Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
10.0 - 12.0 years
12 - 13 Lacs
Mumbai
Work from Office
Job Summary: We are looking for a Senior Operations Manager to oversee and optimize business operations, ensuring efficiency, cost-effectiveness, and compliance. The ideal candidate will be responsible for streamlining processes, improving productivity, managing cross-functional teams, and implementing best practices to achieve operational excellence. Key Responsibilities: 1. Strategic Leadership: Develop and implement strategic plans for the service and operations department in alignment with overall organizational goals. Provide vision and direction to achieve excellence in service delivery. 2. Team Management: Lead, mentor, and manage teams across regions, fostering a culture of collaboration, innovation, and continuous improvement. Ensure effective communication and coordination among team members. 3. Service Delivery: Oversee the operation and maintenance of Electronic Security, Fire Detection/Suppression, IBMS & allied systems solutions. Ensure service quality, responsiveness, and timely issue resolution. 4. Client Relationship Management: Build and maintain strong relationships with clients to understand their evolving needs and expectations. Address client concerns promptly and ensure high levels of customer satisfaction. 5. Regional Operations: Efficiently manage service and operations activities across multiple regions. Implement standardized processes while considering regional variations and requirements. 6. Performance Metrics: Establish and monitor key performance indicators (KPIs) to evaluate team and individual performance. Regularly assess and improve operational efficiency based on metrics. 7. Resource Planning: Plan and allocate resources effectively to meet service demands. Optimize staffing levels, skill sets and equipment to ensure efficient operations. 8. Training and Development: Implement training programs to enhance the technical skills and knowledge of service teams. Keep the team updated on industry advancements and best practices. 9. Budget Management: Develop and manage budgets for service and operations. Monitor expenses and implement cost-effective measures without compromising service quality. 10.Continuous Improvement: Identify opportunities for process improvement and implement best practices. Foster a culture of continuous learning and innovation within the service and operations teams. 11.Health and Safety Compliance: Ensure compliance with health and safety regulations. Implement and enforce safety protocols to create a secure working environment. 12.Emergency Response Planning: Develop and implement effective emergency response plans to address critical situations promptly. Conduct regular drills and assessments to ensure preparedness.
Posted 15 hours ago
4.0 - 9.0 years
7 - 11 Lacs
Pune
Work from Office
To be part of a global security operations center and be responsible for - proactively identify threats and vulnerabilities; implement industry best practices; participate in the review and resolution of opportunities from both internal and external IT security audits; provide recommendations to the overall IT security posture of the organization; and participate in the creation of IT security awareness communications to the organization that adhere to corporate safety and security regulations Responsibilities: Investigate and provide proper incident response to security alerts. Identify new security use cases and create required detection rules in the system. Work with the customer to gather requirements, propose use cases and build them in Splunk. Perform administration activities in Splunk including integration of log sources, creation of queries for security use cases, dashboards, troubleshoot issues. Assist and train team members on how to investigate and respond to various security threats. Manage and support wide range of security technologies including SIEM, EDR, Vulnerability Scanners, Identity and Access Management, Data Loss Prevention, and Cloud Security. Participate in security solution design and security consultation. Work with the customer point of contacts for any escalated incidents, security remediation. Create required dashboards and provide reports. Actively participate in customer meetings and give presentations. Job Bachelor's degree in Computer Science, Information Security, or an equivalent degree. 4+ years of working experience in Information Security. Vast experience in Splunk Enterprise and Enterprise Security. Have experience in integration of log sources, defining use cases, creation of new correlation rules, creation of dashboards, implementing best practices in Splunk environment. Good understanding of security threats and mitigation strategies. Have in-depth knowledge on how to investigate and respond to various security alerts, and can able to create incident response procedures for same. Certification in any of the following is a plusSplunk Certified Admin/Architect, CEH. Demonstrated excellent response to critical incidents and security threats in the past. Excellent analytical, presentation, customer service and facilitation skills. Ready to work in 24x7 Security operations.
Posted 16 hours ago
12.0 - 18.0 years
10 - 20 Lacs
Bengaluru
Work from Office
POSITION PURPOSE The Technical Lead will be responsible for the configuration, implementation, and maintenance of various technologies managed by the Information Technology department. This person will focus on the administration of the network infrastructure to include desktop PCs, servers, network equipment, and software applications. The Technical Lead will assess and identify appropriate solutions to be integrated into the systems operation and make recommendations for implementation. DUTIES AND RESPONSIBILITIES Investigate user problems, identify their source, determine possible solutions, test and implement solutions, document for future reference. Plan, organise, control and evaluate IT and electronic data operations. Design, develop, implement and coordinate systems, policies and procedures Ensure security of data, network access and backup systems. Develops, maintains, and monitors procedures for all server backups and network usage. Team management, communicate job expectations and appraise their performance. Troubleshoot networks, systems, and applications to identify and correct malfunctions and other operational difficulties. Manage MPLS and dedicated leased internet circuits. Identify utilization patterns and their effect on operation/system availability and performance expectations Anticipate communication, network problems and implement preventive measures. Audit systems and assess their outcomes Preserve assets, information security and control structures Ensure timely user notification of maintenance requirements and effects on system availability. Keep confidentiality of the company & client information. Ensures compliance of IT Security Policies; provides support in security management and supports networking and security services in LAN, WAN. Makes recommendations for new equipment and services to purchase and work with various vendors for procurement. Perform on-site and remote technical support. Assist in the organization and inventory of all hardware and software resources. Maintain excellent communication with rest of the IT Team on all tasks and projects. Creates and maintain good technical documentation. Team handling and task management experience. Responsibilities may require working in non-regular office hours in response to needs of the systems being supported. EDUCATION, KNOWLEDGE, EXPERIENCE, SKILLS AND ABILITIES REQUIRED Education and Experience: Bachelors degree is mandatory. 15 years of systems/network experience is required. Skills and Abilities: 12+ years of experience with Cisco based networks, Windows desktop OS and Server platforms. Solid knowledge of LAN/WAN configurations and trouble shooting. Hands on experience on managing Cisco/Palo firewalls & routers is mandatory. Should be strong at configuring and troubleshooting Cisco LAN switches, routers, firewalls & network related problems. Should have good experiencing in configuring and managing VLANs, QoS on Cisco based devices. Strong knowledge on the working and configuring IP addresses on the LAN & WAN. Hands on experience in installation & trouble shooting OS and application softwares. MS Windows and software troubleshooting skills. Maintains quality customer service skills, a strong work ethic, and is a team player with the ability to work independently. Must possess above average organization skills, excellent communication skills, and can demonstrate problem solving skills. Experience in managing IT infrastructure on the cloud is essential.
Posted 16 hours ago
6.0 - 11.0 years
4 - 8 Lacs
Hyderabad
Work from Office
Immediate Openings on Security Consultants with Vulnerability _Contract_Pan India 6+ Years Security Consultants with Vulnerability Pan India Period :Immediate. Type Contract Description 7 + Years Security Consultants with Vulnerability tools exp like Qualys or Tenable (prefer Qualys) and ServiceNow. Experience with Vulnerability tools such as Qualys or Tenable (prefer Qualys) and ServiceNow .
Posted 16 hours ago
5.0 - 10.0 years
12 - 17 Lacs
Pune
Work from Office
Project description Do you have the expertise to manage cyber security productsAre you a committed and visionary team player with a logical mind-setAre you motivated to work in a complex, diverse and global environment Security is a global organization within Group Technology Infrastructure and Security Engineering. Our services focus on preventing and detecting cyber threats and securing our IT systems. We provide consolidated and reliable security services that implement secure design principles and create best-fit solutions. You will be working in the Cyber Hygiene Technology team, providing security products and services for the Cyber Hygiene space - specifically for Application Security and Penetration testing. We provide consolidated and reliable security hygiene controls to our clients using the latest technology. As a Tech Cyber Security Engineer, you will play a vital role in creating Infrastructure, determining required IT business solutions, and assisting in implementing them. Responsibilities Evaluate, plan, build and maintain the infrastructure for Application Security Testing and Penetration testing tools Ensure the performance, uptime, and security of tools across cloud and on-premises environments Ensure operational workflows and the day-to-day operations, including tool updates, troubleshooting, and reported issues Collaborate with cross-functional teams to ensure smooth functioning of the tools and the related systems Contribute to the reduction of all security and operational risks, in line with policies and standards Ensure the product stays accurate, up-to-date and complaint in all bank's systems Analyse issues within applications/systems and define corrective measures Skills Must have Ideally 5+ years of experience in IT Security engineering capacity with experience in integration, automation, development efforts Very good knowledge of the Azure cloud ecosystem and its native capabilities Solid scripting experience (e.g. PowerShell, bash, python) and version control basics (e.g. Git) Sound experience of automation pipelines and DevOps tooling Sound experience with Windows and Linux operating systems Technical experience in infrastructure setup for Application security and Penetration testing tools Good knowledge on Network and Infrastructure Good knowledge of Infra as Code (e.g. ARM, Terraform) Previous experience with container technologies is a plus (e.g. Kubernetes) Previous experience with deploying complex cybersecurity enterprise solutions is a plus (e.g. vulnerability scanning suites, pen-testing software, application security tools) Solid understanding of agile methodologies within a large organization Inquisitive, able to challenge effectively and manage conflicting stakeholder needs Technical communication and documentation skills Nice to have N/A Other Languages EnglishC1 Advanced Seniority Senior
Posted 16 hours ago
3.0 - 8.0 years
11 - 15 Lacs
Pune
Work from Office
Project description Security is a global organization within Group Technology Infrastructure and Security Engineering. Our services focus on access management for applications and infrastructure, identity management for users, directories, detecting/preventing measures for cyber threats, and exchanging/storing data securely. We provide consolidated and reliable security services that implement secure design principles, and create best-fit solutions. You'll be working as part of our global Infrastructure Vulnerability Management team. As an Tech Business Analyst, you'll play an important role in ensuring the on-going cyber-security of organization. Responsibilities engage with colleagues at all levels to meet business requirements translate business requirements into technical documentation collaborate with technologists to drive delivery conduct as-is and to-be impact analysis contribute to reduction of all security and operational risks, in line with policies and standards identify opportunities to improve our processes, tools and reports Skills Must have Ideally 3 years of experience in applying business analysis techniques, preferably in IT Security or infrastructure projects (Vulnerability Management area preferred). SQL hands-on experience understanding of IP Networks ( OSI model, IP Routing, Firewall, SSL= Ideally 2 years hands-on experience with Vulnerability Management Scanning Solutions Experience managing Business and Technical from initiation to final implementation Experience with data analysis proficiency with Excel is a must, experience with dedicated tools is a plus. Experience with Business Process analysis (documentation of as-is and to-be processes, process improvement). Ability to work independently on assigned tasks and driving them from start to completion. Ability to challenge and propose possible improvements (in various areas, e.g. process, reporting) Ability to explain complex concepts in a clear and concise manner Use to work with stakeholders on different levels of the organization, including managers Use to work in a demanding and variable environment Excellent written and verbal communication skills Fluent in English Nice to have N/A Other Languages EnglishC1 Advanced Seniority Regular
Posted 16 hours ago
8.0 - 13.0 years
35 - 40 Lacs
Pune
Work from Office
: Job Title: TISO - Information Security compliance LocationPune, India Corporate TitleVP Role Description TISO is responsible to enforce Information Security compliance within their area of responsibility in line with the CISO mandate and strategy as well as the banks risk appetite. Furthermore, TISOs are the experts and points of escalation for all IT security related aspects of the IT assets in their area of responsibility. They provide guidance on how to implement technical control aspects and achieve compliance to the related Information Security controls and ensure appropriate handling of any relevant exceptions. In close cooperation with the respective Chief BISOs they support the business divisions as well as the COO IT counterparts to comply with Security Controls. Deutsche Banks Corporate Bank division is a leading provider of cash management, trade finance and securities finance. We complete green-field projects that deliver the best Corporate Bank - Securities Services products in the world. Our team is diverse, international, and driven by shared focus on clean code and valued delivery. At every level, agile minds are rewarded with competitive pay, support, and opportunities to excel.You will work as part of a cross-functional agile delivery team. You will bring an innovative approach to software development, focusing on using the latest technologies and practices, as part of a relentless focus on business value. You will be someone who sees engineering as team activity, with a predisposition to open code, open discussion and creating a supportive, collaborative environment. You will be ready to contribute to all stages of software delivery, from initial analysis right through to production support. What well offer you 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Align standards, frameworks and security with overall business and technology strategy Identify and communicate current and emerging security threats Create solutions that balance business requirements with information and cyber security requirements Train users in implementation or conversion of systems Derive the IT Security strategy from the overall Chief Information Security Office (CISO) strategy and requirements and translates this into an operational plan for delivery for their area of responsibility In relation to the IT Assets, processes within their scope of responsibility they: Drive integration of Chief Information Security Office Initiatives, programs and central solutions and ensure alignment with the divisional portfolios. Ensure effective and efficient communication, coordination and implementation of CISO IT Security requirements and decisions Are responsible for the adoption of centrally mandated Security Solutions and the maintenance of technical security documentation and compliance to security controls. Are the recognized expert in DB Information Security Policies and procedures and their implementation in relation to technologies. Proactively manages IT audits and plan (in co-operation with COO IT management) preparation and remediation. Ensure appropriate senior management awareness/oversight of follow-up on action items to resolve identified issues, e.g. information security reviews of vendors, audit issue resolution. Spearhead independent reviews of IT Security Controls, prioritise identified issues and assesses remediation actions for quality, considering the optimal cost-risk ratio as well the strategically optimal resolution (e.g. Information Security control evaluation and respective follow up activities). Verify remediation concepts for critical and systemic issues and monitors their execution according to plan and with quality. Partner with key stakeholders (Chief BISOs and IT management etc.) to act as mediator and subject matter expert for them on Information Technology Security topics. Ensure a common understanding of Information Technology Security risks and their implications for the Group and for their scope of responsibility. Your skills and experience Experience of 8-12 years in: Security considerations of cloud computingThey include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks. Identity and access management (IAM) the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources. Experience with and knowledge of: VB.NET, Java/J2EE, ColdFusion, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle. These are some of the technical elements needed to build security into an organization. ISO27001 specifications for a framework of policies and procedures that include all legal, physical and technical controls involved in an organizations risk management Control Objectives for Information and Related Technologies (COBIT) Windows and UNIX environment. General Skills: Exceptional communication skills with diverse audiences - Strong critical thinking and analytical skills Demonstrated ability to identify risks associated with business processes, operations, information security programs and technology projects The ability to be the enterprise security subject matter expert who can explain technical topics to those without a technical background Ability to present and discuss information security related topics to senior committees, fora and groups, and drive decision making Ability to distinguish between noise and real issues, in particular when it comes to the impact of information security risk to the franchise Good understanding of (DB) Findings Management, Control Inventory and how we apply information technology solutions in this space; robust understanding of Anti-Financial Crime Functions in Corporate Banking. Ability to lead, mentor and influence without formal authority, in a complex multi-matrix organization Working with Global teams across multiple time zones Education/Certification Degree in Information Security or a comparable education How well support you
Posted 21 hours ago
6.0 - 11.0 years
15 - 20 Lacs
Pune
Work from Office
: Job TitleSecurity & Risk Delivery Manager Corporate TitleAVP LocationPune, India Role Description The Security Compliance & Risk Team is responsible for the overall security posture and risk governance across all End-User products and services. As delivery manager, you will be responsible for working directly with the EUC Security Compliance and Risk Manager and respective teams and stakeholders to respond to various regulatory and audit demands. This is also a dynamic role which will also entail leading collaboration and driving forward technology refreshes, the billing and various escalations for secure virtual desktops. Youll be a well-seasoned technologist with 10+ years of experience and will join a global team of other expert individuals that collectively make a large impact to our bank through creativity, innovation, and passion. What well offer you , 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Must have strong relationship and project management skills. Drive delivery of risk and regulatory needs of the bank. Ability to distil / simplify technical information for presentation to senior management The ability to multi task, prioritize work and adapt during sometimes pressured situations. Experience of working in a Risk Function or Vendor Risk in a Technology Department Ability to lead discussions with Audit teams effectively Ability to effectively work with business users, developers and other technology colleagues outside of your direct team, across a broad range of business functions and at all levels of the organization Knowledge of Risk tools used in DB ie. GFMS, db SR / Ariba, NAR, Clarity, Waltz . Knowledge of Servicenow, MECM(SCCM), INTUNE, IT Hardware Asset management. Experience of working on coordinating activity related to Technology questionnaires received from regulators. Experience of operating within DBs Finding Management Policy (FMP) and Third Party Management (TPM) KOD Your skills and experience - Must have For Regulatory Audit and Response Effectively manage senior stakeholders in the EUC Technology Towers to manage the Risk & Control activities related to Security & Risk Team. The activities cover multiple risk areas incl. assessing and managing the risk log, remediation of risks, face off to audits, regulatory requests, governing technology risk metrics (incl Information Security), Security alerts, DR/BCM and vendor risk metrics. Evaluate evidence for closure of risk items in line with company policies. Face off to internal risk functions related to various risk initiatives and programmes. Presenting the Risk / Vendor Risk packs and providing updates to the Technology Tower Leads. The key objective here is to provide regular management updates with regards to the progress and challenges being faced regarding risk management activities. Managing regulatory responses for specific Technology towers. Numerous regulators and counterparties assess the banks IT security set up and the responses need to be provided in coordination with the Technology Tower areas appropriately and in a timely way. Actively suggest improvements and efficiencies that benefit the end user community and improve the overall risk processes with specific focus on the Vendor Risk processes. For the Secure Virtual Environment Experience with oversight and management of financial, operational risk, client-facing, and technical aspects of secure virtual environments or related technology. The candidate must have strong relationship and project management skills, be an expert in secure VDI technologies. Experience working with business clients to ensure adherence to relevant policies, including segregation of duties and least privilege access mandates; Govern the Provisioning vendor to ensure they are meeting SLA/KPI expectations, correctly following KOP and Change Management mandates, driving efficiency, accuracy and automation; Preparation of executive management reports and presentations; Experience with Tableau or other relevant dashboarding technology. Ensure on-going preparation of documentation/Key Operating Procedures and perform QA Familiarity with remote computing technologies like ZScaler, MFA, VDI environments, etc. Working knowledge of Microsoft Excel, Word, PowerPoint How well support you . . . . About us and our teams Please visit our company website for further information https://www.db.com/company/company.htm We strive for a culture in which we are empowered to excel together every day. This includes acting responsibly, thinking commercially, taking initiative and working collaboratively. Together we share and celebrate the successes of our people. Together we are Deutsche Bank Group. We welcome applications from all people and promote a positive, fair and inclusive work environment.
Posted 21 hours ago
2.0 - 4.0 years
4 - 6 Lacs
Chennai
Work from Office
The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.
Posted 1 day ago
2.0 - 4.0 years
4 - 6 Lacs
Hyderabad
Work from Office
The Cyber Security E2 role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security E2 domain.
Posted 1 day ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Microsoft Threat Protection. Experience5-8 Years.
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: ServiceNow - GRC. Experience3-5 Years.
Posted 1 day ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: ServiceNow - GRC. Experience5-8 Years.
Posted 1 day ago
5.0 - 8.0 years
5 - 9 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SAP Security. Experience5-8 Years.
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Active Directory. Experience3-5 Years.
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Cloudflare Security. Experience3-5 Years.
Posted 1 day ago
5.0 - 9.0 years
7 - 11 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 day ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Cloud Automation. Experience5-8 Years.
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
Chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Dell One Identity Manager. Experience3-5 Years.
Posted 1 day ago
5.0 - 8.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Active Directory. Experience5-8 Years.
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
Chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SAP GRC - Governance-Risk-Compliance. Experience3-5 Years.
Posted 1 day ago
2.0 - 6.0 years
5 - 9 Lacs
Coimbatore
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT
Posted 1 day ago
3.0 - 8.0 years
9 - 10 Lacs
Bengaluru
Work from Office
About the Job: The Managed Services Senior Security Analyst is responsible for providing security solutions to clients. The Senior Security Analyst will demonstrate the capacity to consistently meet and exceed client expectations, by representing and reinforcing the Cyderes brand through positive interaction with other teams within the company. Perform deep dive investigations into security threats, understand and implement MITRE mapping to identify customers current security posture. Responsibilities: Provide overall guidance, instructions, and mentorship to other Security Analysts Perform triage and security investigation based on advanced analysis tasks across the endpoint, server, and network and provide recommendations. Perform remediation actions wherever applicable. Coordinate Incident investigations and perform deep dive analysis on detected threats. Understand and identify indicators of attack and compromise in alerts, by hunting through data, and from review of investigation notes. Have full understanding of the MITRE ATT&CK framework. Mapping custom use cases to tactics and techniques. Update documentation and runbooks to avoid repeatable alerts. Document, communicate recommendations and guidelines based on results of analysis. Analyze, review, and provide raw log data for more insight into escalations through SIEM. Communicate effectively orally and in writing. Maintain current knowledge and understanding of threat landscape. Requirements: 5 or more years of progressing/in-depth IT security experience. Practical experience in a senior role within the last three years and demonstrated ability to carry out the functions of the job. Previous Experience with any of the two leading SIEM like Splunk, Sentinel, Chronical etc. Previous experience on any of the EDR tools like - Defender, SentinalOne, CrowdStrike etc. Advanced knowledge SIEM platform and query language (KQL or SPL.) Possess at least one industry certification Sec+, CEH SC200, CC (Cloud Fundamental Security knowledge). Prior knowledge of SOAR platform such as Siemplify, Forti soar etc. Understanding of Phishing and email header analysis. Contributing on whitelisting, Tuning management. Experience in SOC and Incident Response activities. Expert-level Analysis of security events. SIEM content management knowledge is an advantage. Basic scripting or development experience will be an added advantage.
Posted 1 day ago
3.0 - 4.0 years
5 - 6 Lacs
Bengaluru
Work from Office
Req ID: 328138 NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now. We are currently seeking a IT Application Operations Service Analyst to join our team in Bengaluru, Karn taka (IN-KA), India (IN). Mandatory Skills Required: Microsoft Technologies: L2 Operations experience, ITIL, Service now Service Now: ITSM, CSM, Reporting & Dashboards Monitoring & Observability Tools: Azure Alerting Optional: Databricks, DataIKU Familiarity with DevOps Pipelines Incident management according to defined service levels Resolving incidents within Service Desk assignment group with the help of the knowledge base Qualify and enhancing incident description and document activities in MR ServiceNow Inform users about the ticket status Ticket processing according to the status model Dispatching to other assignment teams Monitoring all open and unassigned incidents within BDAP Coordinating joint activities and cooperating with other 2nd/3rd level support groups inside and outside the own service organization Documenting solutions in the knowledge base (Knowledge Management or in FAQs on AnalyticsNet) Monitor SLA status or close breaches Handle IT Security or mayor incidents, if necessary, by initializing BDAP Internal Critical and Security Incident Team Alert processing according to defined service levels Processing of IT Security alerts according to knowledge articles Processing of Operational alerts according to knowledge articles Handling of Azure Service Health information Define knowledge articles for new types of alerts Service Request management Prequalify, approve and document activities in the MR ServiceNow notes Tracking the Request workflow Perform compliant firewall requests and changes on behalf of users (De- and whitelisting) Creation of new Service Requests (templates) for the Digi-Ops Service Catalog and maintenance of existing ones Prioritize ticket handling within full Digi-Ops team and define ticket priority based on defined standards Request Changes or Service Requests for Digi-Ops team Manage firewall requests for DO team (De- and whitelisting) and keep PIP_Whitelisting_Status overview up to date Track status, clarify questions, push the workflow and actively report back to team Present changes / service requests in CABs (change advisory boards) User Communication Distribution in official media channels (AnalyticsNet, Yammer, by mail to the target groups, MS Teams channel) Maintain AnalyticsNet Provide FAQs, Known Errors and update existing ones Post important announcements Post maintenance windows and downtimes Check for completeness of relevant information (FAQs, user guides, etc.) Knowledge management Update knowledge base / wiki articles & documents Pick up new topics document accordingly and train new Service Desk team members accordingly Manage DO knowledge base in MR ServiceNow Manage keywords (meta data) within knowledge base Read user guides and other AnalyticsNet content, proactively check for completeness, share Knowledge in team Event support Support events within the Data Analytics community in a self-coordinated way (e.g. technical preparation of wide-range training activities, Datathon support, etc.) About NTT DATA NTT DATA endeavors to make https://us.nttdata.com accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact us at https: / / us.nttdata.com / en / contact-us . This contact information is for accommodation requests only and cannot be used to inquire about the status of applications. NTT DATA is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. For our EEO Policy Statement, please click here . If youd like more information on your EEO rights under the law, please click here . For Pay Transparency information, please click here .
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
Chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Palo Alto Prisma Access. Experience3-5 Years.
Posted 1 day ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The IT security job market in India is booming with the increasing digitization and cyber threats. Organizations across various industries are actively looking for skilled professionals to secure their digital assets and protect sensitive information. If you are considering a career in IT security, India offers a plethora of opportunities for growth and advancement in this field.
The average salary range for IT security professionals in India varies based on experience and expertise. Entry-level positions typically start around INR 3-5 lakhs per annum, while experienced professionals can earn up to INR 15-20 lakhs per annum.
In the field of IT security, a typical career path may include roles such as: - Junior Security Analyst - Security Engineer - Security Consultant - Security Architect - Chief Information Security Officer (CISO)
Apart from technical skills in IT security, professionals are also expected to have knowledge in: - Network Security - Cybersecurity - Risk Management - Compliance - Incident Response
As you prepare for IT security roles in India, remember to showcase your technical skills, knowledge of cybersecurity best practices, and problem-solving abilities during interviews. Stay updated with the latest trends in the field and demonstrate a passion for safeguarding digital assets. With dedication and continuous learning, you can embark on a successful career in IT security in India. Good luck!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6462 Jobs | Ahmedabad
Amazon
6351 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane