Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
6.0 - 10.0 years
15 - 22 Lacs
pune
Work from Office
Role & responsibilities This individual contributor role executes and/or assists in the planning and execution of ITRM compliance assessment and consulting projects, as well as driving and coordinating the design and implementation of appropriate controls. Additionally, this role manages medium-size ITRM service delivery and engagements, and components of larger initiatives. This role also develops ITRM processes and/or methodology for designated ITRM initiatives by documenting process and/or methodology requirements and acceptance criteria from process owners and key stakeholders and collects and reports performance metrics using company software/reporting tools. Preferred candidate profile...
Posted 2 months ago
3.0 - 7.0 years
7 - 17 Lacs
gurugram
Hybrid
Role & responsibilities : Qualification and Minimum Entry Requirements B.Tech/MCA/MBA with 3 5 Years of relevant experience in Information Technology/Security Controls, SSAE 18, SOC reports, IT Audits, IT General Controls, IT Application Controls and ERP Audits. Candidate should have intermediate knowledge of financials, operations and technology and its related risks Candidate should have good knowledge for SOC 1, SOC 2, ICFR, IT General Controls, IT Application Controls, Information security and risk management frameworks/ standards (ISO 27001, NIST, COBIT, ITIL, PCI.) Qualified to pursue a job-relevant certification (CIA, CISA, CMA, ISO, CRISC, CISSP) Strong Data Analytical skills includi...
Posted 2 months ago
8.0 - 12.0 years
30 - 35 Lacs
thiruvananthapuram
Work from Office
We re looking for Managers with expertise in ICFR - IT Audit & Implementation to join the group of our Risk team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of our service offering. Your key responsibilities Responsible for managing multiple client engagements in MENA region and team members including Senior Consultant/Associate Manager level within the EY GDS team You can expect to work with high level client personnel to address compliance, financial, and operational risks, ICFR risk and controls and perform audits based on the business requirements You are also expected to conduct Kick-off Meetings, IT internal control testing, dev...
Posted 2 months ago
2.0 - 5.0 years
17 - 19 Lacs
mumbai
Work from Office
NOMURA CAPITAL (INDIA) PRIVATE LIMITED is looking for Sr. Information Security Analyst to join our dynamic team and embark on a rewarding career journey Collaborate with crossfunctional teams to achieve strategic outcomes Apply subject expertise to support operations, planning, and decisionmaking Utilize tools, analytics, or platforms relevant to the job domain Ensure compliance with policies while improving efficiency and outcomes
Posted 2 months ago
5.0 - 7.0 years
15 - 22 Lacs
bengaluru
Hybrid
Key Skills: SOX, SOX testing, ITGC, IT Audit, SOC 1, SOC 2, Internal Audit Roles and Responsibilities: Manage multiple client engagements, ensuring quality, compliance, and timely delivery. Monitor project progress, implement corrective measures, and mitigate risks. Propose innovative solutions to enhance engagement productivity and client satisfaction. Ensure adherence to engagement plans, internal standards, and risk management procedures. Identify and escalate potential risks, red flags, and compliance issues. Demonstrate industry specialization by staying updated on trends, challenges, and best practices. Prepare and deliver presentations, reports, and client updates. Build strong intern...
Posted 2 months ago
1.0 - 5.0 years
6 - 10 Lacs
bengaluru
Work from Office
Technology Infrastructure Platform Audit 3+ years hands-on experience in auditing infrastructure platforms, network security, cloud, firewalls etc., Command over IA lifecycle following re-performance standards. Certifications like CISA, CIA, ISO 27001 preferred. Technology-Business Integrated Audit 3+ years hands-on experience in auditing IT General Controls (ITGC) and IT Application Controls (ITAC) Command over IA lifecycle following re-performance standards. Certifications like CISA, CIA, ISO 27001 preferred. Business Audit 3+ years hands-on experience in auditing functional domains of financial services sector including Asset Wealth Management (AWM), Corporate and Investment Banking (CIB)...
Posted 2 months ago
2.0 - 4.0 years
1 - 3 Lacs
jaipur
Work from Office
We are looking for a highly skilled and experienced Security Guard to join our team in the hospitality industry. The ideal candidate will have 2-4 years of experience in security management, preferably within the hospitality sector. Roles and Responsibility Ensure the safety and security of guests, staff, and property. Monitor and respond to security incidents and emergencies. Develop and implement effective security protocols and procedures. Collaborate with other departments to maintain a secure environment. Conduct regular security checks and inspections. Maintain accurate records of security incidents and activities. Job Requirements Proven experience as a Security Guard or in a related ...
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
kochi
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
3.0 - 5.0 years
7 - 11 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
13 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of the role is to lead and manage security requirements and recommend specific improvement measures that helps maintain the Security posture of organisation Do 1. Lead Risk and Compliance to protect sensitive information a. Drive Risk Management, Regulatory and Contractual compliance b. Diagnose the level of preparedness of the customer for cyber security and health and accordingly propose a solution to the client c. Build appropriate risk governance with client partners and internal stakeholders and ensure customer policies and SOW requirements are in line with the deliverables d. Govern design and rollout of Common Compliance frameworks e. Ensure policies, processe...
Posted 2 months ago
5.0 - 7.0 years
20 - 25 Lacs
pune
Work from Office
Solution Architects at SailPoint embark on their journey by undergoing comprehensive product training. This initial phase allows them to harness their existing experience, paving the way for a profound understanding of our SaaS solutions . Within a month or two, they begin serving as the technical leads on customer projects where they will employ their client and partner communication skills, as we'll as their industry knowledge, to share organizational best practices for SailPoint products and identity governance. After their first six months, Solution Architects will have established themselves as both technical and consultative experts within the SailPoint Services organization, and by th...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
192783 Jobs | Dublin
Wipro
61786 Jobs | Bengaluru
EY
49321 Jobs | London
Accenture in India
40642 Jobs | Dublin 2
Turing
35027 Jobs | San Francisco
Uplers
31887 Jobs | Ahmedabad
IBM
29626 Jobs | Armonk
Capgemini
26439 Jobs | Paris,France
Accenture services Pvt Ltd
25841 Jobs |
Infosys
25077 Jobs | Bangalore,Karnataka