Comprehensive private medical care options. Safety net of life insurance and disability programs. Tailored financial programs.. Additional elected or voluntary benefits. About Us:. We are an energy technology company that provides solutions to energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, cleaner and more efficient for people and the planet.. Join Us:. Are you seeking an opportunity to make a real difference in a company that values innovation and progress? Join us and become part of a team of people who will challenge and inspire you! Let’s come together and take energy forward.. Baker Hughes Company is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law.. R136394. Show more Show less

Posted 3 days ago

Apply

5.0 - 8.0 years

9 - 14 Lacs

Madurai, Tiruppur, Salem

Work from Office

Naukri logo

Req ID: 125023. Remote Position: Hybrid. Region: Asia. Country: India. State/Province: Chennai. City: Guindy, Chennai. Summary. The Senior Specialist, IT Solutions is a key role that evaluates, implements, and manages Security solutions to protect Celestica's systems and data. Responsibilities include implementing automation technologies, performing risk assessments, contributing to automation policies and standards, and advising on automation best practices. This role also mentors junior team members and provides advanced technical support for automation solutions.. Detailed Description. Performs tasks such as, but not limited to, the following:. Maintain security infrastructure for operational efficiencies. collaborate with other IT infrastructure, application and network teams to ensure seamless integrations of tools and technology.. Develop and implement playbooks for security automation and orchestration to respond to security events and incidents.. Design and implement integrations between security tools such as EDR, SIEM, and ServiceNow, to automate incident response and threat intelligence sharing.. Automate security processes, such as vulnerability scanning, patching, and user provisioning, using scripting and configuration management tools.. Develop custom scripts and tools, such as parsers and data enrichment scripts, to automate repetitive security tasks and integrate disparate security data sources.. Create and maintain comprehensive documentation and runbooks for security automation processes and integrations.. Collaborate with other security team members, such as threat intelligence analysts and incident responders, to identify automation opportunities and implement effective security automation solutions.. Stay up-to-date on emerging security threats and technologies to proactively identify and address potential security risks through automation.. Knowledge/Skills/Competencies. Expert knowledge of information security principles, practices, and technologies.. Expert knowledge of EDR, SIEM, and ServiceNow. Strong understanding of data integration and API development. In-depth knowledge of information security standards and regulations (e.g., ISO 27001, NIST).. Strong understanding of software design processes and data modeling.. Excellent problem-solving and analytical skills.. Strong leadership, mentoring, and communication skills.. Ability to work independently and as part of a team.. Physical Demands. Duties of this position are performed in a normal office environment.. Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required.. Typical Experience. 6 to 8 years of experience in information security, with a proven track record of evaluating, implementing, and managing security solutions.. Typical Education. Bachelor's degree in Software Engineering, Computer Science, Information Security, or a related field.. Relevant industry certifications (e.g., CISSP, CISM) are highly desirable.. Notes. This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.. Celestica is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law).. At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. Special arrangements can be made for candidates who need it throughout the hiring process. Please indicate your needs and we will work with you to meet them.. Company Overview. Celestica (NYSE, TSX: CLS) enables the world’s best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development – from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.. Celestica would like to thank all applicants, however, only qualified applicants will be contacted.. Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.. Show more Show less

Posted 3 days ago

Apply

5.0 - 8.0 years

8 - 12 Lacs

Thane

Work from Office

Naukri logo

Qualifications. Proven experience in information security management roles. In-depth knowledge of information security principles and practices. Experience in developing and implementing information security policies and procedures. Familiarity with regulatory requirements and industry standards related to information security. Strong understanding of network security, cryptography, identity and access management, and security architecture. Experience with security risk assessments and vulnerability management. Knowledge of security technologies, such as firewalls, intrusion detection/prevention systems, antivirus, and endpoint security. Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams. Bachelor’s degree or higher in Information Security, Computer Science, or a related field. Relevant certifications (e.g., CISSP, CISM, CISA) are a plus. Demonstrated leadership skills and the ability to mentor and guide a team. Show more Show less

Posted 3 days ago

Apply

9.0 - 14.0 years

8 - 12 Lacs

Mangaluru

Work from Office

Naukri logo

Summary Of The Position:. This position requires candidate should be Graduate/Post Graduate on Engineering / Computer Science with at least 10 + years of experience in managing Information Security / Cyber Security for an enterprise level.. Lead and manage day-to-day security operations and ensure the implementation and enforcement of security measures across the organization. Role will involve assessing vulnerabilities, managing security incidents, and overseeing a team of security professionals. Collaborate closely with IT, risk management, and other business units to maintain a secure infrastructure and ensure compliance with relevant security standards and regulations.. Qualification, Certifications and Knowledge level. Tech/ B. Certifications: CEH / GSEC / CISM or other relevant security. 10 years of experience in cybersecurity or information security roles.. Strong knowledge of SIEM, firewalls, IDS/IPS, vulnerability management, and encryption.. Experience with security frameworks such as NIST, ISO 27001, SOC 2 or CIS.. Hands-on experience with incident response and management.. Prior experience in a leadership or managerial role within security operations is preferred.. Good understanding of IT/IS & Cyber risks. Experience in risk management processes and reporting. Experience in third-party risk management frameworks & processes. Good Communication Skills. Ability to work independently and to take emergent decisions on his/her own. Ability to work collaboratively with internal and external stakeholders to achieve a mutually beneficial result. Good team player, hardworking, enthusiastic with good attitude. Experience:. 10-12 years of relevant work experience in Information Security / IT Security and risk management functions.. Roles & Responsibilities:. Security Operations Management:. Oversee daily security operations and lead the Security Operations Center (SOC) team.. Develop and enforce security policies, procedures, and guidelines.. Manage vulnerability scanning, penetration testing, and threat monitoring activities.. Ensure all security tools (firewalls, IDS/IPS, DLP, SIEM) are properly configured, maintained, and updated.. Incident Response And Management:. Lead investigations and response to security incidents, breaches, or cyberattacks.. Perform root cause analysis and post-incident reporting.. Ensure incident response plans are regularly tested and optimized.. Threat And Vulnerability Management:. Manage and review system vulnerabilities and threats and implement risk mitigation strategies.. Perform regular risk assessments and security audits to identify and address security gaps.. Collaborate with DevOps and infrastructure teams to integrate security best practices in all systems.. Compliance And Governance:. Ensure compliance with security regulations, standards, and frameworks (ISO 27001, NIST, GDPR, etc.).. Maintain up-to-date documentation of security controls and processes.. Coordinate internal and external security audits, including audits related to compliance.. Leadership And Team Development:. Supervise and mentor junior security analysts and engineers.. Provide guidance on career development, training, and certifications.. Collaborate with HR and senior leadership to define security team goals and objectives.. Vendor And Stakeholder Management:. Liaise with third-party vendors to assess security tools and technologies.. Work closely with other business units, such as IT, legal, and finance, to ensure security objectives are aligned with business priorities.. Security Awareness And Training:. Develop and implement IT security awareness training programs for employees.. Foster a culture of security awareness across the organization.. Perform a phishing simulation exercise at the organizational level and assess the associated risks.. Summary Of The Position:. This position requires candidate should be Graduate/Post Graduate on Engineering / Computer Science with at least 10 + years of experience in managing Information Security / Cyber Security for an enterprise level.. Lead and manage day-to-day security operations and ensure the implementation and enforcement of security measures across the organization. Role will involve assessing vulnerabilities, managing security incidents, and overseeing a team of security professionals. Collaborate closely with IT, risk management, and other business units to maintain a secure infrastructure and ensure compliance with relevant security standards and regulations.. Qualification, Certifications and Knowledge level. Tech/ B. Certifications: CEH / GSEC / CISM or other relevant security. 10 years of experience in cybersecurity or information security roles.. Strong knowledge of SIEM, firewalls, IDS/IPS, vulnerability management, and encryption.. Experience with security frameworks such as NIST, ISO 27001, SOC 2 or CIS.. Hands-on experience with incident response and management.. Prior experience in a leadership or managerial role within security operations is preferred.. Good understanding of IT/IS & Cyber risks. Experience in risk management processes and reporting. Experience in third-party risk management frameworks & processes. Good Communication Skills. Ability to work independently and to take emergent decisions on his/her own. Ability to work collaboratively with internal and external stakeholders to achieve a mutually beneficial result. Good team player, hardworking, enthusiastic with good attitude. Experience:. 10-12 years of relevant work experience in Information Security / IT Security and risk management functions.. Roles & Responsibilities:. Security Operations Management:. Oversee daily security operations and lead the Security Operations Center (SOC) team.. Develop and enforce security policies, procedures, and guidelines.. Manage vulnerability scanning, penetration testing, and threat monitoring activities.. Ensure all security tools (firewalls, IDS/IPS, DLP, SIEM) are properly configured, maintained, and updated.. Incident Response and Management:. Lead investigations and response to security incidents, breaches, or cyberattacks.. Perform root cause analysis and post-incident reporting.. Ensure incident response plans are regularly tested and optimized.. Threat and Vulnerability Management:. Manage and review system vulnerabilities and threats and implement risk mitigation strategies.. Perform regular risk assessments and security audits to identify and address security gaps.. Collaborate with DevOps and infrastructure teams to integrate security best practices in all systems.. Compliance and Governance:. Ensure compliance with security regulations, standards, and frameworks (ISO 27001, NIST, GDPR, etc.).. Maintain up-to-date documentation of security controls and processes.. Coordinate internal and external security audits, including audits related to compliance.. Leadership and Team Development:. Supervise and mentor junior security analysts and engineers.. Provide guidance on career development, training, and certifications.. Collaborate with HR and senior leadership to define security team goals and objectives.. Vendor and Stakeholder Management:. Liaise with third-party vendors to assess security tools and technologies.. Work closely with other business units, such as IT, legal, and finance, to ensure security objectives are aligned with business priorities.. Security Awareness and Training:. Develop and implement IT security awareness training programs for employees.. Foster a culture of security awareness across the organization.. Perform a phishing simulation exercise at the organizational level and assess the associated risks.. UnifyCX is an emerging Global Business Process Outsourcing company with a strong presence in the U.S., Colombia, Dominican Republic, India, Jamaica, Honduras, and the Philippines. We provide personalized contact centers, business processing, and technology outsourcing solutions to clients worldwide. In nearly two decades, unifyCX has grown from a small team to a global organization with staff members all over the world dedicated to supporting our international clientele.. At UnifyCX, we leverage advanced AI technologies to elevate the customer experience (CX) and drive operational efficiency for our clients. Our commitment to innovation positions us as a trusted partner, enabling businesses across industries to meet the evolving demands of a global market with agility and precision.. UnifyCX is a certified minority-owned business and an EOE employer who welcomes diversity.. Show more Show less

Posted 3 days ago

Apply

2.0 - 5.0 years

3 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

Come join Deepwatch’s team of world-class cybersecurity professionals and the brightest minds in the industry. If you're ready to challenge yourself with work that matters, then this is the place for you. We're redefining cybersecurity as one of the fastest growing companies in the U.S. – and we have a blast doing it!. Who We Are. Deepwatch is the leader in managed security services, protecting organizations from ever-increasing cyber threats 24/7/365. Powered by Deepwatch’s cloud-based security operations platform, Deepwatch provides the industry’s fastest, most comprehensive detection and automated response to cyber threats together with tailored guidance from dedicated experts to mitigate risk and measurably improve security posture. Hundreds of organizations, from Fortune 100 to mid-sized enterprises, trust Deepwatch to protect their business.. Our core values drive everything we do at Deepwatch, including our approach to tackling tough cyber challenges. We seek out tenacious individuals who are passionate about solving complex problems and protecting our customers. At Deepwatch, every decision, process, and hire is made with a focus on improving our cybersecurity solutions and delivering an exceptional experience for our customers. By embracing our values, we create a culture of excellence that is dedicated to empowering our team members to explore their potential, expand their skill sets, and achieve their career aspirations, which is supported by our unique annual professional development benefit.. Deepwatch Recognition Includes. 2025, 2024, 2023, 2022 and 2021 Great Place to Work® Certified. 2024 Military Times Best for Vets Employers. 2024 US Department of Labor Hire Vets Gold Award. 2024 Forbes' America's Best Startup Employers. 2024 Cyber Defense Magazine, Global Infosec Awards. 2023 and 2022 Fortress Cybersecurity Award. 2023 $180M Series C investment from Springcoast Capital Partners, Splunk Ventures, and Vista Credit Partners of Vista Equity Partners. 2022 Cybersecurity Excellence Award for MDR. Position Summary. This role is 100% onsite in Bengaluru. The shift for this position is Monday Friday, 7:30AM 3:30 PM.. Deepwatch is looking for a highly motivated, self-driven, technical analyst dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. The Deepwatch Squad and Security Operations Center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time for our customers.. The Deepwatch squad is a unique approach to how we support our customers and ultimately provide an experience not found anywhere else. You’ll be an integral part of supporting our customers by understanding their bespoke environment, needs and challenges. You will be playing a key role in supporting some of the top organizations in the world, and have the opportunity to develop your skills by working with the best responders in the industry, your team and your Squad.. The Analyst I is focused on providing descriptive analysis. They will answer questions such as the who, what, when, and where of events. Analysts are curious individuals who actively work to develop a better understanding of the environments they are assigned. Using cybersecurity best practices, you will monitor and secure complex customer environments utilizing industry leading technology such as Splunk, xSOAR, CrowdStrike and more.. In This Role, You’ll Get To. Support incident handling processes across multiple platforms and security technologies including Windows, Linux and macOS. Monitor a queue of security events generated by the Deepwatch platform SOAR, triage events based on their criticality, and escalate validated security events to customers. Document and manage incident cases in our case management system. Keep up-to-date with information security news, techniques, and trends. Identify and report any gaps in log collection or reporting as soon as possible to the customer and Deepwatch Engineering. Become proficient with Splunk, ServiceNow and other third-party threat intelligence tools as required. Perform security detection analysis and investigations using SIEM and SOAR technologies, leverage Deepwatch proprietary tooling and intelligence and maintain SLA’s. Act as the first line of defense during security events by triaging and investigating alerts within a customer’s environment. Produce high-quality written and verbal communications, recommendations, and findings to customer management in a timely manner. Continue to sharpen your skills and capabilities on the job, and through the Deepwatch development program. To be successful in this role, you’ll need to:. A basic understanding of cyber security principles, concepts and practice with a focus on SOC operations, alert triage and investigations. Know your way around SIEM platforms (Splunk preferred), how to perform queries and leverage various log sources to perform investigations. Articulate the process involved in pivoting to other log sources, cloud systems, or consoles to perform a comprehensive analysis from multiple data sources. Have a basic understanding of modern EDR, email security and cloud identity platforms. Review SIEM alerts and make a determination for what other sources or intelligence is needed to make a determination, relying on peers to help improve your skills and capabilities. A strong understanding of all basic ports and protocols. Familiarity with Windows, Mac, and Linux file path structure.. Familiarity with OSINT, TTPs and IOCs. Strong written and verbal communication skills with the ability to produce well-written reports and analysis that’s thorough, accurate and complete.. Provide the customer with a complete understanding of the investigation. CEH, CySA, GSEC, Sec+, or equivalent certification preferred. A college degree in Information Security or IT, related training, certifications or on-the-job experience. Life At Deepwatch. For employees, Deepwatch fosters a unique, flexible work environment designed with collaboration in mind. The company emphasizes personal and professional. growth, offering benefits such as professional development programs, comprehensive health coverage, and generous parental leave. Deepwatch is also committed to diversity, equity, inclusion, and belonging, aiming to empower underrepresented groups in tech by connecting them with meaningful opportunities, mentors, and sponsors.. In recognition of its supportive workplace culture, Deepwatch earned the Great Place To Work Certification/(TM) in 2025, underscoring its dedication to. creating a positive and inclusive work environment. Deepwatch is a global cybersecurity company with offices in San Francisco Bay Area, CA; Tampa, Florida;. and Bengaluru, India.. What We Offer. At Deepwatch, we are committed to supporting our employees with a comprehensive benefits package designed to enhance your well-being and financial security.. We Partner With Plum Benefits To Provide. ? Group Health Insurance – Comprehensive medical coverage for you and your dependents.. ? Group Accidental Insurance – Financial protection in case of accidental injuries.. ? Group Term Life Insurance – Security for your loved ones in unforeseen circumstances.. For additional details, refer to the benefits guide provided by Plum.. Payroll & Compensation. ? Pay Cycle: Salaries are processed monthly and paid on the last day of each month.. ? Pay Slips & Reimbursements: Delivered via email.. ? Payroll Processing: Managed by BCL Chartered Accountants through GreytHR, which provides tax and payment-related details.. Show more Show less

Posted 3 days ago

Apply

4.0 - 8.0 years

8 - 12 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less

Posted 3 days ago

Apply

5.0 - 9.0 years

13 - 17 Lacs

Mumbai

Work from Office

Naukri logo

Synopsis of the role The Information Security Manager is responsible for developing, implementing, and maintaining the organization's overall information security strategy. This includes ensuring the confidentiality, integrity, and availability of all information assets.. What You’ll Do. Implement Security policies & Standard operating processes (SOPs) : Create/ review, and update information security policies and SOPs, procedures, and standards to ensure alignment with industry best practices and RBI regulatory requirements.. Risk Management: Identify, assess, and mitigate information security risks to the organization's assets, data, and systems.. Compliance: Ensure compliance with relevant laws, regulations, and industry standards, such as GDPR, NIST, PCI-DSS, and ISO 27001.. Security Awareness: Develop and implement security awareness training programs for employees to promote a culture of security.. Incident Response: Develop and manage incident response plans to ensure prompt and effective response to security incidents.. Vulnerability Management: Implement vulnerability management processes to identify, classify, and remediate vulnerabilities in systems and applications.. Security Architecture (Cloud and On Prime) : Design , review and implement secure architectures for systems, networks, and applications.. Third-Party Risk Management: Assess and mitigate information security risks associated with third-party vendors and service providers.. Budgeting and Resource Allocation: Manage the information security budget and allocate resources to ensure effective implementation of security measures.. Reporting and Metrics: Provide regular reporting and Security metrics to stakeholders on information security performance and risk posture.. Cloud Security Experience*: Experience with cloud security platforms and technologies.. Programming Skills: Proficiency in programming languages such as Python, Java, or C++.. Industry Certifications: Additional certifications such as CompTIA Security+, or ISO 27001 Lead Implementer.. Operational & Reporting Tasks:. Risk management: Identify, assess, and mitigate information security risks to the organization.. Compliance: Ensure compliance with relevant laws, regulations, and industry standards.. Budgeting: Manage the information security budget and allocate resources.. Stakeholder Management: Communicate information security risks and mitigation strategies to stakeholders.. Project Management: Manage information security projects, including project planning, execution, and delivery.. Vendor Management: Manage relationships with information security vendors and service providers.. Security Metrics: Develop and report security metrics to stakeholders.. Compliance Reporting: Report on compliance with relevant laws, regulations, and industry standards.. Risk Reporting: Report on information security risks and mitigation strategies.. Incident Reporting: Report on security incidents and response activities.. What Experience You Need. Bachelor’s Degree or Engineering with Information security certification like ISO 27001, CCNA, ITIL foundation. Minimum 13 to 15 yrs of Information security Information / Security audits experience/Technology administration /Project management etc.. Education: Bachelor's degree in Computer Science or computer engineering, Information Security, or related field.. Certifications: CISSP, CEH, CISM, or CISA certification preferred.. Experience: Minimum 5 years of experience in information security, with at least 2 years in a management role.. Skills: Strong knowledge of information security principles, risk management, and compliance. Excellent communication, leadership, and project management skills.. Soft skills:. Time management Effective time management and prioritizing. Collaboration Ability to work & collaborate with cross functional teams Adaptability: Ability to adapt to changing security landscapes and professional environment.. What Could Set You Apart. People management skills. Good Communication skill Passion to continuously learn and work to value add to the organization security environment Positive attitude. Show more Show less

Posted 3 days ago

Apply

2.0 - 5.0 years

6 - 10 Lacs

Hyderabad

Work from Office

Naukri logo

As an Associate, you will support the overall research and due diligence within our Compliance Practice, by gathering information to help Kroll’s clients onboard and manage the risks associated with new clients and third parties, ensure we offer the right level of screening and due diligence solutions based on the risks inherent in the opportunity.. At Kroll, your work will help deliver clarity to our clients’ most complex governance, risk and transparency challenges. Apply now to join One team, One Kroll. Responsibilities. Support the overall research and due diligence process for Kroll’s Risk & Compliance practice area.. Manage cases from start to finish, conducting extensive Internet, database, and media research into companies and individuals to provide our clients with an accurate assessment of the status, legitimacy, general background, and overall reputation of a subject company and its principals.. Advise our clients to make informed, strategic decisions that have a huge impact on their organizations.. Work with clients of all sizes and industries, providing a portfolio of services that includes third party screening and monitoring, reputational due diligence solutions. Use the Kroll Compliance Portal, a user-friendly web-based due diligence, governance, and compliance platform. Requirements. 2-4 years of previous work experience (including internships) is highly desirable. A high value on our talent and seek candidates with a high level of conscientiousness, integrity, and professional pride.. Outstanding English reading and writing skills. Meticulous attention to detail, a sense of curiosity, and the ability to learn quickly, and a dedication to customer satisfaction. Undergraduate or graduate degree at an accredited university majoring in: International Relations/Affairs, Regional Studies, Political Science, or other related areas of study required. Ability to quickly and effectively summarize information from multiple sources into concise analytical assessments. Ability to work independently. Ability to prioritize several projects and assignments on multiple topics while meeting tight deadlines. Customer-service orientation with a dedication to quality. Excellent written and verbal communication skills that help represent diverse communities. Experience working with diverse teams. About Kroll-. In a world of disruption and increasingly complex business challenges, our professionals bring truth into focus with the Kroll Lens. Our sharp analytical skills, paired with the latest technology, allow us to give our clients clarity—not just answers—in all areas of business.. We embrace diverse backgrounds and global perspectives, and we cultivate diversity by respecting, including, and valuing one another. As part of One team, One Kroll, you’ll contribute to a supportive and collaborative work environment that empowers you to excel.. In order to be considered for a position, you must formally apply via careers.kroll.com. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. Show more Show less

Posted 3 days ago

Apply

3.0 - 5.0 years

8 - 12 Lacs

Pune

Work from Office

Naukri logo

Graduate Or Post Graduate Degree in computer science, information technology, or similar field, plus recent computer application programming experience, or an equivalent combination of education and experience.. 5-10 years’ development experience in Dell One Identity & .net technologies .. Good experience in Dotnet(c#.net or vb.net), SQL server. Good to have knowledge Or added advantages of having experience in REST API , WCF. Good understanding of Product development life cycle.. Good understanding of Identity Lifecycle, Access Management & Application provisioning/de-provisioning. Good to have knowledge of Scrum methodology. Good to have knowledge of Azure .. Good to have knowledge of Active directory. Azure Active Directory experience will be a added advantage. Good to have fluent communication and interpersonal skills .. Your Benefits. We offer a hybrid work model which recognizes the value of striking a balance between in-person collaboration and remote working incl. up to 25 days per year working from abroad. We believe in rewarding performance and our compensation and benefits package includes a company bonus scheme, pension, employee shares program and multiple employee discounts (details vary by location). From career development and digital learning programs to international career mobility, we offer lifelong learning for our employees worldwide and an environment where innovation, delivery and empowerment are fostere. Flexible working, health and wellbeing offers (including healthcare and parental leave benefits) support to balance family and career and help our people return from career breaks with experience that nothing else can teachAbout Allianz Technolog. Allianz Technology is the global IT service provider for Allianz and delivers IT solutions that drive the digitalization of the Group. With more than 13,000 employees located in 22 countries around the globe, Allianz Technology works together with other Allianz entities in pioneering the digitalization of the financial services industry.We oversee the full digitalization spectrum – from one of the industry’s largest IT infrastructure projects that includes data centers, networking and security, to application platforms that span from workplace services to digital interaction. In short, we deliver full-scale, end-to-end IT solutions for Allianz in the digital age. D&I statement. Allianz Technology is proud to be an equal opportunity employer encouraging diversity in the working environment. We are interested in your strengths and experience. We welcome all applications from all people regardless of gender identity and/or expression, sexual orientation, race or ethnicity, age, nationality, religion, disability, or philosophy of life. Join us. Lets care for tomorrow.. You. IT. Show more Show less

Posted 3 days ago

Apply

3.0 - 6.0 years

6 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

WHAT YOU DO AT AMD CHANGES EVERYTHING. We care deeply about transforming lives with AMD technology to enrich our industry, our communities, and the world. Our mission is to build great products that accelerate next-generation computing experiences the building blocks for the data center, artificial intelligence, PCs, gaming and embedded. Underpinning our mission is the AMD culture. We push the limits of innovation to solve the world’s most important challenges. We strive for execution excellence while being direct, humble, collaborative, and inclusive of diverse perspectives.. AMD together we advance_. The Staff Information Security Analyst will be responsible for identifying and defining requirements and engineering solutions to solve the existing threats and security issues of a global organization. This role will initial focus heavily on data protection, leading advancements in data loss prevention, and changing how AMD protects data going forward.. The Person. The ideal candidate will possess strong multi-tasking skills and enthusiasm for details and should think one step ahead of cyber-criminals. They should be well prepared to thrive in a fast-paced environment, possessing strong interpersonal and communication skills. You will use your critical thinking and sense of ownership to focus on long term quality IT security solutions. Are you self-motivated and a team player with proven ability to deliver end-to-end solutions in a high-tech and fast-moving industry? If so, this is a great career opportunity!. Key Responsibilities. The Staff Information Security Analyst responsibilities include, but are not limited to:. Building and growing AMD’s data security capabilities to keep AMD data secure regardless of location.. Identifying, monitoring, and defining the requirements to reduce the overall risk to AMD data, systems, and infrastructure.. Implementing hardware and software solutions to help mitigate a wide variety of information security risks.. Collaborating with other IT teams to align initiatives across the company.. Preferred Experience. Minimum of 5 years of IT security related experience.. Professional experience as a Security Engineer with demonstrated successful leadership and delivery of data protection solutions.. Experience as a customer-facing technical lead, including working with both management-level and development teams.. Senior/advanced related IT or security experience working in one or more Security Domains.. Experience with CASB, DLP, CSPM, Web Proxy.. Hands on experience with Data Classification policies and technologies to address data leakage.. Working knowledge of network topology, protocols, components, and OSI model, and IAM technologies (e.g., PKI, Oauth, OIDC, SAML). Understanding of NIST Cyber Security Framework standard and requirements and ability to apply them to an enterprise environment.. Experience with infrastructure operations and processes associated with IT service management in an Enterprise-level organization.. Experience with cloud services (AWS, Google, Microsoft) and associated networking, as well as collaboration and integration with O365 products.. Hands on experience with Enterprise Linux platforms.. Experience with EDR solutions is a plus.. DLP, CASB. Nice to have: Client proxy, SIEM, File and Removable Media Protection [FRP]. It Would Be Nice If You Also Had. Experience with scripting language (python, PowerShell, etc.).. Strong documentation skills.. Academic Credentials. BS CS preferred but not required.. CISSP, CISA, CISM, CCSK. Benefits offered are described: AMD benefits at a glance.. AMD does not accept unsolicited resumes from headhunters, recruitment agencies, or fee-based recruitment services. AMD and its subsidiaries are equal opportunity, inclusive employers and will consider all applicants without regard to age, ancestry, color, marital status, medical condition, mental or physical disability, national origin, race, religion, political and/or third-party affiliation, sex, pregnancy, sexual orientation, gender identity, military or veteran status, or any other characteristic protected by law. We encourage applications from all qualified candidates and will accommodate applicants’ needs under the respective laws throughout all stages of the recruitment and selection process.. Show more Show less

Posted 3 days ago

Apply

3.0 - 5.0 years

8 - 12 Lacs

Pune

Work from Office

Naukri logo

Graduate Or Post Graduate Degree in computer science, information technology, or similar field, plus recent computer application programming experience, or an equivalent combination of education and experience.. 5-10 years’ development experience in Dell One Identity & .net technologies .. Good experience in Dotnet(c#.net or vb.net), SQL server. Good to have knowledge Or added advantages of having experience in REST API , WCF. Good understanding of Product development life cycle.. Good understanding of Identity Lifecycle, Access Management & Application provisioning/de-provisioning. Good to have knowledge of Scrum methodology. Good to have knowledge of Azure .. Good to have knowledge of Active directory. Azure Active Directory experience will be a added advantage. Good to have fluent communication and interpersonal skills .. Your Benefits. We offer a hybrid work model which recognizes the value of striking a balance between in-person collaboration and remote working incl. up to 25 days per year working from abroad. We believe in rewarding performance and our compensation and benefits package includes a company bonus scheme, pension, employee shares program and multiple employee discounts (details vary by location. From career development and digital learning programs to international career mobility, we offer lifelong learning for our employees worldwide and an environment where innovation, delivery and empowerment are fostere. Flexible working, health and wellbeing offers (including healthcare and parental leave benefits) support to balance family and career and help our people return from career breaks with experience that nothing else can teachAbout Allianz Technolog. Allianz Technology is the global IT service provider for Allianz and delivers IT solutions that drive the digitalization of the Group. With more than 13,000 employees located in 22 countries around the globe, Allianz Technology works together with other Allianz entities in pioneering the digitalization of the financial services industry.We oversee the full digitalization spectrum – from one of the industry’s largest IT infrastructure projects that includes data centers, networking and security, to application platforms that span from workplace services to digital interaction. In short, we deliver full-scale, end-to-end IT solutions for Allianz in the digital age. D&I statement. Allianz Technology is proud to be an equal opportunity employer encouraging diversity in the working environment. We are interested in your strengths and experience. We welcome all applications from all people regardless of gender identity and/or expression, sexual orientation, race or ethnicity, age, nationality, religion, disability, or philosophy of life. Join us. Lets care for tomorrow.. You. IT. Show more Show less

Posted 3 days ago

Apply

4.0 - 8.0 years

8 - 12 Lacs

Hyderabad

Work from Office

Naukri logo

Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less

Posted 3 days ago

Apply

4.0 - 8.0 years

8 - 12 Lacs

Mumbai

Work from Office

Naukri logo

Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less

Posted 3 days ago

Apply

5.0 - 9.0 years

10 - 14 Lacs

Thiruvananthapuram

Work from Office

Naukri logo

A chapter lead is a responsible for continuously developing the skills and professionals of their chapter members. Chapter Leads help build the profession of their Chapter members working in Agile Squads and enable these with the skills and tools needed to build the most robust solution. For this role in Cluster Security Awareness and Transparency (SAT) team, the incumbent is expected to have relevant understanding of Information Security domains, security awareness and training, basics cloud security knowledge and Governance, risk, and compliance (GRC) area.. You will. Lead a team of individuals within a specific discipline or function, providing guidance, mentorship, and support for their professional growth.. Act as role models for Agile with the aim of inspiring, training, and encouraging Chapter members to use Agile working practices to undergo personal further development and to express their own ideas.. Balance their Squad and line duties. In addition, they are responsible for developing skills within the Chapter, designing, and enforcing standards of their profession, and building capabilities through knowledge sharing.. Works closely with capacity planning, utilization and forecast with Product Owner (PO), Cluster Product Owner (CPO), Scrum Masters and Tribe Lead.. Be responsible to drive people process of Cluster SAT function in-line with financial targets of the function and contribute towards overall productivity and delivery efficiency.. They serve their people and their Areas, and the Agile Squads to foster a learning organization and make people awesome.. Conduct regular one-on-one meetings to discuss career development (Personal Development plan), challenges, and provide constructive feedback. Provide ongoing performance feedback through regular check-ins and performance reviews.. Collaborate with team members to set SMART (Specific, Measurable, Achievable, Relevant, Time-bound) goals, ensuring alignment with business objectives.. Monitor team performance, ensuring the right balance of workload and resources. Allocate resources effectively to meet project deadlines and deliverables.. Conduct mid-year and annual performance reviews, assessing individual and team progress, offering constructive feedback, and adjusting goals as necessary.. Address performance issues early and work with individuals to create action plans (PIP) for improvement.. Be responsible for the further development of the competencies and soft skills of respective team members (referred as squad members).. Identify training and development needs in collaboration with POs, CPO, L&D team, and providing opportunities for team members to acquire new skills.. Works in tandem with Product Owners, Cluster Product Owner, Tribe Lead and Scrum Masters to understand the shortand long-term resource planning and skill landscape strategy to ensure fine balance of right skills at right level is maintained across the chapter(s).. Participate in hiring and onboarding new team members, ensuring the team has the right skills to meet business needs.. Collaborate with other Chapter Leads and functional teams to ensure cross-functional alignment and to share best practices.. Focuses on right upskilling, cross-skilling, and personal development plan of each chapter member.. Joins hands to drive overall people engagement in the chapter and overall Cluster SAT members.. Responsible to handle grievances or concerns arising from squad members and meet effective resolution.. Actively drive agile transformation and foster end-to-end ownership mindset within the function.. Responsible for housekeeping (e.g., resource management, access management, timecards) according to local regulations.. Responsible to maintain a safe and inclusive environment where chapter members have freedom and safety to innovate, experiment and learn from failure.. Communicate effectively with senior leadership regarding team performance, challenges, and resource needs.. Point of contact for security and assurance, and other regulatory topics including Asset Risk Assurance, Privacy Impact Assessments, IT DR, BIA, Security Audits, Authorization concept and other regulatory (DORA, VAIT) topics for SAT cluster.. Promote work-life balance and support the well-being of team members.. Your Skills. You enjoy working with people individually and in groups and are solution-oriented, proactive, independent, structured and reflective. You communicate clearly, can adapt flexibly to a counterpart and are enthusiastic about new topics.. You have an agile mindset, live agile leadership (servant leadership) and agile methods.. You will quickly build an understanding of the content in order to address the concerns of the employees of your chapter.. You deal successfully with external service providers or are ready to learn the ropes.. Advantageous: You have already gained experience in people management in the past (e.g., technical or disciplinary, #lead or similar leadership training). Had adequate knowledge of Information Security and its related IT landscape.. Work Experience with Information Security and ticketing solutions e.g. Archer, Zscalar, Phishme tool, SNOW, JIRA etc.. Having work experience of people management and is a must and experience in Agile transformation or equivalent would be an added advantage.. Degree or equivalent professional experience. Your Benefits. We offer a hybrid work model which recognizes the value of striking a balance between in-person collaboration and remote working incl. up to 25 days per year working from abroad. We believe in rewarding performance and our compensation and benefits package includes a company bonus scheme, pension, employee shares program and multiple employee discounts (details vary by location. From career development and digital learning programs to international career mobility, we offer lifelong learning for our employees worldwide and an environment where innovation, delivery and empowerment are fostered. Flexible working, health and wellbeing offers (including healthcare and parental leave benefits) support to balance family and career and help our people return from career breaks with experience that nothing else can teachAbout Allianz Technolog. Allianz Technology is the global IT service provider for Allianz and delivers IT solutions that drive the digitalization of the Group. With more than 13,000 employees located in 22 countries around the globe, Allianz Technology works together with other Allianz entities in pioneering the digitalization of the financial services industry.We oversee the full digitalization spectrum – from one of the industry’s largest IT infrastructure projects that includes data centers, networking and security, to application platforms that span from workplace services to digital interaction. In short, we deliver full-scale, end-to-end IT solutions for Allianz in the digital age.. D&I statement. Allianz Technology is proud to be an equal opportunity employer encouraging diversity in the working environment. We are interested in your strengths and experience. We welcome all applications from all people regardless of gender identity and/or expression, sexual orientation, race or ethnicity, age, nationality, religion, disability, or philosophy of life.Join us. Lets care for tomorrow.You. IT. Show more Show less

Posted 3 days ago

Apply

1.0 - 4.0 years

3 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

We're Celonis, the global leader in Process Mining technology and one of the world's fastest-growing SaaS firms. We believe there is a massive opportunity to unlock productivity by placing data and intelligence at the core of business processes and for that, we need you to join us.. The Team:. As part of the Information Security Organization, you will be working closely with different departments for their information security compliance. This role will be part of the new and growing Compliance Engineering function. The Information Security team plays a critical role in ensuring Celonis's technology and information assets are appropriately guarded from external and internal threats. The Security GRC Department you'll be joining is responsible for maintaining existing security attestations at Celonis globally, balancing risk with appropriate controls and assessing control effectiveness.. The Role:. This isn't a typical compliance role. It is a technical, hands-on position within our GRC organization, at the critical interface between business operations and technology. Here, you can be a data analyst, an engineer, an auditor, and a builder, using leading technology to design, create, and run automated solutions that test our security controls. In addition to that your analytical skills will contribute to our overall security process intelligence. You will get hands-on experience with our own Celonis platform, modern GRC (Governance, Risk, and Compliance) tools, and low-code automation.. The work you’ll do:. Design and build assets to test and continuously monitor the effectiveness of our internal security controls including continuous evidence collection. Rigorously test and validate the data and logic within your solutions to ensure accuracy, completeness, and reliability.. Participate in and support internal as well as external security compliance audits, applying your technical understanding as well as business acumen to assess control design and effectiveness.. Develop and manage insights to measure program effectiveness. This includes metrics for compliance and offers the opportunity to support broader security performance and risk management analytics.. Work with technical and non-technical teams across Celonis to translate security requirements into automated tests and operational workflows.. The qualifications you need:. Academic background in Computer Science, Engineering, Information Systems, Physics, Mathematics or a related field, or equivalent work experience.. You thrive on big challenges, can anticipate and adapt to changes in direction, and are driven to continuously improve the solution.. A Builder's Mindset: You have foundational experience with data integration and analyzing data using SQL, Python, or similar languages in a database-like environment.. Strong Problem-Solving Skills: You are a self-starter who can troubleshoot issues independently and enjoys tackling open-ended challenges.. Excellent Communication Skills: You can clearly articulate and right-size complex technical issues in English to both technical and non-technical people.. This role requires working in shifts aligned with Central European Time (CET) to collaborate effectively with our global teams.. Preferred Qualifications:. A strong interest in or foundational knowledge of Process Mining, Continuous Controls Monitoring, Evidence Collection, GRC platforms, and IT Auditing.. Knowledge of cloud technologies from different cloud service models and security frameworks ( ISO 27001, SOC 2, NIST etc.). Demonstrated knowledge of technology risks, infrastructure, and information security princip. What Celonis Can Offer You:. Pioneer Innovation: Work with the leading, award-winning process mining technology, shaping the future of business.. Accelerate Your Growth: Benefit from clear career paths, internal mobility, a dedicated learning program, and mentorship opportunities.. Receive Exceptional Benefits: Including generous PTO, hybrid working options, company equity (RSUs), comprehensive benefits, extensive parental leave, dedicated volunteer days, and much more.. Prioritize Your Well-being: Access to resources such as gym subsidies, counseling, and well-being programs.. Connect and Belong: Find community and support through dedicated inclusion and belonging programs.. Make Meaningful Impact: Be part of a company driven by strong values that guide everything we do: Live for Customer Value, The Best Team Wins, We Own It, and Earth Is Our Future.. Collaborate Globally: Join a dynamic, international team of talented individuals.. Empowered Environment: Contribute your ideas in an open culture with autonomous teams.. About Us:. Celonis makes processes work for people, companies and the planet. The Celonis Process Intelligence Platform uses industry-leading process mining and AI technology and augments it with business context to give customers a living digital twin of their business operation. It’s system-agnostic and without bias, and provides everyone with a common language for understanding and improving businesses. Celonis enables its customers to continuously realize significant value across the top, bottom, and green line. Celonis is headquartered in Munich, Germany, and New York City, USA, with more than 20 offices worldwide.. Get familiar with the Celonis Process Intelligence Platform by watching this video.. Celonis Inclusion Statement:. At Celonis, we believe our people make us who we are and that “The Best Team Wins”. We know that the best teams are made up of people who bring different perspectives to the table. And when everyone feels included, able to speak up and knows their voice is heard that's when creativity and innovation happen.. Your Privacy:. Any information you submit to Celonis as part of your application will be processed in accordance with Celonis’ Accessibility and Candidate Notices. By submitting this application, you confirm that you agree to the storing and processing of your personal data by Celonis as described in our Privacy Notice for the Application and Hiring Process.. Please be aware of common job offer scams, impersonators and frauds. Learn more here.. Show more Show less

Posted 3 days ago

Apply

3.0 - 8.0 years

7 - 12 Lacs

Mumbai

Work from Office

Naukri logo

Position Purpose The key objective of this role is to ensure that processes across IT operate securely. The remit extends across all aspects of IT security (i.e. policies and procedures, authorization and administration of accesses, networks and firewalls, servers and workstations, operation systems, databases and applications), wherever applicable and covers all IT teams and usage of the IT platform by other departments. Another key objective is to ensure that IT maintains an appropriate level of security in compliance with company policy and requirements from regulatory & market authorities and in accordance with recommendations from General Inspection, Compliance, Internal Audit and External Auditors. This role also contributes to the design, testing and roll-out of security controls such as access management, exception management, data leakage prevention, etc. in accordance with established regional processes Responsibilities Direct Responsibilities 1. IT Risk Management - Inform APAC IT Security Risk Management team about any new projects or major change within India for further risk assessment. - Ensure risk assessment on the in-scope projects, third-party vendors and the deviation of policies & best practice is properly conducted. Ensure the recommendation issued for projects and security exceptions / risk acceptances are properly followed up. - To translate policy statements into local guidelines and procedures in order to produce enforceable actions - To enforce an efficient user account management process in order to authorize and control users accesses and habitations to IT Systems - To monitor and ensure immediate and accurate reporting of any SIPL IT Security related incident (intrusion, virus, etc.) to the regional & global IT Security and Incident Management processes. - To be part of the network rules review and recertification process, by reviewing and approving all network access requests (including firewall, proxy and SMTP requests), and perform periodical review. - To work in partnership with the Business Lines, Organization & Methods, Information Systems, and others to draw up measures for implementing the Company's Information Systems Security Directives. Especially to participate to all projects in order to ensure respect of good IT Security practices - To occasionally participate in regional security risk assessment activity of business line applications - To work with different stakeholders and assist India CIO to implement the IT risk management framework - To conduct necessary security controls, reviews, assessment to ensure the best security practice is in place . 2. IT Security Control Design, Testing and Implementation - To gather control requirements based on regulatory guidelines and business needs - To assist in the design of local and business-specific security controls - To contribute to the processing of day-to-day security events, leading or supporting security investigations and escalation to relevant stakeholders (Business, Compliance, Legal, HR, IT) - To maintain exception management workflows and to track local exceptions and their recertification - To produce periodic KPI and KRI dashboards and distribute them to local management 3. Coordination & Cooperation - To actively coordinate and cooperate with other IT and APAC Security teams to ensure best IT Security practices, deliveries and a smooth interaction - To work closely with IT Infrastructure & Production team, as well as Business Lines IT teams for closure of non-compliant issues found within scope of responsibilityTo assist the production & follow up of Security Dashboard by APAC SecurityTo maintain an IT Security Awareness training program towards all local employees - To assist SIPL COO/CIO for the production of required and requested reporting to the local regulatory & market authorities - To answer requests raised by Internal Audit and Risk and to promptly close findings and recommendations 4. Team management - As team head to supervise and lead the SIPL information security team: - Ensure the team's mandated learnings (eLearning, classroom training) are completed before due date - Ensure block leave and carryover leave are managed per policy - Ensure timesheets are recorded in Clarity - Identify development and training plan for the team - Create succession plan and backup plan for the team - When necessary, manage low performers with development plans and keep track of the progress (if applicable) 5. Permanent Control Aspects - Direct contribution to BNPP operational permanent control framework. - Responsible for the implementation of operational permanent control policies and procedures in day-to-day business activities, such as Control Plan - Responsible for ensuring team members (if applicable) to comply with regulatory requirements and internal guidelines. - Responsible for reporting all incidents according to the Incident Management System - Responsible for ensuring job descriptions are written, distributed and updated - Ensure audit recommendations are resolved within the specific timeline. Contributing Responsibilities 1. Cooperation - To improve IT quality and process generally 2 . Compliance & Control - Comply with the BNPP IT Security policies - Comply with the BNPP standards of Code of Conduct - Comply with regulatory requirements and internal guidelines. - Ensuring appropriate escalation to management and/or Permanent Control (or Compliance as appropriate) as soon as an issue is identified - Minimizing operational failure, including but not exclusively, the risk of fraud, by helping to devise, and by implementing, sufficient regular controls 3 . Committees - Participate and contribute to different committees related to the job scope, including but not limited to IT management, IT risk management (TRM), country supplier risk management, data governance, data protection, local outsourcing management, etc. Technical & Behavioral Competencies - To be knowledgeable of IT Security concepts. - To know IT Security regional roadmap. - To maintain a good knowledge of the technologies, systems, integration and workflows of the IT Security program. - To know the organization of global IT Security, as well as regional Security, who to action depending on the matter and to maintain good relationships with IT Security managers. - To know program management methodology. - To know how to define an action plan and to follow up on progress. - To be organized and meticulous. - To know how to communicate clear instructions and follow up while delegating appropriately. Negotiation skills. Specific Qualifications (if required) - Securities practitioner qualification is a must; - Strong local regulatory experience on SEBI is required - Bachelors degree in Computer Science, Information Security or equivalent experience - Holder of information security and risk management (e.g. CISM, CISSP, etc.) preferred Skills Referential Behavioural Skills : (Please select up to 4 skills) Ability to collaborate / Teamwork Communication skills - oral & written Decision Making Personal Impact / Ability to influence Transversal Skills: (Please select up to 5 skills) Ability to understand, explain and support change Ability to manage a project Ability to develop and adapt a process Ability to inspire others & generate people's commitment Ability to manage / facilitate a meeting, seminar, committee, training Education Level: Bachelor Degree or equivalent (3 years) Experience Level At least 7 years

Posted 3 days ago

Apply

2.0 - 5.0 years

7 - 11 Lacs

Gurugram

Work from Office

Naukri logo

About NCR Atleos Key Responsibilities Security Administration Design, Engineer and manage security solutions.Configure, monitor, and troubleshoot systems to ensure optimal performance and security.Plan and execute upgrades, patches, and other maintenance activities for security tooling.Collaborate with the cybersecurity team to ensure robust security measures and compliance with industry standards.Technical Support and Troubleshooting:Provide advanced technical support for AWS cloud networking issues.Mentor and guide junior engineers and IT support staff. Documentation and Reporting Create and maintain comprehensive documentation of configurations, procedures, and processes.Generate regular reports on system performance, security incidents, and maintenance activities. Qualifications Education :Bachelors degree in computer science, Information Technology, Cybersecurity, or a related field; or equivalent work experience. Experience :At least 3 years of hands-on experience in Cyber Security. Technical Skills: Strong understanding of network protocols and services (TCP/IP, DNS, VPN, etc.).Knowledge of scripting languages (PowerShell, Python) for automation. Key Competencies Problem-Solving Skills: Strong analytical and troubleshooting abilities to diagnose and resolve complex technical issues. Communication Skills: Excellent verbal and written communication skills, with the ability to explain technical concepts to non-technical stakeholders. Project Management Ability to manage multiple projects and priorities in a fast-paced environment. EEO Statement NCR Atleos is an equal-opportunity employer. It is NCR Atleos policy to hire, train, promote, and pay associates based on their job-related qualifications, ability, and performance, without regard to race, color, creed, religion, national origin, citizenship status, sex, sexual orientation, gender identity/expression, pregnancy, marital status, age, mental or physical disability, genetic information, medical condition, military or veteran status, or any other factor protected by law. Statement to Third Party Agencies To ALL recruitment agenciesNCR Atleos only accepts resumes from agencies on the NCR Atleos preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Atleos employees, or any NCR Atleos facility. NCR Atleos is not responsible for any fees or charges associated with unsolicited resumes.

Posted 3 days ago

Apply

3.0 - 6.0 years

6 - 11 Lacs

Gurugram

Work from Office

Naukri logo

About NCR Atleos Responsible for planning and performing Application Risk Assessments, as per the guidelines provided by regulations and standards. Build expertise on security governance and compliance that includes all Cloud providers and Cloud security monitoring. Build tool expertise on tools - Wiz, Algosec, Fortinet, Forscout, etc. Effectively collaborates and communicates with the stakeholders and ensure satisfaction Foster teamwork. Train and coach team members to ensure effective knowledge management activity. EEO Statement NCR Atleos is an equal-opportunity employer. It is NCR Atleos policy to hire, train, promote, and pay associates based on their job-related qualifications, ability, and performance, without regard to race, color, creed, religion, national origin, citizenship status, sex, sexual orientation, gender identity/expression, pregnancy, marital status, age, mental or physical disability, genetic information, medical condition, military or veteran status, or any other factor protected by law. Statement to Third Party Agencies To ALL recruitment agenciesNCR Atleos only accepts resumes from agencies on the NCR Atleos preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Atleos employees, or any NCR Atleos facility. NCR Atleos is not responsible for any fees or charges associated with unsolicited resumes.

Posted 3 days ago

Apply

Exploring Information Security Jobs in India

The information security job market in India is thriving with numerous opportunities for job seekers looking to build a career in this field. With the increasing importance of data protection and cybersecurity measures, companies across various industries are actively hiring professionals with expertise in information security.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Mumbai
  4. Hyderabad
  5. Delhi-NCR

Average Salary Range

The average salary range for information security professionals in India varies based on experience level. Entry-level professionals can expect to earn around INR 4-6 lakhs per annum, while experienced professionals with 5+ years of experience can earn upwards of INR 15 lakhs per annum.

Career Path

In the field of information security, a typical career path may involve progressing from roles such as Security Analyst or Security Engineer to Senior Security Consultant, and eventually to roles like Security Architect or Chief Information Security Officer (CISO).

Related Skills

In addition to expertise in information security, professionals in this field are often expected to have skills in areas such as:

  • Network Security
  • Vulnerability Assessment
  • Penetration Testing
  • Incident Response
  • Security Compliance

Interview Questions

  • What is the difference between symmetric and asymmetric encryption? (medium)
  • Explain the concept of least privilege in the context of information security. (basic)
  • How do you stay updated with the latest cybersecurity threats and trends? (basic)
  • Can you explain the process of conducting a penetration test on a network? (medium)
  • What is the role of a firewall in network security? (basic)
  • Describe a recent security incident you handled and how you resolved it. (medium)
  • What is the importance of encryption in data protection? (basic)
  • How do you ensure compliance with regulations such as GDPR in your organization? (medium)
  • What are some common methods used for social engineering attacks? (medium)
  • How would you secure a wireless network from potential threats? (medium)
  • Explain the concept of multi-factor authentication and its benefits. (basic)
  • How do you approach risk assessment in information security? (medium)
  • What is the difference between black-box and white-box testing in security assessments? (advanced)
  • How do you handle security incidents involving sensitive data leaks? (medium)
  • Can you explain the concept of security information and event management (SIEM)? (medium)
  • How would you secure a web application from common security vulnerabilities? (medium)
  • What steps would you take to secure a company's cloud infrastructure? (medium)
  • How do you ensure secure coding practices within a development team? (basic)
  • What are the key components of a disaster recovery plan in the context of cybersecurity? (medium)
  • How do you prioritize security patches for critical vulnerabilities in a system? (medium)
  • Explain the role of cryptography in information security. (basic)
  • How do you conduct a security risk assessment for a new IT project? (medium)
  • What are the advantages and disadvantages of using biometric authentication systems? (medium)
  • How would you respond to a security incident involving a ransomware attack? (medium)
  • Explain the concept of zero-trust security and its implementation in organizations. (advanced)

Closing Remark

As you explore opportunities in the information security field in India, remember to continuously enhance your skills, stay updated with industry trends, and prepare thoroughly for interviews. With dedication and a proactive approach to learning, you can build a successful career in this dynamic and rewarding field. Good luck in your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies