Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
1.0 - 3.0 years
1 - 4 Lacs
mumbai
Work from Office
Do Ensure the Incident resolution within the Response and Resolution SLAs Support the Incident Management Lead as needed and prepare the SLA Reports for Incidents Track the Backlog, pending, re-opened incidents and work for their closure asap. Coordinate with the Event monitoring teams and ensure creation of the alert-based incident creation Collaborate with the key stakeholders (SD Team, Customers, End users, Technical resolution team, Vendors, and CIS Delivery management team) during the incident resolution and Incident escalations and Ensure communication update is done on-time KEY SKILLS AND COMPETENCIES Shall have Knowledge of the ITSM Tool; Remedy or ServiceNow or HPSM Shall have 3-5 y...
Posted 2 weeks ago
1.0 - 3.0 years
1 - 4 Lacs
mumbai
Work from Office
Do Ensure the Incident resolution within the Response and Resolution SLAs Support the Incident Management Lead as needed and prepare the SLA Reports for Incidents Track the Backlog, pending, re-opened incidents and work for their closure asap. Coordinate with the Event monitoring teams and ensure creation of the alert-based incident creation Collaborate with the key stakeholders (SD Team, Customers, End users, Technical resolution team, Vendors, and CIS Delivery management team) during the incident resolution and Incident escalations and Ensure communication update is done on-time KEY SKILLS AND COMPETENCIES Shall have Knowledge of the ITSM Tool; Remedy or ServiceNow or HPSM Shall have 3-5 y...
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
5.0 - 8.0 years
7 - 11 Lacs
gurugram
Work from Office
Role Purpose The purpose of the role is to analyse security requirements and design security solutions towards protecting organizations security assets Do 1. Analyse Risk and Compliance assurance to protect sensitive information Identify Risk and compliance issues at all levels as per the updates Analyse common compliance frameworks and ensure policies, processes and standards are in place Perform quarterly audit, sample testing and report risks Communicate assurance findings to the clients in a timely manner Monitor remediation on assurance findings and ensure closure of all open points Ensure all required controls are implemented, documented and monitored so as to ensure full audit complia...
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 weeks ago
14.0 - 19.0 years
20 - 25 Lacs
bengaluru
Work from Office
Key Responsibilities Design Architecture : Develop and maintain scalable architectures for non-human identity lifecycle management, including provisioning, rotation, and decommissioning. Implementation Automation : Automate identity provisioning and deprovisioning processes for applications, devices, and services using IAM tools and scripts. Access Management : Define and enforce policies for authentication and authorization of non-human identities, including privileged access management (PAM) for service accounts and secrets management. Integration : Integrate IAM solutions with cloud platforms, CI/CD pipelines, DevOps tools, and third-party APIs to ensure seamless identity management. Secu...
Posted 2 weeks ago
14.0 - 19.0 years
20 - 25 Lacs
hyderabad
Work from Office
Key Responsibilities Design Architecture : Develop and maintain scalable architectures for non-human identity lifecycle management, including provisioning, rotation, and decommissioning. Implementation Automation : Automate identity provisioning and deprovisioning processes for applications, devices, and services using IAM tools and scripts. Access Management : Define and enforce policies for authentication and authorization of non-human identities, including privileged access management (PAM) for service accounts and secrets management. Integration : Integrate IAM solutions with cloud platforms, CI/CD pipelines, DevOps tools, and third-party APIs to ensure seamless identity management. Secu...
Posted 2 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 weeks ago
3.0 - 5.0 years
6 - 10 Lacs
noida
Work from Office
Location:Pan India Role:Splunk Admin Exp: 4yrs-6.5yrs JD Create and maintain custom correlation rules, queries, alerts, dashboards, and reports within Splunk Develop use cases mapped to frameworks like MITRE ATT&CK. Fine-tune rules to reduce false positives and optimize performance. Integrate threat intelligence into Splunk content. Ensure effective use of Splunk for security monitoring. Regularly review and enhance existing content based on emerging threats. Support log ingestion and data normalization. Work closely with security operations, threat intelligence, and development teams. Mandatory Skills: Security Log Monitoring . Experience: 3-5 Years .
Posted 2 weeks ago
4.0 - 7.0 years
15 - 20 Lacs
kolkata
Work from Office
Desired skills : Strong knowledge of effective controls for Application Security, Cloud Services Hosting, Identity and Access Management, Data Protection, Borderless Connectivity, Endpoint Security, and Cyber Security Operations Strong knowledge of application architectural patterns, such as MVC, Microservices, Eventdriven etc. Strong knowledge of architectural domain including cloud application architecture and containerbased deployment. Knowledge in code review service penetration testing is preferred. Familiarity with cloud architecture and services, such as AWS, Azure or GCP is preferred. Strong knowledge of security controls assessments of network and security devices. Strong knowledge ...
Posted 2 weeks ago
3.0 - 8.0 years
5 - 10 Lacs
hyderabad
Work from Office
Your key responsibilities Designs, implements and deploys cloud platforms to support and meet business needs. Identifies and recommends opportunities for improvement and performance issue solutions. Provides intermediate level technical support and monitors multiple cloud technology platforms efficiency through the use of monitoring tools and applications. Maintains comprehensive technical knowledge of cloud software and infrastructure platforms. Develops technical standards. Tests and evaluates IT vendor products. Reviews configuration parameters to optimize system performance and maximize operation uptime. Trains and mentors staff and IT project teams, providing guidance and consultation a...
Posted 2 weeks ago
1.0 - 4.0 years
7 - 8 Lacs
bengaluru
Work from Office
Your key responsibilities Participate in the delivery of Third-Party Risk Management (TPRM) engagements covering walkhroughs, testing, documentation and other engagement related activities . Participate in vendor calls / client interactions by providing delivery updates. Follow policies and procedures that support the successful implementation of TPRM operating models. Participate in process walkthrough discussions to assist in documenting end-to-end business processes and functional requirements. Participate in assessing the application of legal and regulatory requirements to clients TPRM practices. Participate in technology enhancement requirements such as Automation, Data Analytics, AI to...
Posted 2 weeks ago
4.0 - 8.0 years
7 - 12 Lacs
kolkata
Work from Office
Your key responsibilities Lead and work closely with the manager in the delivery of Third-Party Risk Management (TPRM) engagements. Assist / Mentor team members in vendor calls / client interactions by providing delivery updates. Perform Quality Checks on work products before delivering it to the end clients. Follow policies and procedures that support the successful implementation of TPRM operating models. Facilitate process walkthrough discussions to document end-to-end business processes and functional requirements. Assess the application of legal and regulatory requirements to clients TPRM practices. Lead/Participate in technology enhancement requirements such as Automation, Data Analyti...
Posted 2 weeks ago
4.0 - 8.0 years
7 - 12 Lacs
bengaluru
Work from Office
Your key responsibilities Lead and work closely with the manager in the delivery of Third-Party Risk Management (TPRM) engagements. Assist / Mentor team members in vendor calls / client interactions by providing delivery updates. Perform Quality Checks on work products before delivering it to the end clients. Follow policies and procedures that support the successful implementation of TPRM operating models. Facilitate process walkthrough discussions to document end-to-end business processes and functional requirements. Assess the application of legal and regulatory requirements to clients TPRM practices. Lead/Participate in technology enhancement requirements such as Automation, Data Analyti...
Posted 2 weeks ago
4.0 - 8.0 years
7 - 12 Lacs
noida
Work from Office
Your key responsibilities Lead and work closely with the manager in the delivery of Third-Party Risk Management (TPRM) engagements. Assist / Mentor team members in vendor calls / client interactions by providing delivery updates. Perform Quality Checks on work products before delivering it to the end clients. Follow policies and procedures that support the successful implementation of TPRM operating models. Facilitate process walkthrough discussions to document end-to-end business processes and functional requirements. Assess the application of legal and regulatory requirements to clients TPRM practices. Lead/Participate in technology enhancement requirements such as Automation, Data Analyti...
Posted 2 weeks ago
3.0 - 8.0 years
17 - 19 Lacs
hyderabad
Work from Office
Your key responsibilities Provides expert-level technical leadership for critical software, middleware, or hardware projects across multiple platforms, ensuring successful architecture, development, and implementation. Evaluates and approves development options and technical deliverables. Oversees comprehensive testing for functionality, performance, and security. Approves technical solutions proposed by team members, resolves complex technical problems, and anticipates issues to enable preventive action. Acts as a key technical liaison with stakeholders, effectively communicating technical implications, project risks, and solution strategies. Maintains expertise in IT methodologies, archite...
Posted 2 weeks ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
192783 Jobs | Dublin
Wipro
61786 Jobs | Bengaluru
EY
49321 Jobs | London
Accenture in India
40642 Jobs | Dublin 2
Turing
35027 Jobs | San Francisco
Uplers
31887 Jobs | Ahmedabad
IBM
29626 Jobs | Armonk
Capgemini
26439 Jobs | Paris,France
Accenture services Pvt Ltd
25841 Jobs |
Infosys
25077 Jobs | Bangalore,Karnataka