Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 7.0 years
9 - 13 Lacs
Mumbai
Work from Office
As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. * Responsible for security researcher to provide insight and understanding of new and existing information security threats * Responsible to participate in recommending improvements to SOC security process, procedures, policies, security incident management and vulnerability management processes * You will be involved in evaluating, recommending, implementing, and solving problems related to security solutions and evaluating IT security of the new IT Infrastructure systems * Keep yourself up-to-date with emerging security threats including applicable regulatory security requirements * Work in a 24x7 Security Operation Centre (SOC) environment Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * Minimum 2+ years’ experience in SIEM. * Proven expertise in handling the daily monitoring of Information Security events on the QRadar / ArcSight / Splunk console platform * Proficient in monitoring security events from various SOC channels (SIEM, Tickets, Email and Phone), based on the security event severity to handle the service support teams, tier2 information security specialists * Expertise in threat modelling and Use case development and ability to review policies of security monitoring tools based on security concepts and logical approach. Preferred technical and professional experience * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications
Posted 2 weeks ago
3.0 - 7.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 4 plus years of experience Application Security TestingExperience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding PracticesKnowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat ModellingAbility to conduct threat modelling sessions to identify and mitigate security risks Preferred technical and professional experience Vulnerability AssessmentExperience in conducting vulnerability assessments and penetration testing Application Security TestingExperience with static and dynamic application security testing (SAST/DAST) tools. Security ToolsProficiency in using security tools like Burp Suite, Nessus, or Fortify
Posted 2 weeks ago
6.0 - 10.0 years
17 - 20 Lacs
Hyderabad, Chennai
Work from Office
The Impact you will have in this role: Qualifications: Minimum of 6 years of related experience Bachelor's degree preferred or equivalent experience Talents Needed for Success:
Posted 2 weeks ago
6.0 - 10.0 years
17 - 20 Lacs
Hyderabad, Chennai
Work from Office
DTCC offers a flexible/hybrid model of 3 days onsite and 2 days remote (Onsite Tuesdays, Wednesdays and a third day of your choosing) The impact you will have in this role: We are seeking a dedicated and skilled Lead IT Security Engineer to join our team. The ideal candidate will have a strong background in network security, cloud technologies, and hands-on experience with Zscaler products. As a Lead Zscaler Security Engineer, you will be responsible for providing technical support and ensuring the smooth operation of Zscaler solutions. Your Primary Responsibilities: Provide technical support for Zscaler products (ZIA, ZPA, ZDX), including troubleshooting and resolving issues. Monitor and maintain the health and performance of Zscaler solutions. Collaborate with support teams to understand their technical needs and provide effective solutions. Assist in the deployment and configuration of Zscaler products. Conduct root cause analysis for recurring issues and implement preventive measures. Document technical issues and solutions for knowledge sharing and future reference. Stay up to date with the latest Zscaler features, updates, and industry trends. Work closely with the engineering and product teams to escalate and resolve complex issues. **NOTE: The Responsibilities of this role are not limited to the details above. ** Qualifications: Bachelor's degree and/or equivalent experience Minimum 5 years of Cybersecurity related experience Talents Needed for Success: Hands-on experience with Zscaler products (ZIA, ZPA, ZDX). Strong understanding of networking protocols and security best practices. Strong communication and interpersonal skills, including the ability to build relationships with key stakeholders. Strong critical thinking and problem-solving skills to resolve problems effectively and creatively while maintaining a high level of flexibility, professionalism, and integrity. Ability to work independently and manage multiple tasks simultaneously. Experience in managing Data Protection Technologies: Endpoint & Web DLP, CASB Network Security: Secure Web Gateways, Secure Access Secure Edge (SASE), Firewalls, IDS/IPS technologies
Posted 2 weeks ago
5.0 years
0 Lacs
Pune, Maharashtra, India
On-site
About the role: We are seeking a hands-on Security & Compliance Lead to own and execute end-to-end security audits and compliance initiatives across applications, infrastructure, and organizational processes. This role ensures systems, applications, and business operations are secure, compliant, and aligned with both internal policies and regulatory requirements (e.g., RBI, ISO 27001, SOC 2 Type II). Responsibilities: Conduct technical assessments (e.g., VRA, security checklists) required by new BFSI clients. Analyse and complete detailed cloud infrastructure security and compliance questionnaires. Assist in mapping customer security and regulatory requirements (e.g., ISO 27001, RBI, SOC 2 type II) to internal controls. Maintain documentation and templates for commonly requested BFSI assessment artifacts. Manage and complete security questionnaires from clients, vendors, and partners. Evaluate vendor security and compliance by reviewing their responses and supporting documentation. Identify security risks within the company’s IT infrastructure, applications and services. Ensure compliance with security standards such as ISO 27001, GDPR, SOC 2, or any other relevant frameworks. Work with internal teams to maintain compliance with legal and regulatory requirements. Collaborate with the IT security, legal, and procurement teams to address concerns identified in the security assessments. Develop and maintain internal security policies and procedures related to vendor assessments and third-party risk management. Prepare detailed reports summarizing findings from security assessments and risk analysis. Provide recommendations to improve security measures and compliance. Educate internal staff and external partners about security best practices and compliance requirements Support pre-sales and onboarding teams with timely delivery of assessment documentation. Stay updated with AWS best practices, shared responsibility model, and emerging cloud security trends. Good to Have: Bachelor’s degree in computer science, Information Security, Data Science, or a related field 5+ years of experience working with Audit/compliance, application security assessments, AWS cloud security preferably BFSI domain 2+ yrs. of experience on AWS cloud security and risk assessments. Strong exposure to AWS cloud infrastructure (Guard Duty, security hub, inspector, Firewall, IAM, EC2, VPC, S3, Security Groups, etc.). Familiarity with secure coding practices, vulnerability management, and threat modelling. Experience with VRA templates, cloud security checklists, and assessment responses for enterprise or regulated clients. Familiarity with information security standards such as ISO 27001, SOC 2, RBI cybersecurity framework. Strong understanding of data protection, encryptions methodologies Ability to interpret and explain security configurations and policies in layman's terms. Experience with security controls, vulnerability scanning tools (e.g., Nessus, wire shark), or SIEM. Exposure with security tools such as network firewall, IPS/IDS is plus
Posted 2 weeks ago
2.0 - 7.0 years
1 - 5 Lacs
Kolkata, Hyderabad, Pune
Work from Office
Security Trust Analyst1 Job Title: Security Trust Analyst Location: Bangalore, India Work Mode: Hybrid (Minimum 2 days/week from office) About the Role We are seeking a Security Trust Analyst to join our Global Trust Office as an individual contributor. In this hands-on role, you will work closely with sales teams and internal security functions to demonstrate that our security and compliance controls meet industry-leading standards. You will also engage with cross-functional stakeholders across Compliance, Legal, Privacy, Product, and Engineering teams. The ideal candidate is detail-oriented, collaborative, and passionate about cybersecurity and compliance, with a strong understanding of industry frameworks such as ISO 27001, PCI DSS, and AICPA SOC . Key Responsibilities Perform first-line review of incoming Trust Office cases in Salesforce, validate case accuracy, and assign for further action. Respond to requests from internal sales teams regarding security and compliance inquiries from customers and prospects. Prepare and distribute weekly reports from Salesforce. Manage distribution of Security and Trust Assurance Packets (STAP) to customers and prospects. Collaborate with internal teams (Security, Product, Engineering, etc.) to communicate and support DocuSigns compliance posture. Contribute to continuous improvement initiatives within the Global Trust Office. Perform additional tasks and responsibilities as assigned. Support after-hours requests on an as-needed basis. What Youll Bring Basic Qualifications: Bachelors degree or equivalent work experience in Computer Science, Cybersecurity, GRC (Governance, Risk & Compliance), or related field. Minimum 2 years of relevant experience in cybersecurity or compliance-related roles. Familiarity with security and compliance frameworks such as:SSAE16, ISO 27001, NIST, PCI DSS, SOC, SIG, CSA, HIPAA, HITRUST, FedRAMP. Experience working in a SaaS or cloud solutions environment. Proficiency with Salesforce and Google Workspace tools. Strong analytical, communication, and presentation skills. Detail-oriented with excellent organizational and time management skills. Comfortable working across cross-functional teams and stakeholders. Strong passion for continuous learning and improvement. Understanding of the role of supply chain security in customer assurance. Work Environment Hybrid Work Model: This is a hybrid position requiring a presence in the Bangalore office a minimum of 2 days per week , with flexibility for remote work based on team and business needs. Location - Pune,Hyderabad,Kolkata,Jaipur,Chandigarh
Posted 2 weeks ago
3.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Key Responsibilities: · Conduct advanced network vulnerability assessments and penetration tests for client infrastructures. · Utilize Nessus for comprehensive vulnerability scanning and management. · Perform advanced penetration testing using industry-standard tools. · Conduct detailed configuration reviews of network devices, servers, and other infrastructure components. · Develop and implement remediation strategies to address identified vulnerabilities. · Collaborate with client IT teams to enhance their security posture. · Provide detailed security reports and actionable recommendations to clients. · Stay current with emerging security threats and technologies. Qualifications: · Bachelor's degree in Information Security, Computer Science, or related field. · 3+ years of experience in infrastructure security. · Proficiency in using Nessus and other vulnerability scanning tools. · Strong understanding of network security principles and advanced penetration testing techniques. · Experience with security tools such as Metasploit, Nmap, Kali Linux · Excellent analytical and problem-solving skills. · Relevant certifications such as OSCP, CEH or equivalent are a plus. Skills: · Network Vulnerability Assessment and Penetration Testing (VAPT) · Nessus · Advanced Penetration Testing · Configuration Review · Metasploit, Nmap, Wireshark, Kali Linux · Vulnerability Management Stay updated on our latest job openings and industry insights by following us on LinkedIn: eSec Forte® Technologies
Posted 2 weeks ago
3.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Penetration testing JD Job Description (Senior Cyber Security Analyst – Network Penetration Testing) Responsibilities: Perform comprehensive security assessments on network infrastructure, including routers, switches, firewalls, and VPNs, to identify weaknesses and potential entry points for attackers. In-depth understanding of the assumed breach methodology in the active directory environment. Identify, exploit, and document security vulnerabilities to demonstrate potential impact and provide remediation recommendations. Evaluate wireless networks for vulnerabilities such as WPA/WPA2 cracking, rogue access points, and misconfigured wireless security settings. Conduct web application penetration testing, including SQL injection, cross-site scripting (XSS), and authentication bypass techniques, to uncover vulnerabilities in web-based systems. Knowledge of regulatory requirements, compliance frameworks, and industry standards related to cybersecurity (e.g., PCI DSS, NIST, ISO 27001) is beneficial. Proficiency in multiple operating systems (Windows, Linux, macOS), networking protocols, and security tools such as Nessus, Metasploit, Cobalt Strike, Empire, BloodHound, and Burp Suite. Profile Required: 3+ years of experience. Good to have certifications: OSCP CRTO PNPT ECPTX #ActiveDirectory #RedTeam #WifiPentest #WindowsPrivilegeEscalation #LinuxPrivilegeEscalation #WebApplicationSecurity Specific Context Within Societe Generale Global Solution Center (SGGSC), you will join Global Cybersec Capability Centre (G3C) team based out of Bengaluru, working in Pentest team to contribute in the Global pentest practice. Environment At Société Générale, we are convinced that people are drivers of change, and that the world of tomorrow will be shaped by all their initiatives, from the smallest to the most ambitious. Whether you’re joining us for a period of months, years or your entire career, together we can have a positive impact on the future. Creating, daring, innovating and taking action are part of our DNA. If you too want to be directly involved, grow in a stimulating and caring environment, feel useful on a daily basis and develop or strengthen your expertise, you will feel right at home with us! Still hesitating? You should know that our employees can dedicate several days per year to solidarity actions during their working hours, including sponsoring people struggling with their orientation or professional integration, participating in the financial education of young apprentices and sharing their skills with charities. There are many ways to get involved.
Posted 2 weeks ago
3.0 years
0 Lacs
Calicut
Remote
Senior Security Consultant (VAPT Specialist) Company Overview We are seeking a highly skilled and experienced Senior VAPT Specialist to join our cybersecurity team. This role is ideal for a security professional who excels in a client-facing environment and possesses in-depth expertise in both offensive and defensive security practices. Position Summary As a Senior VAPT Specialist, you will be responsible for conducting comprehensive security assessments, managing client relationships, and delivering high-quality penetration testing services. You will work with diverse clients to identify vulnerabilities, assess security postures, and provide actionable recommendations to enhance their cybersecurity defenses but not limited to. Key ResponsibilitiesClient Management & Communication Serve as the primary technical point of contact for assigned clients during security assessments Conduct client briefings, status updates, and final presentation meetings Translate complex technical findings into business-relevant insights for stakeholders Maintain professional relationships and ensure client satisfaction throughout project lifecycles Prepare and deliver comprehensive reports with clear remediation guidance Security Testing & Assessment Perform comprehensive vulnerability assessments and penetration testing across multiple domains: Web Application Security Testing : Identify and exploit vulnerabilities in web applications, including but not limited to OWASP Top 10 vulnerabilities Mobile Application Security Testing : Assess the security of iOS and Android applications, including static and dynamic analysis API Security Testing : Evaluate REST, SOAP, and GraphQL APIs for security weaknesses Network Penetration Testing : Conduct internal and external network assessments, including wireless security testing Source Code Review : Perform manual and automated static code analysis to identify security flaws Cloud Security Configuration Review : Assess cloud infrastructure configurations across AWS, Azure, and GCP platforms Threat Modeling & Risk Assessment Develop comprehensive threat models for client applications and infrastructure Conduct risk assessments and prioritize security findings based on business impact Design attack scenarios and security test cases based on threat intelligence Collaborate with development teams to integrate security into SDLC processes Red Team Operations Plan and execute red team exercises to simulate real-world attack scenarios Develop custom tools and exploits for specific client environments Conduct social engineering assessments and physical security testing when required Provide post-exercise debriefings and improvement recommendations Documentation & Reporting Create detailed technical reports documenting vulnerabilities, exploitation methods, and remediation steps Develop executive summaries tailored for C-level audiences Maintain accurate project documentation and testing methodologies Contribute to internal knowledge base and best practices documentation Required QualificationsExperience & Background 3-5 years of hands-on experience in vulnerability assessment and penetration testing Proven track record of successful client engagements and project delivery Experience with enterprise-level security assessments across various industries Demonstrated ability to work independently and manage multiple projects simultaneously Technical Expertise Deep understanding of security frameworks and standards : Penetration Testing Execution Standard (PTES) OWASP Top 10 and OWASP Testing Guide SANS Top 25 Most Dangerous Software Errors NIST Cybersecurity Framework CIS Critical Security Controls MITRE ATT&CK Framework Development & Programming Experience Software Development Background : Hands-on experience in application development and an understanding of secure coding practices are highly recommended. Programming and Scripting Languages : Strong proficiency in Python and Bash as minimum requirements, with additional experience in PowerShell, and at least one compiled language (C/C++, Go, Java, or C#) Custom Tool Development : Ability to develop custom security tools, exploits, and automation scripts Security Tools Expertise : Expert-level proficiency with: Burp Suite Professional, OWASP ZAP Nmap, Nessus, OpenVAS Metasploit, Cobalt Strike Wireshark, tcpdump Static analysis tools (SonarQube, Checkmarx, Veracode) Custom exploit development tools Social Engineering & Phishing Expertise Social Engineering Assessments : Design and execute social engineering campaigns to test human-factor security Phishing Simulations : Develop and conduct sophisticated phishing campaigns, including email, SMS, and voice-based attacks Physical Security Testing : Conduct on-site assessments including tailgating, badge cloning, and facility penetration Awareness Training : Provide security awareness training based on assessment findings OSINT (Open Source Intelligence) : Gather and analyze publicly available information for reconnaissance and social engineering preparation Communication & Language Skills Excellent English communication skills (both written and spoken) Ability to communicate complex technical concepts to non-technical stakeholders Strong presentation and public speaking abilities Professional writing skills for technical documentation and reports Professional Attributes Strong analytical and problem-solving abilities Attention to detail and a methodical approach to testing Ability to think like an attacker and anticipate security threats Commitment to ethical hacking principles and professional conduct Continuous learning mindset to stay current with emerging threats and technologies Research-Oriented Mindset : Conduct deep research activities to understand emerging vulnerabilities, attack vectors, and security trends Innovation and Tool Development : Proactive approach to developing custom security tools, scripts, and methodologies to enhance testing capabilities Creative thinking for developing novel attack scenarios and bypassing security controls Preferred QualificationsCertifications (Added Advantage) OSCP - Highly Preferred GPEN CRTO CRT Additional Experience (Added Advantage) Experience with DevSecOps practices and CI/CD pipeline security Background in software development or system administration Knowledge of compliance frameworks (PCI DSS, HIPAA, GDPR, SOC2, ISO 27001) Experience with threat intelligence platforms and indicators of compromise Familiarity with containerization security (Docker, Kubernetes) Previous consulting or client-facing experience What We OfferProfessional Development Continuous learning opportunities and professional development Support for professional certifications and training Mentorship opportunities and knowledge-sharing sessions Work Environment Collaborative and innovative team environment Flexible work arrangements and remote work options Opportunity to work with diverse clients across various industries Exposure to the latest cybersecurity trends and emerging technologies Compensation & Benefits Competitive salary commensurate with experience Performance-based bonuses and incentives Professional development and certification reimbursement Application Process Qualified candidates should submit: Current resume highlighting relevant experience and certifications Cover letter demonstrating communication skills and explaining interest in the role Professional references from previous clients or employers We are an equal-opportunity employer committed to diversity and inclusion in our workforce. Job Type: Full-time Benefits: Flexible schedule Health insurance Paid time off Provident Fund Schedule: Monday to Friday Work Location: In person
Posted 3 weeks ago
4.0 - 8.0 years
0 Lacs
maharashtra
On-site
As a highly organized Cybersecurity Officer at AmeriPharma, you will play a crucial role in managing system-wide healthcare compliance, information security, and privacy regulations. Reporting to the Director of Regulatory Affairs, you will be responsible for ensuring regulatory excellence, information security, and adherence to federal and state laws. Your primary focus will be on fostering a culture of accountability, trust, and risk management across all IT infrastructures. Your duties will involve developing and managing a comprehensive cybersecurity program in compliance with regulations such as HITECH, providing cybersecurity support during software and network development, conducting security and risk assessments, and managing annual risk assessments, vulnerability management, and penetration testing. You will also be responsible for implementing security measures, overseeing compliance with patient data protection regulations, and managing cyber threats, incident response, and forensic investigations. To be successful in this role, you must have expertise in HIPAA, HITECH, HITRUST, and cybersecurity frameworks, along with extensive experience in risk management, information security, and regulatory compliance auditing. Strong technical knowledge in network security, cloud security, and identity access management is essential, as well as exceptional communication skills and the ability to make strategic, data-driven decisions in high-pressure environments. You will collaborate with IT teams to improve security controls across cloud, network, and endpoints, lead cybersecurity awareness training programs for employees, align cybersecurity initiatives with business objectives, and innovate in cybersecurity frameworks, AI-driven threat detection, and cloud security. Additionally, you will engage with industry leaders and regulatory bodies on emerging cybersecurity threats and develop and test software applications using Agile methodologies. The ideal candidate will have a Bachelor's degree in Computer Science, Information Technology, or a related field, along with certifications such as CompTIA A+, Network+, CISSP, CCNA, MSCE, or MCSD. A minimum of 4 years of experience in Engineering, Software Engineering, or related fields is required, as well as proficiency in cybersecurity tools and platforms. If you are passionate about cybersecurity, have a strong background in regulatory compliance and risk management, and are looking for a challenging and rewarding opportunity to make a difference in healthcare IT security, we invite you to join our dynamic team at AmeriPharma.,
Posted 3 weeks ago
1.0 - 5.0 years
0 Lacs
punjab
On-site
You will be responsible for providing onsite and offsite training programs to clients in the role of Cyber Security Trainer and consultant. Your duties will include pre-requisites in Metasploit, OWASP top ten attacks, Burpsuite, Kali Linux, Acunetix, Nessus, Nmap tools, among others. You will be involved in Vulnerability Assessment, Network Penetration Testing, Internal & External as well as Web App scanning, and Penetration testing using both manual techniques and Automated tools. A good understanding of Threat Intelligence and familiarity with domain tools is essential. Effective communication skills in English will be required for this role. This is a Full-time position suitable for both Freshers and experienced candidates. The work schedule is in the Morning shift. The location is near VR mall, Mohali - 160055, Punjab. Candidates must be able to reliably commute or plan to relocate before starting work. Preferred candidates will have a total work experience of 1 year.,
Posted 3 weeks ago
7.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Netradyne harnesses the power of Computer Vision and Edge Computing to revolutionize the modern-day transportation ecosystem. We are a leader in fleet safety solutions. With growth exceeding 4x year over year, our solution is quickly being recognized as a significant disruptive technology. Our team is growing, and we need forward-thinking, uncompromising, competitive team members to continue to facilitate our growth. Job Title: Senior Cybersecurity Offensive Engineer Location: Netradyne, Bangalore About Netradyne Netradyne is a leader in AI-powered safety and fleet management technology. Our mission is to enhance driver safety, operational efficiency, and overall user experience through innovative and advanced solutions. We are dedicated to building a secure and connected future for the transportation industry by leveraging cutting-edge technology. We are seeking a Senior Cybersecurity Offensive Engineer with 7 to 10 years of hands-on experience in offensive security, penetration testing, and vulnerability assessments. The ideal candidate will play a critical role in strengthening our systems, identifying vulnerabilities, and enhancing our security posture. Roles & Responsibilities Offensive Security Operations Conduct vulnerability assessments and penetration testing on applications, networks, and cloud systems. Execute red team engagements to simulate real-world attacks and identify vulnerabilities and exploitation paths. Threat Analysis & Research Stay updated on the latest cybersecurity threats, vulnerabilities, and attack vectors. Proactively identify and mitigate risks relevant to the transportation and technology sectors. Security Audits & Incident Response Perform regular security audits, including code reviews and architecture assessments. Investigate potential security breaches, recommend corrective actions, and support incident response activities. Collaboration & Training Collaborate with product development, DevOps, and engineering teams to integrate secure practices. Lead internal training programs to promote a security-first culture across the organization. Requirements Experience 7 to 10 years of experience in offensive security, ethical hacking, penetration testing, or related roles. Proven expertise as a Cybersecurity Offensive Engineer or a similar position. Technical Skills Proficiency with security tools such as Burp Suite, Metasploit, Nessus, Nmap, Kali Linux, Qualys, SonarQube, and BlackDuck. Strong understanding of web, network, mobile, and IoT security. In-depth knowledge of OWASP Top 10 and common attack vectors (SQL injection, XSS, CSRF, buffer overflow, etc.). Familiarity with vulnerability management tools (e.g., Qualys, Tenable) and secure coding practices. Hands-on experience with reverse engineering, exploit development, and malware analysis (preferred). Familiarity with DevSecOps tools and processes (static/dynamic code analysis). Knowledge of security frameworks and compliance standards (e.g., OWASP, NIST, SOC, CIS, GDPR, HIPAA, PIPEDA). Programming & Problem-Solving Skills Proficiency in scripting languages like Python, Bash, Ruby, or PowerShell. Familiarity with programming languages such as C, C++, Java, or Go. Strong problem-solving and creative thinking abilities to simulate real-world attacks and devise effective mitigation strategies. Soft Skills Exceptional verbal and written communication skills for documentation and collaboration. Excellent organizational skills and attention to detail. Education & Certification Bachelor’s/Master’s degree in Computer Science, Information Security, or a related field (preferred). Relevant certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Cloud Security Certified Professional (CSCP). This role offers an exciting opportunity to work in a dynamic and fast-paced environment where you can make a significant impact on the security of next-generation technologies. We are committed to an inclusive and diverse team. Netradyne is an equal-opportunity employer. We do not discriminate based on race, color, ethnicity, ancestry, national origin, religion, sex, gender, gender identity, gender expression, sexual orientation, age, disability, veteran status, genetic information, marital status, or any legally protected status. If there is a match between your experiences/skills and the Company's needs, we will contact you directly. Netradyne is an equal-opportunity employer. Applicants only - Recruiting agencies do not contact. Recruitment Fraud Alert! There has been an increase in fraud that targets job seekers. Scammers may present themselves to job seekers as Netradyne employees or recruiters. Please be aware that Netradyne does not request sensitive personal data from applicants via text/instant message or any unsecured method; does not promise any advance payment for work equipment set-up and does not use recruitment or job-sourcing agencies that charge candidates an advance fee of any kind. Official communication about your application will only come from emails ending in ‘@netradyne.com’ or ‘@us-greenhouse-mail.io’. Please review and apply to our available job openings at Netradyne.com/company/careers. For more information on avoiding and reporting scams, please visit the Federal Trade Commission's job scams website.
Posted 3 weeks ago
3.0 - 7.0 years
0 Lacs
noida, uttar pradesh
On-site
As an Associate Cybersecurity Consultant at Bulletproof, a GLI company headquartered in Canada with a global presence, you will be part of a team with decades of technology, security, and compliance expertise. Our work in the security space has been recognized nationally and globally for excellence. Our vision at Bulletproof is to serve, secure, and empower the world through people and technology, one customer at a time. We believe in ensuring the safety and security of all individuals and organizations we serve. Challenging Work: At Bulletproof, we thrive on solving complex problems and encourage all employees to contribute their best ideas. You will have the opportunity to work on highly challenging projects and make a real impact. Great People: We value openness, honesty, and authenticity. Each member of our team is essential to our collective success, and we believe in fostering a culture of inclusivity and collaboration. Global Impact: Being part of a global team means that your work will have a significant impact on colleagues, customers, communities, and the world at large. We are inspired by the positive influence our work has in various regions and cultures. Diversity, Equity, and Inclusion: We celebrate diversity, strive for equality, and understand that inclusion strengthens us as individuals, as a company, and as global citizens. Role Overview: As an Associate Cybersecurity Consultant specializing in penetration testing, you will be responsible for conducting thorough security assessments on web-based applications, networks, and systems to identify and mitigate vulnerabilities. Your role will involve defining assessment scopes, generating detailed security test reports, collaborating with clients on remediation plans, and delivering exceptional service in a professional manner. Additionally, you will provide technical expertise in security testing, stay updated on the latest tools and technologies, and contribute to the continuous improvement of our Information Security practice. Key Responsibilities: - Conduct comprehensive security assessments for a diverse range of clients - Define scopes for security testing assignments - Generate high-quality security test reports and documentation - Collaborate with clients on remediation strategies - Offer technical support as a subject matter expert in security testing - Stay informed about current tools, technologies, and vulnerabilities - Work collaboratively with cross-functional teams to meet client security needs - Perform other related duties as assigned Requirements: - Degree in Computer Science, Information Systems, Engineering, or related field - Prior experience in vulnerability assessments and penetration testing preferred - Proficiency in Linux, Windows, and network security - Strong communication skills in English, both written and oral - Ability to work independently and as part of a team - Familiarity with security testing tools such as Nessus, MetaSploit, Burp Suite, etc. - Relevant certifications like CEH, LPT, CPEN, OSCP, etc., are an asset - Knowledge of PCI ASV, CREST certifications, and threat modeling methodologies is a plus - Experience with mobile application security testing and social engineering techniques is advantageous Note: This job description outlines the primary responsibilities and qualifications for the role of Associate Cybersecurity Consultant at Bulletproof. It is not exhaustive and may involve additional tasks based on business needs. Bulletproof is an equal opportunity employer committed to diversity, equity, and inclusion.,
Posted 3 weeks ago
3.0 - 6.0 years
3 - 7 Lacs
Gurugram
Work from Office
This role involves the development and application of engineering practice and knowledge in designing, managing and improving the processes for Industrial operations, including procurement, supply chain and facilities engineering and maintenance of the facilities. Project and change management of industrial transformations are also included in this role. - Grade Specific Focus on Industrial Operations Engineering. Develops competency in own area of expertise. Shares expertise and provides guidance and support to others. Interprets clients needs. Completes own role independently or with minimum supervision. Identifies problems and relevant issues in straight forward situations and generates solutions. Contributes in teamwork and interacts with customers. Skills (competencies)
Posted 3 weeks ago
3.0 - 4.0 years
7 - 11 Lacs
Chennai, India
Work from Office
Hello Visionary! We empower our people to stay resilient and relevant in a constantly changing world. We’re looking for people who are always searching for creative ways to grow and learn. People who want to make a real impact, now and in the future. Does that sound like youThen it seems like you’d make a great addition to our vibrant team. We are looking for a Penetration Tester. This position is available for Chennai Location. You’ll make a difference by: Having experience in performing advanced penetration testing on networks, web & mobile applications, and systems. Having ability to Identify vulnerabilities, exploit weaknesses, and assess the security posture of various assets. Having ability to develop and maintain automated testing tools and scripts. Creating detailed reports outlining findings, risks, and recommended actions. Having Extensive experience in penetration testing, vulnerability assessment, and ethical hacking. Having Proficiency with penetration testing tools such as Metasploit, Burp Suite, Nmap, Nessus, and others. Strong understanding of network protocols, web and mobile applications, and operating systems. Maintaining documentation of testing methodologies, tools, and processes. Knowledge of scripting and programming languages (e.g., Python, Bash). You’ll win us over by: Having An engineering degree B.E/B.Tech/M.E/M.Tech with good academic record. 3-4 Years of relevant experience as Penetration Tester. Having Good command over English language (spoken & written) is non-negotiable. Working closely with business partners to understand their needs and translate them into technical requirements. Communicating findings, risks, and remediation strategies to both technical and non-technical stakeholders. Foster strong relationships with business units to ensure security measures align with business goals. Certification Preferred: Entry level certifications like CEH, eJPT, eWPT. Other certifications like eWPTX, OSCP is an advantage. We’ll support you with: Hybrid working Opportunities. Diverse and inclusive culture. Great variety of learning & development opportunities. Join us and be yourself! We value your unique identity and perspective, recognizing that our strength comes from the diverse backgrounds, experiences, and thoughts of our team members. We are fully committed to providing equitable opportunities and building a workplace that reflects the diversity of society. We also support you in your personal and professional journey by providing resources to help you thrive. Come bring your authentic self and create a better tomorrow with us. Make your mark in our exciting world at Siemens. This role is based in Chennai and is an Individual contributor role. You might be required to visit other locations within India and outside. In return, you'll get the chance to work with teams impacting - and the shape of things to come. We're Siemens. A collection of over 319,000 minds building the future, one day at a time in over 200 countries. Find out more about Siemens careers at
Posted 3 weeks ago
1.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
The Information Security Analyst will play a critical role in safeguarding Greenway Health by focusing on vulnerability management. This position is responsible for identifying, assessing, prioritizing, and mitigating security vulnerabilities across our systems, applications, and infrastructure. The analyst will work closely with IT, development, and compliance teams to ensure the confidentiality, integrity, and availability of sensitive healthcare data in compliance with HIPAA and other regulatory standards. This role requires a proactive approach to staying ahead of emerging threats and maintaining a robust security posture for our EHR solutions. Essential Duties & Responsibilities Conduct regular vulnerability scans and assessments of EHR systems, applications, networks, and infrastructure (e.g., Rapid7). Analyze scan results, prioritize vulnerabilities based on risk severity, and develop remediation plans in collaboration with system owners and development teams. Track and manage vulnerabilities through their lifecycle, ensuring timely mitigation or acceptance of risks with proper documentation. Collaborate with DevOps and software development teams to integrate secure coding practices and address vulnerabilities in the software development lifecycle (SDLC). Maintain and update vulnerability management policies, procedures, and documentation to align with industry standards (e.g., NIST, HITRUST) and regulatory requirements (e.g., HIPAA). Monitor threat intelligence feeds to identify emerging vulnerabilities and threats relevant to EHR systems and recommend proactive measures. Assist in penetration testing efforts and coordinate with internal teams and external vendors to validate security controls. Provide regular reports and metrics on vulnerability management activities to leadership and compliance teams. Participate in incident response activities related to vulnerabilities and support the development of patch management strategies. Educate and train internal teams on vulnerability management best practices and secure development principles. Experience & Education High school diploma/GED. Associate degree in Technology/Computers preferred, ideally in Computer Engineering, Computer Science, or Information Systems Management or equivalent work experience in the field of Cybersecurity. Two (2) to four (4) years of experience in information security, cybersecurity, or a related role, preferably in the healthcare or technology sector. Possess current security certifications (e.g., CEH, CC, CISM, Security+) or be willing to obtain within 1 year of assignment. Experience with scripting (e.g., Python, PowerShell) for automating vulnerability management tasks is a plus. Experience working with Rapid7 InsightVM a plus. Demonstrated experience with vulnerability scanning tools (e.g., Rapid7, Nessus, Qualys) and interpreting scan results. Skills, Knowledge, And Abilities Knowledge of common vulnerability scoring systems (e.g., CVSS) and risk assessment methodologies. Understanding of secure software development practices and application security testing (e.g., SAST, DAST). Ability to work collaboratively in a cross-functional environment and communicate technical concepts to non-technical stakeholders. Ability to manage multiple priorities and meet deadlines in a fast-paced environment. Strong communication skills to convey complex security concepts to technical and non-technical audiences. Proficiency in vulnerability management processes, including identification, assessment, prioritization, and remediation. Familiarity with common security frameworks and standards (e.g., NIST 800-53, OWASP, CIS Controls). Knowledge of network protocols, operating systems (Windows, Linux), and cloud environments (e.g., AWS, Azure). Understanding of EHR system architecture and the unique security challenges in healthcare IT. Strong written and verbal communication skills for documenting findings and presenting recommendations. Ability to stay current with evolving cybersecurity threats, vulnerabilities, and mitigation techniques. Ability to recommend approaches for new or improved processes. Displays and promotes a positive attitude and possesses unwavering integrity and extraordinary adherence to high ethical standards. Ability and motivation to learn new skills as required by an evolving information security landscape. Working knowledge of and experience with the Linux operating system is a plus. Ability to perform professional tasks independently and to analyze and develop innovative solutions to complex problems. Work Environment/Physical Demands While at work, this position is primarily a sedentary job and requires that the associate can work in an environment where they will consistently be seated for the majority of the work day This role requires that one can sit and regularly type on a key board the majority of their work day This position requires the ability to observe a computer screen for long periods of time to observe their own and others’ work, as well as in-coming and out-going communications via the computer and/ or mobile devices. The role necessitates the ability to listen and speak clearly to customers and other associates The work environment is an open room with other associates and noise from others will be part of the regular work day At Greenway, we strive to imagine, empower, engage, and inspire. Join us! To learn more about Greenway, take a video tour of our office, and meet our employees, visit us at www.GreenwayHealth.com/careers. Disclaimer: This Job Summary indicates the general nature and level of work expected of the incumbent(s). It is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities required of the incumbent. Incumbent(s) may be asked to perform other duties as requested. Greenway Health, LLC is an Equal Opportunity Employer. We do not discriminate on the basis of race, religion, age, gender, national origin, sexual orientation, disability, or veteran status.
Posted 3 weeks ago
0.0 - 1.0 years
0 - 0 Lacs
Mumbai, Maharashtra
On-site
Job Title: Cyber Security Consultant Company: JHS & Associates LLP Location: Mumbai, India Experience: 1–2 Years Employment Type: Full-Time Job Description: JHS & Associates LLP is looking for a skilled Cyber Security Consultant with 1–2 years of experience in penetration testing, IT audits, and cybersecurity frameworks. The ideal candidate should have hands-on expertise with vulnerability assessments, security tools, and working knowledge of leading frameworks such as ISO 27001, NIST, and SOC 2. Key Responsibilities: Conduct Vulnerability Assessments and Penetration Testing (VA/PT) for web apps, networks, and APIs. Perform ITGC and IT audit support aligned with regulatory and client requirements. Assist in SOC 2, ISO 27001, RBI, SEBI, NCA and CERT-In readiness engagements. Deliver high-quality security reports with internal quality scores exceeding 90%. Respond to client queries and remediation requests in a timely manner. Collaborate with internal teams to enhance audit prep and cyber defense processes. Mentor junior staff and contribute to training and process improvement initiatives. Required Technical Skills: Tools/Languages: Python, C++, Java, PHP, Nmap, Nessus, Postman, Burp Suite, Wireshark, Metasploit, Acunetix Cybersecurity Domains: Penetration Testing, Vulnerability Assessment, ITGC, API Security, Reverse Engineering Security Frameworks: ISO 27001, NIST, SOC 2, PDPL, NCA, SEBI, RBI Controls/Infra: Firewalls, IDS/IPS, Endpoint Protection, VPNs Database: Oracle, RDBMS, PL/SQL, ETL/ELT, Data Modeling DevOps/Cloud: AWS, Docker, Kubernetes, CI/CD, Git/GitHub Candidate Profile: 1–2 years of hands-on experience in cybersecurity consulting or assessments Strong problem-solving, communication, and documentation skills Familiarity with audit lifecycle and client-facing project delivery Certifications like CEH, OSCP, ISO 27001 LA/LI (preferred but not mandatory) Immediate joiners preferred Job Type: Full-time Pay: ₹30,000.00 - ₹45,000.00 per month Experience: Cyber Security: 1 year (Preferred) Location: Mumbai, Maharashtra (Preferred) Work Location: In person Expected Start Date: 14/07/2025
Posted 3 weeks ago
4.0 - 8.0 years
7 - 11 Lacs
Mumbai, Hyderabad
Work from Office
RECRUITMENT OF SPECIALIST CADRE OFFICER ON REGULAR / CONTRACT BASIS (ADVERTISEMENT NO: CRPD/SCO/2025-26/05) ONLINE REGISTRATION OF APPLICATION & PAYMENT OF FEES: FROM 11.07.2025 TO 31.07.2025 State Bank of India invites Online applications from eligible Indian citizens for appointment to the Specialist Cadre Officers Posts on Regular / Contract Basis. Candidates are requested to apply online through the link given on Banks official website https://bank.sbi/web/careers 1. The process of Registration is complete only when fee is deposited with the Bank through online mode on or before the last date for payment of fee / last date of online registrations. 2. Before applying, candidates are requested to ensure that they fulfil the eligibility criteria for the Post(s) as on the date of eligibility. 3. Candidates are required to upload all required documents (resume, ID proof, age proof, PwBD Certificate (if applicable), educational qualification, certifications, experience, Biodata etc.) failing which their application/candidature will not be considered for shortlisting/ interview. 4. The process of Short-listing will be provisional and without verification of documents. Candidature will be subject to verification of all details/ documents with the original when a candidate reports for interview (if called). 5. In case a candidate is called for interview and is found not satisfying the eligibility criteria (Age, Educational Qualification and Experience etc.) he/ she will neither be allowed to appear for the interview nor be entitled for reimbursement of any travelling expenses. 6. Candidates are advised to check Banks official website https://bank.sbi/web/careers/current-openings regularly for details and updates (including the list of shortlisted/ selected candidates). The Call (letter/ advice), where required, will be sent by e-mail only (NO HARD COPY WILL BE SENT ). 7. All Revisions/ Corrigendum (If Any) Will Be Hosted On The Banks Website Only . 8. In case more than one candidate scores same marks as cut-off marks in the final merit list (common marks at cut-off point), such candidates will be ranked in the merit according to their age in descending order. 9 . Hard copy of application & other documents need not to be sent to this office. 10. TEACHING & TRAINING EXPERIENCE WILL NOT BE COUNTED FOR ELIGIBILITY. I) Details Of Post / Vacancy / Age Criteria / Remuneration /Place Of Postings / Nature Of Engagement / Selection Process: Vacancies UR - 9 EWS - 1 OBC - 4 ST - 1 SC - 3 Total - 18 Cut-off date : Age in years (As on 30.06.2025) - Minimum- 25 Maximum-35 PAY SCALE/ CTC Range - 64820-2340/1-67160-2680/10-93960 Selection Procedure - Shortlisting & Interview II) Details Of Educational Qualification, Experience, Skills, Brief Job Profile & Key Responsibility Area: Basic Qualifications (As on 30.06.2025) - B.E. / B.Tech. in Computer Science / Software Engineering / IT / Electronics or equivalent degree in above specified discipline) with minimum 50% score from a University / Institution / Board recognized by Govt. of India / approved by Govt. Regulatory bodies. Other Qualifications: (As on 30.06.2025) Essential: CISA (Certified Information Systems Auditor) by ISACA USA (The certificate is Mandatory & should be Valid as on the date of Interview) Desirable: CEH By EC Council USA. Experience (Post Basic Education qualifications) (As on 30.06.2025) - Essential: Minimum 4 years experience in BFSI / IT / Information Security Consultancy with 2 years experience in IS Audit / Cyber Security Audit / Information Security Consultancy. Training & Teaching experience will not be counted for eligibility. The experience mentioned / claimed should be supported by a suitable certificate issued by the concerned employer Specific Skills (Desired): Experience in VAPT tools like Nessus, Retina, SAINT and Kali Linux C. Details Of Job Profile (Detailed Description Of Role, Responsibilities & Function) And Key Responsibility Area: Job Profile Roles & Responsibilities) Conduct of IS Audit, Cyber Security Audit, IS Concurrent Audit, IT Outsourced Activities Audit as a part of IS Audit team. Conducting Audits to verify compliance to Banks IS, IT and Cyber Security Policy, RBI / other regulatory guidelines and with International best practices. Maintain professional competence. Help in detecting and plugging vulnerabilities to help strengthen security posture of Bank. Conduct Compliance Audit, Migration Audits and Special Audits. Compiling Synopsis of IS Audit Reports Follow-up with audit entities for processing evidence-based compliance and closure of audit reports. Preparation of Value Statements based on IS / IT/ Cyber Security Policies and Regulatory guidelines for Audit requirement. Improving knowledge skills and sharing of knowledge with IS Audit team. KRAs for the Post Timely conduct of all types of audits under Information Systems Audit. Follow up with auditee entities for submission of compliance reports and processing of evidence-based compliance. Timely closure of Audit reports. Timely submission of periodical reports to higher authorities for review. Knowledge sharing with the team in conducting IS Audits and related technology upgrade. Regular review and update of audit value Statements based on IS / IT/ Cyber Security Policies and Regulatory guidelines for Audit requirement. Remarks: KRAs: LEAVE: The proposed Officer engaged on Contract (OEC) shall be entitled to leave of 30 days during the financial year which will be granted by Bank for genuine and appropriate reasons. For the purpose of computation of leave, intervening Sundays/ Holidays shall not be included. Other terms and conditions of leave may be as applicable to other contractual officers. NOTICE PERIOD/ TERMINATION OF CONTRACT: The contract can be terminated without assigning any reasons by giving 03(Three) months notice from either side or on payment / surrender of 03(Three) months compensation amount in lieu thereof. CALL LETTER FOR INTERVIEW: Intimation /call letter for interview will be sent by email or will be uploaded on bank's website. No hard copy will be sent. D. Grade & Remuneration / CTC Range: FOR REGULAR POST: SCALE - II PAY SCALE/ CTC Range - 64820-2340/1-67160-2680/10-93960 Remarks - The official will be eligible for DA, HRA, CCA, Provident Fund, Contributory Pension Fund i.e., NPS, Leave Fare Concession (LFC), Medical Facility, other perquisites etc. as per rules in force from time to time. IMPORTANT POINTS: i. The number of vacancies including reserved vacancies mentioned above are provisional and may vary according to the actual requirement of the Bank. ii. The educational qualification prescribed for the post is minimum. Candidate must possess the qualification and relevant full-time experience as on specified dates. iii. Candidate belonging to reserved category including Person with Benchmark Disabilities for whom no reservation has been mentioned are free to apply for vacancies announced for General category provided they fulfil all the eligibility criteria applicable to General Category. iv. Maximum age indicated is for General category candidates. Relaxation in upper age limit will be available to reserved category candidates as per Govt. of India guidelines (wherever applicable). v. The reservation under various categories will be as per prevailing Government of India Guidelines. vi. Vacancies reserved for OBC Category are available to OBC candidates belonging to Non-creamy Layer. Candidates belonging to OBC category but coming in creamy layer are not entitled to any relaxation/reservation available to OBC category. They should indicate their category as General or General (VI/HI), as the case may be. vii. OBC category candidate should submit the OBC certificate on format prescribed by Govt. of India, having Non-Creamy Layer clause issued during the period 01.04.2025 to the date of interview, if called for. No request for extension of time for production of the Certificate beyond the said date shall be entertained and candidature will be cancelled. viii. Caste certificate issued by Competent Authority on format prescribed by the Government of India will have to be submitted by the SC/ST/ OBC (Non-creamy layer) candidates. ix. Reservation for Economically Weaker section (EWS) in recruitment is governed by Office Memorandum No. 36039/1/2019-Estt (Res) dated 31.01.2019 of Department of Personnel & Training, Ministry of Personnel (DoPT), Public grievances & Pensions, Government of India. Disclaimer: EWS vacancies are tentative and subject to further directives of Government of India and outcome of any litigation. The appointment is provisional and is subject to the Income & Asset certificate being through the proper channel. x. To avail benefits of reservation under EWS category, candidates must produce an Income and Asset Certificate issued by the competent authority in the prescribed format by Government of India for the relevant financial year, as per the extant DoPT guidelines. xi. The EWS candidates please note that without a valid Income & Asset Certificate for the relevant financial year as per the extant DoPT guidelines on or before the closure of online application date, candidates should apply under General Category only. xii. EWS candidates are required to produce for verification, the Income & Assets Certificate for the relevant financial year as per the extant DoPT guidelines, on the date of document verification, which shall be intimated to the provisionally selected candidates by the Bank. Hence, the Income & Assets Certificate for the relevant financial year can be obtained by the candidate on or before the date of document verification. No request for extension of time for production of Income & Assets Certificate beyond the said date shall be entertained and if a candidate fails to produce the Income & Assets Certificate on the date of document verification, he / she will not be considered for appointment in the Bank. xiii. The relevant experience certificate from employer must contain specifically that the candidate had experience in that related field as required. xiv. Bank reserves the right to cancel the recruitment process entirely or for any particular post at any stage without specifying any reasons thereof. xv. Candidate(s) seeking fee exemption must submit valid requisite certificate of the Competent Authority in the prescribed format, when such certificate is sought at the time of document verification. Otherwise, their claim will not be entertained, and their candidature will be liable for cancellation / rejection. xvi. Candidates against whom there is/ are adverse report regarding character & antecedents, moral turpitude are not eligible to apply for the post. If any such adverse orders / reports against the shortlisted/ selected candidates is found/ received by the Bank post their selection/ engagement, their candidature/ service will to be rejected forthwith. xvii. In case more than one application (multiple applications) are submitted by a candidate for the same post, only the last valid (completed) application will be retained, and the application fee, if any, paid for the other registrations will stand forfeited. Further, multiple attendance/ appearance by a candidate at the time of interview / joining will result in rejection/ cancellation of candidature, summarily. xviii. The Candidates applying for the post should ensure that their admission to all the stages of the recruitment will be purely provisional subject to satisfying the prescribed eligibility conditions. Mere issuance of call letter(s) / e-Admit Card(s) to the candidate will not imply that his/her candidature has been finally accepted for the post. The Bank takes up verification of eligibility conditions with reference to original documents only after the candidate has been shortlisted for the Interview. xix. Candidates serving in Govt./ Quasi Govt. offices, Public Sector undertakings including Nationalized Banks and Financial Institutions are advised to submit No Objection Certificate from their employer at the time of interview, failing which their candidature may not be considered and travelling expenses, if any, otherwise admissible, will not be paid. xx. MERIT LIST: MERIT LIST FOR SELECTION WILL BE PREPARED IN DESCENDING ORDER ON THE BASIS OF SCORES OBTAINED IN INTERVIEW ONLY. IN CASE MORE THAN ONE CANDIDATE SCORE THE CUT-OFF MARKS (COMMON MARKS AT CUT-OFF POINT), SUCH CANDIDATES WILL BE RANKED ACCORDING TO THEIR AGE IN DESCENDING ORDER, IN THE MERIT. xxi. MERE FULFILLING MINIMUM QUALIFICATION AND EXPERIENCE WILL NOT VEST ANY RIGHT IN CANDIDATE FOR BEING CALLED FOR INTERVIEW. THE SHORTLISTING COMMITTEE CONSTITUTED BY THE BANK WILL DECIDE THE SHORTLISTING PARAMETERS AND THEREAFTER, ADEQUATE NUMBER OF CANDIDATES, AS DECIDED BY THE BANK WILL BE SHORTLISTED AND CALLED FOR INTERVIEW. THE DECISION OF THE BANK TO CALL THE CANDIDATES FOR THE INTERVIEW SHALL BE FINAL. NO CORRESPONDENCE WILL BE ENTERTAINED IN THIS REGARD. HOW TO APPLY : Candidates should have valid email ID which should be kept active till the declaration of result. It will help him/her in getting call letter/Interview advice etc. by email. GUIDELINES FOR FILLING ONLINE APPLICATION - i. Candidates will be required to register themselves online through the link available on SBI website https://bank.sbi/web/careers/current-openings and pay the application fee using Internet Banking/ Debit Card/ Credit Card etc. ii. Candidates should first scan their latest photograph and signature. Online application will not be registered unless candidate uploads his/ her photo and signature as specified on the online registration page (under How to Upload Documents). iii. Candidates should fill the application carefully. Once application is filled-in completely, candidate should submit the same. In the event of candidate not being able to fill the application in one go, he can save the information already entered. When the information/ application is saved, a provisional registration number and password is generated by the system and displayed on the screen. Candidate should note down the registration number and password. They can re-open the saved application using registration number and password and edit the particulars, if needed. This facility of editing the saved information will be available for three times only. Once the application is filled completely, candidate should submit the same and proceed for online payment of fee. iv. After registering online, the candidates are advised to take a printout of the system generated online application forms. v. Candidates seeking Age relaxation are required to submit copies of necessary certificates at the time of joining. No change in category of any candidate is permitted after registration of online application. GUIDELINES FOR PAYMENT OF FEES i. Application fees and Intimation Charges (Non-refundable) is 750/- (Seven Hundred Fifty only) for General/EWS /OBC candidates and no fees/intimation charges for SC/ ST/ PwBD candidates. ii. After ensuring correctness of the particulars in the application form, candidates are required to pay the fees through payment gateway integrated with the application. No change/ edit in the application will be allowed thereafter. iii. Fee payment will have to be made online through payment gateway available thereat. The payment can be made by using Debit Card/ Credit Card/ Internet Banking etc. by providing information as asked on the screen. Transaction charges for online payment, if any, will be borne by the candidates. iv. On successful completion of the transaction, e-receipt and application form, bearing the date of submission by the candidate, will be generated which should be printed and retained by the candidate. v. If the online payment of fee is not successfully completed in first instance, please make fresh attempts to make online payment. vi. A provision is there to reprint the e-Receipt and Application form containing fee details, at later stage. vii. Application Fee once paid will NOT be refunded on any account NOR can it be adjusted for any other examination or selection in future. B: HOW TO UPLOAD DOCUMENTS: a. Details of Document to be uploaded: Recent Photograph Signature Brief Resume (PDF) ID Proof (PDF) Proof of Date of Birth (PDF) PwBD certification (if applicable) (PDF) Educational Certificates: Relevant Mark-Sheets/ Degree Certificate (PDF) Experience certificates (PDF) Form-16/Offer Letter/Latest Salary slip from current employer (PDF) No Objection Certificate (If applicable) (PDF) CTC Negotiation form (Duly filled, Signed & Scanned in PDF- Available at Bank's career website). Biodata Form (Duly filled, Signed & Scanned in PDF- Available at the bank's career website under the advertisement). Form-16 / ITR / Form 26AS & latest 3 month's Salary Slips along with CTC form. CTC Negotiation form (Duly filled, Signed & Scanned in PDF- Available at Bank's career website). d. Document file type/ size: i. All Documents must be in PDF (except Photograph & Signature) ii. Page size of the document to be A4 iii. Size of the file should not be exceeding 500 kb. iv. In case of Document being scanned, please ensure it is saved as PDF and size not more than 500 kb as PDF. If the size of the file is more than 500 kb, then adjust the setting of the scanner such as the DPI resolution, no. of colors etc., during the process of scanning. Please ensure that Documents uploaded are clear and readable. C: GENERAL INFORMATION: I. Before applying for the post, the applicant should ensure that he/ she fulfils the eligibility and other norms mentioned above for that post as on the specified date and that the particulars furnished by him/ her are correct in all respects. II. Candidates belonging to reserved category including, for whom no reservation has been mentioned, are free to apply for vacancies announced for General category provided they must fulfil all the eligibility conditions applicable to General category. III. IN CASE IT IS DETECTED AT ANY STAGE OF RECRUITMENT THAT AN APPLICANT DOES NOT FULFIL THE ELIGIBILITY NORMS AND/ OR THAT HE/ SHE HAS FURNISHED ANY INCORRECT/ FALSE INFORMATION OR HAS SUPPRESSED ANY MATERIAL FACT(S), HIS/ HER CANDIDATURE WILL STAND CANCELLED. IF ANY OF THESE SHORTCOMINGS IS/ ARE DETECTED EVEN AFTER ENGAGEMENT / APPOINTMENT, HIS/ HER CONTRACTS /SERVICES ARE LIABLE TO BE TERMINATED FORTHWITH. IV. The applicant should ensure that the application is strictly in accordance with the prescribed format and is properly filled. V. Engagement/Appointment of selected candidate is subject to his/ her being declared medically fit as per the requirement of the Bank. Such engagement/appointment will also be subject to the service and conduct rules of the Bank for such post in the Bank, in force at the time of joining the Bank. VI. Candidates are advised to keep their e-mail ID active for receiving communication viz. call letters/ Interview date advice etc. VII. The Bank takes no responsibility for any delay in receipt or loss of any communication whatsoever. VIII. Candidates serving in Govt./ Quasi Govt. offices, Public Sector undertakings including Nationalized Banks and Financial Institutions are advised to submit No Objection Certificate from their employer at the time of interview, failing which their candidature may not be considered and travelling expenses, if any, otherwise admissible, will not be paid. IX. In case of selection, candidates will be required to produce proper discharge certificate from the employer at the time of taking up the engagement. X. Candidates are advised in their own interest to apply online well before the closing date and not to wait till the last date to avoid the possibility of disconnection / inability/ failure to log on to the website on account of heavy load on internet or website jam. SBI does not assume any responsibility for the candidates not being able to submit their applications within the last date on account of aforesaid reasons or for any other reason beyond the control of SBI. XI. DECISION OF BANK IN ALL MATTERS REGARDING ELIGIBILITY, CONDUCT OF INTERVIEW, OTHER TESTS AND SELECTION WOULD BE FINAL AND BINDING ON ALL CANDIDATES. NO REPRESENTATION OR CORRESPONDENCE WILL BE ENTERTAINED BY THE BANK IN THIS REGARD. XII. The applicant shall be liable for civil/ criminal consequences in case the information submitted in his/ her application are found to be false at a later stage. XIII. Merely satisfying the eligibility norms does not entitle a candidate to be called for interview. Bank reserves the right to call only the requisite number of candidates for the interview after preliminary screening/ short-listing with reference to candidates qualification, suitability, experience etc. XIV. In case of multiple application, only the last valid (completed) application will be retained, the application fee/ intimation charge paid for other registration will stand forfeited. XV. Any legal proceedings in respect of any matter of claim or dispute arising out of this advertisement and/ or an application in response thereto can be instituted only in Mumbai and Courts/ Tribunals/ Forums at Mumbai only shall have sole and exclusive jurisdiction to try any cause/ dispute. Outstation candidates, who may be called for interview after short-listing will be reimbursed the cost of travelling by Air fare Economy Class upto Bank approved specified limit for AVP / Dy. Manager Post and Actual fare economy class for GM Post, by shortest route on the basis of actual journey. Local conveyance like taxi/cab/personal vehicle expenses/fares will not be payable. A candidate, if found ineligible for the post will not be permitted to appear for the interview and will not be reimbursed any fare. XVII. Request for change / correction in any particulars (including category in the application form, once submitted will not be entertained under any circumstances. No correspondence/phone/email will be entertained in this regard. Candidates are advised to fill up the online application carefully and furnish the correct information in this application. XVIII. BANK RESERVES RIGHT TO CANCEL THE RECRUITMENT PROCESS ENTIRELY OR FOR ANY PARTICULAR POST AT ANY STAGE WITHOUT ASSIGNING ANY REASONS THEREOF, WHATSOEVER. XIX. At the time of interview, the candidate will be required to provide details regarding criminal cases pending against him/her, if any. Suppression of material facts will result in cancellation/ termination of candidature at any point, even if the candidate is selected, his/her selection will be canceled in such circumstances. The Bank may also conduct independent verification, inter alia, including verification of Police Records, etc. The Bank reserves the right to deny the engagement/appointment depending upon such disclosure and/or independent verification.
Posted 3 weeks ago
1.0 - 3.0 years
0 - 3 Lacs
Mumbai, Mumbai Suburban, Navi Mumbai
Work from Office
Hi, We have an opening for Cyber Butler role for Mumbai location,(Trident & Oberio hotel) - on partners payroll PFB JD and confirm on the same. If you’re interested then please share your resume and let me know. Key Responsibilities : Responsibilities: • L0 Support for Jio CPE infra in Hotel. • L0 Support for Resident, Non-Resident Guests & Belvedere • L0 Support for Hotel Staff for “Team Internet” • Wi-Fi assistance for Events/Conferences. • First point of contact for Troubleshooting WiFi network related Incidents. • Escort Field/Jio engineers during incident/Project Work. • Ensure Periodic Wi-Fi Audits for Guest Rooms. Qualification and Work Experience Qualification : B.Sc. / BE /B Tech Work experience : 1-3 Years • CCNA trained Preferred • Excellent communications skill to handle premium users • Promptness and Discipline Excellent interpersonal and communication skills. • Well Groomed as per Hospitality industry standard If you’re interested please share below mention details for the same. Location Preferred location Current Co Experience Current CTC Expected CTC Notice Period Offer in Hand Highest Education SSC % HSC % Graduation % University Name Please share the details on below mail ID: ashwini.chakor@ril.com Regards, Ashwini Chakor
Posted 3 weeks ago
8.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Job Role : -Senior Information Security Engineer Job Location : -Bangalore/Chennai Experience : - 8+ Years Job Roles & Responsibilities : - Lead vulnerability assessments and policy compliance scans across on?prem, cloud, container (Docker/Kubernetes), database, and web environments using tools like Qualys. Validate scan results, eliminate false positives, and deliver accurate, actionable reports to stakeholders. Serve as technical SME: analyze findings, diagnose root causes, and guide remediation efforts. Develop and maintain a knowledge base to support continuous improvement and team expertise. Stay current on emerging threats, tools, and VM lifecycle advancements; recommend service enhancements. Communicate security requirements effectively across the organization and step in as interim team lead when necessary. Job Skills & Requirements : - Experience & Education 8+ years in information security Bachelor?s in Engineering, CS, IT, or equivalent. Industry certifications preferred: CISSP, CISA, CISM, CRISC, CCNA/CCNP/CCIE Security. Technical Expertise Proficient with vulnerability scanning platforms (Qualys, Nessus, etc.), false-positive tuning, and compliance frameworks. Experience across cloud, on?prem systems, network devices (routers, firewalls, proxies), and infrastructure components. Skilled in risk/threat assessment and security policy enforcement. Familiar with containers, DDI (DNS/DHCP/IPAM), WAF/CDN/DDOS solutions (e.g., Infoblox, Zscaler, Imperva). Advantageous: scripting (Python), and use of monitoring tools like Spectrum, SevOne, ThousandEyes, CyberArk, MS?Entra?ID. Soft Skills & Leadership Excellent analytical, communication, and report-writing abilities. Strong organizational and time-management skills. Demonstrated leadership: capable of guiding teams, managing escalations, and fostering security culture. Adaptable self-starter with a commitment to continuous learning and proactive problem solving.
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Bengaluru
Work from Office
SENIOR EXPERT ENGINEER role for the Vulnerability Management Services team. Designation: Senior Expert Engineer Location: Mumbai ( Onsite) Experience: 5 to 8 years Here are the Job Responsibilities: - Execute vulnerability scanning and manage VM programs for clients Complete the projects within budgeted efforts and agreed timelines with high quality deliverables - Perform vulnerability scanning using different scanning solutions including SAINT, Nessus, Tenable.io, Tenable.sc, Qualys, etc. - Gain good understanding of client network architecture and infrastructure to be scanned - Be involved in threat identification, vulnerability identification and control analysis - Develop customized reports and dashboards as per client expectations - Be proactive in project planning and execution - Perform likelihood determination, impact analysis and risk determination - Showcase prioritization of risks including solution recommendation and documentation - Identify and infer the business risk posed by the weaknesses identified during the assessments - Engage with both business and technical teams within and outside the organization from a project scope definition, project execution, project closure perspectives Skills required: 5+ year of experience in Vulnerability Scanning - Expertise in Vulnerability Scanning tools such as Qualys, Tenable, Rapid7, etc. - Experience with understanding and explaining vulnerabilities to stakeholders - Good knowledge of various platforms such as Windows, Linux, Unix, Mac OS, Cisco, Juniper, etc. - Insights on standards such as PCIDSS, CIS Benchmarks, etc. - Flexible in working on challenging activities and creative in problem solving - Good communication and writing skills with ability to talk fluently #LinkedIn
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Bengaluru
Work from Office
SENIOR EXPERT ENGINEER role for the Vulnerability Management Services team. Designation: Senior Expert Engineer Location: Mumbai ( Onsite) Experience: 5 to 8 years Here are the Job Responsibilities: - Execute vulnerability scanning and manage VM programs for clients Complete the projects within budgeted efforts and agreed timelines with high quality deliverables - Perform vulnerability scanning using different scanning solutions including SAINT, Nessus, Tenable.io, Tenable.sc, Qualys, etc. - Gain good understanding of client network architecture and infrastructure to be scanned - Be involved in threat identification, vulnerability identification and control analysis - Develop customized reports and dashboards as per client expectations - Be proactive in project planning and execution - Perform likelihood determination, impact analysis and risk determination - Showcase prioritization of risks including solution recommendation and documentation - Identify and infer the business risk posed by the weaknesses identified during the assessments - Engage with both business and technical teams within and outside the organization from a project scope definition, project execution, project closure perspectives Skills required: 5+ year of experience in Vulnerability Scanning - Expertise in Vulnerability Scanning tools such as Qualys, Tenable, Rapid7, etc. - Experience with understanding and explaining vulnerabilities to stakeholders - Good knowledge of various platforms such as Windows, Linux, Unix, Mac OS, Cisco, Juniper, etc. - Insights on standards such as PCIDSS, CIS Benchmarks, etc. - Flexible in working on challenging activities and creative in problem solving - Good communication and writing skills with ability to talk fluently #LinkedIn
Posted 3 weeks ago
10.0 - 15.0 years
15 - 20 Lacs
Mumbai
Work from Office
Role of Wealth Management India IT Risk and Information Systems Security Manager, being understood this role includes delegations from APAC WM CISO for the team located in India territory and fully participates in overall WMIS Cybersecurity and IT Risk objectives. Participate to IT project security reviews conducted both on a global and APAC basis across all platforms. Participate in the Security Operation meetings in APAC, EMEA & CH regions. This requires the incumbent to foster close working relationships with other business areas and IT Development / Production / CSIRT / Production Security teams. The incumbent will work hand in hand with the IT Dev, Prod teams and the business, as an enabler and a facilitator. WM IT Risk and Security Manager o Manage the WM IT Risk and Security local team in India by managing the recruitment, performances review as well as training and career-path development. o Coordinate with APAC WM security actors, including India-based resources. o Coordinate with APAC WM IT teams on risk and security topics, while promoting a secure development and deployment culture o Assist for a Risk Treatment for any APAC WM issue, based on the WM GAIM generic process. o Periodic reporting of security status to WM CISO APAC and WM Global CISO o Contribute to the IT Risk and Cybersecurity Governance including procedural framework, Cybersecurity awareness and communication. o Ensure the regular reporting for management follow-up IT Security Compliance (delegation on WM APAC scope) o Ensure the alignment with the Group and WM GAIM security policies, for both project and production assets. o Ensure the protection of WM business data with an adequate security level of WM assets, based on project assessment and production review processes. o Ensure the compliance with regulatory bodies requirements, including for APAC (HKMA, MAS), EU (GDPR), Switzerland (FINMA) o Leveraging on a deep knowledge of Security standards such as NIST, CIS,ISO2700x , ensure the compliance with the IT security requirements o Ensure the compliance with the Third-party Technology risks and Cloud security. o Identify the process gaps and provide solutions. Application Security o Ensure the effective implementation of Secure SDL including the DevSecOps and Threat modelling practices. o Identify and implement the latest security standards for internet facing and internal assets. o Improve the Vulnerability Management at the application level in terms of efficiency as well as effectiveness (including Static Acceptance Security Testing SAST, Dynamic Acceptance Security Testing DAST and Software Composition Analysis SCA). Perform Security risk assessments and reviews to be presented to respective committees. Ensure the adequate security level for all WM GAIM applications, whatever the IT project managers location and hosting provider. Production Security Oversight (delegation on WM APAC scope) o Identify the production security requirements and ensure a smooth integration of WM assets within APAC IT Production, including network flow opening and Application Zoning compliance. o Identify the compliance level of the production environment and contribute to remediation actions definition while keeping the oversight on actions progress. o Keep an overview and ensure the adequate Vulnerability Management at the server and middleware level leveraging on production scans and liaising with relevant production stakeholders. Contribute to the management of Cybersecurity incidents. CyberSecurity Program (delegation on WM APAC scope) o Contribute to the steering and driving of the security initiatives on the APAC scope expected by the WM Cybersecurity Program. Contributing Responsibilities Coordination with IT Security actors o Reporting line to the WM GAIM Global CISO : alignment on the objectives and means, contribution to the different global reporting (WM Cybersecurity Committee, Wholesale Application Security Dashboard) o Coordination and control of security activities performed by APAC CIB Business Information Security and Production Security teams, including project assessment from production point of view, production security review, user security awareness for the WM scope. o Coordination with the Swiss Security team concerning integration of WM assets within Swiss IT production. o Keeping abreast of initiatives by the IT Security community within the Group and other IT Security stakeholders within the Group. Technical & Behavioral Competencies Cybersecurity / Technical Value-added Competencies Cybersecurity Governance : framework (NIST / CIS framework), Security incident management, Logging & Detection (SIEM ELK products) DevSecOps : CI/CD toolchain knowledge of various tools o Source code management: sonarQuabe, bibucket, github/gitlab o Security application scanning (e.g. Sonatype/NexusIQ, Fortify, AppSpider, Qualys, DTR scan) o Automation/orchestration: Ansible tower, Jenkins Application Security: Threat modeling, Security architecture key concepts, exposure to various development framework and applicative landscape (Java/Web, Mobile applications, containerization/docker, kubernetes, API management, Cloud security) Vulnerability Management o Nexpose, Nessus Ethical Hacking Knowledge o Kali Linux knowledge (metasploit, nmap) Specific Qualifications (if required) Qualifications and Experience 10 years' experience in information security evaluation and design of technical architectures Functional as well as technical knowledge of the applications used within BNP Paribas Knowledge of the Norms and Standards of the BNP Paribas Group, in particular with respect to ITRM & Wholesale IT Security Norms and Policies Team management experience is a must Preferred Master level in Computer science and Information Security Skills Referential Behavioural Skills : Communication skills - oral & written Ability to collaborate / Teamwork Decision Making Ability to deliver / Results driven Transversal Skills: Ability to set up relevant performance indicators Ability to develop and adapt a process Ability to manage a project Ability to develop others & improve their skills Ability to manage / facilitate a meeting, seminar, committee, training Education Level: Master Degree or equivalent
Posted 3 weeks ago
5.0 - 8.0 years
7 - 11 Lacs
Bengaluru
Work from Office
SENIOR EXPERT ENGINEER role for the Vulnerability Management Services team. Designation: Senior Expert Engineer Location: Mumbai ( Onsite) Experience: 5 to 8 years Here are the Job Responsibilities: - Execute vulnerability scanning and manage VM programs for clients Complete the projects within budgeted efforts and agreed timelines with high quality deliverables - Perform vulnerability scanning using different scanning solutions including SAINT, Nessus, Tenable.io, Tenable.sc, Qualys, etc. - Gain good understanding of client network architecture and infrastructure to be scanned - Be involved in threat identification, vulnerability identification and control analysis - Develop customized reports and dashboards as per client expectations - Be proactive in project planning and execution - Perform likelihood determination, impact analysis and risk determination - Showcase prioritization of risks including solution recommendation and documentation - Identify and infer the business risk posed by the weaknesses identified during the assessments - Engage with both business and technical teams within and outside the organization from a project scope definition, project execution, project closure perspectives Skills required: 5+ year of experience in Vulnerability Scanning - Expertise in Vulnerability Scanning tools such as Qualys, Tenable, Rapid7, etc. - Experience with understanding and explaining vulnerabilities to stakeholders - Good knowledge of various platforms such as Windows, Linux, Unix, Mac OS, Cisco, Juniper, etc. - Insights on standards such as PCIDSS, CIS Benchmarks, etc. - Flexible in working on challenging activities and creative in problem solving - Good communication and writing skills with ability to talk fluently #LinkedIn
Posted 3 weeks ago
6.0 - 11.0 years
10 - 14 Lacs
Mumbai Suburban, Navi Mumbai, Mumbai (All Areas)
Work from Office
Key Result Areas: Effectively lead and manage the application security testing team. Ensure the team meets project deadlines and objectives. Successfully plan and execute security assessments on software applications and Infrastructure devices. Identify and report vulnerabilities accurately and in a timely manner. Monitor and track the resolution of identified vulnerabilities. Stay current with evolving security threats and best practices. Effectively communicate security risks and recommendations to stakeholders. Job Description: The Application Security Testing Manager will be responsible for leading a team of security testers and ensuring the security and integrity of software applications within G&B. This role involves planning, executing, and overseeing security assessments, identifying vulnerabilities, and driving their remediation. Preferred candidate profile Essential: Proven experience (typically 5+ years) in application security testing and vulnerability assessment. Familiarity with security testing tools such as Burp Suite, OWASP ZAP, Nessus, and others. Proficiency in programming and scripting languages (e.g., Python, Java) for security testing and automation. Strong understanding of software development lifecycles and secure coding practices. Experience with security standards, frameworks, such as OWASP SPECIAL SKILLS REQUIRED Essential: Bachelor's or Master's degree in computer science, cybersecurity, or a related field. Excellent communication skills. Strong problem-solving and analytical abilities.
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough