Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 5.0 years
7 - 8 Lacs
Mumbai
Work from Office
About the Role: Liminal Custody is seeking a Content Writer to lead our content creation efforts. This role is responsible for both developing our content strategy and executing it through hands-on writing and production. The ideal candidate will translate complex topics about digital assets into clear, professional, and engaging content that reinforces our position as a trusted industry leader. Responsibilities: Content Creation: Act as the primary writer for a variety of professional content, including official blog articles, website copy, case studies, reports, and newsletters. Editorial Planning: Develop and manage the companys content calendar to ensure a consistent and timely publication schedule that aligns with business objectives. Content Repurposing: Adapt core content, such as research reports, into various formats including articles, social media updates, and video scripts to maximize reach. Channel Management: Publish and manage content on the companys official channels, including the website blog and professional social media platforms. Quality Assurance: Edit and proofread all content to ensure it meets our standards for accuracy, clarity, and brand consistency . Performance Analysis: Monitor content engagement and use data to inform future content planning and strategy. Vendor Management: Coordinate with external freelance writers or agencies for specialized projects as needed, providing clear direction and feedback. Desired Candidate Profile: Professional Experience: A minimum of 3-5 years of experience in a content writing, corporate communications, or related role. A background in technology, financial services, or digital assets is highly preferred. Proven Writing Ability: Demonstrated experience in writing and editing high-quality content for a business audience. A portfolio of relevant work is required. Project Management Skills: Strong organizational skills with the ability to manage multiple projects and meet deadlines effectively. Adaptability: Ability to write effectively for different formats and audiences, from detailed reports to concise social media updates. Technical Proficiency: Experience with content management systems (e.g., WordPress) and professional social media management tools. Education: A bachelors degree in Marketing, Communications, Journalism, or a related field is preferred. About Liminal : Liminal is a compliant and insured digital asset custody and wallet infrastructure provider. Launched in April 2021, Liminal Custody is a CCSS Level 3, SOC Type 2, and ISO 27001 & 27701 certified organization. Based in Singapore, Liminal has operations spread across APAC, MENA, and Europe, along with offices in Singapore,Taiwan , India, and UAE. The company has received an initial approval from VARA. Liminal takes pride in supporting businesses with its qualified and insured custody (self and institutional) that enables stress-free safekeeping of digital assets for institutions. It also provides a cutting-edge wallet infrastructure platform that is secure, compliant, and automated and comes with a plug-and-play architecture for faster onboarding of developers, business partners, and government agencies. Our website - https://www.liminalcustody. com/
Posted 1 month ago
5.0 - 10.0 years
9 - 13 Lacs
Thiruvananthapuram
Work from Office
Description Key Responsibilities: Advanced incident investigation: Conduct deep-dive investigations into complex security alerts and incidents, correlating events across multiple security tools and logs (SIEM, EDR, network logs, cloud logs). Incident response leadership: Lead containment, eradication, and recovery efforts for security incidents, collaborating with IT, engineering, and other teams. Threat hunting: Proactively search for threats within our environment using threat intelligence, hypotheses, and advanced analytical techniques. Root cause analysis: Perform root cause analysis for security incidents and recommend preventative measures to enhance our defenses. Threat Hunting: Exercises and proactive detection activities. Stay updated on emerging threats, vulnerabilities, attack techniques, and security news Vulnerability Management: Conduct regular vulnerability scans and assessments using industry-standard tools and ASPM. Analyze scan results to identify and classify security vulnerabilities, understanding their potential impact and exploitability. Develop playbooks: Contribute to the creation and refinement of incident response playbooks, runbooks, and standard operating procedures, including SOAR. Security tool optimization: Recommend and assist with the configuration, tuning, and optimization of SIEM rules, EDR policies, and other security controls. Threat intelligence integration: Integrate and operationalize threat intelligence (IOCs) and TTPs to improve detection capabilities and inform proactive defense strategies. Reporting: Generate comprehensive incident reports and provide actionable insights to management. Required Qualifications: Minimum of 5 years of experience in a Security Operations Center (SOC) or a similar cybersecurity role Strong understanding of security frameworks (MITRE ATT&CK, NIST, ISO 27001, etc.) Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel, etc.) Familiarity with EDR solutions (e.g., CrowdStrike, Carbon Black, Defender ATP) Solid knowledge of networking concepts, log analysis, and common attack vectors Experience in the incident response lifecycle, malware analysis, and threat hunting Ability to perform effectively in high-pressure situations and manage multiple incidents simultaneously Bachelor s degree in computer science, Information Security, or a related field (or equivalent experience) Preferred Skills and Certifications: Certifications such as GCIA, GCIH, CEH, CISSP, OSCP , or Security+ Experience with scripting (Python, PowerShell, Bash) for automation and log parsing Knowledge of cloud security monitoring (AWS, Azure, GCP) Experience with SOAR platforms and the automation of incident response workflows
Posted 1 month ago
3.0 - 4.0 years
7 - 8 Lacs
Chennai
Work from Office
Job Description Security Analyst We are seeking an experienced professional with a strong background in internal audits, security metrics, privacy, and business continuity. The ideal candidate should have 2 to 4 years of hands-on experience in information security and a solid understanding of industry standards and best practices. Support the security team with a focus on Privacy, Third-Party Risk Management, Security Certifications, and Business Continuity. Lead the planning and execution of security audits, including ISO 27001, SOC 2, PCI DSS, and HITRUST. Conduct third-party due diligence assessments to evaluate vendor security and compliance posture. Maintain and monitor key performance indicators (KPIs) and security metrics to support data-driven decision-making. Act as the primary point of contact for compliance-related incidents and inquiries; conduct investigations and document findings. Review Service Organization Control (SOC) reports for critical vendors to assess control effectiveness. Perform ad-hoc, customized control risk assessments to evaluate information security and compliance risks. Collaborate with process and control owners to plan, execute, and report on risk assessments, including tracking remediation and mitigation efforts. Work cross-functionally with internal teams (e.g., Legal, Procurement, Compliance, IT Security) to ensure alignment in third-party risk management practices. Candidates with certifications such as ISO 27001, ISO 31000, Security+, or equivalent is highly desirable. B. Tech or equivalent degree in Computer Science, Information Security or related field Excellent communication, presentation and collaboration skills Highly analytical and detail-oriented with a proactive approach to risk and compliance challenges. Ability to navigate complex regulatory landscapes and provide support. Knowledge of NIST CSF, OWASP, MITRE ATT&CK is preferable
Posted 1 month ago
0.0 - 1.0 years
0 Lacs
Bengaluru
Work from Office
About the Role: The internship is designed to provide a comprehensive understanding of social media marketing within the fast-paced and nuanced cryptocurrency industry. The successful candidate will be instrumental in executing our social media strategy across key platforms, with a strong emphasis on content creation, community engagement, and performance analysis. Key Responsibilities: Content Creation & Curation: Develop and schedule engaging and informative content for Liminal Custodys social media channels, including Twitter (X), LinkedIn, and our company blog. Translate complex technical concepts related to our business into easily digestible and engaging social media posts. Curate relevant industry news, market trends, and regulatory updates to share with our audience, positioning Liminal as a thought leader. Assist in the creation of multimedia content, including infographics, short video clips, and graphics for social media. Community Management & Engagement: Monitor our social media channels for mentions, comments, and direct messages, responding in a timely and professional manner that reflects Liminals brand voice. Actively engage in relevant conversations within the crypto community on various platforms, fostering a positive and interactive environment. Identify and engage with key influencers, industry experts, and potential partners within the crypto ecosystem. If applicable, assist in managing and moderating community channels on platforms like Telegram or Discord. Campaign Support & Analysis: Support the planning and execution of social media campaigns to promote new products, partnerships, and company announcements. Track and analyze key social media metrics (e.g., engagement rate, reach, follower growth) to measure the effectiveness of our content and campaigns. Contribute to monthly reports on social media performance, providing insights and recommendations for improvement. Research & Industry Monitoring: Stay abreast of the latest trends and developments in the cryptocurrency and blockchain industry. Monitor competitor social media activities to identify opportunities for differentiation. Desired Candidate Profile: Currently pursuing or recently completed a degree in Marketing, Communications, Business, or a related field. A strong and demonstrable interest in cryptocurrency, blockchain technology, and the broader Web3 ecosystem. Familiarity with key social media platforms, particularly Twitter (X) and LinkedIn, and an understanding of their role in the crypto discourse. Excellent written and verbal communication skills, with the ability to convey complex information clearly and concisely. A creative mindset with a keen eye for detail. Basic understanding of social media analytics and reporting. Proactive, self-motivated, and able to work independently as well as part of a team. Experience with social media management tools (e.g., Hootsuite, Buffer) is a plus. Prior experience in content creation or community management within the crypto space is highly desirable. About Liminal : Liminal is a compliant and insured digital asset custody and wallet infrastructure provider. Launched in April 2021, Liminal Custody is a CCSS Level 3, SOC Type 2, and ISO 27001 & 27701 certified organization. Based in Singapore, Liminal has operations spread across APAC, MENA, and Europe, along with offices in Singapore,Taiwan , India, and UAE. The company has received an initial approval from VARA. Liminal takes pride in supporting businesses with its qualified and insured custody (self and institutional) that enables stress-free safekeeping of digital assets for institutions. It also provides a cutting-edge wallet infrastructure platform that is secure, compliant, and automated and comes with a plug-and-play architecture for faster onboarding of developers, business partners, and government agencies. Our website - https://www.liminalcustody. com/
Posted 1 month ago
5.0 - 7.0 years
5 - 10 Lacs
Hyderabad, Ahmedabad
Work from Office
Senior Cloud Security Engineer Location : Hyderabad / Ahmedabad, India Summary: We seek a highly skilled and experienced Senior Cloud Security Engineer to join our team. The ideal candidate will have a strong background in AWS Cloud Security, OCI Cloud Security, IAM, Compliance Management, firewalls, VPNs, Cloud Security frameworks, and Vulnerability Management. This role involves designing, implementing, and maintaining security controls and best practices to protect cloud environments and ensure compliance with industry standards and regulations. Responsibilities: Design and implement robust security architectures for AWS and OCI cloud environments. Experience in multi-cloud security strategies. Configure and manage firewalls, VPNs, and intrusion prevention systems to ensure secure connectivity. Manage and enhance Identity and Access Management (IAM) solutions, ensuring least privilege access control. Develop and enforce cloud security policies, standards, and procedures to maintain compliance with industry regulations (ISO 27001, NIST, CIS, GDPR, etc.). Oversee firewall configurations and network security controls to prevent unauthorized access and cyber threats. Conduct vulnerability assessments, penetration testing, and remediation of security risks. Collaborate with DevOps and cloud engineering teams to integrate security best practices into CI/CD pipelines. Monitor and respond to security incidents and threats, providing timely resolution and reporting. Stay updated with emerging threats, security trends, and technologies to continuously improve the organization s security posture. Provide guidance and training to internal teams on cloud security best practices. Required Skills: Bachelor s/Master s in Computer Science, IT, or a related field. 5-7 years of experience in cloud security engineering, preferably in mid to large-scale enterprise environments. Strong expertise in AWS security services (IAM, Security Hub, GuardDuty, WAF, KMS, etc.). Experience with Oracle Cloud Infrastructure (OCI) security tools and frameworks. Hands-on experience with SIEM solutions (Splunk, Azure Sentinel, etc.). Proficiency in vulnerability management tools (Qualys, Nessus, etc.) and penetration testing techniques. Strong understanding of firewall configurations, VPNs, and network access controls. Knowledge of compliance frameworks such as ISO 27001, NIST, CIS, PCI-DSS, and GDPR. Familiarity with automation and scripting (Python, Terraform, PowerShell) for security operations. Strong analytical and problem-solving skills, with the ability to handle security incidents effectively. Relevant certifications (AWS Certified Security Specialty, CISSP, CISM, CEH, or equivalent) are preferred. AWS Certified Solutions Architect, Azure Solutions Architect, and Oracle Cloud Architect Associate certifications are preferred.
Posted 1 month ago
5.0 - 7.0 years
3 - 7 Lacs
Bengaluru
Hybrid
Technical Change Manager,IT Change Manager,Change and Release Manager,ITIL Change Manager,ITSM Change Manager,IT Service Management Change Manager,ITIL v4 Foundation,Request for Change (RFC) Management,Change Advisory Board (CAB),ISO 27001,ISO 20000
Posted 1 month ago
3.0 - 7.0 years
6 - 10 Lacs
Mohali
Work from Office
About ASB ASB is committed to empowering students with expertise in emerging technologies. We are looking for an enthusiastic and passionate Cybersecurity Training Expert to lead and mentor students, equipping them with industry-relevant skills in cybersecurity. This role requires a deep understanding of cybersecurity principles, hands-on technical expertise, and a passion for teaching. The ideal candidate will have solid experience in network security, penetration testing, ethical hacking, compliance, and security frameworks. They should be an excellent communicator who can break down complex cybersecurity concepts into easy-to-understand modules. Key Responsibilities 1. Training Delivery Design, develop, and deliver high-quality cybersecurity training through courses, workshops, boot camps, and webinars. Cover a broad range of cybersecurity topics, including but not limited to: Network Security & Firewalls Penetration Testing & Ethical Hacking Cloud Security & DevSecOps Security Compliance & Auditing (ISO 27001, NIST, GDPR, etc.) Threat Intelligence & Incident Response SIEM, SOC & Security Tools (Burp Suite, Wireshark, Metasploit, AWS Security Hub, etc.) 2. Curriculum Development Develop and continuously update cybersecurity training materials, including hands-on labs, case studies, quizzes, and real-world projects. Ensure training content is aligned with industry best practices, compliance frameworks, and emerging security trends. 3. Training Management Organize and manage cybersecurity training sessions, ensuring smooth content delivery, engagement, and assessments. Track learner progress and provide additional support, including one-on-one guidance and mentorship. 4. Technical Support & Mentorship Assist students with technical queries and troubleshoot cybersecurity-related challenges. Provide career guidance and mentorship, helping students navigate certifications (CEH, CISSP, OSCP, CISM, etc.) and job opportunities in cybersecurity. 5. Industry Engagement Stay updated with the latest cybersecurity threats, vulnerabilities, and defense mechanisms. Represent ASB at cybersecurity conferences, webinars, and industry events. 6. Assessment & Evaluation Develop hands-on challenges, CTFs (Capture The Flag), and practical assessments to evaluate student proficiency. Provide constructive feedback to enhance their technical skills. Required Qualifications & Skills Educational Background Bachelor's or Masters degree in Computer Science, Cybersecurity, Information Security, or a related field. Hands-on Cybersecurity Experience 3+ years of experience in cybersecurity roles such as Penetration Tester, Security Analyst, SOC Analyst, Cybersecurity Engineer, or Security Auditor. Expertise in ethical hacking, threat analysis, cloud security, risk assessment, and compliance. Strong knowledge of Linux, Windows Security, Networking, and Cryptography. Teaching & Communication Skills 2+ years of experience in training, mentoring, or delivering cybersecurity education. Ability to explain complex security concepts in a clear and engaging way. Cybersecurity Tools & Platforms Experience with security tools such as Kali Linux, Metasploit, Burp Suite, Wireshark, Nessus, Nmap, Snort, Splunk, SIEM platforms, and AWS Security Hub. Knowledge of SOC operations, incident response, and security automation tools. Passion for Education A genuine enthusiasm for training the next generation of cybersecurity professionals. Preferred Qualifications Industry Certifications CEH, OSCP, CISSP, CISM, CCSP, AWS Security Certification, or equivalent. Experience in Online Teaching Prior experience in online training platforms (Udemy, Coursera, etc.) or learning management systems (LMS). Knowledge of Security Frameworks & Compliance Familiarity with ISO 27001, NIST, GDPR, SOC 2, and PCI-DSS. Experience in Blue Team & Red Team Operations Understanding of ethical hacking (offensive security) and defensive security (SOC, SIEM, endpoint protection, etc.).
Posted 1 month ago
1.0 - 5.0 years
4 - 8 Lacs
Bengaluru
Work from Office
(PURPOSE) We are looking for an experienced Information Security and Compliance Engineer to design and enforce policies and procedures that protect MFL customers data from security breaches. You will be responsible for implementing policies and procedures aligned with standards, frameworks, and regulations, including RBI guidelines for NBFCs. ORGANIZATIONAL CHART KEY RESPONSIBILITIES Conduct internal audits and risk assessments to ensure compliance and improve ISMS of the organization as per industry standards. Develop, implement, and improve security policies, processes, and procedures. Monitor regulatory changes, manage compliance audits, and prepare reports for management and regulators. Provide training and guidance on compliance policies and best practices. Identify and mitigate risks across roles, software, and information categories. Track KPIs, analyse ISMS performance, and enhance efficiency. Respond to regulatory requests and ensure timely compliance reporting. KEY INTERACTIONS Internal Stakeholders External Stakeholders Engineering / Software Development Cloud/DevOps Teams Cybersecurity IT Infra and Networks HR, People Ops Legal, Compliance Internal Audit team External Audit Team Regulators Third Party Providers/Vendors External VA PT KEY SKILLS & BEHAVIOURAL ATTRIBUTES Excellent problem-solving and analytical skills Ability to educate a non-technical audience about various security measures Effective verbal and written communication skills Fluent in English (both written and spoken) EDUCATION / EXPERIENCE Degree in Computer Science, Information Security, Technology, Cybersecurity, or a related field. Solid knowledge of various information security frameworks (e.g., ISO 27001, PCI DSS), GRC principles, and security domains [e.g., risk management, incident response, access control, etc.] Experience participating in compliance audits, risk management and investigations in the banking or NBFC industry . I n-depth knowledge of RBI IT regulations and their application to IT systems and processes. Excellent problem-solving and analytical skills Ability to educate a non-technical audience about various security measures Effective verbal and written communication skills; documentation and presentation skills. Fluent in English (both written and spoken)
Posted 1 month ago
7.0 - 12.0 years
10 - 20 Lacs
Mumbai
Work from Office
Managing GRC, IT/IS audits, Data Privacy SEBI/RBI Cyber security framework, Data privacy, GDPR Data privacy, DPDPA, ISO NCIIPC guidelines, NIST framework Information Technology Infrastructure, Information Security Compliance/regulatory requirements Required Candidate profile Experience in Information Technology Infrastructure, Information Security. Experience in managing GRC, IT/IS audits, Data Privacy Exposure on SEBI/RBI Cyber security framework, Data privacy, GDPR
Posted 1 month ago
10.0 - 15.0 years
11 - 15 Lacs
Mumbai, New Delhi, Hyderabad
Work from Office
All roles at JumpCloud are Remote unless otherwise specified in the Job Description. About JumpCloud JumpCloud delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud , IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. JumpCloud is IT Simplified. About the Role: We are seeking a Staff Product Manager with deep expertise in AI, Data Science, and Cybersecurity to lead the development of a transformative Security Data Fabric and Exposure Management Platform (ISPM, ITDR etc). In a world of siloed security tools and scattered data, your mission is to turn data chaos into clarity helping organizations see, understand, and act on their cyber risk with precision and speed. The JumpCloud access and authentication team is changing the way IT admins and users authenticate to their JumpCloud managed IT resources for a frictionless experience to get work done. The days of the traditional corporate security perimeter are over. Remote work - and the domainless enterprise - are here to stay. As such, we believe securing all endpoints is at the crux of establishing trust, granting resource access, and otherwise managing a modern workforce. Our Cloud Directory Platform supports diverse IT endpoints from devices, SSO applications, infrastructure servers, RADIUS, and LDAP is making it easy for IT admins to manage the authentication required from MFA to zero trust using conditional access based on Identity Trust, Network Trust, Geolocation Trust, and Device Trust based on X509 certificates. If you want to build on this success and drive the future of authentication at JumpCloud come join us. You ll be at the forefront of designing a next-generation data platform that: Creates a Security Data Fabric to unify signals from across the attack surface. Uses AI to resolve entities and uncover hidden relationships. Drives real-time Exposure Management to reduce risk faster than adversaries can act. You will be responsible for: Define and drive the product strategy for the Security Data Fabric and Exposure Management platform (ISPM, ITDR etc) , aligned with customer needs and business goals. Engage with CISOs, security analysts, and risk leaders to deeply understand pain points in exposure management and cyber risk visibility. Translate strategic objectives into clear, actionable product requirements that leverage AI/ML and data science to unify and contextualize security signals. Collaborate closely with engineering, data science, UX, sales, and security research to deliver scalable and performant solutions. Champion a data-centric mindset shaping features like entity resolution, risk scoring, and automated remediation workflows powered by advanced analytics. Champion a data-centric mindset shaping features like entity resolution, risk scoring, and automated remediation workflows powered by advanced analytics. You Have: 10+ years of experience in product management, with at least 5 years in cybersecurity or enterprise AI/data products. Deep understanding of AI/ML, data science, entity resolution, and knowledge graphs in practical applications. Experience building or integrating security analytics, threat detection, vulnerability management, or SIEM/XDR solutions. Ability to untangle the interconnectedness of the complex authentication mess and simplify the same to drive the cross-functional team in the same direction. Proven ability to define and deliver complex B2B platforms, especially in data-heavy, high-stakes environments. Excellent communication and storytelling skills to align cross-functional teams and influence stakeholders. Nice to have: Experience with graph databases, ontologies, or large-scale entity disambiguation. Familiarity with security standards (MITRE ATT&CK, CVSS, etc.) and frameworks (NIST CSF, ISO 27001 etc). Prior experience launching products in cloud-native or hybrid enterprise environments. Degree in Computer Science, Information Systems or Engineering. MBA is a plus. #LI-PS1 Where you ll be working/Location: JumpCloud is committed to being Remote First, meaning that you are able to work remotely within the country noted in the Job Description. This role is remote in the country of India. You must be located in and authorized to work in India to be considered for this role. Language: JumpCloud has teams in 15+ countries around the world and conducts our internal business in English. The interview and any additional screening process will take place primarily in English. To be considered for a role at JumpCloud , you will be required to speak and write in English fluently. Any additional language requirements will be included in the details of the job description. Why JumpCloud One of JumpCloud s three core values is to Build Connections. To us that means creating " human connection with each other regardless of our backgrounds, orientations, geographies, religions, languages, gender, race, etc. We care deeply about the people that we work with and want to see everyone succeed." - Rajat Bhargava, CEO Please submit your r sum and brief explanation about yourself and why you would be a good fit for JumpCloud . Please note JumpCloud is not accepting third party resumes at this time. JumpCloud is an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. Scam Notice: Please be aware that there are individuals and organizations that may attempt to scam job seekers by offering fraudulent employment opportunities in the name of JumpCloud. These scams may involve fake job postings, unsolicited emails, or messages claiming to be from our recruiters or hiring managers. Please note that JumpCloud will never ask for any personal account information, such as credit card details or bank account numbers, during the recruitment process. Additionally, JumpCloud will never send you a check for any equipment prior to employment. All communication related to interviews and offers from our recruiters and hiring managers will come from official company email addresses (@jumpcloud.com) and will never ask for any payment, fee to be paid or purchases to be made by the job seeker.
Posted 1 month ago
5.0 - 6.0 years
10 - 14 Lacs
Mumbai
Work from Office
About Godrej Agrovet: Godrej Agrovet Limited (GAVL) is a diversified, Research & Development focused agri-business Company dedicated to improving the productivity of Indian farmers by innovating products and services that sustainably increase crop and livestock yields. GAVL holds leading market positions in the different businesses it operates - Animal Feed, Crop Protection, Oil Palm, Dairy, Poultry and Processed Foods. GAVL has a pan India presence with sales of over a million tons annually of high-quality animal feed and cutting- edge nutrition products for cattle, poultry, aqua feed and specialty feed. Our teams have worked closely with Indian farmers to develop large Oil Palm Plantations which is helping in bridging the demand and supply gap of edible oil in India. In the crop protection segment, the company meets the niche requirement of farmers through innovative agrochemical offerings. GAVL through its subsidiary Astec Life Sciences Limited, is also a business-to-business (B2B) focused bulk manufacturer of fungicides & herbicides. In Dairy and Poultry and Processed Foods, the company operates through its subsidiaries Creamline Dairy Products Limited and Godrej Tyson Foods Limited. Apart from this, GAVL also has a joint venture with the ACI group of Bangladesh for animal feed business in Bangladesh. For more information on the Company, please log on to www.godrejagrovet.com . Designation Location Mumbai Job Purpose We are seeking a highly skilled and experienced IT & OT Infrastructure, Data, and Applications Security Manager to lead the security strategy and implementation for IT & OT (Operational Technology) environments. This role is responsible for ensuring that critical infrastructure, network systems, and applications are secure from cyber threats while ensuring operational continuity in both the IT and OT domains. The position requires a deep understanding of both IT and OT security frameworks, as well as an ability to collaborate with cross-functional teams to safeguard digital assets and operations. Roles & Responsibilities: 1. IT & OT Infrastructure Security: Develop, implement, and maintain security policies, procedures, and controls to protect IT & OT infrastructure components, including servers, networks, industrial control systems (ICS), SCADA, and cloud environments. Collaborate with IT teams to ensure secure integration between IT and OT systems, addressing the unique security requirements of each domain. Conduct regular risk assessments, vulnerability scans, and penetration tests to identify and mitigate threats in IT & OT infrastructures. Manage the security of industrial networks, SCADA systems, and IIoT (Industrial Internet of Things) devices to prevent cyber threats and ensure safe operations. Implement and maintain security for cloud services, on-premises data centers, and critical OT assets, ensuring compliance with industry standards. 2. Data Security : Implement data encryption, tokenization, and masking techniques to protect sensitive and proprietary data across systems, databases, and storage devices. Oversee data classification processes and ensure data protection in compliance with legal and regulatory requirements (GDPR, CCPA, HIPAA, etc.). Ensure proper data backup, disaster recovery, and business continuity planning related to data security. Conduct data loss prevention (DLP) assessments and implement preventative controls. Manage access control policies for databases and ensure segregation of duties for sensitive information. 3. Network Security: Develop and maintain robust network security architecture for IT & OT networks, ensuring protection against unauthorized access, data breaches, and cyber-attacks. Monitor and analyze network traffic and logs to detect potential threats, vulnerabilities, and anomalous activities across IT & OT networks. Implement network segmentation to isolate IT and OT environments while ensuring controlled data exchange between systems. Configure and manage firewalls, intrusion detection/prevention systems (IDS/IPS), and secure VPNs to protect networks from external and internal threats. Manage secure communication channels for IT/OT devices and ensure the proper functioning of secure remote access protocols for IT/OT systems. 4. Applications Security: Lead the implementation of secure application development practices for OT applications. Work with development and OT engineering teams to incorporate secure coding practices into OT software systems. Conduct regular security assessments and code reviews for applications, ensuring that vulnerabilities are identified and mitigated. Oversee security testing of OT applications, including SCADA systems, human-machine interfaces (HMIs), and industrial control software, to ensure that security controls are in place. Implement security controls around application access, user authentication, and data integrity for OT applications. 5. Incident Response & Threat Management: Lead and coordinate response efforts to security incidents involving OT systems, ensuring that containment, investigation, and remediation processes are followed efficiently. Develop and maintain incident response plans that address OT-specific risks, ensuring minimal disruption to critical operations. Conduct post-incident analysis to identify root causes, recommend improvements, and apply corrective actions to prevent future occurrences. Collaborate with internal and external teams (e.g., law enforcement, vendors) during security incidents that may impact OT systems. 6. Security Governance and Compliance: Ensure compliance with relevant industry regulations, standards, and frameworks (e.g., NIST, ISO 27001, IEC 62443, NERC CIP) in OT environments. Implement and enforce security governance, risk management, and compliance strategies across OT assets. Perform regular audits and assessments of OT security controls to ensure compliance with security policies and regulatory requirements. Maintain comprehensive security documentation, including risk assessments, incident reports, and security project plans. 7. Security Awareness and Training: Develop and conduct security awareness training programs for OT staff, ensuring that they are educated on security best practices, emerging threats, and organizational policies. Provide ongoing education to the OT team about the importance of cybersecurity in the context of industrial operations and critical infrastructure. Stay current with emerging security trends, threats, and vulnerabilities specific to OT environments and incorporate new knowledge into security practices. Educational Qualification: : Bachelors degree in Computer Science, Information Security, Cybersecurity, Engineering, or a related field (Master s preferred). Experience: Minimum of 5 to 6 years of experience in IT & OT security, Data security, and application security. Extensive experience securing both OT (industrial control systems, SCADA, ICS, IIoT) environments. Proven experience with network segmentation, firewalls, IDS/IPS, VPNs, and application security frameworks. Familiarity with securing operational technology, including understanding of industrial protocols (Modbus, OPC, DNP3, etc.). Hands-on experience with OT vulnerability management, incident response, and threat intelligence processes. Skills: Expertise in securing network and infrastructure devices, systems, and industrial control systems (ICS). Deep knowledge of network protocols and security mechanisms (e.g., IP, TCP/IP, VPNs, firewalls). Proficiency in securing cloud environments (AWS, Azure, Google Cloud) as well as on-premises systems. Experience with tools for vulnerability scanning, penetration testing, and risk assessments (e.g., Nessus, Qualys, Burp Suite). Certifications : CISSP, CISM, CISA, or similar certifications are preferred. OT-specific certifications such as Certified SCADA Security Architect (CSSA) or IEC 62443 certification a plus. Network security certifications such as CCSP, AWS Certified Security Specialty, or CCNA Security are beneficial. Application security certifications (e.g., CEH, OWASP) are a bonus. An inclusive Godrej Before you go, there is something important we want to highlight. There is no place for discrimination at Godrej. Diversity is the philosophy of who we are as a company. And has been for over a century. It s not just in our DNA and nice to do. Being more diverse - especially having our team members reflect the diversity of our businesses and communities - helps us innovate better and grow faster. We hope this resonates with you. We take pride in being an equal opportunities employer. We recognize merit and encourage diversity. We do not tolerate any form of discrimination on the basis of nationality, race, color, religion, caste, gender identity or expression, sexual orientation, disability, age, or marital status and ensure equal opportunities for all our team members. If this sounds like a role for you, apply now! We look forward to meeting you.
Posted 1 month ago
8.0 - 9.0 years
15 - 20 Lacs
Noida
Work from Office
Key Responsibilities Understand and apply Technology Control Framework based on industry standards to establish, promote and manage governance, risk compliance. Implement security controls, risk assessment framework, and program that align to best practices and regulatory requirements. Ensure and monitor effective implementations of the policies and procedures. Inform and align decision making for information technology planning, policy and operations to meet business objectives. Communicate the governance activities, policies and decisions with the IT Management and Business Leadership and keep them informed of IT governance decisions that will affect IT services and projects. Work with different stakeholders to maintain up-to-date documentation for scoping, testing and remediation of technology controls Assess audit findings / gaps including control weaknesses in coordination with different stakeholders and assist with development of management action plans. Assess efficacy of security controls, document and report control failures and gaps to stakeholders. Provide remediation guidance and prepare management reports to track remediation activities. Ability to communicate a deep understanding of the business and a broad knowledge of existing risk evaluation practices is expected in this role. Carefully maintain complaint and nonconformance processing through records and tracking systems, including root cause and corrective actions. Execute strategy for dealing with increasing number of audits, compliance checks and internal assessment processes for Ameriprise standard compliance framework/practices. Lead the identification, assessment, and mitigation of risks across all operational, strategic, and regulatory domains. Oversee the governance controls across technology business units, ensuring effective governance structures, executive performance evaluations, and compliance with corporate governance codes. Work closely with senior management to define risk tolerance levels, ensuring that appropriate mitigation measures are in place. Maintain strong relationships with key internal and external stakeholders, including the Board, senior management, regulators, auditors, and business leaders. Provide regular updates to the Board and senior management on governance, risk, and assurance matters, including risk exposures, compliance status, and audit outcomes. Lead the preparation of comprehensive risk and governance reports, including annual governance reports, risk assessments, and assurance reviews for the Board and senior management. Preferred Qualifications Foundational knowledge of Cloud Computing Technologies (AWS, Microsoft Azure, GCP etc ). Possess strong oral and written communication skills along with refined presentation skills and the ability to work with other departments and varying levels of management, including senior leadership. Be able to engage at all levels of the organization to organize, drive and communicate results. Good understanding of industry standards for compliance such as ISO 27001:2013, PCI DSS, and SSAE 18 SOC 1 / SOC 2 attestation standards. Defining problems, collecting, and analyzing data, establishing facts, and drawing valid conclusions Questions status quo and navigates through roadblocks. Ameriprise India LLP has been providing client based financial solutions to help clients plan and achieve their financial objectives for 125 years. We are a U. S. based financial planning company headquartered in Minneapolis with a global presence. The firm s focus areas include Asset Management and Advice, Retirement Planning and Insurance Protection. Be part of an inclusive, collaborative culture that rewards you for your contributions and work with other talented individuals who share your passion for doing great work. you'll also have plenty of opportunities to make your mark at the office and a difference in your community. So if you're talented, driven and want to work for a strong ethical company that cares, take the next step and create a career at Ameriprise India LLP. Full-Time/Part-Time Timings (2:00p-10:30p) India Business Unit Job Family Group Technology
Posted 1 month ago
10.0 - 15.0 years
12 - 17 Lacs
Bengaluru
Work from Office
bachelors degree in computer science or related field 10+ years of experience in Information security and related domain 3+ years of experience in security architecture and security solution engineering Strong understanding of cryptographic algorithms and protocols used in blockchain, such as hashing functions, public-key cryptography, and zero-knowledge proofs Experience designing and implementing security architectures for applications and microservices Experience in architecting and solving security problems Experience in designing and analyzing security solutions with a deep understanding of Blockchain Security, Identity and access management, cloud & infrastructure security, application security, data & network security, security governance, etc Experience with driving Secure SDLC activities, DevSecOps (CI/CD), and agile software development practices Knowledge of Security Integration into CI/CD and experience in driving CI/CD adaptation for Security controls Sound understanding of security by design principles and architecture-level security concepts Strong leadership skills and the ability to coach and mentor other members of the Product Security teams Experience with penetration testing methodologies and tools including security analysis, audits, and reviews Knowledge of current and emerging security threats and techniques for exploiting security vulnerabilities Sound knowledge of OWASP Top 10 and SANS 25 Must have Knowledge and experience with security standards such as CCSS (CryptoCurrency Security Standard), NIST, ISO 27001/2, CSA, SOC 1&2, and CIS CISSP, TOGAF/SABSA, or Cloud security certifications are preferred Prior application development or software engineering experience is desirable Ability to convey security concepts to both technical and non-technical audiences Flexible, adaptable, and able to manage multiple tasks in a dynamic, fast-paced environment Excellent written and verbal communication skills, interpersonal and presentation skills, and the proven ability to influence and communicate effectively Excellent business acumen and a commercial outlookYou will be mining through these tasks Plans, researches, and designs security architecture for Web3 infrastructure, including smart contracts, decentralized wallets and applications, blockchain networks and Web2 applications & systems Performs security design and architecture reviews for the existing, and future implementations and new features, and provides recommendations to reduce the risks in Web 3.0 & Web 2.0 layers Proactively drive the security requirements phase along with the product and engineering teams, and develop security requirements focused on blockchain and Web3 ecosystems Stay informed about emerging threats and vulnerabilities specific to blockchain and Web3 technologies Develop and execute incident response plans tailored to the unique security challenges of decentralised environments Implement and manage cryptographic protocols to ensure the security of data and transactions within blockchain systems Develop strategies for secure key management, including private key protection, multi-signature and multi-party computation solutions Ensure that blockchain and Web3 implementations comply with relevant regulations and industry standards Bridge the gap between traditional Web2 security practices and Web3 technologies to ensure a cohesive security strategy Develop and implement security policies that address both centralized and decentralized components of the company s infrastructure Develop and review threat models and security risk assessments to identify risks and drive mitigations Continuously review and align the secure development lifecycle to industry standards, including Microsoft SDL, OWASP development guides, and privacy-related guides Work collaboratively with the development and scrum teams to strengthen the existing software development lifecycle and standardize the secure development process across the company Review of cloud and physical infrastructure and their threat landscape to ensure ongoing and continued implementation of adequate security controls Are you the one? Our missing block You are knowledge-hungry when it comes to VDA and Web3, always eager to dive deeper and stay ahead in this evolving space The world of Web3 and VDA excites you, fueling your curiosity and driving you to explore new opportunities within this dynamic landscape You act like an owner, constantly striving for excellence, impact, and tangible results in everything you do You embrace a We over Me mindset, growing individually while fostering the growth of those around you Change is your catalyst, igniting your passion to build and innovate You think outside the box, unbound by limitations or doubt, always pushing the boundaries of what s possible Perks That Empower You Our benefits are designed to make a lasting impact on your life, giving you the freedom to create a work-life balance that truly suits you Design Your Own Benefit: Tailor your perk package to fit your unique needs Whether you're eyeing a new gadget or welcoming a furry friend into your life, our flexible benefits ensure that you can prioritize what matters most to you Unlimited we'llness Leaves: We believe in the power of we'll-being Take the time you need to recharge, knowing that your health is our priority With unlimited we'llness leaves, you can return refreshed, ready to build and grow Mental we'llness Support: Your mental health is as important as your professional growth Benefit from access to health experts, free counseling sessions, monthly we'llness workshops, and regular team outings, all designed to help you stay balanced and connected Bi-Weekly Learning Sessions: These sessions are more than just updates they re opportunities to fuel your growth Stay ahead with the latest industry knowledge, sharpen your skills, and accelerate your career in an ever-evolving landscape
Posted 1 month ago
8.0 - 13.0 years
13 - 18 Lacs
Kochi
Work from Office
We are seeking a Security Analyst with strong technical skills, client-facing experience, and a passion for mentoring junior resources. This role is ideal for professionals looking to lead cybersecurity services, build teams, and deliver impactful security solutions to clients across industries. Key Responsibilities Lead end-to-end cybersecurity services for assigned clients, including incident response, threat analysis, and vulnerability management Conduct risk assessments, prepare technical reports, and advise clients on improving their security posture Mentor and train junior analysts; create training programs, SOPs, and knowledge-sharing sessions Monitor SIEM, EDR, IDS/IPS tools to detect, analyze, and respond to threats Develop and maintain use cases, detection rules, and incident escalation protocols Coordinate with internal and external stakeholders to meet SLA targets Document incident timelines, root cause analysis (RCA), and ensure compliance with security frameworks like ISO 27001, NIST, or MITRE ATT&CK Requirements bachelors degree in Computer Science / Cybersecurity / Information Technology 3 7 years in cybersecurity operations 2+ years in a client-facing or leadership/mentoring role Technical Skills Hands-on experience with SIEM tools (eg, Splunk, QRadar) Working knowledge of Vulnerability Scanners (eg, Nessus, Qualys) Proficiency in Incident Detection, Threat Hunting, EDR Tools Scripting skills (Python / PowerShell) is a plus Key Competencies Strong leadership and team-building skills Excellent verbal and written communication Analytical mindset and proactive problem solver Ability to manage clients, priorities, and incidents efficiently
Posted 1 month ago
6.0 - 8.0 years
9 - 13 Lacs
Bengaluru
Work from Office
As a Senior Account Executive, you will work closely with one or more Sales Directors aligned with overall sales goals to support client relationship management. This role requires a strong understanding of the company s full range of offerings and plays a key role in client satisfaction, account management, and sales strategy. Essential Duties and Responsibilities: Facilitate bid process by qualifying RFP s, writing proposals, and developing effective pricing for clients. Define project-level feasibility for client bids using proprietary tools. Keep the company s CRM tool updated with delivered bids. Work with Account Directors and Sales Directors to develop, expand and leverage the client relationship with focus on developing incremental revenue through closing sales, effective up[1]selling and managing client expectations during delivery phase. Assist the Client Services Team during project delivery with additional information and partner source, if required. Assist in presentations, and other sales related activities, required by the Sales Director and Account Directors. As part of job responsibilities, you are required to comply with ISO 20252:2019 and ISO 27001 standards. Education and Other Requirement: bachelors degree or equivalency preferred, 6-8+ years of experience in pre-sales and proposal management in the Market Research industry Strong communication skills (spoken and written English) Proficiency in MS Word, Excel, and PowerPoint Customer-centric mindset; previous customer service experience is a plus Qualifications bachelors degree or equivalency preferred
Posted 1 month ago
5.0 - 10.0 years
9 - 10 Lacs
Chennai
Work from Office
As the Security Engineer, you will be responsible for implementing, maintaining, monitoring, and managing security solutions. The Security Engineer will deliver these solutions in accordance with the organization s architectural designs, best practices, and regulatory or compliance requirements. The Security Engineer is expected to collaborate with other members of the IT, DevOps, and Security teams to contribute to Agilysys security strategy with security leadership. Considered a highly knowledgeable individual, the Security Engineer is expected to implement, monitor, and manage secure solutions that address modern day issues. We are looking for individuals that want to continually improve the information security program and build positive relationships across the organization. Your duties will include: Work with a high performing team of security analysts and incident responders focused on threat detection, security operations, and incident response. Assist with incident response and system stability issues as they occur. Handle the day-to-day implementation, and maintenance of security solutions used by the security operations team across the organization. Develop security processes, procedures, playbooks for all security solutions. Assist with leading the response to security incidents and providing analysis to senior leadership along with the preservation of digital evidence. Work with IT peers to continually test, review, and update alerting to improve threat detection and response. Research, validate, and deploy solutions meeting security requirements. Participate regularly in change project and change management meetings. Keep management apprised on the status of information security issues and initiatives. Drives security efficiencies that enables security team members to work on more advanced tasks. Other duties as assigned. Requirements for success: bachelors degree from a four-year college or university preferred. 5 plus years of IT security experience required including 3+ years of hands-on security operations experience. Experience with a System Information and Event Management (SIEM, Exabeam Preferred) or other scalable log management solution, including the configuration and tuning of the system. In addition to other security offerings such as EDR, Security Automation, Vulnerability Management and more. Understands how to communicate business risk from cybersecurity issues, pen testing, and gap assessments. Has the ability to manage projects from beginning to end and provide weekly status reports. Has the ability to create visual reports for metrics and leadership updates. Working experience with system/tool integration and utilizing scripting. Working experience with end-point security tools and knowledge of databases, firewalls, web services, and cloud. Strong system, cloud, network, and database security administration experience Strong demonstrated analytical skills to see the big picture. Excellent verbal and written communication skills to technical and non-technical audiences of various levels in the organization Security+, GSEC, CEH, or relevant security certification(s) Preferred. Preferred: Experience with one or more of the following: ISO/27001, NIST, PCI DSS, SOC2. Must be willing to complete all license applications, background checks, security checks and/or any other documentation and provide copies of any identification documents required by any State, Federal or Tribal governmental agency to maintain compliance with their laws and to successfully perform in the role
Posted 1 month ago
4.0 - 8.0 years
6 - 10 Lacs
Noida
Work from Office
Rockwe'll Automation is a global technology leader focused on helping the world s manufacturers be more productive, sustainable, and agile. With more than 28, 000 employees who make the world better every day, we know we have something special. Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we'do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that s you we would love to have you join us! Job Description Summary: The Change Manager ensures all changes improving managed Data Centre, Network, and Cybersecurity services are assessed . You will govern change planning, review, risk analysis, and compliance across global NOC/SOC operations. You will work daily with people around the globe reviewing change requests which includes checking completeness, categorizing them, and ensuring documentation. You will coordinate the Change Advisory Board (CAB) by scheduling the CAB meetings where partners assess the changes and determine the best path forward. You will assess the changes for the proper risk and influence on services, customers, and infrastructure. You will be the bridge between technical teams and departments ensuring everyone is informed of upcoming changes, potential service disruptions, and outcomes. You will be responsible for post-implementation reviews to evaluate the success ; document lessons learned and flag any incidents or rollbacks that occurred. You will trach change metrics and look for ways to improve the change process. You will report to the Global Manager, Continuous Improvement and work in a hybrid capacity from our Noida, India office. Your Responsibilities: Manage the end-to-end change lifecycle and enforce change policy compliance. Lead the Change Advisory Board (CAB) and ensure rigorous peer reviews. Perform risk impact assessments and guide pre/post-change validation plans. Coordinate with Engineering, Application, and Customer teams to align change windows and communication. Maintain comprehensive change documentation for audits and customer reviews. Track change success rates and implement continuous improvements. Align change practices with ISO 27001, NIS2, and customer security requirements. The Essentials - You Will Have: 5+ years in change management within a NOC/SOC or ITIL environment. In-depth understanding of infrastructure and security operations. An understanding of ITIL principles and the full change lifecycle. Experience with change enablement tools (e. g. , ServiceNow, BMC Remedy). Collaboration working across teams and resolving conflicts with a balanced, approach. Proficiency in English (minimum B2 level). The Preferred - You Might Also Have: ITIL 4 Practitioner: Change Management certification Technical understanding of enterprise networks, data centers, and cybersecurity environments. Project Management skills like planning and resources coordination. Tool proficiency experience with tools like ServiceNow, Jira, or Remedy. The ability to coach others on the change process. What We Offer: Our benefits package includes Comprehensive mindfulness programs with a premium membership to Calm Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching program - Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program Personalized we'llbeing programs through our OnTrack program On-demand digital course library for professional development and other local benefits! At Rockwe'll Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if you're excited about this role but your experience doesnt align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. #LI-Hybrid #LI-SM1
Posted 1 month ago
3.0 - 5.0 years
4 - 7 Lacs
Hyderabad
Work from Office
Business Unit: Cubic Transportation Systems We have a top-tier portfolio of businesses, including Cubic Transportation Systems (CTS) and Cubic Defense (CD). Explore more on Cubic. com. Job Details: Security Operations Engineer Apply Refer Referral Bonus Eligible Yes Business Unit: Cubic Corporation We have a top-tier portfolio of businesses, including Cubic Transportation Systems (CTS) and Cubic Defense (CD). Explore more on Cubic. com. Job Details: Job Summary: We are looking for a highly skilled Security Operations Engineer to support and enhance our global security posture. This role focuses on vulnerability remediation across infrastructure, applications, and databases. The ideal candidate will have hands-on experience with Azure, Wintel, Java application support, and SQL databases, and will work closely with global teams to ensure security compliance and operational excellence. Work Shift: 24x7 Rotational Experience: 3+ Years Primary Skills: Linux, Azure, Windows, Applications Support Secondary Skills: Microsoft SQL, Networking knowledge Responsibilities : Perform vulnerability remediation across infrastructure, applications, and databases. Monitor and respond to security incidents, ensuring timely resolution and documentation. Support and maintain secure operations in Azure and Wintel environments. Provide application-level support for Java-based systems and SQL databases. Collaborate with global teams to align with security standards and best practices. Ensure compliance with ISO 27001 standards and internal security policies. Maintain documentation and reports related to security operations and remediation efforts. Contribute to future hardware software planning. Minimum Job Requirements: Bachelors degree, or Minimum 3 years of experience in Security Operations or related technical roles. Strong hands-on experience with Microsoft Azure and Wintel infrastructure. Experience supporting Java applications and SQL databases. Proven track record in vulnerability management and remediation. Familiarity with global security standards, especially ISO 27001. Strong analytical and problem-solving skills. Ability to work in a rotational 24x7 support model. You bring a solution-driven mindset, stay updated with tech trends, and thrive in a collaborative, high-stakes environment. Desirable Certifications: ITIL Foundation or higher (recommended). Microsoft Certified: Azure Security Engineer Associate or equivalent. Worker Type: Employee Global Level: Global Level 2 Worker Type: Employee
Posted 1 month ago
5.0 - 8.0 years
11 - 15 Lacs
Hyderabad
Work from Office
Business Unit: Cubic Transportation Systems We have a top-tier portfolio of businesses, including Cubic Transportation Systems (CTS) and Cubic Defense (CD). Explore more on Cubic. com. Job Details: Job Summary : We are looking for a highly skilled Principal Security Operations Engineer to support and enhance our global security posture. This role focuses on vulnerability remediation across infrastructure, applications, and databases. The ideal candidate will have hands-on experience with Azure, Wintel, Java application support, and SQL databases, and will work closely with global teams to ensure security compliance and operational excellence. Work Shift: 24x7 Rotational Experience: 8+ Years Primary Skills: Linux, Azure, Windows, Applications Support Secondary Skills: Microsoft SQL, Networking knowledge Responsibilities : Lead and manage projects and/or workstreams, providing technical leadership, ensuring the required quality standards and milestones are met. Work collaboratively with local and remote stakeholders including management, technology architects and technology staff with the lifecycle of operational security compliance, from design and development, through to implementation and maintenance. Owning end-to-end availability and performance of key services and build best practices to prevent problem recurrence. Provide technical guidance to change and delivery teams for transition of vulnerability remediation into live production. Perform vulnerability remediation across infrastructure, applications, and databases. Monitor and respond to security incidents, ensuring timely resolution and documentation. Support and maintain secure operations in Azure and Wintel environments. Provide application-level support for Java-based systems and SQL databases. Collaborate with global teams to align with security standards and best practices. Provide support with industry standard audits, ensuring compliance with ISO 27001 standards and internal security policies. Maintain documentation and reports related to security operations and remediation efforts. Contribute to future hardware software planning. Minimum Job Requirements: Bachelors degree, or Minimum 8 years of experience in Security Operations or related technical roles. Strong hands-on experience with Microsoft Azure and Wintel infrastructure. Experience supporting Java applications and SQL databases. Proven track record in vulnerability management and remediation. Familiarity with global security standards, especially ISO 27001. Strong analytical and problem-solving skills Ability to work in a rotational 24x7 support model You bring a solution-driven mindset , stay updated with tech trends, and thrive in a collaborative, high-stakes environment. Desirable Certifications: ITIL Foundation or higher (recommended). Microsoft Certified: Azure Architect or equivalent. Worker Type: Employee
Posted 1 month ago
3.0 - 6.0 years
10 - 15 Lacs
Bengaluru
Work from Office
Support the Supplier Cyber Risk and Assurance processes for all business units and support functions across GSK, to ensure cyber security risks that may be introduced by third-parties are understood, managed or mitigated Key Responsibilities Conduct comprehensive supplier cybersecurity assessments and generate detailed reports, ensuring alignment with up-to-date departmental procedures and industry best practices. Continuously develop and enhance the third-party risk management process framework for security risk, incorporating the latest standards, procedures, emerging technologies, and AI-driven insights. Review and analyse supplier security practices through questionnaires, audits, scans and assessments to ensure compliance with company cyber security standards. Coordinate and respond to security incidents involving suppliers, including investigation, mitigation, and reporting. Examine supplier contracts to ensure they include necessary security clauses and negotiate terms to address identified risks. Provide clear and effective support to internal third-party relationship owners and external third-party representatives, facilitating accurate responses to the security risk assessment questionnaire. Collaborate closely with Legal, Procurement teams to ensure the inclusion of robust security and privacy clauses in third-party contracts, in line with current regulatory and industry requirements. Accurately interpret third-party responses to assessment questionnaires, using AI and automation tools to translate them into concise and actionable risk exposure reports for internal stakeholders. Work with internal third-party relationship owners and external third-party representatives to recommend and implement effective cyber security controls to mitigate risks to GSK. Ensure robust tracking and remediation of third-party security and privacy risk exposures identified through assessment processes Deliver ongoing training and awareness programs related to the supplier cyber risk and assurance process, keeping pace with the latest industry trends and threats. Aggregate and distribute periodic program metrics and dashboards, leveraging advanced analytics and reporting tools. Provide expert consultancy and subject matter expertise (SME) support in conducting security posture assessments, as part of continuous monitoring or post-breach scenarios, ensuring that suppliers maintain robust and up-to-date security controls with the assistance of AI and automation technologies. Ability to Perform detailed assessments of AI-enabled tools to identify potential risks related to compliance, security, bias, and ethical considerations. Ability to evaluate the service specific AI risks, brainstorming of the changing landscape of the AI like Gen AI & Agentic AI to provide assessment questionnaires inputs. Develop and implement strategies to mitigate identified risks in AI tools. Evaluate tools for vulnerabilities, including data privacy, algorithmic transparency, and unintended consequences. General Experience and knowledge across different frameworks and standards such as ISO 27001, NIST, CIS etc Demonstrated experience and understanding of cyber security principles, IT security controls, and related technologies and products Security Certification: Preferred Security Certifications: CISSP, CISM, CISA, CTPRA, CTPRP, CRISC, ISO27001: 2022 LA & LI, ISO42001 AI. Understanding of relevant regulations and compliance standards GDPR, HIPAA, PCI-DSS etc Practical experience with third-party risk management tools such as Archer, OneTrust, Certa, CyberGRX, UpGuard, and ServiceNow is highly preferred. Sound knowledge in Power BI, Tableau, Excel advanced features. Prior experience in conducting cyber-Security risk assessments and 3rd party security and data privacy assessments. Ensuring 3rd parties adhere to data protection laws and best practices for safeguarding sensitive information. Strong analytical skills to identify, evaluate, and prioritize potential cyber risks from suppliers. Understanding of cybersecurity principles, tools, and technologies used to protect against threats. Proficiency in documenting cyber security findings, creating reports, and presenting recommendations to management. Preparedness to coordinate and respond to cyber security incidents involving suppliers. Expertise in reviewing and negotiating supplier contracts to ensure they include necessary security clauses. Stakeholder/ internal business management experience Strong verbal/written communication in English, with the ability to effectively interact with professionals at all levels of responsibility and authority Ability to prioritize, delegate, and foster the development of high-performance teams to lead/support an environment driven by customer service and teamwork Extensive experience in designing and developing security policies, processes, standards, and contracts. Strong understanding of inherent and residual risks, as we'll as expertise in risk assessment methodologies. Work with virtual teams located in different countries around the world, aligning and adapting different work, culture and communication styles. Exposure to any GRC technologies to conduct cyber risk management Strong understanding of AI systems, machine learning, and data analytics. Knowledge of relevant regulations, standards, and ethical frameworks related to AI. Good theoretical knowledge of Application programming and security, Machine Learning OWASP, Big Data, AI Production Environment like Kubernetes. Knowledge of DevSecOps will be a plus. Technical/Functional (Line) Expertise Experience in evaluating third parties for the presence of fundamental information security controls. Experience conducting risk assessments and applying concepts of inherent and residual risk in order to draw appropriate conclusions and articulate the same to non-technical audiences. Ability to effectively negotiate appropriate remediation of security gaps with third party representatives to ensure protection of GSK information. Leadership Influencing action across various business lines and geographies to achieve program objectives. Ability to effectively manage conflicting priorities in alignment with overall business and departmental strategies. Developing strong relationships with leaders of complementary programs (eg Procurement, Legal, Ethics & Compliance) to ensure harmonization. Decision-making and Autonomy Operates autonomously in the execution of the third-party security risk program framework. Serves as central point-of-contact for evaluating security risks associated with all third-party engagements. Recommends and agrees with Line Manager the need for shifts in program strategy. Interaction Excellent project management skills to effectively balance unexpected and conflicting priorities as they arise Experience operating effectively across matrixed organizations Intercultural sensitivity Innovation Understand innovations and evolving best practices amongst industry practitioners of third-party security risk management to continually mature GSK s program. Ability to apply innovative approaches to balancing business constraints with program goals to identify win-win solutions. Complexity Global SME role, but with coordination to the global third-party program. Operate across geographies and across business lines. Collaborate effectively with relevant third parties and managed service provider. Skills Identity Access Management (IAM), Risk Assessments, Risk Management, Risk Management Framework, Security Architecture Design, Security Compliance, Security Policies, Security Risk, Vulnerability Management
Posted 1 month ago
2.0 - 5.0 years
4 - 7 Lacs
Bengaluru
Work from Office
Domain Experience: At least one year of latest experience in Healthcare or Pharma industry inside sales is required Location: Anywhere in India, work from home Shift Hours: Should be willing to work in US shift, EST time zone. About the Role: M360 is looking for an Inside sales specialist who can cultivate opportunities for new business development opportunities and plans strategies to target potential clients and customers. Inside sales Team is the cornerstone of any successful organization because they ultimately generate new revenue by getting client business referrals, network, and web leads and provide prospective customers/clients with all services offered, and additional presentations as needed. Essential duties and broad responsibilities: Responsible for coordinating activities related to sales and new client acquisition Developing a thorough understanding of m360 Research services, target customer profile, and value proposition Identifying, qualifying, and making sales pitch to potential new clients Reaching monthly targets for scheduling new meetings between potential clients and m360 s Sales team Maintaining a healthy sales pipeline through using best practices such as Prospecting, Lead Qualification, Lead Nurturing, and obtaining bids. Setting up meetings with US-based clients via calls and Emails Collaborating with sales team in the US Doing extensive Market Research on all potential clients Developing customized targeted sales strategies Coordinating new business generation activities Answering potential client questions and follow-up call questions As part of job responsibilities, you are required to comply with ISO 20252:2019 and ISO 27001 standards . PRE-REQUISITES FOR THE ROLE: Prior Inside Sales experience in selling B2B services to Healthcare companies in the US and/or Europe Problem-solving and analytical skills to optimize the prospecting and lead nurturing process and get faster results Comfortable making calls and talking to new people all-day Excellent verbal and written communication skills; the ability to call, connect and interact with clients Persuasive and goal-oriented Possesses an energetic, outgoing, and friendly demeanor Eager to expand the company with new sales, clients, and territories Self-motivated and self-directed Able to multitask, prioritize, and manage time efficiently Excellent analytical and time-management skills Ability to work independently or as an active member of a team Strong computer skills, including Microsoft Office Suite (Word, PowerPoint, Outlook, and Excel) Bonus Points If Experience with lead generation and prospect management Cold calling experience: Previous experience as an inside sales representative, or related sales experience Able to communicate with C-Level Executives professionally Supervisory Responsibility: No Qualifications Any graduate, degree in pharma or healthcare is highly desirable
Posted 1 month ago
2.0 - 7.0 years
7 - 11 Lacs
Belgaum
Work from Office
We are hiring a Cloud Vulnerability & Compliance Analyst to manage vulnerability lifecycle and compliance reporting using Wiz. This role will be instrumental in identifying misconfigurations, tracking remediation, and aligning cloud posture with frameworks like CIS, NIST, and ISO 27001. Key Responsibilities Analyze and prioritize cloud vulnerabilities surfaced by Wiz across AWS, GCP, and Azure. Coordinate remediation activities with DevOps and Infrastructure teams. Develop Wiz dashboards and compliance posture reports. Write and manage Wiz queries (WQL) for tailored risk views. Track progress against regulatory and internal security baselines (e.g., CIS Benchmarks). Requirements 3+ years in cloud security, compliance, or vulnerability management. Strong understanding of cloud services and common misconfiguration patterns. Experience using Wiz for compliance, WQL, and po
Posted 1 month ago
5.0 - 10.0 years
7 - 11 Lacs
Noida
Work from Office
The Change Manager ensures all changes improving managed Data Centre, Network, and Cybersecurity services are assessed . You will govern change planning, review, risk analysis, and compliance across global NOC/SOC operations. You will work daily with people around the globe reviewing change requests which includes checking completeness, categorizing them, and ensuring documentation. You will coordinate the Change Advisory Board (CAB) by scheduling the CAB meetings where partners assess the changes and determine the best path forward. You will assess the changes for the proper risk and influence on services, customers, and infrastructure. You will be the bridge between technical teams and departments ensuring everyone is informed of upcoming changes, potential service disruptions, and outcomes. You will be responsible for post-implementation reviews to evaluate the success ; document lessons learned and flag any incidents or rollbacks that occurred. You will trach change metrics and look for ways to improve the change process. You will report to the Global Manager, Continuous Improvement and work in a hybrid capacity from our Noida, India office. Your Responsibilities: Manage the end-to-end change lifecycle and enforce change policy compliance. Lead the Change Advisory Board (CAB) and ensure rigorous peer reviews. Perform risk impact assessments and guide pre/post-change validation plans. Coordinate with Engineering, Application, and Customer teams to align change windows and communication. Maintain comprehensive change documentation for audits and customer reviews. Track change success rates and implement continuous improvements. Align change practices with ISO 27001, NIS2, and customer security requirements. The Essentials - You Will Have: 5+ years in change management within a NOC/SOC or ITIL environment. In-depth understanding of infrastructure and security operations. An understanding of ITIL principles and the full change lifecycle. Experience with change enablement tools (e.g., ServiceNow, BMC Remedy). Collaboration working across teams and resolving conflicts with a balanced, approach. Proficiency in English (minimum B2 level). The Preferred - You Might Also Have: ITIL 4 Practitioner: Change Management certification Technical understanding of enterprise networks, data centers, and cybersecurity environments. Project Management skills like planning and resources coordination. Tool proficiency experience with tools like ServiceNow, Jira, or Remedy. The ability to coach others on the change process. What We Offer: Our benefits package includes Comprehensive mindfulness programs with a premium membership to Calm Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching program - Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program Personalized wellbeing programs through our OnTrack program On-demand digital course library for professional development and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if youre excited about this role but your experience doesnt align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. #LI-Hybrid #LI-SM1 Rockwell Automation s hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office.
Posted 1 month ago
3.0 - 5.0 years
4 - 8 Lacs
Bengaluru
Work from Office
About us:Hiver gives teams the simplest way to deliver outstanding and personalized customer service As a customer service solution built on Gmail, Hiver is intuitive, super easy to learn, and delightful to use Hiver is used by thousands of teams at some of the best-known companies in the world to provide attentive, empathetic, and human service to their customers at scale We re a top-rated product on G2 and rank very highly on customer satisfaction At Hiver, we obsess about being world-class at everything we do Our product is loved by our customers, our content engages a very wide audience, our customer service is one of the highest rated in the industry, and our sales team is as driven about doing right by our customers as they are by hitting their numbers We re profitably run and are backed by notable investors K1 Capital led our most recent rou of $27 million Before that, we raised from Kalaari Capital, Kae Capital, and Citrix Startup Accelerator Opportunity:Hiver is currently seeking a dedicated Senior Security Engineer to join our Information Security team In this role, you will play a crucial part in ensuring the security and compliance of our systems and data Your responsibilities will encompass reviewing and updating documentation, researching and evaluating security applications, assisting with web content management, and contributing to compliance monitoring and investigations What you will be working on? * Periodic review of Cloud and overall Security posture of Hiver * Advocate security and secure practices throughout Hiver * Perform technical security assessments and and infrastructure audits * Handle information security incidents and data breaches * Work with all business functions to make sure all security risks are effectively managed * Assist the Information Security team with external security audits * Perform privacy assessments as part of ISO, SOC2, GDPR, HIPAA, EU Data Protection etc What we are looking for ? * A minimum of 3-5 years of professional experience in information security practices, with at least 2 years specializing in Cloud security in Product Based companies and related fields (GRC, VAPT, Security operations Centre) * Strong understanding of one of major cloud platforms (AWS, GCP, Azure) and their security offerings * Expertise in cloud security best practices, compliance requirements (e g , ISO 27001:2022, SOC 2, HIPAA), and security frameworks (e g , NIST Cybersecurity Framework) * Conduct regular security assessments and vulnerability scans of cloud environments, identifying and remediating potential risks * Collaborate with stakeholders across the organization (IT, Security, DevOps, Engineering, etc ) to ensure secure cloud adoption and operations
Posted 1 month ago
5.0 - 10.0 years
8 - 13 Lacs
Noida
Work from Office
Rockwell Automation is a global technology leader focused on helping the world s manufacturers be more productive, sustainable, and agile. . Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that s you we would love to have you join us! Job Description Summary: The Change Manager ensures all changes improving managed Data Centre, Network, and Cybersecurity services are assessed . You will govern change planning, review, risk analysis, and compliance across global NOC/SOC operations. You will work daily with people around the globe reviewing change requests which includes checking completeness, categorizing them, and ensuring documentation. You will coordinate the Change Advisory Board (CAB) by scheduling the CAB meetings where partners assess the changes and determine the best path forward. You will assess the changes for the proper risk and influence on services, customers, and infrastructure. You will be the bridge between technical teams and departments ensuring everyone is informed of upcoming changes, potential service disruptions, and outcomes. You will be responsible for post-implementation reviews to evaluate the success ; document lessons learned and flag any incidents or rollbacks that occurred. You will trach change metrics and look for ways to improve the change process. You will report to the Global Manager, Continuous Improvement and work in a hybrid capacity from our Noida, India office. Your Responsibilities: Manage the end-to-end change lifecycle and enforce change policy compliance. Lead the Change Advisory Board (CAB) and ensure rigorous peer reviews. Perform risk impact assessments and guide pre/post-change validation plans. Coordinate with Engineering, Application, and Customer teams to align change windows and communication. Maintain comprehensive change documentation for audits and customer reviews. Track change success rates and implement continuous improvements. Align change practices with ISO 27001, NIS2, and customer security requirements. The Essentials - You Will Have: 5+ years in change management within a NOC/SOC or ITIL environment. In-depth understanding of infrastructure and security operations. An understanding of ITIL principles and the full change lifecycle. Experience with change enablement tools (e.g., ServiceNow, BMC Remedy). Collaboration working across teams and resolving conflicts with a balanced, approach. Proficiency in English (minimum B2 level). The Preferred - You Might Also Have: ITIL 4 Practitioner: Change Management certification Technical understanding of enterprise networks, data centers, and cybersecurity environments. Project Management skills like planning and resources coordination. Tool proficiency experience with tools like ServiceNow, Jira, or Remedy. The ability to coach others on the change process. What We Offer: Our benefits package includes Comprehensive mindfulness programs with a premium membership to Calm Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching program - Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program Personalized wellbeing programs through our OnTrack program On-demand digital course library for professional development and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if youre excited about this role but your experience doesnt align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. #LI-Hybrid #LI-SM1
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough