11984 Information Security Jobs - Page 4

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 day ago

AI Match Score
Apply

3.0 - 5.0 years

7 - 11 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 day ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

kochi

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 1 day ago

AI Match Score
Apply

8.0 - 10.0 years

5 - 8 Lacs

bengaluru

Work from Office

Job Description Role Purpose The purpose of this role is to provide solutions and bridge the gap between technology and business know-how to deliver any client solution Do 1. Bridging the gap between project and support teams through techno-functional expertise For a new business implementation project, drive the end to end process from business requirement management to integration & configuration and production deployment Check the feasibility of the new change requirements and provide optimal solution to the client with clear timelines Provide techno-functional solution support for all the new business implementations while building the entire system from the scratch Support the solutioni...

Posted 1 day ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 day ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 1 day ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

kochi

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 day ago

AI Match Score
Apply

3.0 - 8.0 years

8 - 12 Lacs

pune, bengaluru

Work from Office

About the role The IT Identity and Access Manager is responsible for safeguarding sensitive company data and systems by managing user identities, access permissions, and security protocols. Experience Key Qualifications Minimum 15+ years of experience in Identity and access Management Minimum 5+ years of Experience in managing the IDAM platform for a global organization in the leadership role Experience in designing, implementing, and operating IDAM and PAM solutions within enterprise environments. Extensive knowledge of IDAM technologies such as IGA, RBAC, PAM, SSO, IDP and directory services Strong knowledge of security frameworks and security concepts such as defence-in-depth techniques, ...

Posted 1 day ago

AI Match Score
Apply

1.0 - 2.0 years

2 - 6 Lacs

mumbai

Work from Office

We are looking for a highly skilled and experienced Information Security Analyst to join our team. The ideal candidate will have approximately 1-2 years of practical professional experience in information security. Roles and Responsibility Design, test, and implement secure operating systems, networks, and databases. Conduct risk audits and assessments, providing recommendations for application design. Monitor and analyze system access logs. Plan for security backup and system disaster recovery. Develop and implement relevant solutions based on best practices. Collaborate with cross-functional teams to ensure the security of IT assets. Job Requirements Strong knowledge of information securit...

Posted 1 day ago

AI Match Score
Apply

2.0 - 7.0 years

6 - 9 Lacs

thane

Work from Office

We are looking for a highly skilled and experienced IT professional to join our team as an Officer - Information Technology. The ideal candidate will have 2-7 years of experience in the field. Roles and Responsibility Develop and implement IT infrastructure and systems architecture strategies. Map relationships between IT platform/infrastructure components. Identify key technology interactions and dependencies across systems/platforms. Evaluate total cost of ownership and return on investment of various IT platform/infrastructure alternatives. Manage and oversee the implementation of short-term activities within the team. Deliver professional responsibilities focusing on excellence. Job Requ...

Posted 1 day ago

AI Match Score
Apply

7.0 - 9.0 years

13 - 15 Lacs

bengaluru

Work from Office

Global & Indian Privacy Frameworks: Demonstrate an exceptional level of expertise in DPDPA and GDPR . Apply your deep understanding of these regulations to assess, implement, and maintain a robust privacy program. Privacy by Design: Collaborate with product and engineering teams to integrate privacy requirements seamlessly into the software development lifecycle. Ensure that new products and features are designed with privacy in mind from the outset. Review the product designs for privacy compliance in line with DPDP/GDPR. Technical proficiency to map product, tech and privacy correlation and suggest the best way forward. Privacy Impact Assessments (PIAs): Lead and conduct PIAs and Data Prot...

Posted 1 day ago

AI Match Score
Apply

15.0 - 20.0 years

13 - 18 Lacs

mumbai

Work from Office

1. Security Architecture & Strategy Develop and maintain enterprise security architecture for AWS, GCP, and hybrid environments using IaC tools (Terraform, CloudFormation). Drive Zero-Trust adoption through micro-segmentation, identity-centric access, and end-to-end encryption. Design PKI infrastructures and secrets management systems (HashiCorp Vault, AWS Secrets Manager) for secure key lifecycle management. Establish container security frameworks (Kubernetes, Docker) with pod security policies, runtime threat detection (Falco), and supply chain integrity tools (Harbor, Clair). Define API security best practices integrating OAuth 2.0, JWT validation, and rate limiting via platforms like Api...

Posted 1 day ago

AI Match Score
Apply

2.0 - 5.0 years

4 - 7 Lacs

pune

Work from Office

Design robust QA code and tooling strategies without being overly complex Validate new and existing RESTful server features at the functional, web API and partner integration levels for internal and external customers Write and maintain purpose-built automated workflows, perform code reviews with peers, and apply targeted manual efforts/investigations to meet practical or business requirements Develop tools and instruments in collaboration with other QA team members to exercise and analyze technically complex scenarios Adjacent test activities may include occasional overlap with networking, client application, infrastructure, and user interface aspects of mobile handset and vehicle client ap...

Posted 1 day ago

AI Match Score
Apply

6.0 - 12.0 years

8 - 14 Lacs

mumbai

Work from Office

To deliver exceptional volume and revenue performance by acquiring and engaging with DBS Treasures clients having an AUM => INR 20 Million through need-based approach” and ensure client coverage and product penetration through cross-sell and up-sell of DBS products and services. To manage & maintain the highest customer satisfaction and service levels through pro-active client engagement & relationship management, coordinating internally with DBS Service and Distribution and Product team Key Accountabilities Acquire and upgrade quality Treasures clients in the branch location areas Engage with existing customers to deepen the wallet share through retention and growth of AUM. Accountable for ...

Posted 1 day ago

AI Match Score
Apply

6.0 - 12.0 years

8 - 14 Lacs

mumbai

Work from Office

To deliver exceptional volume and revenue performance by acquiring and engaging with DBS Treasures clients having an AUM => INR 20 Million through need-based approach” and ensure client coverage and product penetration through cross-sell and up-sell of DBS products and services. To manage & maintain the highest customer satisfaction and service levels through pro-active client engagement & relationship management, coordinating internally with DBS Service and Distribution and Product team Key Accountabilities Acquire and upgrade quality Treasures clients in the branch location areas Engage with existing customers to deepen the wallet share through retention and growth of AUM. Accountable for ...

Posted 1 day ago

AI Match Score
Apply

5.0 - 10.0 years

35 - 40 Lacs

bengaluru

Work from Office

As a Senior Software Engineer for Walmart, youll have the opportunity to Apply and/or develop ML solutions to develop efficient and scalable models at Walmart scale. Through this role you have an opportunity to develop intuitive software that meets and exceeds the needs of the customer and the company. You also get to collaborate with team members to develop best practices and requirements for the software. In this role it would be important for you to professionally maintain all codes and create updates regularly to address the customers and companys concerns. You will show your skills in analysing and testing programs/products before formal launch to ensure flawless performance. Troublesho...

Posted 1 day ago

AI Match Score
Apply

5.0 - 10.0 years

35 - 40 Lacs

bengaluru

Work from Office

Design, develop, and maintain tools, services, and automation that simplify operations for secrets management platforms (Vault, Akeyless, etc.) Build Kubernetes-native solutions and operators to automate lifecycle tasks such as onboarding, policy management, auditing and monitoring. Partner with security, platform and application teams to ensure secret solutions are scalable, resilient, and easy to adopt. Improve platform reliability by developing automated health checks, self-healing scripts and operational tooling. Develop dashboards, metrics, and alerting for observability of secrets platform health and usage. Write high-quality, well-tested code primarily in Golang, leveraging Kubernetes...

Posted 1 day ago

AI Match Score
Apply

5.0 - 10.0 years

10 - 11 Lacs

bengaluru

Work from Office

Responsible for design, deployment, and management of Database Activity Monitoring (DAM) solutions across diverse database platforms (e.g., SQL Server, MySQL, PostgreSQL). Define and implement policies for monitoring, alerting, and auditing of database activities to detect unauthorized access, data exfiltration, and policy violations. Collaborate with Security Architects to integrate DAM into the broader security architecture and ensure alignment with enterprise risk management strategies. Develop and maintain cases, rules, and dashboards for DAM tools to support threat detection, compliance reporting, and forensic investigations. Partner with database administrators, application owners, and...

Posted 1 day ago

AI Match Score
Apply

3.0 - 7.0 years

15 - 19 Lacs

bengaluru

Work from Office

Supporting the operation of our internal and external cyber governance activities - including facilitating the timely delivery of effective cyber governance reports (across multiple stakeholder groups). Partnering with other functions (e. g. Legal, Privacy) to ensure alignment with other governance activities. Maintaining awareness and visibility of relevant regulatory compliance requirements, including triggering changes to standards where required. Support reporting activities to ensure Unilever stay compliant with cyber legislation, e. g. NIS2. Support the Governance Manager to monitor NIST and other industry standard best practices and conducting gap analysis against our own governance a...

Posted 1 day ago

AI Match Score
Apply

3.0 - 8.0 years

6 - 9 Lacs

bengaluru

Work from Office

All aspects of OneStream operational support, including: Handle all operational support tickets raised by users in respect of the OneStream solution. Maintain appropriate operational processes & controls and the associated documentation required for SOX. Participate in the annual SOX audit of operational processes & controls, including delivery of process walkthroughs and provision of documentary evidence to auditors. Maintain user guides / documentation and provide guidance to users regarding operational queries. Deliver user training. User access, including maintenance of supporting documentation (such as user request template, security matrix, approvers list and role mappings) in addition...

Posted 1 day ago

AI Match Score
Apply

1.0 - 5.0 years

3 - 7 Lacs

hyderabad

Work from Office

We are looking for a highly skilled Penetration Tester to join our team at Apple India Pvt Ltd, responsible for retail engineering and ensuring the security of our systems. The ideal candidate will have a strong background in penetration testing and retail engineering. Roles and Responsibility Conduct thorough penetration tests on our systems and networks to identify vulnerabilities and weaknesses. Develop and implement effective mitigation strategies to prevent future attacks. Collaborate with cross-functional teams to ensure seamless integration of security measures. Stay up-to-date with emerging trends and technologies in penetration testing and retail engineering. Provide expert guidance...

Posted 1 day ago

AI Match Score
Apply

4.0 - 7.0 years

6 - 9 Lacs

gurugram

Work from Office

We are looking for a highly skilled and experienced Senior Consultant to join our team in the Technology Strategy & Transformation domain, located in Gurgaon. The ideal candidate will have a strong background in technology consulting and transformation, with expertise in CNS-TC. Roles and Responsibility Develop and implement comprehensive technology strategies to drive business growth and improvement. Collaborate with clients to understand their technology needs and provide tailored solutions. Conduct thorough analysis of current systems and processes to identify areas for improvement. Design and implement new technologies and solutions to enhance efficiency and productivity. Provide expert ...

Posted 1 day ago

AI Match Score
Apply

3.0 - 8.0 years

8 - 12 Lacs

bengaluru

Work from Office

8+ years of handson experience in product management in Information Security, Cybersecurity and/or Information Technology. Strong interpersonal skills,ability to communicate and influence others and work effectively in a cross-functional team. Required Candidate profile Professional certifications preferred: CISSP,GIAC,CISM,CCSP, CISA, CRISC, SAFe Product Management. Deep technical understanding on iOS and Android OS and mobile device/application related technology.

Posted 1 day ago

AI Match Score
Apply

1.0 - 3.0 years

6 - 10 Lacs

gurugram

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 day ago

AI Match Score
Apply

3.0 - 5.0 years

7 - 11 Lacs

kochi

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 day ago

AI Match Score
Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies