Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
We are seeking a highly skilled Senior Application Engineer with strong expertise in network infrastructure, application deployment, and enterprise security tools. The ideal candidate will design and manage robust network architectures while ensuring performance, reliability, and cybersecurity compliance. The role includes working on LAN/WAN/VPN infrastructure, supporting application performance, and managing EDR, XDR, SIEM, and MDM platforms. 🛠 Key Responsibilities: Network & Infrastructure: Design, implement, and manage LAN, WAN, VPN, and wireless network architectures. Configure and install firewalls, routers, switches, and access points. Monitor and maintain network performance, uptime, and security posture. Troubleshoot complex network outages and performance bottlenecks. Maintain network documentation, diagrams, and topology maps. Application Engineering: Lead application deployment, performance tuning, and upgrade rollouts. Manage middleware, web, and application servers (e.g., Apache, Tomcat, IIS). Monitor application health, logs, and metrics for performance or anomalies. Ensure application availability, redundancy, and disaster recovery readiness. Collaborate with DevOps and development teams for CI/CD and production support. Security & Governance: Manage and respond to alerts from EDR/XDR and SIEM platforms (e.g., Splunk, Microsoft Defender, SentinelOne). Implement MDM and endpoint hardening policies. Enforce network segmentation and Zero Trust security principles. Support container security in Docker and Kubernetes environments. 🧰 Tools & Skills: Wireshark, Burp Suite, Nmap, Nessus, Qualys, Splunk, etc. Deep understanding of security frameworks and best practices. Strong documentation, communication, and team collaboration skills. Ability to multitask in a fast-paced and evolving tech landscape. 🎓 Qualifications: B.E. / B.Tech / M.Tech in Computer Science, IT, or equivalent. 3+ years of hands-on experience in network, system, or application engineering. Industry certifications preferred (CCNP, RHCE, CEH, Azure/AWS Security, etc.).
Posted 4 weeks ago
8.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation. Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive. Position Overview: F5 is seeking a highly experienced and results-driven Technical Program Manager (TPM) to lead and manage critical programs focused on software security. This is a senior level role that will drive initiatives that enhance F5’s security posture by implementing best practices for vulnerability management, security scanners, CVE tracking, Security Software Development Life Cycle (SDLC), and more. The ideal candidate will have a deep understanding of security programs, a strong technical background in software development, and a proven track record of successfully delivering cross-functional initiatives in complex environments. As a trusted leader, you will collaborate closely with engineering, security, product, and operations teams to ensure F5’s products and processes meet the highest security standards while enabling business objectives. Key Responsibilities: Program Management: Strategically plan and deliver programs and initiatives across key security and vulnerability management areas, including implementation of security tools (scanners, CI/CD integrations), tracking and addressing vulnerabilities (e.g., CVEs), and enforcing best practices throughout the software development lifecycle. Own program roadmaps, timelines, deliverables, and reporting, ensuring execution aligns with business goals, security requirements, and resource capacity. Drive key metrics and outcomes for security, tracking improvements in vulnerability remediation, compliance, and overall risk reduction. Security SDLC and Vulnerability Management: Partner with engineering and security teams to integrate Security SDLC (Secure Software Development Lifecycle) best practices into the development process, ensuring security is considered and implemented at every stage. Manage programs for vulnerability detection, assessment, and remediation to ensure timely resolution of security risks identified across F5 products and environments. Develop and implement governance processes for tracking and addressing externally reported vulnerabilities, such as Common Vulnerabilities and Exposures (CVEs), ensuring effective prioritization and swift resolution. Cross-Functional Collaboration: Build strong relationships with software engineering, product management, cybersecurity, IT, and operations teams to foster alignment across security-related goals and projects. Act as the central point of coordination for security initiatives, driving progress and ensuring accountability across stakeholders. Facilitate efficient communication between technical and non-technical teams to ensure clarity around priorities, goals, and timelines. Risk and Compliance Management: Drive alignment on security requirements, risk tolerance, and compliance needs, partnering with internal and external security auditors where required. Ensure teams are meeting corporate and industry security standards, including regulatory and policy compliance, while achieving development velocity. Proactively identify and manage security risks through effective mitigation planning and ongoing tracking. Process Improvement and Tooling: Evaluate current security program practices, tools, and workflows, identifying gaps and opportunities for improvement in efficiency and effectiveness. Lead the implementation of automated tools for static and dynamic code analysis, dependency scanning, and configuration management to identify and address vulnerabilities earlier in the development process. Metrics and Reporting: Define, track, and report on KPIs and success metrics for security efforts, including vulnerability remediation rates, defect density reduction, and SLAs for incident response. Provide clear and actionable updates to executive leadership and key stakeholders on the status of security programs, progress, risks, and outcomes. Qualifications: Education: Bachelor’s degree in Computer Science, Software Engineering, Cybersecurity, or a related technical discipline (Master’s preferred). Experience: 8+ years of experience in program management, with at least 3 years focused on security programs, vulnerability management, or security operations (senior level); 10+ years for principal level. Proven experience implementing Security SDLC processes and collaborating with software teams to deliver secure, production-grade solutions. Solid understanding of security domains, particularly vulnerability scanning tools (e.g., Tenable Nessus, Snyk, Qualys), CVE tracking, dependency management, and secure coding practices. Technical Expertise: In-depth knowledge of software development methodologies, including Agile and DevSecOps principles. Familiarity with CI/CD pipelines, source code repositories, and tools for static/dynamic application security testing (e.g., SonarQube, Checkmarx, Veracode). Understanding of vulnerability databases (e.g., NVD), common exploitation techniques, and secure design principles. Basic understanding of threat modeling and risk assessment techniques (stronger expertise is a plus). Leadership and Collaboration: Experience working in highly cross-functional, multi-team environments, with the ability to motivate, guide, and align diverse stakeholders. Exceptional interpersonal, written, and verbal communication skills, with the ability to convey complex security requirements and issues to non-technical audiences, executives, and engineering teams alike. Demonstrated ability to influence without authority and lead by example. Problem Solving and Decision Making: Ability to analyze complex problems, evaluate trade-offs, and make sound decisions in a fast-paced environment. Strong risk management skills, with the ability to balance security needs with engineering velocity and business priorities. Preferred Qualifications: Project management certification (e.g., PMP, PgMP, or PMI-ACP) or security-related certifications (e.g., CISSP, CISM, or CISA). Experience with cloud security and platform-oriented vulnerability management tools like Bugzilla or similar. Familiarity with emerging cybersecurity trends and zero-day vulnerability exploitation techniques. Knowledge of networking and application delivery technologies (F5 experience is a plus!). The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change. Please note that F5 only contacts candidates through F5 email address (ending with @f5.com) or auto email notification from Workday (ending with f5.com or @myworkday.com) . Equal Employment Opportunity It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates. Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.
Posted 4 weeks ago
2.0 years
5 - 9 Lacs
Cochin
On-site
Job requisition ID :: 81576 Date: Jul 3, 2025 Location: Kochi Designation: Consultant Entity: Deloitte Touche Tohmatsu India LLP Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks Your work profile. As an Consultant /Assistant Manager / Deputy Manager in our Cyber Team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - Key Responsibilities: Total 2+years of experience in Cyber security VAPT- Web Application Security Pentesting, Mobile Application Testing, Infra Testing, Source Code Review, Cloud Configuration Review Certification - OSCP, CRTP, CEH, EJPT Understanding of basic business and information technology management processes. Good knowledge of TCP/ IP and Networks including Firewall, IDS/IPS, Routers, Switches, and network architecture. Experience of Web Application Security Testing, Infrastructure VAPT, API testing. Experience on Mobile Security Pen-Testing (iOS and Android). Experience in conducting config reviews of Windows, Linux, UNIX, Solaris, Databases, etc. Experience with Vulnerability Management tools: Kali Linux, Acunetix, AppScan, Nexpose, Qualys Guard, Nessus, Nmap, Metasploit, Fortify etc. Experience in basic scripting such as: Shell, Python, PERL, etc. Basic knowledge of Technologies such as: IPSEC, SSL, SSH, VPN, Ethernet Token Ring, WAP, SMTP, FTP, Frame Relay, WAN, ATM, FDDI, DSL, ISDN, HP Openview, Sun NetManage, Cisco Works, Radius, Big Brother, F5 Desired qualifications B.Tech/M.Tech Candidates must possess security certification of CEH, LPT, OSCP. Good to have security certification for GPEN, CREST/ Your role as a Consultant We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society. In addition to living our purpose, Senior Executive across our organization must strive to be: Inspiring - Leading with integrity to build inclusion and motivation Committed to creating purpose - Creating a sense of vision and purpose Agile - Achieving high-quality results through collaboration and Team unity Skilled at building diverse capability - Developing diverse capabilities for the future Persuasive / Influencing - Persuading and influencing stakeholders Collaborating - Partnering to build new solutions Delivering value - Showing commercial acumen Committed to expanding business - Leveraging new business opportunities Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization Effective communication – Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s) Managing change - Responding to changing environment with resilience Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviours and attitudes to become more inclusive. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome… entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution. In this regard, you may refer to a more detailed advisory given on our website at: https://www2.deloitte.com/in/en/careers/advisory-for-career-aspirants.html?icid=wn_
Posted 4 weeks ago
3.0 years
3 - 6 Lacs
Chennai
On-site
We are seeking a highly skilled Senior Application Engineer with strong expertise in network infrastructure, application deployment, and enterprise security tools. The ideal candidate will design and manage robust network architectures while ensuring performance, reliability, and cybersecurity compliance. The role includes working on LAN/WAN/VPN infrastructure, supporting application performance, and managing EDR, XDR, SIEM, and MDM platforms. Key Responsibilities: Network & Infrastructure: Design, implement, and manage LAN, WAN, VPN, and wireless network architectures. Configure and install firewalls, routers, switches, and access points. Monitor and maintain network performance, uptime, and security posture. Troubleshoot complex network outages and performance bottlenecks. Maintain network documentation, diagrams, and topology maps. Application Engineering: Lead application deployment, performance tuning, and upgrade rollouts. Manage middleware, web, and application servers (e.g., Apache, Tomcat, IIS). Monitor application health, logs, and metrics for performance or anomalies. Ensure application availability, redundancy, and disaster recovery readiness. Collaborate with DevOps and development teams for CI/CD and production support. Security & Governance: Manage and respond to alerts from EDR/XDR and SIEM platforms (e.g., Splunk, Microsoft Defender, SentinelOne). Implement MDM and endpoint hardening policies. Enforce network segmentation and Zero Trust security principles. Support container security in Docker and Kubernetes environments. Tools & Skills: Wireshark, Burp Suite, Nmap, Nessus, Qualys, Splunk, etc. Deep understanding of security frameworks and best practices. Strong documentation, communication, and team collaboration skills. Ability to multitask in a fast-paced and evolving tech landscape. Qualifications: B.E. / B.Tech / M.Tech in Computer Science, IT, or equivalent. 3+ years of hands-on experience in network, system, or application engineering. Industry certifications preferred (CCNP, RHCE, CEH, Azure/AWS Security, etc.). Job Type: Full-time Pay: ₹300,000.00 - ₹660,000.00 per year Benefits: Cell phone reimbursement Flexible schedule Health insurance Paid time off Provident Fund Schedule: Day shift Supplemental Pay: Performance bonus Yearly bonus Work Location: In person
Posted 4 weeks ago
0 years
3 - 4 Lacs
Noida
On-site
Join our Team We are seeking a skilled SIEM Engineer to join our Managed Security Services team. You will be responsible for designing, implementing, managing, and supporting cybersecurity solutions, with a focus on SIEM tools and incident response. This is a hands-on technical role working with internal teams, customers, and third-party vendors to ensure robust security practices. Key Responsibilities: Design, deploy, and manage SIEM tools (e.g., QRadar, ArcSight, Splunk, McAfee ESM) and log integrations Create, tune, and maintain detection rules and dashboards Investigate and respond to security incidents and alerts Participate in security audits, threat hunting, and compliance checks Research emerging threats and enhance detection capabilities Support configuration management, system hardening, and network defense strategies Collaborate across teams to improve security operations and automation Required Skills: Strong hands-on experience with SIEM platforms & SIEM tools (e.g., QRadar, ArcSight, Splunk, McAfee ESM) and log integrations Deep understanding of security operations , incident response , and network/system security Experience with scanning tools (e.g., Nessus, Qualys ) and PAM solutions (e.g., CyberArk, BeyondTrust ) Solid knowledge of Linux/Windows environments and enterprise networks Familiar with encryption, security controls, and system hardening best practices Excellent analytical, troubleshooting, and communication skills Preferred: Security certifications (e.g., CEH, CISSP, GCIA, GCIH) Experience in automation and scripting for SOC workflows Willingness to participate in on-call support rotation Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Noida Req ID: 769625
Posted 4 weeks ago
6.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
WHO ARE WE? We are a bunch of super enthusiastic, passionate, and highly driven people, working to achieve a common goal! We believe that work and the workplace should be joyful and always buzzing with energy! CloudSEK, one of India’s most trusted Cyber security product companies, is on a mission to build the world’s fastest and most reliable AI technology that identifies and resolves digital threats in real-time. The central proposition is leveraging Artificial Intelligence and Machine Learning to create a quick and reliable analysis and alert system that provides rapid detection across multiple internet sources, precise threat analysis, and prompt resolution with minimal human intervention. Founded in 2015, headquartered at Singapore, we are proud to say that we’ve grown at a frenetic pace and have been able to achieve some accolades along the way, including: CloudSEK’s Product Suite: CloudSEK XVigil constantly maps a customer’s digital assets, identifies threats and enriches them with cyber intelligence, and then provides workflows to manage and remediate all identified threats including takedown support. A powerful Attack Surface Monitoring tool that gives visibility and intelligence on customers’ attack surfaces. CloudSEK's BeVigil uses a combination of Mobile, Web, Network and Encryption Scanners to map and protect known and unknown assets. CloudSEK’s Contextual AI SVigil identifies software supply chain risks by monitoring Software, Cloud Services, and third-party dependencies. Key Milestones: 2016 : Launched our first product. 2018 : Secured Pre-series A funding. 2019 : Expanded operations to India, Southeast Asia, and the Americas. 2020 : Won the NASSCOM-DSCI Excellence Award for Security Product Company of the Year. 2021 : Raised $7M in Series A funding led by MassMutual Ventures. Awards & Recognition : Won NetApp Excellerator's "Best Growth Strategy Award," CloudSEK XVigil joined NVIDIA Inception Program, and won the NASSCOM Emerge 50 Cybersecurity Award. 2025 : Secured $19 million in funding led by Tenacity Ventures, Commvault. BeVigil is CloudSEK’s Attack Surface Monitoring (ASM) product used by enterprises globally to identify, monitor, and secure their external attack surface . It enables organizations to discover shadow assets, misconfigurations, leaked credentials, and other exposures—before adversaries do.We are now scaling BeVigil further and are looking for a Product Manager with prior experience in security engineering or research, who can deeply empathize with the user and drive product evolution. What You'll Own Lead the product roadmap and vision for BeVigil, aligning with enterprise customer needs and evolving threat landscapes. Work closely with enterprise security teams to gather insights, validate use cases, and translate needs into product features. Define and enhance features across asset discovery, vulnerability mapping, alerting, and integrations. Collaborate with security researchers, engineers, and designers to ship high-impact features. Stay ahead of attacker trends, emerging vulnerabilities, and technologies in the ASM space. You’ll Be a Great Fit If You Have: 3–6 years of total experience , including at least 1–2 years in a cybersecurity role (security engineer, DevSecOps, or threat researcher) and 1–2 years in product management. Deep understanding of attack surface management , vulnerability assessment, threat exposure, and cyber hygiene practices. Hands-on familiarity with tools like Shodan, Nessus, Nmap, Burp Suite, OSINT frameworks, or SIEM/SOAR platforms . Experience working on enterprise SaaS products , especially in B2B security or developer tooling. Strong communication skills to work cross-functionally with GTM, engineering, research, and client success teams. Bonus: Worked on or evaluated CNAPP, CSPM, or ASM tools in your prior roles.
Posted 4 weeks ago
0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Join our Team We are seeking a skilled SIEM Engineer to join our Managed Security Services team. You will be responsible for designing, implementing, managing, and supporting cybersecurity solutions, with a focus on SIEM tools and incident response. This is a hands-on technical role working with internal teams, customers, and third-party vendors to ensure robust security practices. Key Responsibilities: Design, deploy, and manage SIEM tools (e.g., QRadar, ArcSight, Splunk, McAfee ESM) and log integrations Create, tune, and maintain detection rules and dashboards Investigate and respond to security incidents and alerts Participate in security audits, threat hunting, and compliance checks Research emerging threats and enhance detection capabilities Support configuration management, system hardening, and network defense strategies Collaborate across teams to improve security operations and automation Required Skills: Strong hands-on experience with SIEM platforms & SIEM tools (e.g., QRadar, ArcSight, Splunk, McAfee ESM) and log integrations Deep understanding of security operations, incident response, and network/system security Experience with scanning tools (e.g., Nessus, Qualys) and PAM solutions (e.g., CyberArk, BeyondTrust) Solid knowledge of Linux/Windows environments and enterprise networks Familiar with encryption, security controls, and system hardening best practices Excellent analytical, troubleshooting, and communication skills Preferred: Security certifications (e.g., CEH, CISSP, GCIA, GCIH) Experience in automation and scripting for SOC workflows Willingness to participate in on-call support rotation Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Noida Req ID: 769625
Posted 4 weeks ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. Your work profile. Work you’ll do as a part of our Cyber team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. You’ll: • Works on projects with clearly defined guidelines as team member with responsibility for project delivery • Works under general supervision with few direct instructions • Performs cyber security assessments which includes vulnerability assessment & penetration testing, network security architecture review, secure configuration / code review, etc. • Understands basic business and information technology management processes. • Demonstrates knowledge of firm's methodologies, frameworks and tools • Participate in practice development initiatives The key skills required are as follows: • Understanding of basic business and information technology management processes • Good knowledge of TCP/ IP and Networks including Firewall, IDS/IPS, Routers, Switches, and network architecture • Experience in Infrastructure Penetration Testing and Application Security Testing • Experience in Secure Code Review (Code Security Review) • Experience in conducting configuration reviews of Windows, Linux, UNIX, Solaris, Databases, etc. • Experience with Vulnerability Management tools: Kali Linux, Acunetix, AppScan, Nexpose, Qualys Guard, Nessus, Nmap, Metasploit, Fortify etc. • Experience in basic scripting such as: Shell, Python, PERL, etc. • Basic knowledge of Technoilogies such as: IPSEC, SSL, SSH, VPN, Ethernet Token Ring, WAP, SMTP, FTP, Frame Relay, WAN, ATM, FDDI, DSL, ISDN, HP Openview, Sun NetManage, Cisco Works, Radius, Big Brother, F5 Role and Responsibilities: • Understanding of basic business and information technology management processes • Good knowledge of TCP/ IP and Networks including Firewall, IDS/IPS, Routers, Switches, and network architecture • Experience in Infrastructure Penetration Testing and Application Security Testing • Experience in Secure Code Review (Code Security Review) • Experience in conducting configuration reviews of Windows, Linux, UNIX, Solaris, Databases, etc. • Experience with Vulnerability Management tools: Kali Linux, Acunetix, AppScan, Nexpose, Qualys Guard, Nessus, Nmap, Metasploit, Fortify etc. • Experience in basic scripting such as: Shell, Python, PERL, etc. • Basic knowledge of Technoilogies such as: IPSEC, SSL, SSH, VPN, Ethernet Token Ring, WAP, SMTP, FTP, Frame Relay, WAN, ATM, FDDI, DSL, ISDN, HP Openview, Sun NetManage, Cisco Works, Radius, Big Brother, F5 Educational Qualification: Bachelor’s/master’s degree Certifications: OSCP How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome… entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organization and the business area you’re applying to. Check out recruiting tips from Deloitte professionals.
Posted 4 weeks ago
10.0 - 15.0 years
15 - 19 Lacs
Bengaluru
Work from Office
We seek a highly skilled and motivated Test Architect in the core domain to join our dynamic global team. You will be a key member of our Core Solutions team, This role will be critical in providing advanced expertise in IPv4/IPv6, firewalls, cloud core technologies, and Software Test experience in Telco grade products. You Have: Any Bachelor's degree or Master's degree, or equivalent degree, with 10+ years of relevant Software Test experience in Telco-grade products 7+years of System test experience in Functional and serviceability areas with high-traffic, large-scale distributed systems, and client-server architectures Good experience in verification ofCloud Native, Microservices applications, using Containers and Virtualization Technologies like Docker, Kubernetes (K8s), Consul, Redis, gRPC, Helm, Envoy, and Open Source Integration. Good experience in security testing of a product and knowledge of various security scans like Black Duck Hub, Tenable, Codenomicon/Defensics, Malware, Anchore, NMAP, Nessus, etc. Good working experience in IMS, VoLTE, 4G/5G core technologies. In-depth and working experience with cloud-ready, cloud-native, microservices, and containers architecture, DevOps, CI/CD. It would be nice if you also had: Prior experience in interfacing with customers & customer teams is an added advantage. Should have worked on the toolsets like Jira, Jenkins, or Bamboo. Able to bring in innovative practices for chaotic programmable tests like Chaos Monkey, Janitor Monkey etc. Own and drive CNCS Functional testing across multiple core network NFs like SBC, TAS, CSCF, and MRF. Own and drive CNCS security testing and execute various security scans, and analyze the scan reports. Identify security vulnerabilities in the product. Validate security-related enhancements. Overall, Responsible for driving the Test strategy and planning for CNCS releases, Test effectiveness and Improvements for the CNCS product in functional/non-functional areas, and accountable for fault escapes. Understand new feature enhancements in SBC, NTAS, CSCF, MRF, etc. NFs and plan testing of critical features therein within CNCS. Analyse critical customer issues, help identify solutions, and ensure similar issues dont escape internal testing. Work effectively in a mixed environment and use best practices and knowledge of internal or external business issues to improve products or services. Plan technical requirements from customers needs. Apply and maintain quality standards. Participate in process and tool evolutions and identify improvements therein. Mentor junior team members and help them realize their full potential.
Posted 1 month ago
6.0 - 11.0 years
11 - 15 Lacs
Bengaluru
Work from Office
We seek a highly skilled and motivated Test Lead in the core domain to join our dynamic global team. You will be a key member of our Core Solutions team, This role will be critical in providing advanced expertise in IPv4/IPv6, firewalls, cloud core technologies, and Software Test experience in Telco grade products. You Have: Any Bachelor's degree or Master's degree, or equivalent degree, with 6+ years of relevant Software Test experience in Telco grade products. System test experience in Functional and serviceability areas with high-traffic, large-scale distributed systems and client-server architectures. Good experience in verification ofCloud Native, Microservices applications, using Containers and Virtualization Technologies like Docker, Kubernetes (K8s), Consul, Redis, gRPC, Helm, Envoy, and Open Source Integration. Experience with security testing of a product and knowledge of various security scans like Black Duck Hub, Tenable, Codenomicon/Defensics, Malware, Anchore, NMAP, Nessus etc is an added advantage. Good working experience in IMS, VoLTE, 4G/5G core technologies. Working experience with cloud-ready, cloud-native, micro services and containers architecture, DevOps, CI/CD. It would be nice if you also had: Prior experience in interfacing with customers & customer teams is an added advantage. Should have worked on the toolsets like Jira, Jenkins, or Bamboo. Able to bring in innovative practices for chaotic programmable tests like Chaos Monkey, Janitor Monkey, etc. Contribute to CNCS Functional testing across multiple core network NFs like SBC, TAS, CSCF, and MRF. Contribute to CNCS security testing and execute various security scans, and analyze the scan reports. Validate security related enhancements. Own end-to-end CNCS functional features and deliver with quality. Overall, Responsible for driving the Test strategy, Test effectiveness, and Improvements for the CNCS product in functional/non-functional areas, and accountable for fault escapes. Works effectively in a mixed environment and uses best practices and knowledge of internal or external business issues to improve products or services. Plan technical requirements from customers needs. Applies and maintains quality standards. Participates in process and tool evolutions and improvements.
Posted 1 month ago
5.0 - 10.0 years
16 - 20 Lacs
Bengaluru
Work from Office
Educational Bachelor of Engineering,Master Of Engineering Service Line Cyber Security Responsibilities Approx 5 years' experience as a Security Architect Bachelor's degree in information technology, security, or similar Experience in providing security architecture support to a large development organization Information security credentials such as IGP, CISSP or similar Well versed in cloud security on a generic level as well as AWSSecondary Skills: SAST and DASTSolid diplomatic and communication skills in EnglishThe candidate will primary work with security assessments and as part of that also be able to provide guidance on how to close security gaps The candidate will also be part of "shift left" for assessments to automate and minimize the manyal work involved It is also expected that the candidate will assist in creating an assessment " factory" with a streamlined process for approaching assessments Preferred Skills: Technology-Enterprise Architecture-Data / Information Architecture
Posted 1 month ago
10.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Job Description: Introduction: A Career at HARMAN Digital Transformation Solutions (DTS) We’re a global, multi-disciplinary team that’s putting the innovative power of technology to work and transforming tomorrow. At HARMAN DTS, you solve challenges by creating innovative solutions. Combine the physical and digital, making technology a more dynamic force to solve challenges and serve humanity’s needs Work at the convergence of cross channel UX, cloud, insightful data, IoT and mobility Empower companies to create new digital business models, enter new markets, and improve customer experience. About The Role- Senior Penetration Tester with deep expertise in application security . The ideal candidate will be responsible for planning, executing, and documenting comprehensive penetration tests, including advanced manual testing techniques and contribute to strengthening our security posture by recommending practical solution principles and secure coding practices . What You Will Do Conduct comprehensive penetration tests on web/mobile/cloud applications, firmware, and hardware devices. Perform manual security testing beyond automated tools to uncover complex vulnerabilities. Analize systems and architecture to identify security risks and attack surfaces. Use industry-standard tools such as Metasploit, Burp Suite, Nmap, Wireshark, Nessus, and custom scripts for exploitation and reconnaissance. Simulate real-world attack scenarios to evaluate system resilience. Develop and present detailed reports with proof-of-concept (PoC), risk assessments, and remediation guidance. Collaborate with development and DevOps teams to suggest secure coding practices and fix vulnerabilities at the root. Stay up to date with emerging threats, vulnerabilities, and industry trends. What You Need 8–10 years of hands-on experience in penetration testing (application and hardware). Strong knowledge of OWASP Top 10, SANS 25, and common vulnerability patterns. Deep familiarity with exploit frameworks (e.g., Metasploit), reverse engineering, and hardware-level attack techniques (e.g., JTAG, UART, SPI). Experience analyzing and testing embedded systems, IoT devices, and network appliances. Ability to explain vulnerabilities to non-security stakeholders with clarity. Proven experience in crafting custom exploits or payloads. Solid understanding of secure development lifecycle (SDLC) and CI/CD pipeline integration. Certifications like OSCP, OSCE, GPEN, or similar are a strong plus. What Is Nice To Have Knowledge of containerized environments. Familiarity with secure boot, firmware integrity, and hardware encryption modules. Contribution to bug bounty platforms or CVE submissions. What Makes You Eligible Any offer of employment is conditioned upon the successful completion of a background investigation and drug screen. Dedicated performer & team player with the ability to advocate appropriately for product quality. Relentless learner with a dedication to learn new technologies and test methods Self-driven and Innovative to drive continuous improvements in Test process Resourcefulness in triaging problems and coordinating with multiple teams for issue resolution Strong written, verbal communication and inter personal relationship skills You Belong Here HARMAN is committed to making every employee feel welcomed, valued, and empowered. No matter what role you play, we encourage you to share your ideas, voice your distinct perspective, and bring your whole self with you – all within a support-minded culture that celebrates what makes each of us unique. We also recognize that learning is a lifelong pursuit and want you to flourish. We proudly offer added opportunities for training, development, and continuing education, further empowering you to live the career you want. About HARMAN: Where Innovation Unleashes Next-Level Technology Ever since the 1920s, we’ve been amplifying the sense of sound. Today, that legacy endures, with integrated technology platforms that make the world smarter, safer, and more connected. Across automotive, lifestyle, and digital transformation solutions, we create innovative technologies that turn ordinary moments into extraordinary experiences. Our renowned automotive and lifestyle solutions can be found everywhere, from the music we play in our cars and homes to venues that feature today’s most sought-after performers, while our digital transformation solutions serve humanity by addressing the world’s ever-evolving needs and demands. Marketing our award-winning portfolio under 16 iconic brands, such as JBL, Mark Levinson, and Revel, we set ourselves apart by exceeding the highest engineering and design standards for our customers, our partners and each other.
Posted 1 month ago
3.0 years
2 - 4 Lacs
Cochin
Remote
Job Title : Security Analyst – Client Services & Team Leadership Location : Kochi, Kerala Experience : 3–8 years Team Size to Manage : 2–5 Junior Analysts Industry Type : IT Services & Consulting / Cybersecurity Functional Area : ISM / TVM / GRC / Threat Intelligence Budget : As per Industry Urgency : 15–30 days Job Description We are seeking a Security Analyst with strong technical skills, client-facing experience, and a passion for mentoring junior resources. This role is ideal for professionals looking to lead cybersecurity services, build teams, and deliver impactful security solutions to clients across industries. Key Responsibilities Lead end-to-end cybersecurity services for assigned clients, including incident response, threat analysis, and vulnerability management Conduct risk assessments, prepare technical reports, and advise clients on improving their security posture Mentor and train junior analysts; create training programs, SOPs, and knowledge-sharing sessions Monitor SIEM, EDR, IDS/IPS tools to detect, analyze, and respond to threats Develop and maintain use cases, detection rules, and incident escalation protocols Coordinate with internal and external stakeholders to meet SLA targets Document incident timelines, root cause analysis (RCA), and ensure compliance with security frameworks like ISO 27001, NIST, or MITRE ATT&CK Requirements Education Bachelor’s degree in Computer Science / Cybersecurity / Information Technology Experience 3–7 years in cybersecurity operations 2+ years in a client-facing or leadership/mentoring role Technical Skills Hands-on experience with SIEM tools (e.g., Splunk, QRadar) Working knowledge of Vulnerability Scanners (e.g., Nessus, Qualys) Proficiency in Incident Detection, Threat Hunting, EDR Tools Scripting skills (Python / PowerShell) is a plus Key Competencies Strong leadership and team-building skills Excellent verbal and written communication Analytical mindset and proactive problem solver Ability to manage clients, priorities, and incidents efficiently ABOUT UPSMART SOLUTIONS UpSmart Solutions is at the forefront of technological innovation, offering a wide range of services including big data analytics, application design, digital infrastructure development, and more. Our mission is to deliver top-notch solutions that help our clients achieve their digital transformation goals. With a team of dedicated professionals, we pride ourselves on our ability to provide high-quality, innovative solutions that exceed client expectations. WHY WORK AT UPSMART SOLUTIONS PROFESSIONAL DEVELOPMENT We offer continuous learning opportunities, including workshops, certifications, and mentorship programs to help you grow in your career. COMPETITIVE COMPENSATION Our compensation packages are designed to attract and retain top talent, with competitive salaries, bonuses, and benefits. POSITIVE WORK ENVIRONMENT Enjoy a collaborative and inclusive workplace where your ideas are valued, and your contributions make a real impact. WORK-LIFE BALANCE We understand the importance of balancing work with personal life, offering flexible working hours and remote work options. INNOVATIVE PROJECTS Be part of groundbreaking projects that leverage the latest technologies in big data, AI, and digital transformation. HEALTH AND WELLNESS We prioritize your well-being with comprehensive health plans, wellness programs, and a supportive work culture. JOIN OUR TEAM Are you ready to take your career to the next level? At UpSmart Solutions, we are always on the lookout for talented individuals who are passionate about technology and innovation. Join us and be part of a team that is dedicated to delivering cutting-edge solutions and making a real impact in the tech industry. Apply now and start your journey with us!
Posted 1 month ago
3.0 - 4.0 years
1 - 2 Lacs
Chennai
On-site
Hello Visionary! We empower our people to stay resilient and relevant in a constantly changing world. We’re looking for people who are always searching for creative ways to grow and learn. People who want to make a real impact, now and in the future. Does that sound like you? Then it seems like you’d make a great addition to our vibrant team. We are looking for a Penetration Tester. This position is available for Chennai Location. You’ll make a difference by: Having experience in performing advanced penetration testing on networks, web & mobile applications, and systems. Having ability to Identify vulnerabilities, exploit weaknesses, and assess the security posture of various assets. Having ability to develop and maintain automated testing tools and scripts. Creating detailed reports outlining findings, risks, and recommended actions. Having Extensive experience in penetration testing, vulnerability assessment, and ethical hacking. Having Proficiency with penetration testing tools such as Metasploit, Burp Suite, Nmap, Nessus, and others. Strong understanding of network protocols, web and mobile applications, and operating systems. Maintaining documentation of testing methodologies, tools, and processes. Knowledge of scripting and programming languages (e.g., Python, Bash). You’ll win us over by: Having An engineering degree B.E/B.Tech/M.E/M.Tech with good academic record. 3-4 Years of relevant experience as Penetration Tester. Having Good command over English language (spoken & written) is non-negotiable. Working closely with business partners to understand their needs and translate them into technical requirements. Communicating findings, risks, and remediation strategies to both technical and non-technical stakeholders. Foster strong relationships with business units to ensure security measures align with business goals. Certification Preferred: Entry level certifications like CEH, eJPT, eWPT. Other certifications like eWPTX, OSCP is an advantage. We’ll support you with: Hybrid working Opportunities. Diverse and inclusive culture. Great variety of learning & development opportunities. Join us and be yourself! We value your unique identity and perspective, recognizing that our strength comes from the diverse backgrounds, experiences, and thoughts of our team members. We are fully committed to providing equitable opportunities and building a workplace that reflects the diversity of society. We also support you in your personal and professional journey by providing resources to help you thrive. Come bring your authentic self and create a better tomorrow with us. Make your mark in our exciting world at Siemens. This role is based in Chennai and is an Individual contributor role. You might be required to visit other locations within India and outside. In return, you'll get the chance to work with teams impacting - and the shape of things to come. We're Siemens. A collection of over 319,000 minds building the future, one day at a time in over 200 countries. Find out more about Siemens careers at: www.siemens.com/careers
Posted 1 month ago
4.0 years
0 Lacs
India
On-site
Job Title: VAPT Consultant / SCON/ DM/ M/ SM/ AD Location: Gurgaon, Delhi NCR (Work from Office) Experience: 4+ Years Certifications: OSCP - Mandatory Joining: Immediate joiners preferred Job Description: We are seeking a highly skilled and motivated VAPT Consultant with a strong background in Vulnerability Assessment and Penetration Testing. The ideal candidate must hold an OSCP certification and possess hands-on experience in identifying and mitigating security vulnerabilities in networks, web applications, and infrastructure. Key Responsibilities: Perform Vulnerability Assessments and Penetration Testing (Web, Mobile, Network, APIs, Cloud, etc.) Simulate real-world attacks to identify and exploit vulnerabilities Prepare detailed technical reports , risk ratings, and remediation recommendations Collaborate with development and infrastructure teams to close security gaps Stay updated with the latest vulnerabilities, hacking techniques, and threat vectors Assist in security audits , threat modeling, and risk assessments Contribute to red team/blue team security exercises and internal security knowledge building Required Skills: Minimum 4 years of hands-on VAPT experience OSCP Certification is mandatory Strong knowledge of OWASP Top 10, MITRE ATT&CK framework Proficient in using tools like Burp Suite, Nmap, Nessus, Metasploit, Kali Linux, Wireshark, etc. Experience in scripting (Python, Bash, or PowerShell) is an added advantage Understanding of network protocols, firewalls, and security controls Excellent analytical, communication, and reporting skills Preferred Qualifications: Experience with cloud security assessments (AWS, Azure, GCP) Exposure to red teaming or purple teaming engagements Ability to clearly communicate findings to both technical and non-technical stakeholders
Posted 1 month ago
2.0 - 4.0 years
4 - 6 Lacs
Gurugram
Work from Office
Why this job matters As an experienced Information Security Services provider, we will help lead a highly motivated team laser-focused on analysing, designing, developing and delivering solutions built to stop adversaries and strengthen your operations Our Competent individuals and Skilled leadership will provide you incident response, risk reviews and vulnerability assessments, identifying threats, all of which ladder up to driving secure solutions. What Ill be doing your accountabilities Accountable for delivering vulnerability assessments and penetration tests. Responsible for increasing individual technical skill whilst also delivering BAU. Accountable for increasing capability of the penetration testing team through web application, network & mobile skill acquisition. Accountable for support leadership in setting strategy for the team moving forward. Responsible for contributing to the positive research and technical capability of BT security. To support and maintain the BT Business Support Protect BT ISO27001 certificate for Offensive Security team The skills you need Pentest Skills Web application pen test (OWASP, NIST framework), Network pen test (Linux, windows), API & Mobile pen test. Networking Skills TCP/IP packet level understanding, Routing, Switching, firewall understanding. Linux Skills Linux directory structure & basic command line knowledge from pentest/vulnerability assessment standpoint. Vulnerability management- This requires understanding of vulnerability assessment framework (CVE/CVSS) and Security assessment tools (such as Nmap, Metasploit, Burp Suite, SQL map, Nessus) Regulatory Understanding- PCI DSS guidelines, GDPR. Leadership accountabilities Accountabilities of the job: Solution focused achiever: We need this person to focus on delivering exceptional penetration testing services Customer champion: we are transforming how we communicate with our customers and need responsible person with a customer-focused attitude. Change agent: We need a tester who sees our processes and immediately thinks of better ways to do what we are doing and then leads that change. Experience you would be expected to have Mandatory 2-4 Years experience in the field on pen testing. Mandatory Bachelors degree or higher preferred. CEH, OSCP, CREST, LPT certifications are highly preferred. Ability to understand packet level TCP/IP knowledge. Good scripting knowledge (e.g. Python) will be highly preferred. Capable of working successfully with end customers PREFERRED.
Posted 1 month ago
6.0 - 10.0 years
8 - 12 Lacs
Gurugram
Work from Office
What youll be doing your accountabilities Leading a squad of skilled cyber security practitioners delivering new security controls and enhancements. Ensuring that delivery work is aligned with strategy and feeding outcomes and learning back into strategy. Developing Agile business cases in conjunction with key stakeholders. Prioritising squad work to deliver the greatest impact for the investment. Mobilising and overseeing end-to-end delivery of epics (from concept to closure). Ensuring that all required policies and procedures are complied with. Setting up and maintaining accurate epic financial forecasting and tracking glide-path to budget. Risk/issue and management. Managing change. Working across BT Group ensuring that deliveries of changes/risk controls are embedded in the operational organisation Working across BT Group ensuring that the operational effectiveness of delivered changes/risk controls are measured. Working across BT Group ensuring that benefits are realised and measured. Providing reporting to Security Portfolio Board (stakeholders up to BT CISO and BT CIO) and Security governance forums e.g. Security Council, Security Forum. Experience youd be expected to have MANDATORY 5+ years demonstrable experience of successfully leading complex, high value deliveries in an IT domain Excellent communication skills Strong stakeholder management skills Self-starter and able to manage time effectively Able to work accurately with numbers and data In receipt of formal training in Agile methodologies and can apply the knowledge to specific circumstances (accreditation doesnt need to be current) Demonstrable experience of successfully using Agile methodologies for delivery PREFERRED Degree or equivalent qualification/experience Experience leading complex cyber security deliveries Knowledge and experience of cyber assessment frame works Knowledge and experience of cyber risk management Experience of managing a significant budget in excess of 1m
Posted 1 month ago
3.0 - 5.0 years
0 Lacs
Pune, Maharashtra, India
On-site
About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. Position Summary We are seeking a System Test Engineer with expertise in SaaS applications providing cybersecurity solution to join our dynamic team. The ideal candidate will play a critical role in testing, validating, and ensuring the reliability and security of our SaaS-based cyber security platform. This position requires strong analytical skills, hands-on experience with automation, and a deep understanding of cloud environments, networking protocols, firewalls and security frameworks. Key Responsibilities Design, develop, and execute system-level test plans, test cases, and automated test scripts for a SaaS-based cyber security platform. Validate end-to-end functionality, scalability, and performance of security applications integrated with external ITSM systems. Develop and maintain automation frameworks to streamline test execution and enhance test coverage. Conduct security, performance, and regression testing to identify vulnerabilities, bottlenecks, and reliability issues. Test and validate the functionality of agents that connect with the SaaS platform. Work closely with development, product management, and DevOps teams to troubleshoot issues and ensure high-quality product releases. Implement and execute API testing, system integration testing, and user acceptance testing. Participate in test strategy planning and provide feedback for continuous improvement of the test process. Required Skills & Qualifications A bachelor’s or master’s degree in computer science, electronics engineering or a related field 3-5 years of experience in system testing for SaaS applications and Cyber Security platforms. Strong knowledge of networking protocols (TCP/IP, HTTP/HTTPS, DNS, VPN, IPSec, TLS, etc.). Strong understanding of security concepts such as firewalls, IDS/IPS, zero-trust architecture, and cloud security controls. Hands-on experience with test automation tools (Selenium, Robot Framework, PyTest, etc.). Proficiency in scripting and automation using Python, Bash, or similar languages. Experience working with cloud platforms such as AWS, Azure, or Google Cloud. Familiarity with containerization and orchestration tools like Docker and Kubernetes. Experience with CI/CD pipelines and DevOps processes. Strong troubleshooting and debugging skills in distributed systems and cloud environments. Preferred Qualifications Knowledge of security frameworks such as SOC2, ISO 27001, and compliance standards. Experience with security testing tools such as Burp Suite, Nessus, Wireshark, or Metasploit. Familiarity with Infrastructure as Code (IaC) tools such as Terraform or Ansible. Certifications such as AWS Certified Security - Specialty, CCNA Security, CISSP, or CEH are a plus. Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted.
Posted 1 month ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
audius India Private Limited is looking for a full-time "Security Consultant" for Pune, India location. Your deep expertise in the security domain is our top priority. Prior experience in information security or risk consulting is highly valued. You’ll be responsible for: Conducting application threat modeling using STRIDE/DREAD frameworks Leveraging C4 data model architecture to identify trust boundaries and potential security gaps Developing application risk profiles and crafting actionable remediation strategies Performing penetration testing on cloud infrastructures, thick client applications, and enterprise systems Collaborating with product teams and clients to develop threat models and offer clear, actionable insights on risks, vulnerabilities, and attack vectors What We’re Looking For: Deep understanding of information security principles, cloud security, architecture, and cryptographic protocols Hands-on experience in large-scale cloud environments (SaaS, PaaS, IaaS) and cloud-native security Knowledge of CI/CD pipeline security and OWASP tools & methodologies Understanding of secure coding practices and common vulnerabilities Familiarity with tools like Burp Suite, Nessus, Wireshark, and other penetration testing frameworks Strong analytical and problem-solving skills Excellent communication and documentation skills in English (German is a plus!) A collaborative, confident, and customer-focused attitude Preferred Certifications: Candidates with one or more of the following certifications will have an added advantage: CISSP – Certified Information Systems Security Professional CCSP – Certified Cloud Security Professional CSSLP – Certified Secure Software Lifecycle Professional If this sounds like your next career move, we’d love to hear from you. Apply now and be a part of audius.
Posted 1 month ago
7.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Job Title: AD Security Specialist – Tenable & ManageEngine Location: Mumbai Job Type: Full-Time Experience: 4–7 years Notice Period: Immediate Joiners Preferred Job Overview: We are looking for an experienced AD Security Specialist to manage, integrate, and govern security solutions related to Active Directory (AD) using Tenable and ManageEngine . The ideal candidate will have hands-on experience in security deployment and should be capable of leading integration and governance initiatives independently. Key Responsibilities: Implement and manage security tools, primarily Tenable and ManageEngine, in AD environments. Lead the deployment and configuration of security solutions across enterprise systems. Perform integration of tools and ensure smooth interoperability with existing infrastructure. Monitor, audit, and govern security posture in Active Directory and related systems. Identify and respond to vulnerabilities using Tenable scans and reports. Support incident response and root cause analysis for AD-related security events. Collaborate with IT and security teams to enhance the overall security framework. Maintain documentation and provide regular updates on AD security status and improvements. Requirements: Proven experience in Active Directory security and governance. Strong hands-on knowledge of Tenable (Nessus, Tenable.io) and ManageEngine (AD360, Log360, etc.) . Experience in deploying and integrating security solutions in enterprise environments. Good understanding of identity and access management (IAM), security policies, and best practices. Strong troubleshooting and analytical skills. Excellent communication and documentation abilities. Preferred Qualifications: Relevant certifications (e.g., Microsoft, Tenable, CompTIA Security+). Experience working in regulated industries or environments with high compliance standards.
Posted 1 month ago
8.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Role: L3-Information Security Job Description: Primary Responsibility would be to manage the organizational practices for the following: Vulnerability Assessment Infrastructure(Cloud/Traditional DC) Penetration Testing Configuration Review Red Teaming Should be able to lead the team for delivery of Vulnerability Management operations. Conduct penetration testing as per the calendar activities and on demand request for Infrastructure Vulnerability Assessment. Conduct Vulnerability Assessment and Penetration Testing on Cloud Environment (AWS, GCP, Azure). Conduct configuration review as per the calendar activities and on demand request for server, database, network components. Identify and propose work – around for critical vulnerabilities. Explain vulnerabilities to System owners and provide recommendations for mitigation Monitor progress of vulnerability mitigations and maintain track of remediation Provide advisory support to internal IT team for closure of identified vulnerability during the security testing Coordinate fixing of identified and accepted vulnerabilities with Airtel Payments Bank and Security Vendors. Stay abreast of newer trends in tools and technologies used for application security Develop POCs to demonstrate security issues Qualification: B.Tech, B.E, MCA or equivalent from a Recognized university At least 8 years of experience in similar role Certifications Preferred: OSCP, EC-council LPT. Hands on experience with popular security tools – Nessus, Metasploit, KALI Linux. Working knowledge of CIS Security benchmarks Has practical experience in auditing various OS , DB , Network and Security technologies
Posted 1 month ago
5.0 - 7.0 years
5 - 5 Lacs
Thiruvananthapuram
Work from Office
Role Proficiency: Resolve enterprise trouble tickets within agreed SLA and raise problem tickets for permanent resolution and/or provide mentorship (Hierarchical or Lateral) to junior associates Outcomes: 1) Update SOP with updated troubleshooting instructions and process changes2) Mentor new team members in understanding customer infrastructure and processes3) Perform analysis for driving incident reduction4) Escalate high priority incidents to customer and organization stakeholders for quicker resolution5) Contribute to planning and successful migration of platforms 6) Resolve enterprise trouble tickets within agreed SLA and raise problem tickets for permanent resolution7) Provide inputs for root cause analysis after major incidents to define preventive and corrective actions Measures of Outcomes: 1) SLA Adherence2) Time bound resolution of elevated tickets - OLA3) Manage ticket backlog timelines - OLA4) Adhere to defined process - Number of NCs in internal/external Audits5) Number of KB articles created6) Number of incidents and change ticket handled 7) Number of elevated tickets resolved8) Number of successful change tickets9) % Completion of all mandatory training requirements Outputs Expected: Resolution: Understand Priority and Severity based on ITIL practice resolve trouble ticket within agreed resolution SLA Execute change control tickets as documented in implementation plan Troubleshooting: Troubleshooting based on available information from previous tickets or consulting with seniors Participate in online knowledge forums reference. Covert the new steps to KB article Perform logical/analytical troubleshooting Escalation/Elevation: Escalate within organization/customer peer in case of resolution delay. Understand OLA between delivery layers (L1 L2 L3 etc) adhere to OLA. Elevate to next level work on elevated tickets from L1 Tickets Backlog/Resolution: Follow up on tickets based on agreed timelines manage ticket backlogs/last activity as per defined process. Resolve incidents and SRs within agreed timelines. Execute change tickets for infrastructure Installation: Install and configure tools software and patches Runbook/KB: Update KB with new findings Document and record troubleshooting steps as knowledge base Collaboration: Collaborate with different towers of delivery for ticket resolution (within SLA resolve L1 tickets with help from respective tower. Collaborate with other team members for timely resolution of tickets. Actively participate in team/organization-wide initiatives. Co-ordinate with UST ISMS teams for resolving connectivity related issues. Stakeholder Management: Lead the customer calls and vendor calls. Organize meeting with different stake holders. Take ownership for function's internal communications and related change management. Strategic: Define the strategy on data management policy management and data retention management. Support definition of the IT strategy for the function's relevant scope and be accountable for ensuring the strategy is tracked benchmarked and updated for the area owned. Process Adherence: Thorough understanding of organization and customer defined process. Suggest process improvements and CSI ideas. Adhere to organization' s policies and business conduct. Process/efficiency Improvement: Proactively identify opportunities to increase service levels and mitigate any issues in service delivery within the function or across functions. Take accountability for overall productivity efforts within the function including coordination of function specific tasks and close collaboration with Finance. Process Implementation: Coordinate and monitor IT process implementation within the function Compliance: Support information governance activities and audit preparations within the function. Act as a function SPOC for IT audits in local sites (incl. preparation interface to local organization mitigation of findings etc.) and work closely with ISRM (Information Security Risk Management). Coordinate overall objective setting preparation and facilitate process in order to achieve consistent objective setting in function Job Description. Coordination Support for CSI across all services in CIS and beyond. Training: On time completion of all mandatory training requirements of organization and customer. Provide On floor training and one to one mentorship for new joiners. Complete certification of respective career paths. Performance Management: Update FAST Goals in NorthStar track report and seek continues feedback from peers and manager. Set goals for team members and mentees and provide feedback Assist new team members to understand the customer environment Skill Examples: 1) Good communication skills (Written verbal and email etiquette) to interact with different teams and customers. 2) Modify / Create runbooks based on suggested changes from juniors or newly identified steps3) Ability to work on an elevated server ticket and solve4) Networking:a. Trouble shooting skills in static and Dynamic routing protocolsb. Should be capable of running netflow analyzers in different product lines5) Server:a. Skills in installing and configuring active directory DNS DHCP DFS IIS patch managementb. Excellent troubleshooting skills in various technologies like AD replication DNS issues etc.c. Skills in managing high availability solutions like failover clustering Vmware clustering etc.6) Storage and Back up:a. Ability to give recommendations to customers. Perform Storage & backup enhancements. Perform change management.b. Skilled in in core fabric technology Storage design and implementation. Hands on experience on backup and storage Command Line Interfacesc. Perform Hardware upgrades firmware upgrades Vulnerability remediation storage and backup commissioning and de-commissioning replication setup and management.d. Skilled in server Network and virtualization technologies. Integration of virtualization storage and backup technologiese. Review the technical diagrams architecture diagrams and modify the SOP and documentations based on business requirements.f. Ability to perform the ITSM functions for storage & backup team and review the quality of ITSM process followed by the team.7) Cloud:a. Skilled in any one of the cloud technologies - AWS Azure GCP.8) Tools:a. Skilled in administration and configuration of monitoring tools like CA UIM SCOM Solarwinds Nagios ServiceNow etcb. Skilled in SQL scriptingc. Skilled in building Custom Reports on Availability and performance of IT infrastructure building based on the customer requirements9) Monitoring:a. Skills in monitoring of infrastructure and application components10) Database:a. Data modeling and database design Database schema creation and managementb. Identify the data integrity violations so that only accurate and appropriate data is entered and maintained.c. Backup and recoveryd. Web-specific tech expertise for e-Biz Cloud etc. Examples of this type of technology include XML CGI Java Ruby firewalls SSL and so on.e. Migrating database instances to new hardware and new versions of software from on premise to cloud based databases and vice versa.11) Quality Analysis: a. Ability to drive service excellence and continuous improvement within the framework defined by IT Operations Knowledge Examples: 1) Good understanding of customer infrastructure and related CIs. 2) ITIL Foundation certification3) Thorough hardware knowledge 4) Basic understanding of capacity planning5) Basic understanding of storage and backup6) Networking:a. Hands-on experience in Routers and switches and Firewallsb. Should have minimum knowledge and hands-on with BGPc. Good understanding in Load balancers and WAN optimizersd. Advance back and restore knowledge in backup tools7) Server:a. Basic to intermediate powershell / BASH/Python scripting knowledge and demonstrated experience in script based tasksb. Knowledge of AD group policy management group policy tools and troubleshooting GPO sc. Basic AD object creation DNS concepts DHCP DFSd. Knowledge with tools like SCCM SCOM administration8) Storage and Backup:a. Subject Matter Expert in any of the Storage & Backup technology9) Tools:a. Proficient in the understanding and troubleshooting of Windows and Linux family of operating systems10) Monitoring:a. Strong knowledge in ITIL process and functions11) Database:a. Knowledge in general database management b. Knowledge in OS System and networking skills Additional Comments: Job Title: Threat Hunter | VAPT Analyst Role Overview: We are seeking a versatile cybersecurity professional who will serve as a Threat Hunter, and VAPT Analyst, responsible for proactively identifying cyber threats, assessing security vulnerabilities, and mitigating email-based attacks. This role requires expertise in threat hunting, and penetration testing, combining advanced technical skills with strong analytical capabilities. The ideal candidate will play a pivotal role in strengthening the organization's cybersecurity posture. Responsibilities: Threat Hunting - Proactively hunt for undetected threats within the organization's networks, systems, and endpoints using threat intelligence and behavioral analysis. - Identify patterns, TTPs (Tactics, Techniques, and Procedures), and anomalies that indicate potential threats or APT activity. - Leverage threat intelligence feeds and MITRE ATT&CK framework to create detection use cases and hypotheses. - Work closely with SOC teams to improve detection rules and accuracy. - Perform forensic investigations and root cause analysis of incidents and suspicious activities. - Develop custom scripts and queries to automate hunting activities (e.g., with EDR, SIEM, XDR tools). - Generate threat hunting reports, indicators of compromise (IOCs), and actionable recommendations. Vulnerability Assessment and Penetration Testing (VAPT) - Conduct vulnerability assessments and penetration tests on systems, applications, and networks. - Identify and analyze critical vulnerabilities, and deliver detailed, actionable reports. - Use automated tools (e.g., Nessus, Burp Suite, Nmap, Metasploit) and manual testing techniques. - Ensure VAPT processes align with compliance and internal policies. - Perform regular and ad-hoc assessments, including web apps, databases, wireless, and APIs. - Provide recommendations for remediation and validate fixes through re-testing. - Maintain up-to-date knowledge of evolving vulnerabilities and attack methods. Qualifications: - Bachelor's degree in Computer Science, Information Security, or related discipline. - 5+ years of experience in a cybersecurity role encompassing threat hunting, and VAPT. - Expertise in VAPT tools and methodologies (e.g., Nessus, Burp Suite, Metasploit, OWASP Top 10). - Strong experience with SIEMs, EDR platforms, threat intel, and threat hunting frameworks (MITRE ATT&CK). - Proficiency in scripting (Python, PowerShell, Bash) for automation and analysis. - Excellent problem-solving, investigative, and reporting skills. - Strong communication and interpersonal skills. - Certifications such as OSCP, CEH, GIAC (GCIH/GPEN/GWAPT), CISSP, or CESM are highly preferred. Required Skills Soc,TTP,Troubleshooting
Posted 1 month ago
1.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Join our Team About This Opportunity We are now looking for a Security Analyst professional. This job role is responsible for monitoring, coordination, support, management, and execution of reactive maintenance activities to ensure that services provided to customers are continuously available and performing to Service Level Agreement (SLA) performance levels. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured. What You Will Do Support the following systems and functions: Security event management on 24*7 shift Monitor incoming event queues for potential security incidents Security incident management, 1st level triaging, issues and RCA Perform initial investigation and triage of potential incidents; and raise or close events as applicable Monitor SOC ticket (or email) queue for potential event reporting from outside entities and individual users Support parsers and rules development for the SIEM Raise incidents to respective team for resolution (within SLA) Identity Access Management Create and track the access to customer environments Process improvements Identify improvements in processes and KPIs Adapt to improvement initiatives Shift handover Maintain SOC shift logs with relevant activity from the shift Document investigation results, ensuring relevant details are passed to Security Engineer for final event analysis Update SOC collaboration tool as necessary Vulnerability scanning and reporting Schedule the vulnerability assessment scan for desired frequency based on agreed plan for nodes in scope Track and provide details of the scan planned/ ongoing/ completed status as and when required Governance Reports Preparation of daily, weekly and monthly reports You will bring Basic knowledge of a Security Information and Event Management System (SIEM), such as McAfee, Splunk, Qradar, etc. Basic knowledge of a vulnerability scanning system such as Nessus, Tripwire, etc. Knowledge of both Linux-based and MS Windows-based systems with technical understanding and skills for analytical problem-solving Knowledge of IP networking Ability to work in shifts The ability to work constructively under pressure Ability to work both in a team as well as individually Knowledge sharing & collaboration skills Customer oriented, service minded Deliver results & meet customer expectations Excellent communication skills, English is a must Key Qualifications: Education: Graduate in Computer Science or similar Minimum years of relevant experience: 1 to 2 years with at least 1 year of experience in IT security ITIL certification, CEH, Security +, CCNA Security or similar will be an advantage Basic knowledge of telecommunications networks will be an added advantage
Posted 1 month ago
2.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Join our Team About This Opportunity We are now looking for a Security Analyst professional. This job role is responsible for monitoring, coordination, support, management, and execution of reactive maintenance activities to ensure that services provided to customers are continuously available and performing to Service Level Agreement (SLA) performance levels. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured. What You Will Do Support the following systems and functions: Security event management on 24*7 shift Monitor incoming event queues for potential security incidents Security incident management, 1st level triaging, issues and RCA Perform initial investigation and triage of potential incidents; and raise or close events as applicable Monitor SOC ticket (or email) queue for potential event reporting from outside entities and individual users Support parsers and rules development for the SIEM Raise incidents to respective team for resolution (within SLA) Identity Access Management Create and track the access to customer environments Process improvements Identify improvements in processes and KPIs Adapt to improvement initiatives Shift handover Maintain SOC shift logs with relevant activity from the shift Document investigation results, ensuring relevant details are passed to Security Engineer for final event analysis Update SOC collaboration tool as necessary Vulnerability scanning and reporting Schedule the vulnerability assessment scan for desired frequency based on agreed plan for nodes in scope Track and provide details of the scan planned/ ongoing/ completed status as and when required Governance Reports Preparation of daily, weekly and monthly reports You will bring Basic knowledge of a Security Information and Event Management System (SIEM), such as McAfee, Splunk, Qradar, etc. Basic knowledge of a vulnerability scanning system such as Nessus, Tripwire, etc. Knowledge of both Linux-based and MS Windows-based systems with technical understanding and skills for analytical problem-solving Knowledge of IP networking Ability to work in shifts The ability to work constructively under pressure Ability to work both in a team as well as individually Knowledge sharing & collaboration skills Customer oriented, service minded Deliver results & meet customer expectations Excellent communication skills, English is a must Key Qualifications: Education: Graduate in Computer Science or similar Minimum years of relevant experience: 2 to 4 years with at least 1 year of experience in IT security ITIL certification, CEH, Security +, CCNA Security or similar will be an advantage Basic knowledge of telecommunications networks will be an added advantage Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Bangalore Req ID: 769632
Posted 1 month ago
6.0 years
0 Lacs
Thane, Maharashtra, India
On-site
Euronet Worldwide is a NASDAQ listed transactions and payments processing major with strong presence in North America, Europe, Middle East, India and the Asia-Pacific regions. Today we are one of the world’s foremost providers of electronic payment and transaction processing solutions for financial institutions, retailers, service providers and individual consumers through three primary business segments — Electronic Financial Transactions, Prepaid and Money Transfer. Amongst our other accomplishments, · We operate the largest private independent nationwide shared ATM network in India · Do processing for the world’s largest payment network for prepaid mobile top-up and · Operate one of the largest global money transfer networks in the world. Euronet Inc. headquartered in Kansas, USA, is a leading global electronic payments provider and distributor, that provides convenient and safe financial transaction services to consumers and businesses worldwide. Euronet has built a unique network of networks that creates a powerful presence at every level of the global payments value chain. Role: IT Security Location: Thane Experience: 6+ Years • Antivirus Management o Product: Trend micro–Deep Security/ Cloud One Security /Apex One o Skills required: Knowledge of installation and troubleshooting agents, In-depth knowledge of all modules of TrendMicro such as Antimalware, FIM, Behavior monitoring, application control, Firewall etc. • Endpoint Security (EDR/XDR) o Product: Trend micro–Vision One/ Sentinel One o Skill set Required: Incident response/Triage, Forensic investigation • PAM/PIM solutions (Arcon) o Skill set Required: knowledge of Security principles like RBAC, Segregation of Duties • Web application Firewall o Product: (Citrix/Radware/Cloudflare/Imperva) o Skill set Required: in depth knowledge of Layer 7 attacks, ability to configure firewall rules, excellent troubleshooting skills, knowledge of OWASP Other Good to have Skill Set • Vulnerability management - Good to have experience on Tools like Qualys/Nessus etc. • Good understanding of TCP/IP basics. • Knowledge of cyber security frameworks (NIST/MITRE/ATT&CK) References: • https://www.euronetworldwide.com/ • https://www.epayworldwide.com/
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough