Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
An extraordinarily talented group of individuals work together every day to drive TNS' success, from both professional and personal perspectives. Come join the excellence! Overview The QA area is responsible for the testing of computer programming systems and applications including the design, coding, testing and deployment of products and solutions to meet goals of TNS' products Responsibilities Quality Assurance Engineer Looking for a candidate with strong technical skills to develop and execute test strategies for telecom related programs. The QA engineer will be responsible for working with other scrum team members to help develop and execute test cases based on a published set of technical requirements. The candidate preferably has an understanding of the telecommunications domain and can work as part of a high performing scrum team in a fast paced agile environment. Responsibilities: Understands project requirements. Develops test strategies and test plans for telephony network applications/infrastructure. Develops and maintains automated regression test suites. Works as part of a scrum team in an agile environment. Works with operations to ensure smooth software deployments in production. Possesses the ability to work with minimal supervision and/or independently. Utilizes experience and judgment to plan and accomplish goals. Creates tests and defect reports using the team standards and best practices. Drives test escape analysis and strategies to prevent defect leakage. Creates and maintains cloud-based lab infrastructure. Experience Required: 5+ years overall test experience developing and executing test cases. Minimum 4 years software testing experience of UNIX or Linux client server applications, including testing application installation/configuration, trouble shooting and load/performance. Experience in Telecom Protocol Testing (SIP, SS7, Diameter, VOIP, VOLE, LTE) - MUST (Strong Experience in SS7, SIP, IMS) Experience in handling functional automation testing using SPECTRA, Jmeter, SIPp, Valid8 Experience in product security testing; Exposure to vulnerability assessment tools RAPID7, Nessus Knowledge of Unix fundamentals, scripting and installation and upgrade of software Exposure to cluster and fault-tolerance deployment, Experience in load testing and performance testing Experience Desired: Exposure to public cloud and private cloud environment technology Working exposure on deploying application on virtual machine, VNF Working exposure on cloud native technology, container technology, CNF, Exposure to REST API Testing, Shell scripting preferred. Understanding of Test Automation Robo framework, Ansible, Experience in RestAPI testing. Experience with build integration tools such as Jenkins. Experience with code coverage tools. Experience with defect and agile management tools such as JIRA Education Qualifications: BTECH/MTECH degree in Computer Science or related field. Qualifications If you are passionate about technology, love personal growth and opportunity, come see what TNS is all about! TNS is an equal opportunity employer. TNS evaluates qualified applicants without regard to race, color, religion, gender, national origin, age, sexual orientation, gender identity or expression, protected veteran status, disability/handicap status or any other legally protected characteristic. Show more Show less
Posted 2 months ago
2.0 - 3.0 years
0 - 0 Lacs
Gurgaon
On-site
Conduct Web Application and API Security Testing using both Manual and Automated Penetration Testing Methodologies Conduct Vulnerability Assessments of Network Devices, DB and servers using various open source and commercial tools Map out a network, discover ports and services running on the different exposed network and security devices Conduct penetration test and launch exploits using Nessus, Metaspoilt, Core Impact, Backtrack penetration testing distribution tools sets Prepare a detailed VAPT findings manually Strong experience with performing VAPT as per OWASP Top 10, SANS Top 25, and NIST, and SANS Security Guidelines. Hands on knowledge on Tools: Nmap, Kali Linux, Metasploit, Maltego, Burp, Nessus, nexpose, wireshark, sqlmap, MobSF, burpsuite etc. Conduct android and IOS mobile application VAPT Ability to suggest remediation to vulnerabilities observed in Application and configuration. Minimum 2-3 years of work experience in the information security domain only Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹65,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Did you worked in the domains like API Testing, IOS, Android Testing, Web Application Testing, Network Penetration Testing, Mobile Application Testing? Experience: minimum: 1 year (Required) Language: English (Required) Location: Gurugram, Haryana (Required) Work Location: In person
Posted 2 months ago
10.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Job description: Job Description: 1.Minimum 10 years in cybersecurity space and 7 years of relevant experience in vulnerability management domain. 2.Understanding and Handson experience in implementing or doing operations as per the phases of vulnerability Management lifecycle . 3.Experience in working or deployment of scanner appliances and cloud agents. 4.Experience in doing asset discovery or IT network asset identification scanning. 5.Good understanding of best vulnerability scanning practices and reporting strategies. 6.Exposure in doing vulnerability analysis and checking the possible patches, solutions, and work arounds. 7.Should be able to do management of zero-day vulnerabilities. 8.Skilled in vulnerability prioritization based on severity, CVSS, risk-based approach : impact analysis, business criticality and vulnerability exploitability. 9.Prepare remediation plan. Co-ordinate and follow up with the asset owners to get the vulnerabilities remediated. 10.Ensuring end to end vulnerability identification and remediation governance. 11.Understanding of asset management, tagging, creating custom dashboards, scanning, and report templates via different VM tools. 12.Ability to present reports and dashboards to customers or service line as planned or on ad hoc basis. Prepare and present the weekly/monthly vulnerability reports to executive management. 13.Experience in developing and maintaining vulnerability exception / exclusion management process and tracking all the risks associated in a risk register. 14.Experience with Policy Compliance scanning based on famous frameworks such as CIS, PCI DSS etc. 15.Integration with well-known third-party IT tools, software & data sources such as: SNOW, Jira etc. 16.Experience in preparing and maintaining technical documentation such as HLD, LLD and other Architecture documents. 17.Eagerness to upskill and reskill as per the requirements and opportunities with Service line. 18.Hands on troubleshooting experience in widely used scanning solutions such as Tenable Nessus, Tenable.sc, Tenable.io, Qualys, Rapid7, MS defender etc. 19.Work with Presales team with vulnerability management project bids to convert them to potential upcoming business opportunities. 20.Excellent verbal and written communication skills. 21.Proficiency in web application security (OWASP top 10), penetration testing will be an added advantage. 22.Professional/Technical certifications will be an added advantage. Show more Show less
Posted 2 months ago
2.0 years
0 Lacs
Pune, Maharashtra, India
On-site
About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. About The Role We are seeking a skilled and passionate Red Team Security Consultant to join our cybersecurity team. The ideal candidate will specialize in simulating adversarial tactics, techniques, and procedures (TTPs) to identify vulnerabilities and improve the organization's security posture. This role involves performing advanced penetration tests, simulating real-world attacks, and working with teams to implement effective remediation strategies Key Responsibilities Plan, execute, and document Red Team exercises mimicking advanced threat actors for medium to large enterprises. Conduct network penetration testing (VAPT), system vulnerability assessments, and security configuration reviews. Perform manual security assessments for web applications, APIs, and client-server applications. Simulate sophisticated attack chains including lateral movement, privilege escalation, and data exfiltration. Develop and execute custom attack payloads using tools and scripts. Assess physical security controls and implement social engineering assessments when required. Create and maintain custom tools/scripts in languages like Python, Bash, or PowerShell. Utilize and adapt adversary emulation frameworks such as MITRE ATT&CK, Cobalt Strike, and Metasploit. Collaborate with Blue Teams to improve detection and response mechanisms through Purple Team engagements. Basic Qualifications Education: BE/B. Tech/ MCA/ M. Sc. (IT/Computers) Experience: Required: 2 - 5 years. Excellent communication and collaboration skills. Preferred Qualifications Preferred Certifications: OSCP, OSCE, CRTP, eWPTX, Security+, CREST, CRTO. Desired Skill Set: Red Teaming, VAPT, Application Security (Web/Mobile/API). 2-5 years of relevant domain experience in VAPT, Red Teaming, and Application Security domains. Proficient in Application Security concepts, including OWASP Top 10 and OSSTMM. Experience with vulnerability scanning tools such as BurpSuite Pro, Nessus, OWASP ZAP, Kali Linux, Cobalt Strike, Caldera etc. Basic ability to write automation scripts (Bash or Python). Understanding of threat modeling and secure coding practices. Strong understanding of TTPs, threat modeling, and secure coding practices. Hands-on experience in Active Directory exploitation, phishing campaigns, and endpoint bypass techniques. Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less
Posted 2 months ago
8.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
Techvantage.ai is a next-generation technology and product engineering company at the forefront of innovation in Generative AI, Agentic AI , and autonomous intelligent systems . We build intelligent, secure, and scalable digital platforms that power the future of AI across industries. Role Overview: We are looking for a Senior Security Specialist with 8+ years of experience in cybersecurity, cloud security, and application security. You will be responsible for identifying, mitigating, and preventing threats across our technology landscape — particularly in AI-powered, data-driven environments. This role involves leading penetration testing efforts , managing vulnerability assessments , and implementing best-in-class security tools and practices to protect our platforms and clients. Key Responsibilities: Design and implement robust security architectures for cloud-native and on-prem environments. Conduct penetration testing (internal/external, network, application, API) and deliver clear remediation strategies. Perform regular vulnerability assessments using industry-standard tools and frameworks. Lead threat modeling and risk assessments across systems, services, and data pipelines. Collaborate with development and DevOps teams to integrate security in SDLC and CI/CD pipelines ( DevSecOps ). Define and enforce security policies, incident response procedures, and access controls. Monitor for security breaches and investigate security events using SIEM and forensic tools. Ensure compliance with global standards such as ISO 27001 , SOC 2 , GDPR , and HIPAA . Provide guidance on secure implementation of AI/ML components and data protection strategies. Requirements: 8+ years of experience in information security , application security , or cybersecurity engineering . Proficient in penetration testing methodologies and use of tools such as Burp Suite , Metasploit , Nmap , Wireshark , Nessus , OWASP ZAP , Qualys , etc. Deep experience in vulnerability management , patching, and security hardening practices. Strong understanding of OWASP Top 10 , CWE/SANS Top 25 , API security, and secure coding principles. Hands-on experience with cloud security (AWS, Azure, or GCP), IAM, firewalls, WAFs, encryption, and endpoint security. Familiarity with SIEM , EDR , IDS/IPS , and DLP solutions. Knowledge of DevSecOps and tools like Terraform , Kubernetes , Docker , etc. Excellent problem-solving, analytical, and incident-handling capabilities. Preferred Qualifications: Certifications such as CISSP , CISM , CEH , OSCP , or AWS Security Specialty . Experience working on security aspects of AI/ML platforms , data pipelines , or model inferencing . Familiarity with governance and compliance frameworks (e.g., PCI-DSS, HIPAA). Experience in secure agile product environments and threat modeling techniques. What We Offer: A mission-critical role securing next-gen AI systems Opportunity to work with an innovative and fast-paced tech company High visibility and leadership opportunities in a growing security function Compensation is not a constraint for the right candidate Show more Show less
Posted 2 months ago
1.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Join Amgen’s Mission of Serving Patients At Amgen, if you feel like you’re part of something bigger, it’s because you are. Our shared mission—to serve patients living with serious illnesses—drives all that we do. Since 1980, we’ve helped pioneer the world of biotech in our fight against the world’s toughest diseases. With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year. As a member of the Amgen team, you’ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you’ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. Information Security Engineer – Vulnerability Management Analyst What You Will Do Let’s do this. Let’s change the world. In this vital role is focused on identifying, assessing, prioritizing, and tracking the remediation of vulnerabilities across the organization’s technology stack. The Vulnerability Management Analyst plays a key role in the security operations team by ensuring known vulnerabilities are managed through their lifecycle using structured processes and tools. The individual will analyze vulnerability scan data, correlate threat intelligence (e.g., KEV, EPSS), and work closely with infrastructure, application, and business teams to drive risk-based remediation. Roles & Responsibilities: Analyze vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. Prioritize vulnerabilities using multiple criteria, including CVSS, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), asset criticality, and business context. Partner with IT and DevOps teams to track remediation progress and provide technical guidance on mitigation strategies. Monitor threat intelligence feeds to correlate vulnerabilities with current exploit activity. Create and maintain vulnerability metrics, dashboards, and reports for leadership and compliance teams. Support vulnerability assessment activities in cloud environments (AWS, Azure, etc.). Maintain documentation related to the vulnerability management lifecycle. Assist in policy and process development related to vulnerability and patch management. Participate in audits and compliance efforts (e.g., SOX, ISO, NIST, PCI). What We Expect Of You We are all different, yet we all use our unique contributions to serve patients. Master’s degree and 1 to 3 years of experience in Cybersecurity, vulnerability management or information security operations OR Bachelor’s degree and 3 to 5 years of experience in Cybersecurity, vulnerability management or information security operations OR Diploma and 7 to 9 years of experience in Cybersecurity, vulnerability management or information security operations Must-Have Skills: Familiarity with vulnerability management tools (e.g., Tenable, Qualys, Rapid7). Understanding of CVSS scoring, vulnerability lifecycle, and remediation workflows. Basic knowledge of threat intelligence and how it applies to vulnerability prioritization. Working knowledge of network, operating system, and application-level security. Ability to analyze scan data and correlate it with business context and threat intelligence. Preferred Qualifications: Good-to-Have Skills: Experience with KEV, EPSS, and other threat-based scoring systems. Familiarity with patch management processes and tools. Exposure to cloud security and related scanning tools (e.g., Prisma Cloud, AWS Inspector). CompTIA Security+ GIAC GSEC / GCIH Qualys Vulnerability Management Specialist (QVMS) Tenable Certified Nessus Auditor (TCNA) Soft Skills: Analytical Thinking – Ability to interpret complex data sets and assess risk effectively Attention to Detail – Precision in identifying and tracking vulnerabilities and remediation status Communication Skills – Ability to communicate technical findings to both technical and non-technical audiences Collaboration & Teamwork – Able to work across IT, DevOps, and security teams to drive resolution Curiosity & Continuous Learning – Willingness to know the latest with evolving threats and technologies Problem-Solving Approach – Capability to identify solutions to security weaknesses in diverse environments What You Can Expect Of Us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now and make a lasting impact with the Amgen team. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. Show more Show less
Posted 2 months ago
1.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Join Amgen’s Mission of Serving Patients At Amgen, if you feel like you’re part of something bigger, it’s because you are. Our shared mission—to serve patients living with serious illnesses—drives all that we do. Since 1980, we’ve helped pioneer the world of biotech in our fight against the world’s toughest diseases. With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year. As a member of the Amgen team, you’ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you’ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. Information Security Engineer – Vulnerability Management Analyst What You Will Do Let’s do this. Let’s change the world. In this vital role is focused on identifying, assessing, prioritizing, and tracking the remediation of vulnerabilities across the organization’s technology stack. The Vulnerability Management Analyst plays a key role in the security operations team by ensuring known vulnerabilities are managed through their lifecycle using structured processes and tools. The individual will analyze vulnerability scan data, correlate threat intelligence (e.g., KEV, EPSS), and work closely with infrastructure, application, and business teams to drive risk-based remediation. Roles & Responsibilities: Analyze vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. Prioritize vulnerabilities using multiple criteria, including CVSS, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), asset criticality, and business context. Partner with IT and DevOps teams to track remediation progress and provide technical guidance on mitigation strategies. Monitor threat intelligence feeds to correlate vulnerabilities with current exploit activity. Create and maintain vulnerability metrics, dashboards, and reports for leadership and compliance teams. Support vulnerability assessment activities in cloud environments (AWS, Azure, etc.). Maintain documentation related to the vulnerability management lifecycle. Assist in policy and process development related to vulnerability and patch management. Participate in audits and compliance efforts (e.g., SOX, ISO, NIST, PCI). What We Expect Of You We are all different, yet we all use our unique contributions to serve patients. Master’s degree and 1 to 3 years of experience in Cybersecurity, vulnerability management or information security operations OR Bachelor’s degree and 3 to 5 years of experience in Cybersecurity, vulnerability management or information security operations OR Diploma and 7 to 9 years of experience in Cybersecurity, vulnerability management or information security operations Must-Have Skills: Familiarity with vulnerability management tools (e.g., Tenable, Qualys, Rapid7). Understanding of CVSS scoring, vulnerability lifecycle, and remediation workflows. Basic knowledge of threat intelligence and how it applies to vulnerability prioritization. Working knowledge of network, operating system, and application-level security. Ability to analyze scan data and correlate it with business context and threat intelligence. Preferred Qualifications: Good-to-Have Skills: Experience with KEV, EPSS, and other threat-based scoring systems. Familiarity with patch management processes and tools. Exposure to cloud security and related scanning tools (e.g., Prisma Cloud, AWS Inspector). CompTIA Security+ GIAC GSEC / GCIH Qualys Vulnerability Management Specialist (QVMS) Tenable Certified Nessus Auditor (TCNA) Soft Skills: Analytical Thinking – Ability to interpret complex data sets and assess risk effectively Attention to Detail – Precision in identifying and tracking vulnerabilities and remediation status Communication Skills – Ability to communicate technical findings to both technical and non-technical audiences Collaboration & Teamwork – Able to work across IT, DevOps, and security teams to drive resolution Curiosity & Continuous Learning – Willingness to know the latest with evolving threats and technologies Problem-Solving Approach – Capability to identify solutions to security weaknesses in diverse environments What You Can Expect Of Us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now and make a lasting impact with the Amgen team. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. Show more Show less
Posted 2 months ago
0 years
0 Lacs
India
Remote
🛡️ Cybersecurity Analyst Intern 📍 Location: Remote (100% Virtual) 📅 Duration: 3 Months 💸 Stipend for Top Interns: ₹15,000 🎁 Perks: Certificate | Letter of Recommendation | Full-Time Offer (Performance-Based) About INLIGHN TECH INLIGHN TECH is committed to providing real-world, project-based learning for students and fresh graduates to bridge the gap between theory and practical skills. Our cybersecurity internship equips aspiring professionals with hands-on experience in identifying, analyzing, and mitigating security threats in a virtual and collaborative environment. Internship Overview As a Cybersecurity Analyst Intern , you'll gain hands-on exposure to threat detection, vulnerability assessment, and incident response . You will work with real-world scenarios, learn key tools used in the industry, and develop practical strategies to secure systems and data from malicious activity. 🔧 Key Responsibilities Monitor systems and networks for suspicious activity or security breaches Assist in conducting vulnerability assessments and penetration testing Analyze logs, reports, and alerts to identify potential threats Research and stay up to date with emerging cybersecurity trends and threats Support the creation of incident response plans, security policies, and documentation Use tools like Wireshark, Nmap, Metasploit, Burp Suite , and others Collaborate with team members to ensure system security across environments ✅ Qualifications Pursuing or recently completed a degree in Cybersecurity, Computer Science, IT , or a related field Familiarity with network protocols, firewalls, and common attack vectors Basic understanding of tools like Kali Linux, Burp Suite, or Nessus Knowledge of OWASP Top 10 vulnerabilities and mitigation techniques Ability to work with Linux and command-line interfaces Passion for ethical hacking, security research, and learning new tools 🎓 What You’ll Gain Practical experience in cyber defense and threat mitigation Exposure to real-world cybersecurity tools and scenarios Internship Certificate of Completion Letter of Recommendation for top performers Opportunity for a Full-Time Offer based on performance A strong portfolio of cybersecurity projects and reports Show more Show less
Posted 2 months ago
0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Introduction In this role, you'll work in one of our IBM Consulting Client Innovation Centers (Delivery Centers), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. Our delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology Your Role And Responsibilities Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices Preferred Education Master's Degree Required Technical And Professional Expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 5 plus years of experience Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding Practices: Knowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat Modelling: Ability to conduct threat modelling sessions to identify and mitigate security risks Preferred Technical And Professional Experience Vulnerability Assessment: Experience in conducting vulnerability assessments and penetration testing Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST) tools. Security Tools: Proficiency in using security tools like Burp Suite, Nessus, or Fortify Show more Show less
Posted 2 months ago
12.0 years
5 - 6 Lacs
Hyderābād
On-site
Job Description: Experience Level: 12+ years. Location: Hyderabad Responsibilities Include: Performing formal and informal targeted “Hunts” to identify vulnerabilities. Actively building and participating in Red Team exercises. Design and execute red team engagements, simulating advanced attack scenarios to identify vulnerabilities and assess the effectiveness of security measures. Conduct penetration tests on networks, applications, and physical security controls. Employing tactics to uncover security holes in user practices and procedures. Develop and execute red team strategies and methodologies to uncover potential security gaps. Analyze and report on findings from red team exercises, including detailed recommendations for remediation. Providing feedback and verification as security issues are fixed. Stay current with the latest security threats, attack techniques, and industry trends. Communicate complex security concepts to both technical and non-technical stakeholders. Collaborate with other security teams to improve overall security practices and incident response capabilities. Be proactive and demonstrate the ability to analyze issues, generate ideas, and initiate action while achieving results. Effectively manages multiple tasks / projects with close attention to detail and meets short turnarounds and deadlines. Collaborate with leadership teams, provide subject matter expertise and insights. Support and guide team members in providing high-quality and actionable intelligence products / deliverables. Support, guide and mentor team members in technical and functional matters The expert in this role will perform analysis of complex security issues and corresponding activities to help mitigate risk. Includes forward looking research, planning and strategy to strengthen our stance against future cyber security threats and attacks, and enhancing our mitigation techniques, processes, and technology solutions. Required skills: At least 12+ years of experience in penetration testing and red team operations. Expert level understanding of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols, devices, security mechanisms and how they operate. Strong understanding of network security threats including APT, botnets, Distributed Denial of Service (DDoS) attacks, worms, and network exploits. Expert knowledge of attack vectors, exploitation techniques, and vulnerability assessment methodologies. Experience with industry-standard penetration testing tools and frameworks. Experience with network probing/testing/analysis tools (Nessus, nmap, burp, wireshark, etc.) Deep technical knowledge of Windows, UNIX and Linux operating systems as both an expert user and system administrator Programming skills that will be used to construct, modify, and execute testing tools including shell (ksh, bash), [g]awk, Python, PERL, regex, .NET Programming, Java, C, C++, C#, PowerShell, curl, Web application development (PHP, ASP.NET, etc.) Comprehensive knowledge of software security testing principles, practices, and tools, experience of vulnerability assessments in a complex environment. Experience or familiarity with vulnerability analysis, computer forensics tools, cryptography principles Excellent teamwork skills for collaboration on analysis techniques, implementation, and reporting. Must be able to work both independently as well as effectively in teams of individuals with a variety of skills and backgrounds. Excellent written and verbal communication skills and have demonstrated ability to present material to senior officials. Highly self-motivated requiring little direction. Demonstrates creative/out-of-the-box thinking and good problem-solving skills. Demonstrates strong ethical behavior. Sense of urgency and attention to detail Flexible to provide coverage in US morning hours on a need-basis, and as required Desirable skills: Strong knowledge of an enterprise architecture Ability to obtain a strong and ongoing understanding of the technical details involved in current APT threats and exploits involving various operating systems, applications and networking protocols. Knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors. Understanding of cloud-based architectures and highly distributed big data architectures Experience with application security testing tools, such as the Metasploit framework and Burp Suite One or more of these certifications CEH: Certified Ethical Hacker CPT: Certified Penetration Tester CEPT: Certified Expert Penetration Tester GPEN: GIAC Certified Penetration Tester OSCP: Offensive Security Certified Professional BS/MS degree in Computer Science, Cyber Security, Engineering, or related technical field Prior experience with Telecom sector. Additional information (if any): Need to be flexible to provide coverage in US morning hours. Weekly Hours: 40 Time Type: Regular Location: IND:AP:Hyderabad / Atria Building, Plot 17 - Adm: Atria Building, Plot No 17 It is the policy of AT&T to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, AT&T will provide reasonable accommodations for qualified individuals with disabilities. AT&T is a fair chance employer and does not initiate a background check until an offer is made. Job ID R-60445 Date posted 05/16/2025 Benefits Your needs? Met. Your wants? Considered. Take a look at our comprehensive benefits. Paid Time Off Tuition Assistance Insurance Options Discounts Training & Development
Posted 2 months ago
1.0 years
2 - 6 Lacs
Hyderābād
On-site
India - Hyderabad JOB ID: R-216599 LOCATION: India - Hyderabad WORK LOCATION TYPE: On Site DATE POSTED: May. 30, 2025 CATEGORY: Information Systems Join Amgen’s Mission of Serving Patients At Amgen, if you feel like you’re part of something bigger, it’s because you are. Our shared mission—to serve patients living with serious illnesses—drives all that we do. Since 1980, we’ve helped pioneer the world of biotech in our fight against the world’s toughest diseases. With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year. As a member of the Amgen team, you’ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you’ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. Information Security Engineer – Vulnerability Management Analyst What you will do Let’s do this. Let’s change the world. In this vital role is focused on identifying, assessing, prioritizing, and tracking the remediation of vulnerabilities across the organization’s technology stack. The Vulnerability Management Analyst plays a key role in the security operations team by ensuring known vulnerabilities are managed through their lifecycle using structured processes and tools. The individual will analyze vulnerability scan data, correlate threat intelligence (e.g., KEV, EPSS), and work closely with infrastructure, application, and business teams to drive risk-based remediation. Roles & Responsibilities: Analyze vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. Prioritize vulnerabilities using multiple criteria, including CVSS, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), asset criticality, and business context. Partner with IT and DevOps teams to track remediation progress and provide technical guidance on mitigation strategies. Monitor threat intelligence feeds to correlate vulnerabilities with current exploit activity. Create and maintain vulnerability metrics, dashboards, and reports for leadership and compliance teams. Support vulnerability assessment activities in cloud environments (AWS, Azure, etc.). Maintain documentation related to the vulnerability management lifecycle. Assist in policy and process development related to vulnerability and patch management. Participate in audits and compliance efforts (e.g., SOX, ISO, NIST, PCI). What we expect of you We are all different, yet we all use our unique contributions to serve patients. Master’s degree and 1 to 3 years of experience in Cybersecurity, vulnerability management or information security operations OR Bachelor’s degree and 3 to 5 years of experience in Cybersecurity, vulnerability management or information security operations OR Diploma and 7 to 9 years of experience in Cybersecurity, vulnerability management or information security operations Must-Have Skills: Familiarity with vulnerability management tools (e.g., Tenable, Qualys, Rapid7). Understanding of CVSS scoring, vulnerability lifecycle, and remediation workflows. Basic knowledge of threat intelligence and how it applies to vulnerability prioritization. Working knowledge of network, operating system, and application-level security. Ability to analyze scan data and correlate it with business context and threat intelligence. Preferred Qualifications: Good-to-Have Skills: Experience with KEV, EPSS, and other threat-based scoring systems. Familiarity with patch management processes and tools. Exposure to cloud security and related scanning tools (e.g., Prisma Cloud, AWS Inspector). CompTIA Security+ GIAC GSEC / GCIH Qualys Vulnerability Management Specialist (QVMS) Tenable Certified Nessus Auditor (TCNA) Soft Skills: Analytical Thinking – Ability to interpret complex data sets and assess risk effectively Attention to Detail – Precision in identifying and tracking vulnerabilities and remediation status Communication Skills – Ability to communicate technical findings to both technical and non-technical audiences Collaboration & Teamwork – Able to work across IT, DevOps, and security teams to drive resolution Curiosity & Continuous Learning – Willingness to know the latest with evolving threats and technologies Problem-Solving Approach – Capability to identify solutions to security weaknesses in diverse environments What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. and make a lasting impact with the Amgen team. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Posted 2 months ago
1.0 years
3 - 7 Lacs
Hyderābād
On-site
India - Hyderabad JOB ID: R-216607 LOCATION: India - Hyderabad WORK LOCATION TYPE: On Site DATE POSTED: May. 30, 2025 CATEGORY: Information Systems Join Amgen’s Mission of Serving Patients At Amgen, if you feel like you’re part of something bigger, it’s because you are. Our shared mission—to serve patients living with serious illnesses—drives all that we do. Since 1980, we’ve helped pioneer the world of biotech in our fight against the world’s toughest diseases. With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year. As a member of the Amgen team, you’ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you’ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. Information Security Engineer – Vulnerability Management Analyst What you will do Let’s do this. Let’s change the world. In this vital role is focused on identifying, assessing, prioritizing, and tracking the remediation of vulnerabilities across the organization’s technology stack. The Vulnerability Management Analyst plays a key role in the security operations team by ensuring known vulnerabilities are managed through their lifecycle using structured processes and tools. The individual will analyze vulnerability scan data, correlate threat intelligence (e.g., KEV, EPSS), and work closely with infrastructure, application, and business teams to drive risk-based remediation. Roles & Responsibilities: Analyze vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. Prioritize vulnerabilities using multiple criteria, including CVSS, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), asset criticality, and business context. Partner with IT and DevOps teams to track remediation progress and provide technical guidance on mitigation strategies. Monitor threat intelligence feeds to correlate vulnerabilities with current exploit activity. Create and maintain vulnerability metrics, dashboards, and reports for leadership and compliance teams. Support vulnerability assessment activities in cloud environments (AWS, Azure, etc.). Maintain documentation related to the vulnerability management lifecycle. Assist in policy and process development related to vulnerability and patch management. Participate in audits and compliance efforts (e.g., SOX, ISO, NIST, PCI). What we expect of you We are all different, yet we all use our unique contributions to serve patients. Master’s degree and 1 to 3 years of experience in Cybersecurity, vulnerability management or information security operations OR Bachelor’s degree and 3 to 5 years of experience in Cybersecurity, vulnerability management or information security operations OR Diploma and 7 to 9 years of experience in Cybersecurity, vulnerability management or information security operations Must-Have Skills: Familiarity with vulnerability management tools (e.g., Tenable, Qualys, Rapid7). Understanding of CVSS scoring, vulnerability lifecycle, and remediation workflows. Basic knowledge of threat intelligence and how it applies to vulnerability prioritization. Working knowledge of network, operating system, and application-level security. Ability to analyze scan data and correlate it with business context and threat intelligence. Preferred Qualifications: Good-to-Have Skills: Experience with KEV, EPSS, and other threat-based scoring systems. Familiarity with patch management processes and tools. Exposure to cloud security and related scanning tools (e.g., Prisma Cloud, AWS Inspector). CompTIA Security+ GIAC GSEC / GCIH Qualys Vulnerability Management Specialist (QVMS) Tenable Certified Nessus Auditor (TCNA) Soft Skills: Analytical Thinking – Ability to interpret complex data sets and assess risk effectively Attention to Detail – Precision in identifying and tracking vulnerabilities and remediation status Communication Skills – Ability to communicate technical findings to both technical and non-technical audiences Collaboration & Teamwork – Able to work across IT, DevOps, and security teams to drive resolution Curiosity & Continuous Learning – Willingness to know the latest with evolving threats and technologies Problem-Solving Approach – Capability to identify solutions to security weaknesses in diverse environments What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. and make a lasting impact with the Amgen team. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Posted 2 months ago
7.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
About BNP Paribas India Solutions Established in 2005, BNP Paribas India Solutions is a wholly owned subsidiary of BNP Paribas SA, European Union’s leading bank with an international reach. With delivery centers located in Bengaluru, Chennai and Mumbai, we are a 24x7 global delivery center. India Solutions services three business lines: Corporate and Institutional Banking, Investment Solutions and Retail Banking for BNP Paribas across the Group. Driving innovation and growth, we are harnessing the potential of over 10000 employees, to provide support and develop best-in-class solutions. About BNP Paribas Group BNP Paribas is the European Union’s leading bank and key player in international banking. It operates in 65 countries and has nearly 185,000 employees, including more than 145,000 in Europe. The Group has key positions in its three main fields of activity: Commercial, Personal Banking & Services for the Group’s commercial & personal banking and several specialised businesses including BNP Paribas Personal Finance and Arval; Investment & Protection Services for savings, investment, and protection solutions; and Corporate & Institutional Banking, focused on corporate and institutional clients. Based on its strong diversified and integrated model, the Group helps all its clients (individuals, community associations, entrepreneurs, SMEs, corporates and institutional clients) to realize their projects through solutions spanning financing, investment, savings and protection insurance. In Europe, BNP Paribas has four domestic markets: Belgium, France, Italy, and Luxembourg. The Group is rolling out its integrated commercial & personal banking model across several Mediterranean countries, Turkey, and Eastern Europe. As a key player in international banking, the Group has leading platforms and business lines in Europe, a strong presence in the Americas as well as a solid and fast-growing business in Asia-Pacific. BNP Paribas has implemented a Corporate Social Responsibility approach in all its activities, enabling it to contribute to the construction of a sustainable future, while ensuring the Group's performance and stability Commitment to Diversity and Inclusion At BNP Paribas, we passionately embrace diversity and are committed to fostering an inclusive workplace where all employees are valued, respected and can bring their authentic selves to work. We prohibit Discrimination and Harassment of any kind and our policies promote equal employment opportunity for all employees and applicants, irrespective of, but not limited to their gender, gender identity, sex, sexual orientation, ethnicity, race, colour, national origin, age, religion, social status, mental or physical disabilities, veteran status etc. As a global Bank, we truly believe that inclusion and diversity of our teams is key to our success in serving our clients and the communities we operate in. About Business Line/Function ITG is a group function established recently (2019) in ISPL with presence in Mumbai, Chennai. We collaborate with various business lines of the group to provide IT Services. IT GROUP is a Group function that extended its capabilities in 2019 in ISPL with presence Mumbai, Chennai & Bangalore, with 1400+ employees. We collaborate with various business lines of the Group such as IT Group Infrastructure & Production, IT Transversal & Functions, IT Cash Services, IT Commercial, Personal Banking & Services, IT Investment & Protection Services, and Cybersecurity & Digital Fraud within IT GROUP. The Cybersecurity & Digital Fraud department’s objective is to protect the Bank and its clients, from Cybersecurity and Cyber Fraud risks. This department is in charge of the permanent monitoring of the evolution of Cyber Risks in the Group’s Information Systems to guarantee the security of the Bank and ensures the deployment of measures to protect customers while raising employees’ awareness of fraud risks particularly. Its mission aims at structuring, strengthening, and harmonizing IT risks management and Cybersecurity for BNP Paribas Group and Defining the vision and strategy for IT risk management and Cybersecurity, and ensuring the implementation of this strategy within the Group’s operating entities, Monitoring the security of the Group's information systems, Steering the IT Continuity and Resilience strategy and methodological framework. The evolving Cyberthreats landscape increases the risk of the financial sector, which leads BNP Paribas to strengthen its Cybersecurity maturity, IT risk management and Operation Resilience. Whilst being mainly based in France, the Cybersecurity & Digital Fraud Department is developing globally since 2021, especially in India (Mumbai, Chennai & Bangalore) and Portugal (Lisbon & Porto). Job Title Business Analyst Senior– GRC System – Risk, Compliance & Governance Date 7th May 2025 Department ITG Location: Bengaluru Business Line / Function CDF GRC IT Reports To (Direct) Grade (if applicable) (Functional) Number Of Direct Reports None Directorship / Registration NA Position Purpose Business Analyst for implementing GRC IT solutions in ServiceNow. Must have experience in implementing GRC solutions. Responsibilities Direct Responsibilities Lead the business requirements gathering process Collect and analyze requirements Animate workshops and meeting, write meeting minutes, follow up actions Prepare related documentation (functional design specifications, RACI, standard operating procedures, business workflow, user manuals etc.) Write User Stories, explain User Stories to developers Create training materials and conduct training sessions Follow up the development lifecycle steps requirements formalization, development testing, UAT coordination with stakeholders, transition to production organization, write release notes Assist users in user acceptance test (test scenarios, non-regression tests) Create and maintain the project planning, identify risks and handle it Ensure the post-implementation monitoring Provide regular project updates (meeting minutes, follow-up on action plan) Ensure proper escalation whenever required Contributing Responsibilities Manage assigned projects Ensure quality of service delivered by products Contribute to investigate user issues reported Technical & Behavioral Competencies Experience in Vulnerability Management processes and tools (Qualys, Rapid7, Tenable, Fortify, Sonarcube, Tanium, Nessus, Nexpose) Knowledge in any of the topics like IT Risk, SOX, Compliance, Control Plans, Action Plans, IT Continuity, Audit, ERM, ORM, Third Party Management Strong process analysis, mapping and design Practical experience of delivering change in IT environments Experience in project management and business analysis Excellent knowledge of the IT Project life cycle Proven track record of successful change management delivery within global banking industry or large organizations is a plus Knowledge and experience on GRC solutions (ServiceNow, Archer, GRC Enablon, eFront, Nasdaq Bwise) Knowledge on Agile methodologies Specific Qualifications (if Required) kills Referential Behavioural Skills: (Please select up to 4 skills) Decision Making Creativity & Innovation / Problem solving Communication skills - oral & written Ability to synthetize / simplify Transversal Skills: (Please select up to 5 skills) Ability to understand, explain and support change Ability to develop and adapt a process Ability to anticipate business / strategic evolution Analytical Ability Ability to develop and leverage networks Education Level Bachelor Degree or equivalent Experience Level At least 7 years Other/Specific Qualifications (if Required) Industry Standard BA Qualification AGILE methodologies GRC, IRM (Integrated Risk Management) Show more Show less
Posted 2 months ago
3.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Hi All, Greetings from Shivsys Softwares Pvt Ltd We are hiring for Product Security Engineer Role: Product Security Engineer Experience: 3+ Years Location: Noida Job Description: Security Specialist in areas of Security Vulnerability Assessment & Penetration Testing. Responsible for periodic assessment and implementation of remediation with the help of node owners. Job Key Tasks & Responsibilities: · Experience in developing trailored Vulnerability Assessment Profiles in collaboration with clients, outlining assessment scope, methodologies, risk assessment criteria, and reporting structures. · Have created and configured custom scan policies for vulnerability scanners, ensuring accurate, tailored scans to meet organizational needs and risk tolerance. · Configure scan policies for full network scans, application scans, compliance checks, and sensitive data exposure detection. · Performed both authenticated and unauthenticated scans across telecom networks and cloud environments (VNF, CNF). Troubleshooting and debugging scans. · Performed automated and manual scans against the CIS Benchmarks (e.g., CIS AWS Foundations, CIS Linux, CIS Windows) to ensure compliance with industry best practices. · Performed comprehensive risk triage by analyzing vulnerability reports, verifying false positives, and assigning accurate severity levels to vulnerabilities based on CVSS matrix. · Evaluate the impact of vulnerabilities and prioritize vulnerabilities based on CVSS scoring and considering exploitability in telecom environments (e.g., SS7, Diameter, GTP, VoIP, IoT, 5G). · Perform cloud-specific vulnerability assessments for containers and orchestration platforms (Docker, Kubernetes). · Provide remediation recommendations based on scan findings, including patching, work arounds, configuration hardening, and compensating controls. · Worked on remediation of non-compliant configurations and security issues based on CIS recommendations. · Experience in threat intelligence gathering to identify known exploits and determine the current exploitation risk of vulnerabilities (e.g., availability of exploit POC, exploit in wild). · Experience of working in ticketing tools i.e. ServiceNow, Jira. · Proficiency in Linux, Windows, and cloud security hardening. · Knowledge security frameworks and standards (e.g., NIST, ISO 27001, CIS) Experience & Certification: · Minimum 3+ years of relevant experience in a combination of security and operations technology jobs · Vulnerability Scanning tools: Nessus, Qualys, OpenVAS · Cloud Scanning Tools: Redhat ACS, Anchore, Trivy · Ticketing Systems: Jira, ServiceNow, Remedy Telecom Expertise: Telecom architecture(2G,3G,4G,5G), Nokia Nodes and functionalities You can also drop your CV at karan.prajapati@shivsys.com Show more Show less
Posted 2 months ago
2.0 - 5.0 years
2 - 6 Lacs
Hyderabad
Work from Office
Join Amgen’s Mission of Serving Patients At Amgen, if you feel like you’re part of something bigger, it’s because you are. Our shared mission—to serve patients living with serious illnesses—drives all that we do. Since 1980, we’ve helped pioneer the world of biotech in our fight against the world’s toughest diseases. With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year. As a member of the Amgen team, you’ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you’ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. What you will do Let’s do this. Let’s change the world. In this vital role you will be responsible for the initial response to security events and incidents within a 24/7 Cybersecurity Operations Center (CSOC). This role involves following established procedures to investigate security events, providing feedback to improve processes, and assisting in the incident response lifecycle. Additionally, the associate will participate in knowledge-sharing sessions and correlate security alerts across platforms. Roles & Responsibilities: Follow established procedures to triage, investigate and respond to security events and incidents. Provide feedback to senior analysts to improve, review, and optimize existing procedures and documentation. Correlate security alerts from various platforms based on common elements. Participate in and lead CSOC Tier 1 knowledge-sharing and learning sessions. Assist incident responders in coordinating the response, containment, eradication, recovery, and lessons learned phases of the incident response lifecycle. Basic Qualifications: Bachelor’s degree and 0 to 3 years of Security Operations experience OR related field experience Diploma and 4 to 7 years of Security Operations or related field experience Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) MTA Security Fundamentals (preferred) Must-Have Skills: Solid understanding of security technologies and their core functionality Experience in analyzing cybersecurity threats with up-to-date knowledge of attack vectors and the cyber threat landscape. Ability to prioritize tasks effectively and solve problems efficiently in a diverse, distributed team environment. Good knowledge of Windows and/or Linux systems. Familiarity with CSOC operations and incident response procedures. Experience with security alert correlation across different platforms. Preferred Qualifications: Good communication and collaboration skills, especially when working with global teams. Ability to prioritize and manage tasks in high-pressure situations. Critical thinking and problem-solving abilities in cybersecurity contexts. A commitment to continuous learning and knowledge sharing. Work Hours This position requires you to work a later shift and may be assigned a second or third shift schedule. Candidates must be willing and able to work during evening or night shifts, as required. Potential Shifts (subject to change based on business requirements)Second Shift2:00 pm – 10:00 pm IST; Third Shift10:00 pm – 7:00 am IST. What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Posted 2 months ago
10.0 years
0 Lacs
Manesar, Haryana, India
On-site
🔐 Hiring Now: Senior SOC Analyst (SIEM | Threat Hunting | Incident Response) 📍 Location: Manesar, Haryana (Onsite | Government Sector Client) 📅 Join by: Immediate to Max 1 Month 🏢 Company: VVNT SEQUOR LLP, Noida 🛡️ About the Role VVNT SEQUOR is urgently hiring a Senior SOC Analyst with 8 –10 years of hands-on experience in SIEM, threat hunting, incident response , and L3/L4 security operations . This is a critical individual contributor role supporting a Government sector client at Manesar, where your cybersecurity expertise will help defend against real-world threats in a high-stakes environment. You’ll work with leading SIEM/EDR/SOAR platforms, conduct forensic investigations, and take the lead on proactive threat detection, containment, and post-incident analysis. 🧰 Key Responsibilities 🔍 Threat Monitoring & SIEM Operations Lead 24x7 SOC operations, monitoring alerts via ArcSight, Splunk, ELK Create and optimize correlation rules , use cases, and detection dashboards Leverage MITRE ATT&CK framework and threat intel feeds for advanced threat hunting 🚨 Incident Response & Forensics Coordinate incident lifecycle management and forensic investigations using CHFI techniques Analyze logs, memory dumps, and endpoint telemetry (EDRs like CrowdStrike, SentinelOne ) Conduct Root Cause Analysis (RCA) and post-incident reviews 🛡️ Vulnerability & Infrastructure Security Perform VAPT using Nessus, Qualys, OpenVAS, Metasploit, Burp Suite Manage security appliances – Firewalls (Palo Alto, FortiGate), WAF, IDS/IPS, Anti-DDoS Support compliance activities for ISO 27001, NIST CSF 🧠 Automation & Knowledge Sharing Integrate SOAR platforms and automate response playbooks (Python, PowerShell scripting) Lead security awareness programs (e.g., KnowBe4) and mentor junior SOC analysts 🧩 Who We’re Looking For 8–10 years in SOC & Security Operations with L3/L4 experience Deep working knowledge of SIEM, EDR, SOAR, forensic tools, threat modeling Strong skills in incident detection, investigation, containment, and RCA documentation Ability to handle escalations independently , acting as a technical leader on shift 🏆 Bonus Skills (Nice to Have) Certifications: CEH, CHFI, GCFA, GCIA, Security+, Splunk Certified Analyst Experience with Tripwire SCM, AWS GuardDuty, Azure Sentinel, TIPs Exposure to OT/ICS security , Red/Blue teaming, Purple teaming drills 📚 Tech Stack & Keywords (for AI & Job Portal Optimization) SOC Analyst | Threat Hunting | Incident Response | SIEM ArcSight Splunk | CHFI | CrowdStrike SentinelOne | SOAR | EDR | MITRE ATT&CK | L3/L4 Security Support | VAPT | Nessus Qualys | Firewall FortiGate PaloAlto | Burp Suite | RCA | ISO 27001 | NIST CSF | Python PowerShell Scripting | Government Sector Cybersecurity 🎯 Why Join VVNT SEQUOR? ✅ Lead mission-critical SOC operations for a Government Sector client ✅ Exposure to real-world threats and next-gen cyber tools ✅ Subsidized Cab + Lunch at client site ✅ Work in a fast-paced, hands-on, innovation-driven environment 📬 Apply Now 📩 Email: chaitali@vvntsequor.in parveen.arora@vvntsequor.in 📱 WhatsApp: +91-9891810196 +91-8802801739 📌 Please include : Updated Resume Last Drawn Salary Expected CTC Notice Period (Only Immediate or ≤1 Month) 📌 #SeniorSOCAnalyst #CybersecurityJobs #SIEM #ThreatHunting #IncidentResponse #L3L4Support #GovernmentCybersecurity #EDR #SplunkJobs #ArcSight #HiringNow #SecurityOperations Show more Show less
Posted 2 months ago
18.0 - 22.0 years
25 - 30 Lacs
Mumbai
Work from Office
Job Title - Security Account Lead + Associate Director + IMU Management Level:5 Associate Director Location:Mumbai/ New Delhi Must have skills: Cyber Security with P&L responsibility and good networking and relationship building ability Good to have skills: Cyber Strategy, Cyber Protection, Cyber Resilience Job Summary : As a Security Account Lead (SAL), you will be a trusted advisor who builds and executes Accenture vision by combining the best of Accenture Security and the power of One Accenture to meet our clients needs and help them become cyber resilient business. This is a critical role on the client account leadership team. Roles & Responsibilities: - Drive Growth for Security Oversee the growth and management of account(s) Accountable for Security P&L for the account(s) Identify new opportunities for business development and expansion within the account(s) Create Value for Clients Truly understand client needs and partner quickly to respond and support client Act as C-Suite advisor, partner with the client across the breadth of security offerings and create connection to other service areas across Accenture Maintain strong brand reputation through exceptional delivery and value for clients Bring the best of Accenture and Security Leverage the best of Accenture and Security, including service offerings, innovations, solution tablets, industry perspectives and proof of value (PoV), to deliver value to our clients Bring in experts from across Accenture from other offerings in support of client needs Build Exceptional Relationships Build and nurture relationships as an integral part of the Accenture team Cultivate relationships across One Accenture and Ecosystems partners Inspire teams and act with a Growth Mindset Create an engaging project environment for people to learn and grow Demonstrate a positive, growth mindset with openness to new ideas, innovations, and opportunities that keep the team challenged Professional & Technical Skills: - Must Have Skills: Proficiency in the Cyber Security environment - Strong networking and relationship building skills in the Financial Services and Products domain i.e. Consumer goods, Life Sciences, Utilities, Resources, Manufacturing etc. Additional Information: - The ideal candidate will possess a strong background in cyber security field, along with a proven track record of delivering impactful solutions to clients. This position is based at either Mumbai or New Delhi location. About Our Company | AccentureQualification Experience: Minimum 18-22 years of progressive functional and consulting experience. Educational Qualification: Masters degree in business administration (MBA) or post graduate degree in management (PGDM) from premier institutes preferred
Posted 2 months ago
5.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (OT Security) – Technology Consulting – Senior GDS Advisory's Risk group is a unique, industry-focused business unit that provides a broad range of integrated services that leverage deep industry experience with strong functional capability and product knowledge. Risk practice team provides integrated advisory services to leading Fortune 500 Companies. The team provides Risk Assurance, Risk Transformation, Internal Audit, Cybersecurity, Financial Services Risk Management and Actuarial services that take an enterprise-wide view, so that risk mitigation and risk management strategies and processes are embedded in every part of the organization. Our services mitigate risk, reduce the cost of control and help create value. The opportunity The GDS Architecture Engineering and Emerging Technology (AEET) services help our clients tackle the many security challenges they face on a daily basis and develop effective solutions using people, processes and technology, while enabling better security and risk decisions, and reducing costs related to manging security risks. The AEET team is looking for individuals who will play a direct role in delivery of Operational Technology (OT) security engagements, development of proposals in this area, and develop OT security solutions. You will play a key role in supporting our clients to secure their IT/OT environments, either through advisory and/or implementation support. Your key responsibilities To qualify, candidates must have: Understanding of security-related operational processes in the OT-ICS environments Understanding of OT SOC/ OT Identity Access Management/ OT Pen testing/ Zero Trust on OT Understanding of technologies (typical assets, communication protocols, technical architectures) utilized by OT-ICS systems and networks Knowledge of cyber / information security concepts, risk and controls concepts Understanding of aspects of functional safety (SIS) Knowledge of TCP/IP, concepts of OSI layer and protocols, networking and security concepts Knowledge of the technical security solutions utilized within OT-ICS systems and networks Knowledge of OS (Windows / Linux) security, Database security Knowledge of IT infrastructure Knowledge of cyber threats and vulnerabilities related to platform and infrastructure is a plus Prior experience working alongside delivery leads and architects to Identify and manage risks is a plus Skills And Attributes For Success Completed technical higher education in the field of industrial automation, computer science, electronics or other relevant fields Certificates or education related to industrial automation / engineering etc. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP Knowledge of standards such as ISO 27001/2, ISO 22301, ISO 27018, NIST standards on Cyber Security, HITRUST, etc. is a plus Knowledge on tools like Nessus, BackTrack, NMAP, BurpSuite, etc. is a definite plus Knowledge on OT network monitoring solution such as Nozomi, Claroty, Armis, DarkTrace, Azure Defender. To qualify for the role, you must have 5+ years of experience in the Cyber Security and OT Security Domain Minimum B. Tech. or equivalent educational qualification ISA/IEC 62443 Fundamental* SCADA Fundamentals CompTIA Network+ CompTIA Security+ What We Look For A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 months ago
5.0 years
0 Lacs
Gurugram, Haryana, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (OT Security) – Technology Consulting – Senior GDS Advisory's Risk group is a unique, industry-focused business unit that provides a broad range of integrated services that leverage deep industry experience with strong functional capability and product knowledge. Risk practice team provides integrated advisory services to leading Fortune 500 Companies. The team provides Risk Assurance, Risk Transformation, Internal Audit, Cybersecurity, Financial Services Risk Management and Actuarial services that take an enterprise-wide view, so that risk mitigation and risk management strategies and processes are embedded in every part of the organization. Our services mitigate risk, reduce the cost of control and help create value. The opportunity The GDS Architecture Engineering and Emerging Technology (AEET) services help our clients tackle the many security challenges they face on a daily basis and develop effective solutions using people, processes and technology, while enabling better security and risk decisions, and reducing costs related to manging security risks. The AEET team is looking for individuals who will play a direct role in delivery of Operational Technology (OT) security engagements, development of proposals in this area, and develop OT security solutions. You will play a key role in supporting our clients to secure their IT/OT environments, either through advisory and/or implementation support. Your key responsibilities To qualify, candidates must have: Understanding of security-related operational processes in the OT-ICS environments Understanding of OT SOC/ OT Identity Access Management/ OT Pen testing/ Zero Trust on OT Understanding of technologies (typical assets, communication protocols, technical architectures) utilized by OT-ICS systems and networks Knowledge of cyber / information security concepts, risk and controls concepts Understanding of aspects of functional safety (SIS) Knowledge of TCP/IP, concepts of OSI layer and protocols, networking and security concepts Knowledge of the technical security solutions utilized within OT-ICS systems and networks Knowledge of OS (Windows / Linux) security, Database security Knowledge of IT infrastructure Knowledge of cyber threats and vulnerabilities related to platform and infrastructure is a plus Prior experience working alongside delivery leads and architects to Identify and manage risks is a plus Skills And Attributes For Success Completed technical higher education in the field of industrial automation, computer science, electronics or other relevant fields Certificates or education related to industrial automation / engineering etc. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP Knowledge of standards such as ISO 27001/2, ISO 22301, ISO 27018, NIST standards on Cyber Security, HITRUST, etc. is a plus Knowledge on tools like Nessus, BackTrack, NMAP, BurpSuite, etc. is a definite plus Knowledge on OT network monitoring solution such as Nozomi, Claroty, Armis, DarkTrace, Azure Defender. To qualify for the role, you must have 5+ years of experience in the Cyber Security and OT Security Domain Minimum B. Tech. or equivalent educational qualification ISA/IEC 62443 Fundamental* SCADA Fundamentals CompTIA Network+ CompTIA Security+ What We Look For A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 months ago
5.0 years
0 Lacs
Kanayannur, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (OT Security) – Technology Consulting – Senior GDS Advisory's Risk group is a unique, industry-focused business unit that provides a broad range of integrated services that leverage deep industry experience with strong functional capability and product knowledge. Risk practice team provides integrated advisory services to leading Fortune 500 Companies. The team provides Risk Assurance, Risk Transformation, Internal Audit, Cybersecurity, Financial Services Risk Management and Actuarial services that take an enterprise-wide view, so that risk mitigation and risk management strategies and processes are embedded in every part of the organization. Our services mitigate risk, reduce the cost of control and help create value. The opportunity The GDS Architecture Engineering and Emerging Technology (AEET) services help our clients tackle the many security challenges they face on a daily basis and develop effective solutions using people, processes and technology, while enabling better security and risk decisions, and reducing costs related to manging security risks. The AEET team is looking for individuals who will play a direct role in delivery of Operational Technology (OT) security engagements, development of proposals in this area, and develop OT security solutions. You will play a key role in supporting our clients to secure their IT/OT environments, either through advisory and/or implementation support. Your key responsibilities To qualify, candidates must have: Understanding of security-related operational processes in the OT-ICS environments Understanding of OT SOC/ OT Identity Access Management/ OT Pen testing/ Zero Trust on OT Understanding of technologies (typical assets, communication protocols, technical architectures) utilized by OT-ICS systems and networks Knowledge of cyber / information security concepts, risk and controls concepts Understanding of aspects of functional safety (SIS) Knowledge of TCP/IP, concepts of OSI layer and protocols, networking and security concepts Knowledge of the technical security solutions utilized within OT-ICS systems and networks Knowledge of OS (Windows / Linux) security, Database security Knowledge of IT infrastructure Knowledge of cyber threats and vulnerabilities related to platform and infrastructure is a plus Prior experience working alongside delivery leads and architects to Identify and manage risks is a plus Skills And Attributes For Success Completed technical higher education in the field of industrial automation, computer science, electronics or other relevant fields Certificates or education related to industrial automation / engineering etc. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP Knowledge of standards such as ISO 27001/2, ISO 22301, ISO 27018, NIST standards on Cyber Security, HITRUST, etc. is a plus Knowledge on tools like Nessus, BackTrack, NMAP, BurpSuite, etc. is a definite plus Knowledge on OT network monitoring solution such as Nozomi, Claroty, Armis, DarkTrace, Azure Defender. To qualify for the role, you must have 5+ years of experience in the Cyber Security and OT Security Domain Minimum B. Tech. or equivalent educational qualification ISA/IEC 62443 Fundamental* SCADA Fundamentals CompTIA Network+ CompTIA Security+ What We Look For A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 months ago
5.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (OT Security) – Technology Consulting – Senior GDS Advisory's Risk group is a unique, industry-focused business unit that provides a broad range of integrated services that leverage deep industry experience with strong functional capability and product knowledge. Risk practice team provides integrated advisory services to leading Fortune 500 Companies. The team provides Risk Assurance, Risk Transformation, Internal Audit, Cybersecurity, Financial Services Risk Management and Actuarial services that take an enterprise-wide view, so that risk mitigation and risk management strategies and processes are embedded in every part of the organization. Our services mitigate risk, reduce the cost of control and help create value. The opportunity The GDS Architecture Engineering and Emerging Technology (AEET) services help our clients tackle the many security challenges they face on a daily basis and develop effective solutions using people, processes and technology, while enabling better security and risk decisions, and reducing costs related to manging security risks. The AEET team is looking for individuals who will play a direct role in delivery of Operational Technology (OT) security engagements, development of proposals in this area, and develop OT security solutions. You will play a key role in supporting our clients to secure their IT/OT environments, either through advisory and/or implementation support. Your key responsibilities To qualify, candidates must have: Understanding of security-related operational processes in the OT-ICS environments Understanding of OT SOC/ OT Identity Access Management/ OT Pen testing/ Zero Trust on OT Understanding of technologies (typical assets, communication protocols, technical architectures) utilized by OT-ICS systems and networks Knowledge of cyber / information security concepts, risk and controls concepts Understanding of aspects of functional safety (SIS) Knowledge of TCP/IP, concepts of OSI layer and protocols, networking and security concepts Knowledge of the technical security solutions utilized within OT-ICS systems and networks Knowledge of OS (Windows / Linux) security, Database security Knowledge of IT infrastructure Knowledge of cyber threats and vulnerabilities related to platform and infrastructure is a plus Prior experience working alongside delivery leads and architects to Identify and manage risks is a plus Skills And Attributes For Success Completed technical higher education in the field of industrial automation, computer science, electronics or other relevant fields Certificates or education related to industrial automation / engineering etc. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP Knowledge of standards such as ISO 27001/2, ISO 22301, ISO 27018, NIST standards on Cyber Security, HITRUST, etc. is a plus Knowledge on tools like Nessus, BackTrack, NMAP, BurpSuite, etc. is a definite plus Knowledge on OT network monitoring solution such as Nozomi, Claroty, Armis, DarkTrace, Azure Defender. To qualify for the role, you must have 5+ years of experience in the Cyber Security and OT Security Domain Minimum B. Tech. or equivalent educational qualification ISA/IEC 62443 Fundamental* SCADA Fundamentals CompTIA Network+ CompTIA Security+ What We Look For A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 months ago
8.0 years
0 Lacs
Gurugram, Haryana, India
On-site
We are the leading provider of professional services to the middle market globally, our purpose is to instill confidence in a world of change, empowering our clients and people to realize their full potential. Our exceptional people are the key to our unrivaled, inclusive culture and talent experience and our ability to be compelling to our clients. You’ll find an environment that inspires and empowers you to thrive both personally and professionally. There’s no one like you and that’s why there’s nowhere like RSM. Bachelor or Master degree in computer science with a minimum of 8 years in cyber security domain Technical background in networking/system administration, security testing or related fields In-depth knowledge of TCP/IP Two or more years of Perl, Python, Bash, or C experience Operating System Configuration and Security experience (Windows, HP-UX, Linux, Solaris, AIX, etc.) Configuration and Security experience with firewalls, switches, routers, VPNs Experience with security and architecture testing and development frameworks, such as the Open Web Application Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), Information Systems Security Assessment Framework (ISSAF), and NIST SP800-115 Familiar with security testing techniques such as threat modeling, network discovery, port and service identification, vulnerability scanning, network sniffing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing, fuzzing, and password cracking and can perform these techniques from a variety of adversarial perspectives (white-, grey-, black-box) Experience with discovering, utilizing, and possibly writing exploits for such vulnerabilities as buffer and stack overflows Familiar with the logistics of security testing such as acquiring authorization for testing, reporting, risk analysis of findings, data handling, and legal considerations Commercial Application Security tools experience (Nessus, Nexpose, Qualys, Appdetective, Appscan, etc.) Open source and free tools experience (Kali Linux suite, Metasploit, nmap, airsnort, Wireshark, Burp Suite, Paros, etc.) One or more of the following testing certifications: Certified Ethical Hacker (CEH); GIAC Certified Penetration Tester (GPEN); Offensive Security Certified Professional (OSCP); or equivalent development or testing certification (ECSA, CEPT, CPTE, CPTS, etc) In addition, one or more of the following governance certifications is preferred: Certified Information Systems Security Professionals® (CISSP®); Certified Information Systems Auditor® (CISA®); Certified Information Security Manager® (CISM®) Strong leadership and communication skills, technical knowledge, and the ability to write at a "publication" quality level in order to communicate findings and recommendations to the client's senior management Must possess a high degree of integrity and confidentiality, as well as the ability to adhere to both company policies and best practices The standard work hours for this role are from 3:30 PM to 11:00 PM IST, aligned to support client requirements and deliverables and engagements. Candidates should be comfortable with this fixed shift timing Position & Key Responsibilities Develop an understanding of the RSM US Risk Consulting service offerings, methodologies, and tools Perform analysis and testing to verify the strengths and weaknesses of client IT environments utilizing commercial and open source security testing tools Perform Internet penetration testing (blackbox/ greybox / whitebox testing) and network architecture reviews (manual/ automated) Perform other security testing tasks such as wireless penetration testing, social engineering campaigns (email, web, phone, physical, etc.), mobile application testing, embedded device testing, and similar activities meant to identify critical weaknesses within client environments Assist with the development of remediation recommendations for identified findings Identify and clearly articulate (written and verbal) findings to senior management and clients Help identify improvement opportunities for assigned clients Supervise and provide engagement management for other staff working on assigned engagements Works closely with the client and RSM team to make sure we meet or exceed client expectations on each engagement and maintain high customer satisfaction. Exercise professional skepticism, judgment and adhere to the code of ethics while on engagements Ensure that documentation is compliant with the quality standards of the firm Work collaboratively as a part of the team and communicate effectively with RSM consulting professionals, and senior management in the U.S. on a daily basis Key Skills To Accelerate Career Maintains a high degree of quality and client relationship on multiple clients at the same time Positively engages, motivates and influences team members Identifies client needs/requirements and initiates discussion to expand services through a solid understanding of the firm’s service capabilities and offerings Subscribes to and actively read industry publications and share relevant information with clients as considered applicable At RSM, we offer a competitive benefits and compensation package for all our people. We offer flexibility in your schedule, empowering you to balance life’s demands, while also maintaining your ability to serve clients. Learn more about our total rewards at https://rsmus.com/careers/india.html. RSM does not tolerate discrimination and/or harassment based on race; colour; creed; sincerely held religious beliefs, practices or observances; sex (including pregnancy or disabilities related to nursing); gender (including gender identity and/or gender expression); sexual orientation; HIV Status; national origin; ancestry; familial or marital status; age; physical or mental disability; citizenship; political affiliation; medical condition (including family and medical leave); domestic violence victim status; past, current or prospective service in the Indian Armed Forces; Indian Armed Forces Veterans, and Indian Armed Forces Personnel status; pre-disposing genetic characteristics or any other characteristic protected under applicable provincial employment legislation. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process and/or employment/partnership. RSM is committed to providing equal opportunity and reasonable accommodation for people with disabilities. If you require a reasonable accommodation to complete an application, interview, or otherwise participate in the recruiting process, please send us an email at careers@rsmus.com. Show more Show less
Posted 2 months ago
5.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
We are seeking a highly skilled and motivated Cyber Security Engineer with 5+ years of experience. If you're passionate about coding, problem-solving, and innovation, we'd love to hear from you! Responsibilities Lead and manage cybersecurity testing projects for telecom and networking equipment (e. g., Routers, Switches, Firewalls, Access points, etc. ). Drive the ITSAR (Indian Telecom Security Assurance Requirements) testing initiatives and capability development. Develop testing capability for FIPS 140-3 (Level 1/2) cryptographic module validations and Common Criteria (CC) EAL evaluations. Conduct and oversee penetration testing, source code reviews, and vulnerability assessments for firmware and applications. Build and maintain internal labs, tools, and automation frameworks for product security evaluations. Interpret and implement national/international security standards and translate them into test cases and validation protocols. Interface with OEMs, consultants, and certification bodies to support product compliance and documentation requirements. Manage technical teams, plan resource allocation, track project delivery timelines, and mentor junior engineers. Stay updated with evolving cybersecurity threats, standards, and industry best practices and contribute to relevant international forums by attending meetings, commenting on standards, test specifications, and publishing white papers. Requirements Bachelor's or Master's degree in Electronics and Communication, Computer Science, Cybersecurity, or related fields. 5+ years or more of experience in product-level cybersecurity testing, preferably in telecom or networking domains. Proven track record in Cybersecurity testing, and experience working with FIPS (NIST CMVP) and/or Common Criteria program. Familiarity with test tools such as Wireshark, Nessus, Burp Suite, OpenSSL, JTAG/UART tools, and Crypto validation tools. Solid knowledge of Linux environments, scripting, and security configuration of embedded systems. This job was posted by Taranpreet Kaur from CodeVyasa. Show more Show less
Posted 2 months ago
6.0 - 11.0 years
14 - 19 Lacs
Bengaluru
Work from Office
Vulnerability and Security Compliance Lead Job Summary We are seeking an experienced Vulnerability and Security Compliance Lead to join our team. The ideal candidate will be responsible for leading efforts to identify, assess, and remediate vulnerabilities across our IT infrastructure while ensuring compliance with relevant security standards and regulations. You will work closely with cross-functional teams to develop and implement security policies, procedures, and best practices that protect our organization from threats. Key Responsibilities Vulnerability Management Lead the vulnerability management program, including vulnerability scanning, assessment, and remediation processes. Coordinate with IT and engineering teams to prioritize and address identified vulnerabilities based on risk impact. Security Compliance Ensure compliance with industry standards and regulations (e. g. , ISO 27001, NIST, PCI-DSS, HIPAA) by developing and maintaining security policies, procedures, and documentation. Conduct regular compliance assessments and audits to identify gaps and recommend corrective actions. Risk Assessment Perform risk assessments to identify potential threats and vulnerabilities to the organizations information assets. Develop and implement risk mitigation strategies and controls to reduce exposure to security threats. Security Policies and Procedures Develop, review, and update security policies, procedures, and guidelines to align with best practices and regulatory requirements. Communicate security policies and compliance requirements to employees and stakeholders to promote awareness and adherence. Incident Response Lead incident response efforts related to security breaches or vulnerabilities, ensuring timely identification, containment, and remediation. Conduct post-incident reviews to assess the effectiveness of response actions and implement improvements. Collaboration and Training Collaborate with IT, legal, and other departments to ensure alignment on security compliance initiatives. Provide training and awareness programs to employees on security best practices, compliance requirements, and vulnerability management. Continuous Improvement Stay current with the latest security trends, threats, and compliance requirements, evaluating their impact on the organization. Recommend and implement improvements to security controls and processes based on emerging threats and vulnerabilities. Qualifications Educational Background Bachelor s degree in Computer Science, Information Technology, Cybersecurity, or a related field. Experience 5+ years of experience in information security, vulnerability management, or compliance roles. Proven experience leading vulnerability assessments and compliance audits in a corporate environment. Technical Skills Strong knowledge of security frameworks (e. g. , NIST, ISO 27001), vulnerability management tools (e. g. , Qualys, Nessus), and security compliance regulations. Familiarity with security technologies such as firewalls, intrusion detection/prevention systems, and endpoint security solutions. Certifications Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), or equivalent are desirable. Preferred Skills Experience with security incident response and threat intelligence. Knowledge of risk management methodologies and practices. Familiarity with cloud security practices and compliance frameworks.
Posted 2 months ago
6.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Share this job About The Company The Hitachi Energy India Operations Center (INOPC) houses over 3,000 energy transition technologists in three locations from grid automation, transformers, high voltage products, grid integration and service businesses. Spread over 3,00,000 sq feet, with nearly 50,000 sq feet of dedicated lab space, the center brings under one roof diverse engineering capability that has been built over the years, fostering collaboration to advance the world’s energy system to be more sustainable, flexible and secure. INOPC supports Hitachi Energy units across 40+ countries to deliver projects in 80+ countries. We are technology leaders at the forefront of evolving the world’s future energy system. The rising energy consumption with changing lifestyles and rapid urbanization, is driving the need for affordable, reliable and sustainable energy. Our innovative technologies help to make the energy system more resilient, secure and safe. Electricity will be the backbone of the carbon-neutral future and together, with customers and partners, we are co-creating solutions that are helping to accelerate the energy transition. Customers count on our technologies to help them to integrate huge volumes of renewable energy into the world’s grids and manage increasing levels of complexity; and our technologies are also instrumental to the electrification of transportation, industry and smart life sectors. The center equally focuses on catering to grow complexity in domestic and international grids and is a key lever for Hitachi Energy’s growth globally. How You’ll Make An Impact Responsible for Cybersecurity requirement from Tender till Project Handover. Coordinate with CSSL/CSSO to fulfill Hitachi Energy requirement and Customer requirement Ensure the project delivered to customer is inline and complaint with the Hitachi Energy security requirement and Customer Security requirement. Make sure Hitachi Energy is protected from a legal and brand perspective. Align and comply with Customer requirement and Hitachi Energy’s internal cyber security requirements for Delivery projects. Assess, identify deviation and Risks in Customer requirement and required standard & regulatory requirement during Tender. Coordinate with Tender Responsible for Success Cybersecurity related Tender Submittal. Ensure required inputs are captured in tender to comply with mandatory Business CS standard and Customer requirement. Support in Company Risk Review and make sure HE is protected with regards to Cybersecurity Ensure Fulfillment of the Secure Project Deployment requirement for all the delivery projects. Acts a liaison with the Customer about Hitachi Energy’s automation solution’s adherence to customer requirements and required standard & regulation. Perform Cyber Security Risk assessment for the project. Review Project Cybersecurity deliverables is implemented and delivered as agreed. For platforms certified with IEC 62443-3-3, make sure that the delivery project is within the requirements of the standard to the extent possible Support to enhance and maintain the CS documentation for project deliverables Ensure the Vulnerability Management in delivery projects Support in Business in achieving IEC 62443 2-4 Certification and in IEC 62443 3-3 certification. Support in maintaining and improving the Cybersecurity solution Contribute to Cybersecurity Assurance process definition and improvement in Customer Delivery Projects. Ensure Test area Asset security Management and Security tools. Living Hitachi Energy’s core values of safety and integrity, which means taking responsibility for your own actions while caring for your colleagues and the business Your Background Should have a minimum 6+ years of IT/OT Industry Experience in Control System Automation ( 3+ years of Cybersecurity with emphasis on OT) OR Should have at least 5 + years as an OT Cyber Security Implementer or Architect Engineering degree in (Instrumentation/ Electrical or Electronics) Added Plus to have Masters in Cybersecurity or Accredited Cybersecurity Certification and experienced working in OT environment components and OT security. Advanced Knowledge OT Networking and Network security and knowledge of Cybersecurity Regulation, Standards and Framework - (IEC62443, NERC–CIP, BDEW, NIST Publication). Awareness on current Cybersecurity controls and solutions – Endpoint Security, AAA, Security logging, Hardening benchmarks and knowledge on Security tool (NESSUS, CIS CAT, Nmap) Understanding on Computer networks and network security – Firewall, IDS and Basic knowledge Operating systems security - Windows Operating system Desirable with ISA 99 / 62443 – Cybersecurity Fundamentals Specialist, GIAC, GICSP, CEH certification Work experience with Cyber Security in Critical Infrastructure is a plus and emerging OT Cybersecurity-related technologies Communicate, present and report to relevant internal and external stakeholders Risk Assessment on the Delivery System and Mentor and train Project Engineers on Cyber Security area. Monitor every Project and ensure the compliance to Cybersecurity requirement before delivery and Emphasis Secure work culture of self or peers Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams. Attention to detail and a commitment to delivering high-quality digital solutions Apply now Location Chennai, Tamil Nadu, India Job type Full time Experience Experienced Job function Engineering & Science Contract Regular Publication date 2025-05-29 Reference number R0089249 Show more Show less
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39817 Jobs | Dublin
Wipro
19388 Jobs | Bengaluru
Accenture in India
15458 Jobs | Dublin 2
EY
14907 Jobs | London
Uplers
11185 Jobs | Ahmedabad
Amazon
10459 Jobs | Seattle,WA
IBM
9256 Jobs | Armonk
Oracle
9226 Jobs | Redwood City
Accenture services Pvt Ltd
7971 Jobs |
Capgemini
7704 Jobs | Paris,France