Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
7.0 - 12.0 years
4 - 8 Lacs
Bengaluru
Work from Office
As worldwide experts in filtration, MANN+HUMMEL develop solutions for vehicles, industrial applications, clean air inside vehicles and the sustainable use of water. With team spirit and an open culture of communication, we are continuously working towards achieving our vision of leadership in filtration . Become part of our team. As worldwide experts in filtration, MANN+HUMMEL develop solutions for vehicles, industrial applications, clean air inside vehicles and the sustainable use of water. With team spirit and an open culture of communication, we are continuously working towards achieving our vision of leadership in filtration . Become part of our team. Job Description Role Summary The Information Technology Support staff will provide direct technical assistance and support to Mann + Hummel IT team for Security infrastructure related requirements. Duties include troubleshooting, configuration devices related to security, monitoring on Network, Server & other IT infrastructure, creating reports and work on tickets. Main Tasks Vulnerability Assessment Tools: Be well-versed in using tools such as Nessus, OpenVAS, Qualys, etc Exploit Development: Knowledge of how vulnerabilities are exploited and understanding of common vulnerabilities (OWASP Top 10, CVEs). Network Security: Understanding of network protocols, firewalls, IDS/IPS systems, and other network security technologies. Vulnerability Management : Oversee the vulnerability management program, including regular scanning, assessment, and prioritization of vulnerabilities across the organization s systems and networks. Collaborate with IT and development teams to ensure timely remediation of identified vulnerabilities. Track and report on the status of vulnerability remediation efforts and provide metrics to senior management. Your Profile B.E / B.Tech from reputed University or Institute Minimum of 7 years of progressive experience in cyber security with atleast 2 years handling vulnerability management role within CSIRT. Relevant certifications such as CISSP, CISM, GIAC or similar. Fluency in technical English (written and spoken) Are you full of ideas? Are you keen to take on responsibility and really achieve something? Then our doors are open to you. This company lives out its values, gives people the freedom to use their own initiative, and offers many development exciting opportunities and many exciting projects - all of which awaits you here. "}}" id="text-9b159c6151" class="cmp-text cmp-text--standard"> Are you full of ideas? Are you keen to take on responsibility and really achieve something? Then our doors are open to you. This company lives out its values, gives people the freedom to use their own initiative, and offers many development exciting opportunities and many exciting projects - all of which awaits you here.
Posted 2 weeks ago
5.0 - 8.0 years
10 - 14 Lacs
Noida, New Delhi, Gurugram
Work from Office
maintainable code using languages like Python, Java, C++, JavaScript,IPS,DDoS,GitLab CI, Travis CI,Python, Bash, PowerShell, Ruby, Go,Ansible, Puppet,firewalls, VPNs
Posted 2 weeks ago
10.0 - 12.0 years
18 - 20 Lacs
Noida, Gurugram, Delhi / NCR
Work from Office
Project Planning, Delivery Oversight, InfoSec Governance, Client Handling,b) Firewalls - CISCO ASA, Palo Alto, WAF : F5 and Barracuda, SSL loaders and load balancers,F5, Radware, DDOS, IPS, IDS, APT, SIEM, VAPT, OS Hardening,SIEM, VAPT,OS Hardening
Posted 2 weeks ago
6.0 - 14.0 years
20 - 25 Lacs
Hyderabad, Bengaluru
Work from Office
At Broadridge, weve built a culture where the highest goal is to empower others to accomplish more. If you re passionate about developing your career, while helping others along the way, come join the Broadridge team. The Security Monitoring Lead Engineer is responsible for enhancing SIEM performance, designing and optimizing detection rules, and integrating automation to drive more effective threat detection and response. This role requires close collaboration with infrastructure, security, cloud engineering, and other cross-functional teams to design and implement seamless integration of security tools, optimize data flows, and ensure comprehensive telemetry coverage across the organization. Additionally, the position requires expertise in DevOps methodologies and Infrastructure as Code (IaC) to build scalable, automated security solutions and streamline deployment processes. The role will require working in shifts to ensure continuous 24/7 operations. Key Responsibilities Architect and implement advanced security monitoring use cases that elevate our threat detection and incident response systems. Spearhead the seamless integration and administration of SIEM platforms, ensuring optimal data flow and threat visibility. Deploy and manage infrastructure as code with Terraform, setting new standards for reliability and efficiency. Develop and automate scripts using Python, Bash, or PowerShell to refine SOC operations and elevate efficiency. Lead efforts in tuning SIEM alerts, enhancing accuracy, and reducing false positives to ensure precise threat identification. Conduct deep-dive log analyses and proactive threat hunting to uncover and mitigate potential security risks. Curate comprehensive documentation and reporting, providing insights that guide strategy and inform stakeholders. Engage continuously with emerging technologies and methodologies to maintain an edge in a rapidly evolving threat landscape. Required Skills and Qualifications Bachelor s degree in computer science, Information Technology, Cybersecurity, or a related field; advanced certifications such as CEH, CISSP, or GIAC are highly regarded. A minimum of 5 years of proven experience in a SOC role with a focus on automation and SIEM integration. Proficiency in Terraform and infrastructure as code practices. Proficiency in scripting languages (Python, Bash, PowerShell), enabling dynamic and effective automation. Extensive experience with security monitoring tools (e. g. , SIEM, EDR, IPS/IDS, Firewalls) and a thorough understanding of cloud security within AWS and Azure environments. Stellar analytical and problem-solving skills, combined with clear and compelling communication capabilities. Capacity and readiness to work and provide leadership in rotational shifts, including nights and weekends. Preferred Qualifications Experience with advanced automation and orchestration tools. In-depth knowledge of security frameworks and regulations, including NIST, ISO 27001, PCI-DSS, GDPR, and HIPAA. A strategic mindset in conducting threat assessments and risk analyses. We are dedicated to fostering a collaborative, engaging, and inclusive environment and are committed to providing a workplace that empowers associates to be authentic and bring their best to work. We believe that associates do their best when they feel safe, understood, and valued, and we work diligently and collaboratively to ensure Broadridge is a company and ultimately a community that recognizes and celebrates everyone s unique perspective.
Posted 2 weeks ago
8.0 - 10.0 years
8 - 18 Lacs
Bengaluru
Work from Office
Tata Elxsi is a global design and technology services leader for Automotive, Media, Communications and Healthcare. The Company helps customers reimagine their products and services through design thinking and application of digital technologies such as IoT (Internet of Things), Cloud, Mobility, Virtual Reality, and Artificial Intelligence. Roles and Responsibilities: Overseeing the 24x7x365 Security Operation Centers processes, technology and people who monitor security tools, assess threats, and risks involving client infrastructure and orchestration Lead and manage the Security Operations Center (SOC) team, providing direction, guidance, and support to ensure the team's effectiveness and productivity with In-depth knowledge of security operations, incident response methodologies, and security technologies (SIEM, IDS/IPS, EDR, etc.). Responsible for ensuring that all Managed Service deliverables are produced on time and within strict SLA time frames, while maintaining an innovative growth culture within SOC team. Expected to act as the escalation point for the SOC technical team Managing priorities, providing recommendations and implementing changes to methods/processes. Handle client meetings, point of contact for client requirements, onboard new clients. Manage relationships with our customers in-house operations teams and lead operational interactions/cadence with client management. Provide direction and vision to improve SOCs effectiveness, including motivating people to perform, listening to the team, providing feedback, recognizing strengths, identifying automation opportunities, reducing alert fatigue and providing adequate challenges to staff to maintain innovative growth culture. Oversee the management of our existing Managed Security Operations managed SIEM and EDR solutions, ensuring their optimal performance and effectiveness in detecting and responding to security incidents. Collaborate with the SOC analysts and engineering team to define and implement SIEM rules, alerts, and correlation logic to improve the accuracy and efficiency of threat detection. Develop and implement SOC strategies, policies, and procedures to enhance the organization's security posture and incident response capabilities. Oversee the monitoring and analysis of security events and incidents, ensuring timely detection, investigation, and response to potential threats or vulnerabilities. Taking a proactive role in utilizing Threat Intelligence and Threat Hunting activities, ensuring the SOC is ahead of potential security threats. Establish and maintain relationships with external partners, vendors, and industry peers to stay updated on emerging threats, best practices, and industry trends. Conduct regular assessments and audits of SOC processes, systems, and controls to identify areas for improvement and ensure compliance with regulatory requirements. Develop and deliver comprehensive reports and metrics on SOC performance, including incident trends, response times, and effectiveness. Stay abreast of the evolving cybersecurity landscape, emerging threats, and industry standards, providing recommendations for proactive security measures and continuous improvement of the SOC. Proven expertise in MDR and Managed SIEM, with a strong preference for experience with Leading Market vendors. Strong networking concepts, including an in-depth understanding of TCP/IP protocols, firewall configuration, network segmentation, VPNs, etc. Strong understanding of Threat Intelligence, Threat Hunting, Vulnerability Management, and risk assessment frameworks. Knowledge and hands-on experience of implementation and management of IDS/IPS, Firewall, VPN, and other security products Experience with Opensource Security Information Event Management (SIEM) tools, creating advance co-relation rules, administration of SIEM, system hardening, and Vulnerability Assessment Strong background and expertise on various security technologies including end point security, perimeter security, Advanced threat protection, Security monitoring and security Certifications: CISSP,CISM, CEH, OSCP, or equivalent are highly desirable., ITIL or equivalent
Posted 2 weeks ago
5.0 - 8.0 years
8 - 13 Lacs
Bengaluru
Work from Office
Role & Responsibilities: Required Skills/qualifications: 5+ years of experience in Network Security experience, Palo Alto, CISCO, ISE etc Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles Hands-on experience with common networking services and protocols (TCP/IP, SSH, FTP, DNS, DHCP, SMTP, SSL, etc.) Experience with maintaining and operating common security technologies (IDS, IPS, Firewalls, Cloud Security, WAF, Endpoint Security, SIEM, etc.) Exceptional organizational abilities and attention to detail The ability to think creatively to find elegant solutions to complex problems Excellent verbal and written communication skills Below cloud skills are expected: o Strong conceptual and hands on knowledge of working in cloud security for any popular public cloud platforms like AWS, GCP, Azure. o Setting up cloud security in AWS, GCP, Azure Network/VPC Design and implementation/configuration Governance around security groups, external IP's, encryption, etc Restrict access to team/function level using least privilege model. o Automation using Terraform/Ansible or other tooling o Expert in troubleshooting and resolving issues related to cloud security o Certification in any Cloud platform would be desirable Preferred Qualifications: 5+ years of experience in Information Security, Security Operations, Incident Response, etc. (or related field) Demonstrated ability to analyze and correlate information from a wide variety of enterprise technologies Demonstrated experience managing firewalls and other security technologies Understanding of common security threats, attack vectors, vulnerabilities and exploits CompTIA Network+/Security+, GIAC (GCIA, GCIH, GSEC, GCFA, GCFE, etc.), CISSP, CEH or related certification(s) desired
Posted 2 weeks ago
15.0 - 20.0 years
17 - 22 Lacs
Mumbai
Work from Office
Customer Delivery Architect - R&S , SDN Solutions (SDA/DNAC, SD-WAN, Meraki) , Catalyst 9000 series, Public cloud solutions (AWS, Azure, GCP) ,Firewalls, IPS, Load Balancers, WAN optimizers , IaaC | 15+ years exp Meet the Team Cisco's Professional Services team helps customers optimize networks and accelerate the adoption of advanced technologies. As part of a global organization, it provides engineering support to ensure high-performance networks for next-gen applications. The CX team is dedicated to delivering a world-class customer experience, solving complex business challenges with network-centric solutions. Their success is reflected in strong financial performance, high customer satisfaction, industry recognition, and employee engagement. Cisco values diversity and is an equal-opportunity employer. Your Impact Cisco is seeking a Solutions Architect for its Enterprise Networking Professional Services team to lead strategic project delivery. This customer-facing role focuses on identifying gaps in customer capabilities, translating them into business requirements, and executing effective solutions across multiple Cisco technologies (SDA/DNAC, SDWAN, Meraki). Key Responsibilities: Design and implement end-to-end solutions that address business challenges. Provide strategic customer guidance to achieve business objectives. Reduce customer risk by refining requirements and ensuring transformation readiness. Manage the project lifecycle from kickoff to implementation. Act as a trusted advisor, guiding customers on technology transitions and Ciscos roadmap. Contribute to solution design, engineering engagement, intellectual capital, and talent development. Mentor engineers, share technical expertise, and create training content. Identify upsell opportunities and advise on renewals. Promote automation and efficiency in service delivery. Collaborate with internal teams, customers, and partners to enhance Ciscos success. Drive innovation and contribute to Ciscos intellectual property. Minimum Qualifications Bachelors degree (or equivalent) with 15+ years of experience in similar roles. Expertise in Cisco Routers, Switches, SDN Solutions (SDA/DNAC, SD-WAN, Meraki). Strong background in Enterprise Networking design, including Catalyst 9000 series, SDN architectures and ASR platforms. Familiarity with public cloud solutions (AWS, Azure, GCP) and integration with SDN solutions. Knowledge of network services appliances (Firewalls, IPS, Load Balancers, WAN optimizers). Proficiency in Infrastructure-as-Code tools like Ansible, Terraform, CloudFormation. Preferred Qualifications Preferred CCIE certification; additional experience with Containers, Ansible, Python, CI/CD, and Cloud providers is a plus
Posted 2 weeks ago
2.0 - 6.0 years
4 - 8 Lacs
Chennai
Work from Office
Responsibilities > Work in 24x7 environment >Support Cisco Unified Communications (UC) platforms, including Cisco Unified Communications Manager (CUCM), Cisco Unity Connection (CUC), Expressway C & E, and Cisco Unified Border Element (CUBE), ensuring high availability and seamless call control across enterprise networks. >Manage Webex Calling Multi-Tenant environments via Webex Control Hub, including number management, location-based routing, PSTN integration (via Local Gateway/CUBE), and emergency call configurations. Support operations on User provisioning, features like hunt group, Auto attendant, and shared lines Configure SIP endpoints and trunks on Cisco CUBE, CUCM, Webex Calling, and AudioCodes SBCs for seamless interoperability with service providers and cloud communication platforms. Develop and maintain Webex API integrations using Cisco Webex REST APIs to automate user provisioning, de-provisioning, and system monitoring. Utilize tools like Postman and Webex Integration Guides for testing and documentation. Troubleshoot call quality issues including echo, jitter, and media path inconsistencies using tools such as syslog, CDRs, and SIP debuggers. Support AudioCodes Mediant SBCs (500, 800, VE, etc.) in enterprise and hybrid environments, including secure configuration for SIP trunking, routing policies, and media negotiation. KPI Reporting preparation and publishing to stakeholders Define Work procedure documentation to keep the day to day activities on live Work for continuous improvement to meet customer expectations. Experience / knowledge 2 to 6 Years of experience Deploy, configure, and support Cisco Unified Communications platforms, including: Cisco Unified Communications Manager (CUCM), CUC, Expressway C & E, CUBE Experience with Webex Calling Multi-Tenant provisioning, number management, and dial plan configuration via Webex Control Hub. Knowledge of location-based call routing, PSTN connectivity (Local Gateway/CUBE), and emergency call routing setup. Proficient in managing user provisioning, calling behavior, hunt groups, auto-attendants, and shared line appearance. Familiarity with analytics & reporting tools within Webex Control Hub for call usage and troubleshooting. Experience with configuring SIP on Cisco CUBE, CUCM, Webex Calling, and AudioCodes SBC Strong understanding of SIP signaling, call setup/teardown, and call flow analysis. Experience working with Cisco Webex REST APIs for automating user provisioning, deletion Knowledge of Webex Integration Guides, Postman, and API documentation tools Experience with AudioCodes Mediant SBCs (500, 800, VE, etc.) in enterprise Ability to integrate AudioCodes SBC with cloud UC platforms like Webex Calling Hands-on with call quality troubleshooting, echo, jitter, and media path diagnostics Experience deploying and managing AudioCodes Virtual Edition SBCs (VE) on AWS EC2 instances. Knowledge of VPC, security groups, Elastic IPs, NAT gateways, and load balancers for VoIP infrastructure. Strong understanding of DMZ network architecture and its role in UC and SBC deployments
Posted 2 weeks ago
7.0 - 12.0 years
20 - 25 Lacs
Pune
Work from Office
Pune Qualifications Bachelor s degree in computer science, Information Security, or a related field. Advanced degrees or relevant certifications (e.g., CISSP, CISM, CEH) are preferred. Minimum of 7-12 years of experience in cybersecurity, with at least 3 years in a managerial role within an MSSP or similar environment. Deep knowledge of cybersecurity principles, threat detection, vulnerability management, and incident response. Familiarity with security technologies (e.g., SIEM, SOAR IDS/IPS, firewalls) is essential. At least one offensive security certification such as OSCP, OSCE, GPEN, or equivalent Microscan Communications private limited is looking for a seasoned MSSP Cybersecurity Manager to lead and manage our cybersecurity operations and services. The ideal candidate will have a strong background in cybersecurity, experience in a Managed Security Service Provider (MSSP) environment, and a proven ability to manage a team, implement security strategies, and deliver exceptional service to clients. The candidate must have very good exposure in red team auditing will act as Subject matter expert in managing VAPT and Red team / blue team services involves designing, implementing, and conducting red team operations and emulating threat actor tactics, techniques, and procedures. Identify and exploit vulnerabilities, assess security postures, and provide actionable insights to customers. Support Business teams by hand holding customers queries and providing right fit solutions. Responsibilities Oversee the design, implementation, and management of security solutions for clients. Ensure that security measures are effective and aligned with industry standards and best practices. Lead the incident response process, including detection, analysis, containment, eradication, and recovery. Ensure timely and effective resolution of security incidents. Manage, mentor, and develop a team of cybersecurity professionals. Promote a culture of continuous learning and improvement within the team. Serve as a key point of contact for client engagements related to cybersecurity services. Provide regular updates, insights, and recommendations to clients on their security posture. Develop and execute cybersecurity strategies that align with client needs and organizational goals. Evaluate and enhance existing security frameworks and processes. Ensure that cybersecurity operations comply with relevant regulations and standards. Prepare and present comprehensive security reports to clients and internal stakeholders. Stay updated on emerging threats, vulnerabilities, and cybersecurity trends. Integrate threat intelligence into security operations to strengthen defences and response strategies. Work closely with other departments, including IT, risk management, and compliance, to ensure a cohesive approach to security and risk management. Oversee the deployment and management of security tools and technologies. Assess and recommend new solutions to enhance security capabilities. Develop and execute complex attack scenarios and simulations to emulate real-world threats and test the robustness of our cybersecurity measures Collaborate with Customers Internal teams to analyse security findings, prioritize remediation efforts, and recommend effective mitigation strategies Create detailed reports outlining vulnerabilities, exploit techniques, and actionable recommendations for improving security posture Conduct threat hunting and map the attack surface Work with the business to review customer requirements and propose right solution that meets end customer s needs. Research and development of custom tools and malware payloads to support operations Provide technical expertise and guidance on offensive security techniques, tools, and procedures Participate in knowledge-sharing activities, such as training sessions and workshops, to foster continuous learning and skill development within the Security team. Requirements and Skills Experience with various SOC platforms and tools (e.g., Splunk, ArcSight, QRadar, Securonix). Familiarity with compliance frameworks such as GDPR, HIPAA, or PCI-DSS. Experience in offensive security roles, including penetration testing, red/purple teaming, and ethical hacking Strong knowledge of network, operating system, cloud, and web application security architecture Proficiency in using offensive security tools such as Metasploit, Burp Suite, Nmap, Nuclei, and Kali Linux Experience with command and control (C2) frameworks such as Cobalt Strike, Sliver, or Mythic Well-versed in at least one scripting or programming language such as Python, C++, C#, Java, Go, PowerShell Experience in creating custom tools and payloads that can evade defensive products In-depth understanding of attack vectors, exploit techniques, and vulnerability assessment methodologies, with experience in applying MITRE ATT&CK Excellent analytical skills with the ability to assess complex systems and identify security gaps Strong leadership and team management skills. Proven ability to lead and develop a high-performing team. Excellent verbal and written communication skills. Ability to articulate complex security concepts to both technical and non-technical audiences. Strong problem-solving abilities and a strategic mindset. Capable of making data-driven decisions and providing actionable insights. How to Apply ? Please read all job details clearly and apply exactly as mentioned below only if you meet eligibility criteria.
Posted 2 weeks ago
5.0 - 10.0 years
10 - 11 Lacs
Pune
Work from Office
Job Description Introduction: Digital Transformation Solutions (DTS) We re a global, multi-disciplinary team that s putting the innovative power of technology to work and transforming tomorrow. As a member of HARMAN Lifestyle, you connect consumers with the power of superior sound. Contribute your talents to high-end, esteemed brands like JBL, Mark Levinson, and Revel Unite your passion for audio innovation with high-tech product development Create pitch-perfect, cutting-edge technology that elevates the listening experience About the Role The person will be responsible for the end-to-end technical support for Network security. What You Will Do Expert-level technical support for network security products. Handling customer technical escalations. Troubleshooting, diagnosing, and resolving technical customer issues. Recreating, tracking, and verifying software defects in the field or under lab conditions reported by customers. Authoring technical knowledge base articles for other technical support personnel and/or customers and partners. What You Need to Be Successful Advanced Networking Skills - Detailed understanding of the protocols surrounding IP service provider networks. Strong network security skills required. Networking skills should include: a. TCP/IP fundamentals b. IP subnetting and supernetting and hierarchical routing principles c. Routing protocol operation (BGP) d. Routing policies at BGP peering points e. VPNs and the associated tunneling technologies (GRE/IP. L2TP, MPLS, etc.) f. Hands-on configuration and operational knowledge of Cisco and Juniper routers g. Hands-on Understanding and knowledge of Netflow, SNMP Security skills - DDOS, IPS, IDS, Threat detection and mitigation Operating systems - Basic to Intermediate knowledge of Linux Database: Basic to Intermediate knowledge of database - postgres, sqlite Good to have: Scripting - shell and/or high level languages (Python, Perl, Php) Bonus Points if You Have Bachelor s degree required. Customer focused candidate, strong attention to detail, ability to establish and maintain strong working relationships with key internal and customer personnel to work effectively. Outstanding customer service and advanced written and verbal communications skills. What Makes You Eligible Work Mode: Hybrid Work location: Bangalore. What We Offer Flexible work environment, allowing for full-time remote work globally for positions that can be performed outside a HARMAN or customer location Access to employee discounts on world-class Harman and Samsung products (JBL, HARMAN Kardon, AKG, etc.) Extensive training opportunities through our own HARMAN University Competitive wellness benefits Tuition reimbursement Be Brilliant employee recognition and rewards program An inclusive and diverse work environment that fosters and encourages professional and personal development
Posted 2 weeks ago
5.0 - 6.0 years
7 - 11 Lacs
Pune
Work from Office
Requirements: Configure, manage, and troubleshoot Checkpoint Firewall and security policies Implement and maintain network security solutions including firewalls, VPNs, IDS/IPS, and endpoint security Perform regular security assessments and ensure compliance with best practices Monitor network performance, identify vulnerabilities, and deploy necessary security patches or updates Provide technical support and incident response for security-related issues Collaborate with IT and security teams to enhance network security posture Document network security configurations, policies, and procedures Stay updated with emerging security threats and industry trends Experience: 5 to 6 years of experience in network engineering Proven expertise in configuring and managing Check Point and Fortinet firewalls Hands-on experience with Cisco networking (routers, switches, and firewalls) Technical Skills: Proficiency in network protocols and technologies (e.g. TCP/IP, MPLS, VPN) Knowledge of routing and switching protocols (e.g. OSPF, BGP, EIGRP) Familiarity with network monitoring tools and techniques Understanding of SD-WAN and cloud networking (AWS, Azure, or GCP) Certifications (Good to have): Check Point Certified Security Expert (CCSE) or equivalent Fortinet Network Security Expert (NSE 4 or higher) Cisco Certified Network Professional (CCNP) or higher
Posted 2 weeks ago
8.0 - 10.0 years
35 - 40 Lacs
Bengaluru
Work from Office
Apply now Apply now Apply Now Start applying with LinkedIn Start Please wait... Technical Lead GRC & Authorizations Date: May 27, 2025 Location: Bangalore, IN Company: Bekaert NV Be part of something bigger! As the world and the way people live is changing, we at Bekaert believe it s our responsibility to contribute to finding new solutions for the future. With a 140+ year old heritage of excellence, innovation, and a future-focused mindset, we strive to create value for our customers and society. We aim to do this through innovative solutions and sustainable practices. We are committed to pushing the boundaries of steel wire transformation and coatings whilst also leveraging our expertise to develop innovative solutions with new materials and services in a safe, smart, and sustainable way. Our focus extends to markets such as new mobility, low-carbon construction, and green energy. As a dynamic and growing company with over 24 000 employees worldwide, 75 nationalities, a retention rate above 90% and almost 5.3 billion in combined revenue in 2023, we are looking for someone like you to join our team as we continue to shape a safer, more efficient, and connected world! Purpose of the Role Bekaert organization is continuously considering application security as a priority. You will join us as Technical Lead GRC & Authorizations to provide technical expertise in design and practices related to the SAP GRC & Authorizations within the enterprise. As Technical Lead GRC & Authorizations you will work along with GRC Architect to define the architecture guidelines, standards and solutions that support the business strategy, business outcomes and needs. And to ensure SAP systems are secured with appropriate user level authorizations. Roles and Responsibilities You will work closely with Solution Architects in designing, implementing and sustaining SAP security solutions, including how to handle security risks in new technology, e.g. S/4 HANA, SAAS, SAC, SuccessFactors etc. You would be required to provide technical expertise in different area ranging from audits, advisory work, roll-out of SAP authorisations. You will work closely with Development and Functional team to review the custom code from security perspective. You will troubleshoot, provide your expertise, and participate in the daily operational activities of the GRC & authorizations team. You will coordinate and work together with partner resources to deliver the security elements of enhancements and upgrades with accountability for clearing roadblocks and ensuring timely and quality delivery of security requirements. You will resolve customer complaints/technical issues in collaboration with support team. You will assist in management of technical changes through the landscape, responsibility for quality and assurance that control points are satisfied. You will work closely with Internal Controls team in ensuring adherence of compliance protocols for all kind of SAP Security and GRC related tasks. And will assist them during audits, UAR and other routine Internal Controls tasks. Essential skills & competencies Bachelors degree in computer science, information-technology, system analysis or a related study, or equivalent experience 8-10 years of overall experience in SAP Security & GRC, minimum 3+ years of experience in security design. Expertise in security configuration, processes, and standard methodologies in ERP systems. SAP ECC, SAP S/4 Hana, Fiori, GRC AC 12.0 are strongly preferred. Experience in GRC 12.0 Access request management, Access risk review, Emergency access management, Business role management and User access review are preferred. Good understanding of SOD, mitigation, and remediation concept. Analyse, understand, and improve tools and processes to enhance the effectiveness and efficiency of implementing GRC & Authorizations. Familiar with different compliance requirements such as SoX, GDPR and ITGC. SAP S/4 Hana certification in security and knowledge of BTP, IAS , IPS and IAG, setup will be considered a plus. Experienced in leading a team and coordinating with multiple stakeholders for smooth operations and enhancements . Be bold and take the leap! Our Digital Advanced Solutions (ADS) team is a dynamic group of technologists from around the globe who consistently push boundaries in digital innovation, cyber resilience, data science, intelligent automation, cloud solutions, and new agile methodologies. It is also good to know tht at Bekaert, we celebrate diversity and are committed to creating an inclusive work environment. We do not discriminate based on race, religion, color, national origin, sex, gender, gender expression, sexual orientation, age, marital status, veteran status, or disability status. Want to learn more about our digital opportunities? Visit Bekaert Careers Job Segment: Sustainability, Environmental Engineering, Computer Science, Developer, Energy, Customer Service, Engineering, Technology Apply now
Posted 2 weeks ago
1.0 - 4.0 years
3 - 6 Lacs
Bengaluru
Work from Office
Nexthink is looking for a Lead Site Reliability Engineer who is passionate about building and running a high-performance cloud platform and enabling best-in-class site reliability and operations practices. This role will support Nexthink operations globally. The candidate will drive the development of modern, cloud-native SRE processes and the management and operations for Nexthink s multi-tenant, microservices-based cloud platform. The platform has multiple instances deployed across the globe. This role involves working closely with cross-functional teams to integrate reliability and security into our systems, ensuring they meet standards. The ideal candidate will have extensive experience in both software engineering and systems administration, with a strong understanding of SRE concepts, requirements and security practices. Leadership and Team Management: Lead, mentor, and develop a team of India-based Site Reliability Engineers. Foster a culture of continuous improvement, collaboration, and innovation. Infrastructure Management: Oversee the design, deployment, and management of scalable and secure cloud infrastructure. Drive automation of infrastructure provisioning, configuration, and management using Infrastructure as Code (IaC) tools. Monitoring and Performance: Develop and maintain comprehensive monitoring, logging, and alerting systems to ensure high availability and performance. Lead efforts in performance tuning and optimization for applications and infrastructure. Security and Compliance: Ensure implementation and maintenance of security controls and best practices to achieve compliance with standards and certifications. Conduct and oversee regular security assessments, vulnerability scans, and penetration testing. Collaborate with the compliance team to prepare for and respond to audits. Incident Management: Lead incident management efforts, ensuring rapid resolution and thorough root cause analysis. Develop and implement strategies for improving incident response and minimizing downtime. Collaboration and Communication: Work closely with development, operations, and security teams to integrate reliability and security into the software development lifecycle. Communicate effectively with stakeholders, providing regular updates on system performance, reliability, and compliance status. Bachelor s degree in Computer Science, Engineering, or a related field (or equivalent experience). 5+ years of experience in site reliability engineering, DevOps, or a related role, with at least 2 years in a leadership position.
Posted 2 weeks ago
7.0 - 12.0 years
9 - 14 Lacs
Bengaluru
Work from Office
THE ROLE: We are looking for an adaptive, self-motivative Physical Design Engineer to join our growing team. As a key contributor, you will be part of a leading team to drive and improve AMDs abilities to deliver the highest quality, industry-leading products to market. The Physical Design team furthers and encourages continuous technical innovation to showcase successes as well as facilitate continuous career development. THE PERSON: You are a team player who has excellent communication skills and experience collaborating with other engineers located in different sites/timezones. You have strong analytical and problem-solving skills and are willing to learn and ready to take on problems. KEY RESPONSIBILITIES: Physical Design Closure of critical partitions in complex IPs PREFERRED EXPERIENCE: 7+ years of expereince in Physical Design Should have done partition closure in at least 3-4 tapeouts Should have exposure to one of signoff verification flows ACADEMIC CREDENTIALS: Bachelors or Masters degree in computer engineering/Electrical Engineering /Electronics Engineering #LI-SR5 Benefits offered are described: AMD benefits at a glance .
Posted 2 weeks ago
5.0 - 10.0 years
20 - 27 Lacs
Hosur, Bengaluru
Work from Office
Roles Responsibilities : Bosch Software and Digital Solutions is a leading systems integrator and solution provider for technology led business transformation. It is the systems integration arm of Bosch Global and is headquartered in Bangalore. The Chief AI Officer (CAIO) will be responsible for developing and articulating a clear AI vision for SDS and overseeing, implementing and governing SDS AI strategy that aligns with business goals. The CAIO will also oversee the development of innovative AI and Gen AI solutions/offerings for further transforming SDS s offerings portfolio and to support SDS customers with their AI journeys. The CAIO will lead Bosch SDS s AI-first approach and align SDS portfolio offerings to the rapidly evolving needs of our customers. Key Responsibilities: 1. Strategic AI Vision and Roadmap Develops and articulate a clear AI vision that aligns with SDS s short, medium and long-term goals. Creates an AI roadmap that outlines short-term and long-term initiatives. Identifies vital areas where AI can drive business growth and efficiency. 2. AI Strategic Leadership Develop and drive SDS AI strategy to align with organizations broader transformation roadmap and business goals. Define overall AI GTM and growth strategy in conjunction with business leaders. 3. AI Product and Solution Development Analyze emerging trends to create AI products/accelerators, frameworks and capabilities in key areas such as predictive analytics, NLP, Computer vision, generative AI, agentic AI, and automation. Define guidelines for AI model development for customers, ensuring ethical, transparent, and responsible AI Use Conceptualize the blueprint of asset to-be developed and collaborate with technical team to execute and implement the same. Co-lead initiatives like hackathons, workshops, and other events to encourage innovation and cross sharing of ideas. 4. AI Strategy Consulting and Advisory Lead customer discussions to understand their existing problem statements and business challenges and assess their existing AI maturity. Define target AI Reference architecture, use case discovery, business case and implementation approach for AI initiatives. Define consulting approach and frameworks and develop AI Consulting proposals, bid defense, and help in acquisition. Manage/Lead AI consulting engagement to define AI strategy, roadmap, and execution plans aligned with business objectives. 5. AI Implementation Oversee the implementation of AI projects for customers, which includes Design and deployment of AI-powered solutions, including machine learning (ML), generative AI, computer vision, NLP, and generative AI solutions for customers. Identify emerging AI trends and technologies to create competitive, scalable offerings. Leverage the existing code base/solutions to ideate and create re-usable assets/IPs. 6. AI Team leadership and Talent Development Build and Lead cross-functional AI teams (Data Scientists, ML Engineers, AI researchers, Gen AI developers, Product Managers, etc. ) Foster a culture of continuous learning, innovation, and collaboration. Establish AI training and upskilling programs for employees.
Posted 2 weeks ago
5.0 - 10.0 years
10 - 18 Lacs
Mumbai
Work from Office
Offsite technical implementation, installation, and configuration of hardware Fortinet, Checkpoint ,cisco FTD Firewalls, IPS Router NAT configuration on firewall. vulnerabilities User Account Management Incident& Problem Management
Posted 2 weeks ago
15.0 - 20.0 years
20 - 25 Lacs
Bengaluru
Work from Office
Data Center Engineering Business Unit closely collaborates with strategic customers in the development of advanced and highly complex SoCs, from architecture and design all the way through layout, packaging, prototype validation and production ramp up. This group provides technology development, EDA/methodology development and IP/Chip design development. India DFT team is a key part of Global DFT community with global ownership and responsibility for delivering generic and more advanced custom DFT architecture solutions, methodology and design. You will be working with this team to directly enable customer DFT requirements for Custom and Compute Businesses. What You Can Expect The position is for a Techno-Managerial role who will be responsible for Managing a team of skilled DFT-engineers who work on implementing DFT / Test on complex IP and SOC for multiple Custom/Compute ASIC/SoC designs. The management responsibilities include but not limited to handling career-development, mentoring and monitoring project execution. As a senior technical leader, the role also involves driving end to end DFT-execution on SoCs and Subsystems, Implementation of various DFT/DFX features, Validation , IP-DFT, STA, pattern generation & Post-Silicon Bringup and Debug for various designs/IPs in Custom/Compute space. The position also involves definition and enhancement of DFT methodologies and tools to be able to benchmark them and enable new methodologies in the domain of DFT/Test. What Were Looking For Bachelor s degree in Computer Science, Electrical Engineering or related fields and 15+ years of related professional experience. Master s degree and/or PhD in Computer Science, Electrical Engineering or related fields with 13+ years of experience. Management experience - Must have directly managed small sized teams , members HandsOn Working experience in various stages of DFT-Execution SCAN-Insertion / MBIST / ATPG / Validation / STA / IP-DFX / Post-Silicon Bringup/Debug Strong fundamentals in Digital Circuit Design and Logic Design is required Understanding of DFT Flows and Methodologies and Experience with Cadence/Mentor/Synopsys Tool set (Genus, Modus, NCSim / DC, Tessent, Spyglass/Tmax) Prior experience in Custom-ASIC design is a plus Scripting skills using PERL, Tcl and C-Shell is plus
Posted 2 weeks ago
5.0 - 10.0 years
7 - 12 Lacs
Mumbai
Work from Office
Innovation is our driving force towards your success Description of the role: The Security Monitoring Analyst is responsible for manning the India SOC for our client based in the US. The key responsibilities include: Handling of all alerts SIEM, IPS/IDS solutions, EDR the Resource is expected to monitor, investigate, respond, and resolve these alerts. Resolving general support requests device control, URL whitelisting, lockouts, etc. Completion of daily checklists as well as preparation and sending of daily reports. Monitor patching status and respond to patch failures by either redeploying the patch manually or escalating to the relevant teams. Monitor Vulnerability scans, review the reports, and parse through these to remove false alarms. Document the response and resolution of alerts and tickets. Creating exclusions/Detection lists to reduce false alarms. Key requirements: The individual is expected to be a graduate (Engineering preferred). CompTIA / CySA+ / equivalent preferred. Ability to think logically, understand and apply learning into practice 2.5+ years of experience in IT security monitoring. Experience working with intrusion detection/prevention systems is a must. Experience in Darktrace would be preferred. Experience working with a SIEM tool is a must. Experience in patch management and IBM BigFix would be an advantage. Experience with vulnerability scanners and their reporting management would be beneficial. Excellent verbal and written English is mandatory. The candidates will be communicating with users based in the US and must communicate effectively. Hours of operation : Rotational shifts shift 7am 3pm / 3pm 11pm / 11pm to 7am. Description of the role: The Security Monitoring Associate is responsible for monitoring security and patching alerts for our clients based in the US. This primarily includes alerts being received on the SIEM tool (Rapid 7 Insight IDR) and also on two different IPS/IDS solutions (SecureWorks and Darktrace) the resource is expected to monitor, investigate and respond to these alerts. Patching of all Windows based systems is carried out on a monthly/quarterly basis using IBM BigFix. The resource is expected to monitor the patching status, respond to patch failures by either redeploying the patch or escalating to the relevant teams. The resource is also expected to review vulnerability reports and parse through these to remove false alarms. Position location: Mumbai Andheri (E). Hours of operation: Rotational shifts shift 7am -3pm/3pm -11pm/11pm to 7am. Salary: INR 4.5L 6L p.a. Key requirements: The individual is expected to be a graduate, any discipline. 2-3 years of experience in IT security monitoring. Experience in working with Intrusion Detection/Prevention Systems is a must. Experience in Secureworks/Darktrace would be preferred. Experience in working with a SIEM tool is must. Experience in patch management and IBM BigFix would be an advantage. Experience with vulnerability scanners and their reporting management would be beneficial. Excellent verbal and written English is a must. The candidates will be communicating with users based in the US and must be able to communicate effectively. The individual will be on the rolls of Interspence Solutions LLP (a Mumbai-based IT company) and will be working to support a leading US based Oil & Gas company. About Company: Interspence Solutions (www.interspence.com) was established in August 2017 and is a company that provides IT consulting and support services within the manufacturing and process industry. Interspence has entered into a long term contract with an Major US based Oil & Gas company to provide skilled IT resources on a T&M basis working under the direction of the their IT leadership team. The company is transforming its business on the back of heavy investments in technology around real time data capture, Big Data platforms, in-memory databases and analytical engines and elastic search services. There is also a significant push towards mobility with majority of the applications being converted into mobile apps. The company is also looking at moving towards DevOps in the near future. With this significant push within the IT space, there is an increasing for skilled and talented resources. Towards this end, we are searching for talented and smart resources who wish to learn and grow their skills working with a company that is defining the art of the possible with the latest technology. Apply for this position Allowed Type(s): .pdf, .doc, .docx By using this form you agree with the storage and handling of your data by this website. *
Posted 2 weeks ago
4.0 - 9.0 years
3 - 7 Lacs
Mumbai
Work from Office
Innovation is our driving force towards your success About Company: No. Of Position : 1 The key responsibilities include: Provide operational support to the team, including handling meetings and taking minutes. Ensure the operational delivery as per the quality criteria and maintaining client satisfaction. Liaise with internal/external clients to ensure client satisfaction. Maintain time sheets, compilation of data and update the activity list weekly for relevant stakeholders. Provide documentation and presentation support to relevant stakeholders as required. Prepare weekly reports and assist with operational resources if required. Assist with activity planning and maintain the activity calendar. Assist with queries and operational monitoring. Perform any other miscellaneous activity as required. Knowledge and Attributes: Ability to work with diverse personalities and demonstrate a high level of performance. Proactive in approach and meticulous attention to detail. Excellent communication is essential for coordinating with team members and stakeholders. Service-oriented aptitude. Understanding of IT processes, structure, and control requirements. Confident and resilient individual who is organized and outcomes-focused. Ability to provide support with limited guidance for projects. Ability to keep on track and meet deadlines. Ability to address any challenges that arise during project execution. Qualification : Any Degree/BBA/BMS/Bachelor in Project Management/MBA. Work Time : 11 am to 7 pm OR 2 pm to 10 pm. Work Schedule : Hybrid (3 days work from office). Work location : Andheri East. Required Experience : 2 4yrs Description of the role: The Security Monitoring Associate is responsible for monitoring security and patching alerts for our clients based in the US. This primarily includes alerts being received on the SIEM tool (Rapid 7 Insight IDR) and also on two different IPS/IDS solutions (SecureWorks and Darktrace) the resource is expected to monitor, investigate and respond to these alerts. Patching of all Windows based systems is carried out on a monthly/quarterly basis using IBM BigFix. The resource is expected to monitor the patching status, respond to patch failures by either redeploying the patch or escalating to the relevant teams. The resource is also expected to review vulnerability reports and parse through these to remove false alarms. Position location: Mumbai Andheri (E). Hours of operation: Rotational shifts shift 7am -3pm/3pm -11pm/11pm to 7am. Salary: INR 4.5L 6L p.a. Key requirements: The individual is expected to be a graduate, any discipline. 2-3 years of experience in IT security monitoring. Experience in working with Intrusion Detection/Prevention Systems is a must. Experience in Secureworks/Darktrace would be preferred. Experience in working with a SIEM tool is must. Experience in patch management and IBM BigFix would be an advantage. Experience with vulnerability scanners and their reporting management would be beneficial. Excellent verbal and written English is a must. The candidates will be communicating with users based in the US and must be able to communicate effectively. The individual will be on the rolls of Interspence Solutions LLP (a Mumbai-based IT company) and will be working to support a leading US based Oil & Gas company.
Posted 2 weeks ago
2.0 - 3.0 years
2 - 6 Lacs
Mumbai
Work from Office
Innovation is our driving force towards your success About Company: Role Overview : The Patch Management Specialist will be responsible for ensuring 100% patch compliance across all servers and workstations (Windows ONLY). This role involves managing the BigFix console for administration, coordinating patch deployments, and maintaining system security and performance. Location : Remote (Preferred Mumbai/Pune) Time : 7 pm to 3 am OR 8 pm to 4 am Work Hours : 5 days a week with a Saturday and Sunday of key responsibilities : Patch Compliance : Ensure 100% patch compliance across all EOG servers and workstations (Windows ONLY). BigFix Console Management : Administer and manage the BigFix console to deploy patches and updates effectively. Coordination and Scheduling : Collaborate with various IT teams to schedule and coordinate patch deployments, minimizing system downtime. Issue Resolution : Address and resolve any issues arising from patch deployments and update failures. Documentation : Maintain and update patch management documentation, including deployment schedules, compliance reports, and issue logs. Reporting : Provide regular reports on patch management activities, system compliance, and performance metrics. Audits : Conduct regular audits of patch levels and system statuses to ensure ongoing compliance and security. Key Requirements: Experience : Proven experience in patch management, particularly with Windows servers and workstations. Technical Skills : Proficiency in using patch management tools such as BigFix, SCCM, WSUS, or equivalent. Communication Skills : Excellent verbal and written communication skills to effectively coordinate with various teams and stakeholders. Problem-Solving : Strong analytical and problem-solving skills to address issues promptly and efficiently. Attention to Detail : High attention to detail to ensure accurate documentation and compliance reporting. Team Collaboration : Ability to work collaboratively within the RRT and other IT teams to achieve patch management goals. Preferred Qualifications: Certifications : Relevant certifications in patch management, system administration, or IT security. Experience with BigFix : Specific experience in administering and managing the BigFix console. Shift Flexibility : Willingness to work in shifts, including rotational shifts if required. This role is crucial for maintaining the security and efficiency of the organization s IT infrastructure by ensuring that all systems are up-to-date and secure. If you have any further questions or need additional details, feel free to ask! Description of the role: The Security Monitoring Associate is responsible for monitoring security and patching alerts for our clients based in the US. This primarily includes alerts being received on the SIEM tool (Rapid 7 Insight IDR) and also on two different IPS/IDS solutions (SecureWorks and Darktrace) the resource is expected to monitor, investigate and respond to these alerts. Patching of all Windows based systems is carried out on a monthly/quarterly basis using IBM BigFix. The resource is expected to monitor the patching status, respond to patch failures by either redeploying the patch or escalating to the relevant teams. The resource is also expected to review vulnerability reports and parse through these to remove false alarms. Position location: Mumbai Andheri (E). Hours of operation: Rotational shifts shift 7am -3pm/3pm -11pm/11pm to 7am. Salary: INR 4.5L 6L p.a. Key requirements: The individual is expected to be a graduate, any discipline. 2-3 years of experience in IT security monitoring. Experience in working with Intrusion Detection/Prevention Systems is a must. Experience in Secureworks/Darktrace would be preferred. Experience in working with a SIEM tool is must. Experience in patch management and IBM BigFix would be an advantage. Experience with vulnerability scanners and their reporting management would be beneficial. Excellent verbal and written English is a must. The candidates will be communicating with users based in the US and must be able to communicate effectively. The individual will be on the rolls of Interspence Solutions LLP (a Mumbai-based IT company) and will be working to support a leading US based Oil & Gas company. About Company: Interspence Solutions (www.interspence.com) was established in August 2017 and is a company that provides IT consulting and support services within the manufacturing and process industry. Interspence has entered into a long term contract with an Major US based Oil & Gas company to provide skilled IT resources on a T&M basis working under the direction of the their IT leadership team. The company is transforming its business on the back of heavy investments in technology around real time data capture, Big Data platforms, in-memory databases and analytical engines and elastic search services. There is also a significant push towards mobility with majority of the applications being converted into mobile apps. The company is also looking at moving towards DevOps in the near future. With this significant push within the IT space, there is an increasing for skilled and talented resources. Towards this end, we are searching for talented and smart resources who wish to learn and grow their skills working with a company that is defining the art of the possible with the latest technology. Job Type: Full Time Job Location: Mumbai Apply for this position Allowed Type(s): .pdf, .doc, .docx By using this form you agree with the storage and handling of your data by this website. *
Posted 2 weeks ago
0.0 - 1.0 years
0 Lacs
Sahibzada Ajit Singh Nagar
Work from Office
What is a SOC analyst? SOC analysts can be understood as the first point of contact to any incident/threat in basic terms. SOC stands for Security Operations Center, and it consists of multiple analysts who work 24x7 rotational shifts to fight against threats that could harm an organization. A SOC analyst generally is responsible for assessing the endpoints and look for vulnerabilities using various tools and technologies. However, the role of a SOC analyst is not limited to this: SOC Analyst Job Duties and Responsibilities: Evaluate critical security incidents using detection tools. Investigate event alerts and logs from multiple endpoints. Analyze and co-relate logs from the firewall, IDS/IPS, AVs, O365, etc. Work in a 24x7 pro-active environment and respond to security alerts. Document and report incidents/offenses to the clients. Use Endpoint detection tools to detect malware across the client s environment. Maintain and send monthly, weekly reports and other client-specific documentation. Work on industry standard SIEM solutions to analyze incidents and create complex indexed searches. Using analytical skills to whitelist False Positives incidents. Keep yourself updated on security news/vulnerabilities and compose a set of Use Cases. Use basic scripting knowledge to automate processes. Onboarding new clients from scratch and configuring their network environment. Identifying compromised Endpoints by analyzing payloads/logs and notifying clients. Work on latest security technologies, including Email filtering, Compliance and Patch management, Syslog management, MDR, and SIEM.
Posted 2 weeks ago
4.0 - 7.0 years
4 - 7 Lacs
Pune
Work from Office
About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. About the Role We are seeking a skilled Senior Security Analyst to join our SOC team. The ideal candidate will have a strong background in SOC operation and ensure that the SOC team is performing its functions as required and to trouble shoot incidents and events. As a Senior Security Analyst shall also act as the technical SME, and handle critical SOC task, Incident, guiding Level 1 and Level 2, customer communications. Key Roles & Responsibilities: Incident Response and Management Lead the investigation of high-severity security incidents and breaches. Provide expert analysis for complex incidents that L1 and L2 analysts cannot resolve. Develop and execute incident response procedures, including containment, eradication, and recovery. Ensure proper escalation processes are followed for incidents requiring higher expertise. Communicate with stakeholders, such as management and IT teams, to ensure appropriate handling of incidents. Threat Hunting and Analysis Perform proactive threat hunting activities to identify potential vulnerabilities, threats, and attacks before they happen using Splunk / QRadar SIEM. Use threat intelligence feeds to enrich SOC operations and identify emerging threats. Analyze large volumes of security data to detect patterns and anomalies. Security Tool Management Oversee and optimize the usage of security monitoring tools such as Splunk/ QRadar SIEM (Security Information and Event Management), IDS/IPS (Intrusion Detection/Prevention Systems), and endpoint protection systems. Configure, update, and fine-tune security tools to improve detection capabilities and reduce false positives. Recommend new security tools and technologies to improve SOC operations. Log and Event Analysis Review logs from various sources (network, endpoints, servers, etc. ) to identify security incidents. Ensure accurate log data collection and retention practices are followed. Provide in-depth analysis of security alerts and generate reports. Vulnerability Management Conduct vulnerability assessments and prioritize remediation activities for critical vulnerabilities. Collaborate with the IT and development teams to address security flaws and implement patches. Collaboration and Escalation Serve as the point of escalation for L1 and L2 SOC analysts when complex issues arise. Collaborate with other security teams, such as network security, application security, and IT operations, to ensure a comprehensive defense strategy. Work with external partners, including Managed Security Service Providers (MSSPs), to coordinate incident management and threat intelligence sharing. Security Policies and Best Practices Review and recommend improvements to security policies, procedures, and best practices. Ensure that the organizations security policies are being followed and advise on improvements. Conduct regular security awareness training for SOC staff and the broader organization. Reporting and Documentation Generate detailed reports on incidents, security posture, and threats for senior management and relevant stakeholders. Maintain incident logs and documentation to comply with regulatory and internal policies. Ensure all incidents are well-documented with root cause analysis, remediation efforts, and lessons learned. Continuous Improvement Analyze the effectiveness of the SOCs operations and suggest improvements to processes, workflows, and technologies. Stay updated on the latest cyber threats, tools, and techniques. Assist with the development and execution of simulations, exercises, and training to improve SOC capabilities. Compliance and Regulatory Requirements Ensure compliance with SLAs for all projects. Ensure SOC operations meet industry compliance requirements (e. g. , GDPR, HIPAA, PCI DSS). Help in audits and compliance assessments related to security operations. Mentoring and Training Provide mentorship and training to junior SOC analysts (L1 and L2). Share knowledge on advanced attack techniques, response strategies, and threat detection methods. Report deviations and concerns to the SOC Manager Basic Qualifications: B. E/B. Tech in Computer Science, Information Technology, Cybersecurity, or a related field. 5+ year of experience and strong foundational knowledge in security operations, SIEM, or IT security. Basic understanding of cybersecurity concepts, networking fundamentals, and security monitoring. Knowledge of IT infrastructure, networking, and cybersecurity principles. Communicate effectively with customers, teammates, and management Excellent problem-solving skills and attention to detail. Strong communication and interpersonal skills. Preferred Qualifications: Certifications in ECIH/GCIH/CISM/CISSP etc. Splunk Certified candidate Exposure to SIEM solutions, specifically Splunk, Qradar , DNIF or similar platforms. Familiarity with security tools such as EDR, XDR, WAF, DLP, email security gateways, and proxy solutions. Enthusiasm for learning and a strong interest in cybersecurity as a career. Ability to work in a team and adjust to rotational shifts in a high-stakes environment. Knowledge of cloud security and platforms (e. g. , AWS, Azure, GCP) Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you re passionate about technology and eager to make an impact, we d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted.
Posted 2 weeks ago
0.0 years
20 - 25 Lacs
Mumbai, Nagpur, Thane
Work from Office
Key Responsibilities Identity and Access Management (IAM) Design, implement, and manage IAM frameworks, ensuring secure access control across on-premises and cloud environments. Administer user accounts, roles, and permissions following the principle of least privilege. Perform periodic access reviews and audits to ensure compliance with organizational policies. Manage single sign-on (SSO), multi-factor authentication (MFA), and identity federation solutions. Collaborate with application teams to implement secure authentication and authorization protocols. Vulnerability Management Conduct regular vulnerability scans across infrastructure, applications, and endpoints using tools such as Qualys, Nessus, or equivalent. Analyze vulnerability reports, prioritize risks, and coordinate remediation efforts with relevant teams. Maintain and improve patch management processes to address identified vulnerabilities. Monitor and track emerging threats, ensuring timely implementation of mitigation measures. Create and present vulnerability management dashboards and reports for stakeholders. Security Operations Monitor and respond to security incidents, ensuring quick containment and resolution. Configure and manage security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. Conduct root cause analysis for incidents and implement preventive measures. Ensure compliance with security standards such as ISO 27001, NIST, or CIS benchmarks. Develop and update runbooks and incident response procedures. and Governance Work closely with DevOps, infrastructure, and application teams to integrate security best practices. Participate in security assessments, audits, and risk analysis exercises. Support the development and enforcement of security policies and standards. Provide security awareness training to teams and stakeholders. Documentation and Reporting Maintain comprehensive documentation of IAM workflows, security processes, and vulnerability management activities. Provide periodic compliance and risk reports to management and relevant stakeholders. Qualifications and Skills Proven experience in IAM, vulnerability management, and security operations. Strong knowledge of identity management tools and vulnerability scanning tools (e.g., Qualys). Proficiency in configuring and managing security tools such as firewalls, IDS/IPS, and endpoint security solutions. Familiarity with cloud security practices across platforms like AWS, Azure, or Google Cloud. Strong analytical and problem-solving skills with attention to detail. Relevant certifications such as CISSP, CISM, CompTIA Security+, or GIAC are highly desirable. Key Responsibilities Identity and Access Management (IAM) Design, implement, and manage IAM frameworks, ensuring secure access control across on-premises and cloud environments. Administer user accounts, roles, and permissions following the principle of least privilege. Perform periodic access reviews and audits to ensure compliance with organizational policies. Manage single sign-on (SSO), multi-factor authentication (MFA), and identity federation solutions. Collaborate with application teams to implement secure authentication and authorization protocols. Vulnerability Management Conduct regular vulnerability scans across infrastructure, applications, and endpoints using tools such as Qualys, Nessus, or equivalent. Analyze vulnerability reports, prioritize risks, and coordinate remediation efforts with relevant teams. Maintain and improve patch management processes to address identified vulnerabilities. Monitor and track emerging threats, ensuring timely implementation of mitigation measures. Create and present vulnerability management dashboards and reports for stakeholders. Security Operations Monitor and respond to security incidents, ensuring quick containment and resolution. Configure and manage security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. Conduct root cause analysis for incidents and implement preventive measures. Ensure compliance with security standards such as ISO 27001, NIST, or CIS benchmarks. Develop and update runbooks and incident response procedures. and Governance Work closely with DevOps, infrastructure, and application teams to integrate security best practices. Participate in security assessments, audits, and risk analysis exercises. Support the development and enforcement of security policies and standards. Provide security awareness training to teams and stakeholders. Documentation and Reporting Maintain comprehensive documentation of IAM workflows, security processes, and vulnerability management activities. Provide periodic compliance and risk reports to management and relevant stakeholders. Qualifications and Skills Proven experience in IAM, vulnerability management, and security operations. Strong knowledge of identity management tools and vulnerability scanning tools (e.g., Qualys). Proficiency in configuring and managing security tools such as firewalls, IDS/IPS, and endpoint security solutions. Familiarity with cloud security practices across platforms like AWS, Azure, or Google Cloud. Strong analytical and problem-solving skills with attention to detail. Relevant certifications such as CISSP, CISM, CompTIA Security+, or GIAC are highly desirable.
Posted 3 weeks ago
4.0 - 9.0 years
25 - 30 Lacs
Bengaluru
Work from Office
Implement key strategic change initiatives into the countries / region as part of the technology and project capabilitybuild Proven capability to understand and integrate the broader impact of payment systems on overall business objectives and business outcomes Ensure benefits realization from change activities - comparing actual benefits with expected benefits and driving the change to ensure the full extent of the benefits Constantly prioritises tasks and the Team s backlog with the customer at the heart of their decision making and ensures timely implementation. Enhance team culture by contributing to the energy and morale. Promote continuous improvement, open communication, and collaboration to boost team performance and project outcomes. Liaise with Tribe leads and other POs to ensure the squad has the right amount of support required to succeed Ability to galvanise a diverse group of people around a common mission Liaise with appropriate Product Managers, Risk Managers and Senior Management to approve any deviations. Identify trends, risks issues; implement controls; resolve and/or report risks and escalate them as required. Ensure that status of work is communicated effectively to all stakeholders Engage with customer groups to understand both stated and unstated needs and ensure they are represented in thedesign of solutions Provide training to the Operations users on the to-be flows Provide Implementation Support to countries during Warranty period Develop relationships with key stakeholders within Payment Operations, Payments Technology, various Project squads, Wholesale Digital team. What will you bring To grow and be successful in this role, you will ideally bring the following: Extensive years in a banking or financial services role with a focus on payments. Assist with the development of Requirements or Epics, Themes and Features into user stories Experienced in leading cross-functional teams to deliver complex projects on time and within budget, utilizing strong planning, communication, and problem-solving skills Strong knowledge of payments products - ACH, RTGS, RTP and cross border Knowledge of regulations and industry standards Strong understanding of digital channels and host to host integrations from business perspective. Must be a confident user of Jira, Confluence You re not expected to have 100% of these skills. At ANZ a growth mindset is at the heart of our culture, so if you have most of these things in your toolbox, we d love to hear from you.
Posted 3 weeks ago
8.0 - 13.0 years
12 - 20 Lacs
Mumbai
Work from Office
Hiring for MNC •Technically sound and hands-on knowledge to manage and maintain various security products like IPS/IDS, Proxy, Anti-virus, Load Balancer, SSL VPN, URL filtering,2FA, DDoS and Network security. Required Candidate profile Act as a functional Security technologies and Operations & Lead a 24x7 Info Sec team managing tools like EDR/XDR, WAF, DLP, Anti-APT, Anti-DDOS,PAM, SIEM, SOAR etc. deployed for of security monitoring
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2