14659 Information Security Jobs - Page 36

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 2 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 2 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 2 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

hyderabad

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 2 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 2 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 2 weeks ago

AI Match Score
Apply

1.0 - 3.0 years

1 - 4 Lacs

mumbai

Work from Office

Do Ensure the Incident resolution within the Response and Resolution SLAs Support the Incident Management Lead as needed and prepare the SLA Reports for Incidents Track the Backlog, pending, re-opened incidents and work for their closure asap. Coordinate with the Event monitoring teams and ensure creation of the alert-based incident creation Collaborate with the key stakeholders (SD Team, Customers, End users, Technical resolution team, Vendors, and CIS Delivery management team) during the incident resolution and Incident escalations and Ensure communication update is done on-time KEY SKILLS AND COMPETENCIES Shall have Knowledge of the ITSM Tool; Remedy or ServiceNow or HPSM Shall have 3-5 y...

Posted 2 weeks ago

AI Match Score
Apply

1.0 - 3.0 years

1 - 4 Lacs

mumbai

Work from Office

Do Ensure the Incident resolution within the Response and Resolution SLAs Support the Incident Management Lead as needed and prepare the SLA Reports for Incidents Track the Backlog, pending, re-opened incidents and work for their closure asap. Coordinate with the Event monitoring teams and ensure creation of the alert-based incident creation Collaborate with the key stakeholders (SD Team, Customers, End users, Technical resolution team, Vendors, and CIS Delivery management team) during the incident resolution and Incident escalations and Ensure communication update is done on-time KEY SKILLS AND COMPETENCIES Shall have Knowledge of the ITSM Tool; Remedy or ServiceNow or HPSM Shall have 3-5 y...

Posted 2 weeks ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 2 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

mumbai

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 2 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

7 - 11 Lacs

gurugram

Work from Office

Role Purpose The purpose of the role is to analyse security requirements and design security solutions towards protecting organizations security assets Do 1. Analyse Risk and Compliance assurance to protect sensitive information Identify Risk and compliance issues at all levels as per the updates Analyse common compliance frameworks and ensure policies, processes and standards are in place Perform quarterly audit, sample testing and report risks Communicate assurance findings to the clients in a timely manner Monitor remediation on assurance findings and ensure closure of all open points Ensure all required controls are implemented, documented and monitored so as to ensure full audit complia...

Posted 2 weeks ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 2 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 2 weeks ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 2 weeks ago

AI Match Score
Apply

14.0 - 19.0 years

20 - 25 Lacs

bengaluru

Work from Office

Key Responsibilities Design Architecture : Develop and maintain scalable architectures for non-human identity lifecycle management, including provisioning, rotation, and decommissioning. Implementation Automation : Automate identity provisioning and deprovisioning processes for applications, devices, and services using IAM tools and scripts. Access Management : Define and enforce policies for authentication and authorization of non-human identities, including privileged access management (PAM) for service accounts and secrets management. Integration : Integrate IAM solutions with cloud platforms, CI/CD pipelines, DevOps tools, and third-party APIs to ensure seamless identity management. Secu...

Posted 2 weeks ago

AI Match Score
Apply

14.0 - 19.0 years

20 - 25 Lacs

hyderabad

Work from Office

Key Responsibilities Design Architecture : Develop and maintain scalable architectures for non-human identity lifecycle management, including provisioning, rotation, and decommissioning. Implementation Automation : Automate identity provisioning and deprovisioning processes for applications, devices, and services using IAM tools and scripts. Access Management : Define and enforce policies for authentication and authorization of non-human identities, including privileged access management (PAM) for service accounts and secrets management. Integration : Integrate IAM solutions with cloud platforms, CI/CD pipelines, DevOps tools, and third-party APIs to ensure seamless identity management. Secu...

Posted 2 weeks ago

AI Match Score
Apply

3.0 - 5.0 years

7 - 11 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 2 weeks ago

AI Match Score
Apply

3.0 - 5.0 years

6 - 10 Lacs

noida

Work from Office

Location:Pan India Role:Splunk Admin Exp: 4yrs-6.5yrs JD Create and maintain custom correlation rules, queries, alerts, dashboards, and reports within Splunk Develop use cases mapped to frameworks like MITRE ATT&CK. Fine-tune rules to reduce false positives and optimize performance. Integrate threat intelligence into Splunk content. Ensure effective use of Splunk for security monitoring. Regularly review and enhance existing content based on emerging threats. Support log ingestion and data normalization. Work closely with security operations, threat intelligence, and development teams. Mandatory Skills: Security Log Monitoring . Experience: 3-5 Years .

Posted 2 weeks ago

AI Match Score
Apply

4.0 - 7.0 years

15 - 20 Lacs

kolkata

Work from Office

Desired skills : Strong knowledge of effective controls for Application Security, Cloud Services Hosting, Identity and Access Management, Data Protection, Borderless Connectivity, Endpoint Security, and Cyber Security Operations Strong knowledge of application architectural patterns, such as MVC, Microservices, Eventdriven etc. Strong knowledge of architectural domain including cloud application architecture and containerbased deployment. Knowledge in code review service penetration testing is preferred. Familiarity with cloud architecture and services, such as AWS, Azure or GCP is preferred. Strong knowledge of security controls assessments of network and security devices. Strong knowledge ...

Posted 2 weeks ago

AI Match Score
Apply

3.0 - 8.0 years

5 - 10 Lacs

hyderabad

Work from Office

Your key responsibilities Designs, implements and deploys cloud platforms to support and meet business needs. Identifies and recommends opportunities for improvement and performance issue solutions. Provides intermediate level technical support and monitors multiple cloud technology platforms efficiency through the use of monitoring tools and applications. Maintains comprehensive technical knowledge of cloud software and infrastructure platforms. Develops technical standards. Tests and evaluates IT vendor products. Reviews configuration parameters to optimize system performance and maximize operation uptime. Trains and mentors staff and IT project teams, providing guidance and consultation a...

Posted 2 weeks ago

AI Match Score
Apply

1.0 - 4.0 years

7 - 8 Lacs

bengaluru

Work from Office

Your key responsibilities Participate in the delivery of Third-Party Risk Management (TPRM) engagements covering walkhroughs, testing, documentation and other engagement related activities . Participate in vendor calls / client interactions by providing delivery updates. Follow policies and procedures that support the successful implementation of TPRM operating models. Participate in process walkthrough discussions to assist in documenting end-to-end business processes and functional requirements. Participate in assessing the application of legal and regulatory requirements to clients TPRM practices. Participate in technology enhancement requirements such as Automation, Data Analytics, AI to...

Posted 2 weeks ago

AI Match Score
Apply

4.0 - 8.0 years

7 - 12 Lacs

kolkata

Work from Office

Your key responsibilities Lead and work closely with the manager in the delivery of Third-Party Risk Management (TPRM) engagements. Assist / Mentor team members in vendor calls / client interactions by providing delivery updates. Perform Quality Checks on work products before delivering it to the end clients. Follow policies and procedures that support the successful implementation of TPRM operating models. Facilitate process walkthrough discussions to document end-to-end business processes and functional requirements. Assess the application of legal and regulatory requirements to clients TPRM practices. Lead/Participate in technology enhancement requirements such as Automation, Data Analyti...

Posted 2 weeks ago

AI Match Score
Apply

4.0 - 8.0 years

7 - 12 Lacs

bengaluru

Work from Office

Your key responsibilities Lead and work closely with the manager in the delivery of Third-Party Risk Management (TPRM) engagements. Assist / Mentor team members in vendor calls / client interactions by providing delivery updates. Perform Quality Checks on work products before delivering it to the end clients. Follow policies and procedures that support the successful implementation of TPRM operating models. Facilitate process walkthrough discussions to document end-to-end business processes and functional requirements. Assess the application of legal and regulatory requirements to clients TPRM practices. Lead/Participate in technology enhancement requirements such as Automation, Data Analyti...

Posted 2 weeks ago

AI Match Score
Apply

4.0 - 8.0 years

7 - 12 Lacs

noida

Work from Office

Your key responsibilities Lead and work closely with the manager in the delivery of Third-Party Risk Management (TPRM) engagements. Assist / Mentor team members in vendor calls / client interactions by providing delivery updates. Perform Quality Checks on work products before delivering it to the end clients. Follow policies and procedures that support the successful implementation of TPRM operating models. Facilitate process walkthrough discussions to document end-to-end business processes and functional requirements. Assess the application of legal and regulatory requirements to clients TPRM practices. Lead/Participate in technology enhancement requirements such as Automation, Data Analyti...

Posted 2 weeks ago

AI Match Score
Apply

3.0 - 8.0 years

17 - 19 Lacs

hyderabad

Work from Office

Your key responsibilities Provides expert-level technical leadership for critical software, middleware, or hardware projects across multiple platforms, ensuring successful architecture, development, and implementation. Evaluates and approves development options and technical deliverables. Oversees comprehensive testing for functionality, performance, and security. Approves technical solutions proposed by team members, resolves complex technical problems, and anticipates issues to enable preventive action. Acts as a key technical liaison with stakeholders, effectively communicating technical implications, project risks, and solution strategies. Maintains expertise in IT methodologies, archite...

Posted 2 weeks ago

AI Match Score
Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies