Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 5.0 years
8 - 12 Lacs
Pune
Work from Office
Graduate Or Post Graduate Degree in computer science, information technology, or similar field, plus recent computer application programming experience, or an equivalent combination of education and experience.. 5-10 years’ development experience in Dell One Identity & .net technologies .. Good experience in Dotnet(c#.net or vb.net), SQL server. Good to have knowledge Or added advantages of having experience in REST API , WCF. Good understanding of Product development life cycle.. Good understanding of Identity Lifecycle, Access Management & Application provisioning/de-provisioning. Good to have knowledge of Scrum methodology. Good to have knowledge of Azure .. Good to have knowledge of Active directory. Azure Active Directory experience will be a added advantage. Good to have fluent communication and interpersonal skills .. Your Benefits. We offer a hybrid work model which recognizes the value of striking a balance between in-person collaboration and remote working incl. up to 25 days per year working from abroad. We believe in rewarding performance and our compensation and benefits package includes a company bonus scheme, pension, employee shares program and multiple employee discounts (details vary by location). From career development and digital learning programs to international career mobility, we offer lifelong learning for our employees worldwide and an environment where innovation, delivery and empowerment are fostere. Flexible working, health and wellbeing offers (including healthcare and parental leave benefits) support to balance family and career and help our people return from career breaks with experience that nothing else can teachAbout Allianz Technolog. Allianz Technology is the global IT service provider for Allianz and delivers IT solutions that drive the digitalization of the Group. With more than 13,000 employees located in 22 countries around the globe, Allianz Technology works together with other Allianz entities in pioneering the digitalization of the financial services industry.We oversee the full digitalization spectrum – from one of the industry’s largest IT infrastructure projects that includes data centers, networking and security, to application platforms that span from workplace services to digital interaction. In short, we deliver full-scale, end-to-end IT solutions for Allianz in the digital age. D&I statement. Allianz Technology is proud to be an equal opportunity employer encouraging diversity in the working environment. We are interested in your strengths and experience. We welcome all applications from all people regardless of gender identity and/or expression, sexual orientation, race or ethnicity, age, nationality, religion, disability, or philosophy of life. Join us. Lets care for tomorrow.. You. IT. Show more Show less
Posted 1 week ago
4.0 - 8.0 years
8 - 12 Lacs
Hyderabad
Work from Office
Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less
Posted 1 week ago
4.0 - 8.0 years
8 - 12 Lacs
Mumbai
Work from Office
Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less
Posted 1 week ago
2.0 - 5.0 years
7 - 11 Lacs
Gurugram
Work from Office
About NCR Atleos Key Responsibilities Security Administration Design, Engineer and manage security solutions.Configure, monitor, and troubleshoot systems to ensure optimal performance and security.Plan and execute upgrades, patches, and other maintenance activities for security tooling.Collaborate with the cybersecurity team to ensure robust security measures and compliance with industry standards.Technical Support and Troubleshooting:Provide advanced technical support for AWS cloud networking issues.Mentor and guide junior engineers and IT support staff. Documentation and Reporting Create and maintain comprehensive documentation of configurations, procedures, and processes.Generate regular reports on system performance, security incidents, and maintenance activities. Qualifications Education :Bachelors degree in computer science, Information Technology, Cybersecurity, or a related field; or equivalent work experience. Experience :At least 3 years of hands-on experience in Cyber Security. Technical Skills: Strong understanding of network protocols and services (TCP/IP, DNS, VPN, etc.).Knowledge of scripting languages (PowerShell, Python) for automation. Key Competencies Problem-Solving Skills: Strong analytical and troubleshooting abilities to diagnose and resolve complex technical issues. Communication Skills: Excellent verbal and written communication skills, with the ability to explain technical concepts to non-technical stakeholders. Project Management Ability to manage multiple projects and priorities in a fast-paced environment. EEO Statement NCR Atleos is an equal-opportunity employer. It is NCR Atleos policy to hire, train, promote, and pay associates based on their job-related qualifications, ability, and performance, without regard to race, color, creed, religion, national origin, citizenship status, sex, sexual orientation, gender identity/expression, pregnancy, marital status, age, mental or physical disability, genetic information, medical condition, military or veteran status, or any other factor protected by law. Statement to Third Party Agencies To ALL recruitment agenciesNCR Atleos only accepts resumes from agencies on the NCR Atleos preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Atleos employees, or any NCR Atleos facility. NCR Atleos is not responsible for any fees or charges associated with unsolicited resumes.
Posted 1 week ago
3.0 - 6.0 years
6 - 11 Lacs
Gurugram
Work from Office
About NCR Atleos Responsible for planning and performing Application Risk Assessments, as per the guidelines provided by regulations and standards. Build expertise on security governance and compliance that includes all Cloud providers and Cloud security monitoring. Build tool expertise on tools - Wiz, Algosec, Fortinet, Forscout, etc. Effectively collaborates and communicates with the stakeholders and ensure satisfaction Foster teamwork. Train and coach team members to ensure effective knowledge management activity. EEO Statement NCR Atleos is an equal-opportunity employer. It is NCR Atleos policy to hire, train, promote, and pay associates based on their job-related qualifications, ability, and performance, without regard to race, color, creed, religion, national origin, citizenship status, sex, sexual orientation, gender identity/expression, pregnancy, marital status, age, mental or physical disability, genetic information, medical condition, military or veteran status, or any other factor protected by law. Statement to Third Party Agencies To ALL recruitment agenciesNCR Atleos only accepts resumes from agencies on the NCR Atleos preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Atleos employees, or any NCR Atleos facility. NCR Atleos is not responsible for any fees or charges associated with unsolicited resumes.
Posted 1 week ago
5.0 - 9.0 years
8 - 13 Lacs
Bengaluru
Work from Office
Date 25 May 2025 Location: Bangalore, KA, IN Company Alstom At Alstom, we understand transport networks and what moves people. From high-speed trains, metros, monorails, and trams, to turnkey systems, services, infrastructure, signalling and digital mobility, we offer our diverse customers the broadest portfolio in the industry. Every day, 80,000 colleagues lead the way to greener and smarter mobility worldwide, connecting cities as we reduce carbon and replace cars. Could you be the full-time Network Security and Tool Automation Analyst in Bangalore were looking for Your future role Take on a new challenge and apply your analytical and automation expertise in a new cutting-edge field. Youll work alongside innovative, dedicated teammates. You'll contribute to the safety and efficiency of our transport networks by handling tickets in SNOW Incidents, Changes, and Service requests for Firewall Flows implementation in alignment with Alstom's security policy. Day-to-day, youll work closely with teams across the business (IS&T E2E PM, Local IS&T Business Partners, Solutions Architects), automate business processes to enhance service delivery, and much more. Youll specifically take care of designing automated workflows, testing them in UAT/BETA environments, and deploying them in production. You will also assist in troubleshooting network-related Firewall Flow issues. Well look to you for: Automating and scripting daily tasks to improve service delivery Implementing flows or rules on Firewalls Configuring and coordinating IPSEC VPN Tunnels E2E Managing Firewall policy and compliance Supporting Security Incident Investigations Handling emergency business requests on flow opening with priority All about you We value passion and attitude over experience. Thats why we dont expect you to have every single skill. Instead, weve listed some that we think will help you succeed and grow in this role: Degree in Engineering or a related field 4+years of Experience or understanding of Firewall Rules implementation and network security policy frameworks Knowledge of programming tools such as Python, Visual Studio Code, CI/CD- GitLab, Power Automate, RestFul API integration, Postman Familiarity with ITIL Service processes and quality reviews A certification in a related field is beneficial Proven ability to perform risk analysis and manage incidents Operational support and process documentation skills Things youll enjoy Join us on a life-long transformative journey the rail industry is here to stay, so you can grow and develop new skills and experiences throughout your career. Youll also: Enjoy stability, challenges and a long-term career free from boring daily routines Work with cutting-edge security standards for rail signalling Collaborate with transverse teams and helpful colleagues Contribute to innovative projects Utilise our flexible working environment Steer your career in whatever direction you choose across functions and countries Benefit from our investment in your development, through award-winning learning Progress towards roles with greater responsibility and scope Benefit from a fair and dynamic reward package that recognises your performance and potential, plus comprehensive and competitive social coverage (life, medical, pension) You dont need to be a train enthusiast to thrive with us. We guarantee that when you step onto one of our trains with your friends or family, youll be proud. If youre up for the challenge, wed love to hear from you! Important to note As a global business, were an equal-opportunity employer that celebrates diversity across the 63 countries we operate in. Were committed to creating an inclusive workplace for everyone.
Posted 1 week ago
3.0 - 5.0 years
6 - 10 Lacs
Chennai
Work from Office
Company RNTBCI PL Job Description Execute and maintain automated and manual tests for Key Management API integrations Troubleshoot and resolve issues with Key Management APIs, including communication between components and data security validation. Understand the different modules of the KMS internal solution. Use Bruno for API testing and debugging of encryption services. Manage, configure, and support cryptographic operations. Log, track, and resolve bugs and incidents related to Key Management and encryption systems. Assist in the configuration and setup of Key Management systems, ensuring proper encryption and key policies are applied. Review and implement configuration changes to meet customer requirements or to resolve issues. Provide guidance and assistance to customers on best practices for Key Management configurations. Perform reload procedures to refresh systems as needed, ensuring proper initialization and key management functionality post-reload. Document the reload process and any related troubleshooting to ensure consistency in future operations. Offer technical support to customers regarding issues related to Key Management, such as API errors, configuration changes, and troubleshooting. Provide clear and timely communication to customers, resolving technical issues or escalating them to higher support tiers as needed. Train and guide customers on key management policies, system configurations, and best practices. Collaborate with internal teams (DevOps, KMS Admin & other L1 & L3 Support Teams) to resolve issues and improve system functionality. Create and maintain technical documentation, troubleshooting guides, and knowledge base articles. Assist with ongoing improvements to the product through feedback from support issues and customer interactions. Job requires 24 / 7 support and the analyst needs to work in multiple shifts on rotational basis Skill 3 to 5 Years Experience in Key Management Systems (e. g. , HSM, encryption key handling, API security). Strong API testing skills, including hands-on experience with tools like Apigee, Bruno, Postman, Swagger, or similar. Experience with monitoring tools (Mastering Dynatrace would be a plus) Familiarity with cryptography concepts Proficiency in encryption protocols, key lifecycle management, and certificate management. Knowledge of security standards and protocols related to encryption and key management (e. g. , PKI, SSL, TLS). Experience in performing system reloads and troubleshooting in production environments. Strong customer-facing communication skills, able to explain complex technical concepts clearly to non-technical stakeholders. Proficiency in scripting languages (e. g. , Python, Bash) for automation or troubleshooting purposes. Familiarity with security platforms, cloud services, or enterprise-level IT infrastructure (Optional) Configuration Management experience, including using configuration files, databases, and environments in relation to security applications. (Optional) Understanding of compliance frameworks such as PCI DSS, GDPR, HIPAA, and NIST guidelines. Preferred Qualification: Bachelor s degree in computer science Information Technology, or related field, or equivalent work experience. Experience with cloud-based KMS solutions (e. g. , AWS KMS, Azure Key Vault, or Google Cloud KMS). Familiarity with SIEM tools and security monitoring. Knowledge of network security principles and firewall management. Job Family Information Technologies & Systems Renault Group is committed to creating an inclusive working environment and the conditions for each of us to bring their passion, perform to the full and grow, whilst being themselves. We find strength in our diversity and we are engaged to ensure equal employment opportunities regardless of race, colour, ancestry, religion, gender, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, etc. If you have a disability or special need requiring layout of the workstation or work schedule, please let us know by completing this form. By submitting your CV or application, you authorise Renault Group to use and store information about you for the purposes of following up your application or future employment. This information will only be used by Renault Group companies as described in the Group Privacy Policy .
Posted 1 week ago
6.0 - 9.0 years
4 - 8 Lacs
Chennai
Work from Office
Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you’d like, where you’ll be supported and inspired bya collaborative community of colleagues around the world, and where you’ll be able to reimagine what’s possible. Join us and help the world’s leading organizationsunlock the value of technology and build a more sustainable, more inclusive world. Strong knowledge of Layer 3 protocols, MPLS, EVPN, Segment Routing (SR-MPLS, SRv6), and SR-TE. Hands-on experience with router and switch software development. Implement Ethernet VPN (EVPN), Segment Routing (SR-MPLS, SRv6), and Traffic Engineering (SR-TE) features in networking products. Work on control plane and forwarding plane development for high-performance networking devices. Collaborate with cross-functional teams to integrate, test, and debug networking protocols on embedded platforms. Experience on Metaswitch stack is plus Knowledge of network security, QoS, and high-scale routing architectures is a plus.
Posted 1 week ago
3.0 - 6.0 years
3 - 7 Lacs
Bengaluru
Work from Office
6 -8 Years experience on creating Design documents, Implementation/ Change Management Plans or Optimization of reports (beyond day-to-day routine operations) is a must. Expertise in Implement &/or design (design is must) of one of the following - Priority is Firewall and good if candidates have hands on exp on Identity solutions, Email Security, Web Security/Proxy, Cloud Security. Cisco ISE is a plus
Posted 1 week ago
5.0 - 8.0 years
6 - 10 Lacs
Pune
Work from Office
Experience and Technical Expertise: - Strong experience(3+ years) working with Splunk in a security operations environment. Deep knowledge of Splunks components (indexers, forwarders, search heads, and deployment servers). Experience in creating and tuning SPL queries , developing Splunk apps , and managing Splunk Enterprise Security (ES). Hands-on experience in data parsing, normalization , and event correlation using Splunk. Proficient in integrating third-party tools , such as firewalls, intrusion detection systems (IDS), and vulnerability scanners, with Splunk. Security Knowledge: Strong understanding of SIEM use cases for security monitoring and incident detection. Knowledge of network security, endpoint security, cloud security, and threat intelligence integration within a SIEM context. Experience in detecting and responding to cybersecurity threats (e.g., malware, DDoS attacks, insider threats, APTs). Cloud and Hybrid Environments: Experience with hybrid environments, where on-premises and cloud data sources are integrated into Splunk. Familiarity with deploying and managing Splunk in cloud environments (e.g., AWS, Azure, Google Cloud). Collaboration and Communication: Strong communication skills to work with cross-functional teams (SOC, IT, Compliance, etc.) and translate security data into actionable business insights. Ability to communicate technical information effectively to both technical and non-technical stakeholders. Problem-Solving and Troubleshooting: Strong troubleshooting skills, particularly when dealing with complex data integration or performance issues in a Splunk environment. Ability to identify root causes of security issues and design effective solutions using Splunk. Data Analytics and Reporting Skills: Ability to design and build custom dashboards, reports, and alerts to provide actionable insights from security data. Proficiency in data visualization to communicate findings to both technical and non-technical stakeholders. Knowledge of KPI and metric tracking for security and operational effectiveness. Scripting and Automation: Proficiency in scripting languages such as Python, Bash, or PowerShell for automation tasks. Experience with Splunk REST API or SDKs to automate processes or integrate Splunk with other tools in the ecosystem. Certifications: Splunk Certified Power User or Splunk Certified Admin certification is typically required or highly preferred. Splunk Certified Security Admin or Splunk Certified Security Specialist for those focusing on security-related roles. Roles and Responsibilities of a Splunk SME: (Standard) Splunk Platform Implementation and Configuration: - Lead the deployment, configuration, and integration of Splunk with various data sources and security tools. Ensure that Splunk instances (indexers, forwarders, search heads) are set up correctly and optimized for performance. Customize Splunk for different security use cases (e.g., monitoring, incident detection, compliance reporting). Data Collection and Ingestion: - Configure data inputs, forwarders, and data parsers for various log sources (e.g., network devices, firewalls, endpoints, servers). Set up log forwarding and ensure efficient and secure data collection from a wide range of security and IT systems. Ensure data normalization and correlation to make it usable for analysis and detection. Search and Query Optimization: - Design and develop complex SPL (Search Processing Language) queries to analyse security data. Optimize searches for performance and efficiency, especially when working with large datasets. Create and maintain reports, dashboards, and alerts for security monitoring and incident response. Incident Detection and Response: - Use Splunk to monitor security events in real-time, identifying potential threats and anomalies. Configure and fine-tune Splunks correlation searches and alerts to ensure accurate detection of security incidents (e.g., intrusions, breaches). Work with security operations teams to investigate incidents and provide actionable insights from Splunk data. Security Monitoring and Threat Intelligence Integration: Integrate external threat intelligence feeds into Splunk to enhance security monitoring. Leverage Splunk s machine learning capabilities to identify patterns of suspicious activity. Create custom detection rules, machine learning models, and analytics to detect emerging threats. Reporting and Compliance: - Generate and deliver automated security reports (e.g., for compliance frameworks like GDPR, PCI-DSS, HIPAA). Ensure that Splunk data is properly indexed, categorized, and stored to support compliance and auditing requirements. Create dashboards and visualizations for executives, managers, and technical teams to track security posture. Splunk Tuning and Optimization: - Perform regular health checks of the Splunk environment to ensure high availability, scalability, and performance. Tune Splunk configurations (indexing, search, data storage) to maintain optimal performance, especially during peak event loads. Troubleshoot and resolve issues related to Splunk performance, data accuracy, or integration challenges. Collaboration and Knowledge Sharing: - Work with other security teams (e.g., SOC, Incident Response, Threat Intelligence) to align Splunk s capabilities with organizational security needs. Provide training, mentoring, and best practices for other Splunk users and administrators. Stay up to date with new features, apps, and updates to Splunk, and share knowledge with the team. Documentation and Standards: - Maintain comprehensive documentation for Splunk configurations, use cases, search queries, and data pipelines. Develop standard operating procedures (SOPs) for various Splunk-related tasks (e.g., creating reports, handling incidents, data ingestion). Document Splunk customizations, integration processes, and automation to ensure Sme, Aws, Integraions, Splunk Admin & Development, Splunk, Network Security, Splunk Admin, Restapi
Posted 1 week ago
4.0 - 8.0 years
4 - 8 Lacs
Chennai
Work from Office
Skill : PI/PO Experience Required : 4-8 Years Location: Chennai( 24/7 shift) No of Position : 1 The role requires strong expertise in SAP PI/PO and basic ABAP programming skills . Hands-on experience in monitoring, troubleshooting, and debugging integration issues. Knowledge of SAP Cloud Platform Integration (CPI), including working with adapters, Java mapping, and node functions, is essential. Familiarity with transport management and incident handling through ServiceNow is also required. Flexibility to work in a 24/7 support environment across rotating shifts, including weekends. PI/PO specific What you ll bring: Proficiency in SAP Process Orchestration (PO) and SAP Cloud Integration (CI): The candidate should have a deep understanding of these tools, their configuration, and their use in creating, deploying, and managing business applications. Experience in monitoring PO and SCI integrations. Must be proficient in Troubleshooting and debugging issues/outages and driving them to permanent resolution. Experience in integrating various SAP and non-SAP applications using SAP PO and SAP CI. Experience in configuring and debugging issues in PO adapters HTTP_AAE, IDoc_AAE, RFC, File, SOAP, SFTP, JDBC and REST. Ability to use node functions, java mapping and XSLT mapping. Knowledge of SLD and transport management (TPZ, CTS+) Good knowledge in certificate maintenance and network security protocols. Prior experience in automating support related activities. Basic Knowledge on Network and SAP Basis related to connectivity. Good understanding of software development life cycle (SDLC) What you ll do: Monitoring 800+ integrations/Iflow in SAP Process Orchestration (PO) and SAP Cloud Integration (CI) systems. To ensure issues are reported to concerned stakeholder and permanent resolution is attained. To ensure assigned tickets are completed within agreed SLA/KPIs. Assist teams during downtime and ensuring issues are closed on time. Automate support related activities. Sap Pi / Po
Posted 1 week ago
3.0 - 5.0 years
8 - 12 Lacs
Chennai
Work from Office
Execute and maintain automated and manual tests for Key Management API integrations Troubleshoot and resolve issues with Key Management APIs, including communication between components and data security validation. Understand the different modules of the KMS internal solution. Use Bruno for API testing and debugging of encryption services. Manage, configure, and support cryptographic operations. Log, track, and resolve bugs and incidents related to Key Management and encryption systems. Assist in the configuration and setup of Key Management systems, ensuring proper encryption and key policies are applied. Review and implement configuration changes to meet customer requirements or to resolve issues. Provide guidance and assistance to customers on best practices for Key Management configurations. Perform reload procedures to refresh systems as needed, ensuring proper initialization and key management functionality post-reload. Document the reload process and any related troubleshooting to ensure consistency in future operations. Offer technical support to customers regarding issues related to Key Management, such as API errors, configuration changes, and troubleshooting. Provide clear and timely communication to customers, resolving technical issues or escalating them to higher support tiers as needed. Train and guide customers on key management policies, system configurations, and best practices. Collaborate with internal teams (DevOps, KMS Admin & other L1 & L3 Support Teams) to resolve issues and improve system functionality. Create and maintain technical documentation, troubleshooting guides, and knowledge base articles. Assist with ongoing improvements to the product through feedback from support issues and customer interactions. Job requires 24 / 7 support and the analyst needs to work in multiple shifts on rotational basis Skill 3 to 5 Years Experience in Key Management Systems (e.g., HSM, encryption key handling, API security). Strong API testing skills, including hands-on experience with tools like Apigee, Bruno, Postman, Swagger, or similar. Experience with monitoring tools (Mastering Dynatrace would be a plus) Familiarity with cryptography concepts Proficiency in encryption protocols, key lifecycle management, and certificate management. Knowledge of security standards and protocols related to encryption and key management (e.g., PKI, SSL, TLS). Experience in performing system reloads and troubleshooting in production environments. Strong customer-facing communication skills, able to explain complex technical concepts clearly to non-technical stakeholders. Proficiency in scripting languages (e.g., Python, Bash) for automation or troubleshooting purposes. Familiarity with security platforms, cloud services, or enterprise-level IT infrastructure (Optional) Configuration Management experience, including using configuration files, databases, and environments in relation to security applications. (Optional) Understanding of compliance frameworks such as PCI DSS, GDPR, HIPAA, and NIST guidelines. Preferred Qualification: Bachelor s degree in computer science Information Technology, or related field, or equivalent work experience. Experience with cloud-based KMS solutions (e.g., AWS KMS, Azure Key Vault, or Google Cloud KMS). Familiarity with SIEM tools and security monitoring. Knowledge of network security principles and firewall management. Job Family Information Technologies & Systems Renault Group is committed to creating an inclusive working environment and the conditions for each of us to bring their passion, perform to the full and grow, whilst being themselves. We find strength in our diversity and we are engaged to ensure equal employment opportunities regardless of race, colour, ancestry, religion, gender, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, etc. If you have a disability or special need requiring layout of the workstation or work schedule, please let us know by completing this form. In order to follow in real time the evolution of your applications and to stay in touch with us, we invite you to create a candidate account. This will take you no more than a minute and will also make it easier for you to apply in the future.
Posted 1 week ago
6.0 - 8.0 years
13 - 18 Lacs
Hyderabad
Work from Office
Strong understanding of network infrastructure and network hardware prior experience in implementing administering and troubleshooting in network / network security Training / Certifications CCNA / CCNP- Routing Switching, CCSA /CCSE Vendor Management, Project Management, Good communication and Presentation skills Routing, Switching, Network Security, Web Security Cisco Routing and Switching Cisco ASA firewalls, Checkpoint firewalls/ MacAfee/ IBM/IPS Devices Maintaining and administering computer networks and related computing environments including systems software applications software hardware and configurations Install upgrade configure and troubleshot network devices such as routers, switches etc Coordinate with system integrators OEMs for design of any deployments / technologies Maximize network performance by monitoring performance troubleshooting network problems and outages scheduling upgrades and collaborating with network architects on network optimization LAN/WAN troubleshooting with protocols such as HSRP, OSPF, BGP, MPLS Tunneling protocols (IPSEC/GRE) etc Inventory maintenance Work within established configuration and change management policies to ensure awareness approval and success change made to the network infrastructures Preparing quarterly /monthly reports processing payments to vendor budget for expenditure expenses Proper documentation and updating documents related network activities Deploying and operating network monitoring for tools effective and proactive network management Working knowledge of Leaf Spine architecture for Cisco networks Ability to create accurate network diagrams and documentation for design and planning network communication systems Install configure upgrade and troubleshoot network services such as firewalls IPS Proxy server Basic knowledge of IPS devices Linux based proxy servers SIEM tools deployment along with correlation rules etc Understand requirements of network security and contributor in adherence of network policies and procedure as laid by organization Maintain firewalls virtual private networks Be a member of security operations team and coordinate with SOC vendors for security incidents reported Configuration and troubleshooting of different kind of Access list firewall rule base to provide access Analyze security incidents / events to determine their root cause Train fellow employees in security awareness and procedures Prepare reports that document security incidents/ events
Posted 1 week ago
5.0 - 7.0 years
8 - 10 Lacs
Bengaluru
Work from Office
Position Purpose The role of the Third-Party Technology Risk Management Analyst / Consultant is to implement the set of operational activities to be carried out within BNP Paribas (Group entities) to manage ICT Cyber risks for the beneficiaries of sourcing (Outsourcing, purchasing shoring) initiatives supported by ICT service providers and third parties involved in ICT projects or business projects with ICT components. She/he can operate within TPTRM scope governance, providers, beneficiaries SMEs spread throughout global region. As part of his role, she/ he will have to work closely with German stakeholders. Especially, she / he will help clients assess the risks associated to their arrangement and provide recommendations for managing those risks.. Responsibilities Direct Responsibilities Perform third-party technology risk assessments to help beneficiaries/contract owners identify and evaluate business and technology risks related to their arrangements, and provide recommendations for managing those risks Define the contractual ICT security requirements applicable to the arrangement to protect confidentiality, integrity and availability of Beneficiary data and systems Provide periodic status updates (KPIs/KRIs) including potential risks and delays to the project delivery to beneficiary project manager, conduct workshops wherever necessary Review thoroughly asset classifications and pre-existing asset related risks control responses ensuring sync with TPTRM assessments responses Select the requirements to include in the specific ICT due diligence questionnaires to be sent to the shortlisted suppliers and analyze the providers feedback Support the Beneficiary answering ICT Security questions from the provider as part of the contract negotiation process List of the risks that should be formalized in a risk management plan given the third party's answers and report on the third party's ability to manage risks Support the Beneficiary recording the arrangement data in the various Group registers (ServiceNow, RISK360, etc.) Ensure periodic review of ICT arrangements and contracted ICT services Demonstrate knowledge in one or more of the following cyber risk domains, including: Security Governance and Management, Security Policies and Procedures, Application Security Controls, Access Controls, Incident Response, Risk Management, Privacy and Data Protection, Encryption. Contributing Responsibilities Direct Responsibilities Perform third-party technology risk assessments to help beneficiaries/contract owners identify and evaluate business and technology risks related to their arrangements, and provide recommendations for managing those risks Define the contractual ICT security requirements applicable to the arrangement to protect confidentiality, integrity and availability of Beneficiary data and systems Provide periodic status updates (KPIs/KRIs) including potential risks and delays to the project delivery to beneficiary project manager, conduct workshops wherever necessary Review thoroughly asset classifications and pre-existing asset related risks control responses ensuring sync with TPTRM assessments responses Select the requirements to include in the specific ICT due diligence questionnaires to be sent to the shortlisted suppliers and analyze the providers feedback Support the Beneficiary answering ICT Security questions from the provider as part of the contract negotiation process List of the risks that should be formalized in a risk management plan given the third party's answers and report on the third party's ability to manage risks Support the Beneficiary recording the arrangement data in the various Group registers (ServiceNow, RISK360, etc.) Ensure periodic review of ICT arrangements and contracted ICT services Demonstrate knowledge in one or more of the following cyber risk domains, including: Security Governance and Management, Security Policies and Procedures, Application Security Controls, Access Controls, Incident Response, Risk Management, Privacy and Data Protection, Encryption. Contributing Responsibilities Instruct the 5 European Bank Authority ICT risks categories and follow them throughout TPTRM assessments Participate in Initialization Committee/ Validation Committee Go-Live committee for Supporting specific arrangements and results Provide support to beneficiary / contract owner to implement residual actions Facilitate the business/sponsor/beneficiary/SME decision-making with deep analysis based on relevant flagged risk families Provide support to contract owners and coordinate/ assist to ensure proper assessments are done Manage TPTRM inventory with follow-up tracker management Contribute to process improvement, upkeep with new policies, regulations, standards guidelines Technical Behavioral Competencies Functional Skills Experience in IT Risk and Cyber Security domains in a financial institution demonstrating a high-level of commitment and self-motivation. Experience in the Finance IT industry with a strong exposure to IT Operations, Application Security, and/or network administration, IPS Demonstrate knowledge of Risk Compliance, cybersecurity, cyber risk, cyber threats, Third Party Technology Risk Management/ Vendor assessments Working knowledge of global regulations, frameworks and standards (ISO, NIST, COBIT, PCI-DSS, HIPAA) and conversant in the tactics, techniques and procedures used by Risk adversaries. Demonstrates a calm professional approach, with a good understanding of delivery within time constraints and the need to escalate/inform departmental management as appropriate. Good IT knowledge Technical : - Good understanding of organizations and IT Businesses - Good technical understanding of infrastructures and IT Security Productions and Systems - IT risk /Third Party risk analysis and management methods and should have worked on Risk Management Tools like, ServiceNow etc. - Knowledge of Cyber Resilience, IT continuity and business continuity - GRC - Governance, Risk Management and Compliance Management. - Firewall and Internet technologies; Cloud Security, Banking Tools Technologies. - Secure access control mechanisms; Encryption and Key management technics Behavioral : - Strong Communication, Analytical and problem-solving skills. - Proven organizational skills with excellent multi-tasking, result oriented and prioritization skills - Good documentation and reporting skills - Ability to work independently - Strong communication and interpersonal skills, able to communicate and relate easily with IT, Finance and back-office users - Good communication, technical writing/diagramming skills - Attention to detail and accuracy Specific Qualifications (if required) - One or more Industry-recognized information Security certifications such as CISSP, CISA, GCCC, CISM, CEH, CRISC, OSCP or Security+. - IT Security tools like Firewalls, IPS, WAF, Endpoint protection, Network security, etc. - IT Auditing (ISO27001/2, NIST 800 Series, ISO27005, ISO42001) - Regulatory Compliance MBA in Finance/Systems/IT, Masters in Technology, Bachelor of Commerce, Masters in Commerce, Bachelor in Science, Bachelor in Technology Skills Referential Behavioural Skills : (Please select up to 4 skills) Communication skills - oral written Attention to detail / rigor Ability to deliver / Results driven Creativity Innovation / Problem solving Choose an item. Choose an item. Choose an item. Transversal Skills: (Please select up to 5 skills) Analytical Ability Ability to manage a project Ability to understand, explain and support change Ability to develop and adapt a process Ability to anticipate business / strategic evolution Other/Specific Qualifications (if required) CISA/CISSP/CISM/CRISC
Posted 1 week ago
5.0 - 8.0 years
4 - 8 Lacs
Bengaluru
Work from Office
Bachelor’s degree in Network and/or Telecoms Engineering , 5 to 8 years of computer Networks and deployment experience, Network design, systems engineering, and network security experience mandatory Hands-on experience with network management (Zabbix, SolarWinds & etc) and traffic analysis tools (e.g. Wireshark, iperf) CCNA/CCNP is preferrable. Roles and Responsibilities Under general supervision, develops, codes, test, and debugs new software or enhancements to existing software customers. Requires good understanding of business application. Works with technical staff to understand problems with software and resolve them. Resolves customer complaints with software and responds to suggestions for improvements and enhancements from customers. May assist in development of software user manuals. Demonstrates software. Note: If the incumbent is responsible for the development of software for internal use, please match to a position in the Application Development sub-family grouping.
Posted 1 week ago
7.0 - 13.0 years
0 - 25 Lacs
Noida, Chennai, Bengaluru
Work from Office
Key Responsibilities: Design, deploy, and manage F5 BIG-IP LTM, GTM, ASM, and APM modules. Configure and maintain load balancing policies, SSL offloading, iRules, and traffic management. Implement and manage network security policies, firewalls, VPNs, and intrusion prevention systems. Perform regular security assessments and vulnerability scans. Collaborate with application and infrastructure teams to optimize performance and security. Troubleshoot complex network and application delivery issues. Monitor network performance and security using tools like Splunk, SolarWinds, or equivalent. Maintain documentation for network configurations, procedures, and policies. Stay updated with the latest security threats, technologies, and compliance requirements Required Skills: Strong hands-on experience with F5 BIG-IP (LTM, GTM, ASM, APM). Proficiency in writing and troubleshooting iRules and iApps . Deep understanding of TCP/IP , HTTP/S , DNS , SSL/TLS , and routing protocols . Experience with firewalls , IDS/IPS , and VPN technologies . Familiarity with network monitoring and logging tools . Knowledge of security frameworks (e.g., NIST, ISO 27001) and compliance standards (e.g., PCI-DSS, HIPAA). Scripting skills (e.g., Python, Bash) for automation and reporting. Excellent problem-solving and communication skills.
Posted 1 week ago
8.0 - 12.0 years
20 - 30 Lacs
Bengaluru
Work from Office
About Toast Toast is driven by building the restaurant platform that helps restaurants adapt, take control, and get back to what they do best: building the businesses they love. Because our technology is purpose-built for restaurants, our customers trust that we will deliver on their needs today while investing in innovative experiences that will power the future of the industry. About this roll*: We are seeking a strategic and experienced leader to manage our Corporate Security and Governance, Risk, and Compliance functions in India. You will lead and grow both teams, strengthen our security posture, drive compliance with industry frameworks, and support enterprise risk efforts, while partnering closely with global stakeholders on key initiatives. What you will do: Corporate Security: Provide leadership and oversight to the CorpSec team, ensuring the implementation of best practices across endpoint protection, vulnerability management, and threat mitigation. Guide the design and management of a secure enterprise endpoint strategy, ensuring the CorpSec team aligns with policy and compliance requirements. Supervise the CorpSec team in conducting vendor risk assessments and coordinate with global stakeholders to drive remediation activities. Oversee the management of secure email gateway and Data Loss Prevention (DLP) systems, ensuring the CorpSec team enforces data protection and policy compliance across all endpoints (Windows, macOS, Linux). Manage endpoint investigations and root cause analysis, directing the CorpSec team to collaborate with the SOC for integrating telemetry into SIEM platforms (e.g., Splunk, Datadog). Ensure the CorpSec team maintains documentation, SOPs, and training resources, and oversees the delivery of awareness sessions to improve endpoint hygiene. Stay informed on emerging threats to provide strategic guidance to the CorpSec team for enhancing threat detection and response capabilities. Governance, Risk, and Compliance (GRC): Oversee the development and maintenance of GRC frameworks (SOC 2, PCI DSS, ISO 27001), ensuring the Technical GRC team aligns with global standards and maintains ongoing compliance. Manage the review process for third-party security attestations (e.g., SOC 2, ISO 27001) and guide the Technical GRC team in assessing vendors in collaboration with Legal, Procurement, and IT. Supervise periodic vendor risk reviews, ensuring the Technical GRC team identifies gaps and drives remediation plans effectively. Partner with internal audit and external assessors to support security evaluations and regulatory alignment. Provide oversight for regular reporting on compliance posture, risk trends, and incident metrics to senior stakeholders, ensuring the Technical GRC team delivers accurate and timely updates. Team Leadership and Development: Provide leadership and mentorship to the Corporate Security and GRC teams in India, fostering a high-trust, collaborative environment. Recruit, train, and grow security talent to build a resilient, high-performing organization. Set performance goals, conduct evaluations, and support team members' ongoing development. Do you have the right ingredients*? Bachelor’s in Computer Science, InfoSec, or related field (Master’s preferred). Industry certifications like CISSP, CISM, or CEH are strongly preferred. 10+ years in cybersecurity, with hands-on experience in vulnerability management, compliance automation, and GRC. Strong understanding of SOC operations, incident response, and security tooling (SIEM, IDS/IPS, WAF). Proven leadership experience managing distributed security teams in dynamic environments. Skilled in communication, collaboration, and team development. Deep knowledge of compliance frameworks (e.g., SOC 2, PCI DSS, ISO 27001) and regulatory expectations.
Posted 1 week ago
9.0 - 14.0 years
0 - 3 Lacs
Chennai
Hybrid
Skills Required- Nextgen Antivirus Experience- 9-15yrs Location-Chennai Mode- Hybrid Please share the below details with updated resume Notice Period- Total Exp- Relevant Exp- Current CTC- Expected CTC- Current Location- Preferred Location- DOB- Ex HCL?- HCL SAP ID-
Posted 1 week ago
3.0 - 5.0 years
3 - 6 Lacs
Chennai
Work from Office
Job Title: Network & Security Engineer Experience: 3 to 5 Years Location: Velachery, Chennai. Notice Period: Immediate Joiner or Max 15 Days Gender Preference: Male Work Schedule: Rotational Day/Night Shifts (Domestic & International ) Job Summary: We are seeking a skilled and experienced Network & Security Engineer to join our dynamic IT infrastructure team. The ideal candidate should have 3 to 5 years of hands-on experience in network security, switching, routing, and cloud environments. The role involves working in rotational shifts, handling critical client infrastructure, and ensuring robust security and seamless connectivity. Key Responsibilities: Firewall Management: Hands-on experience with Fortigate, Palo Alto, or Sophos firewall solutions. Perform configuration, monitoring, and troubleshooting of firewall policies. Network Switching & Routing: Strong experience with HP Aruba, Extreme, or Juniper switches and routers. Perform network setup, configuration, maintenance, and fault diagnosis. Audits & Documentation: Manage ISO/PCI compliance audits and prepare/maintain necessary documentation. Regularly update network and security documentation to meet audit standards. Client Interaction: Provide direct client support for troubleshooting and resolving network/security issues. Deliver excellent service with strong problem-solving and analytical skills. Cloud Platform Exposure: Basic working knowledge of AWS or Azure environments. Assist in cloud network configuration and security setups. Endpoint Security: Hands-on experience with FortiEMS, Seqrite, or other DLP (Data Loss Prevention) products. Ensure endpoint compliance and proactive threat detection. --- Requirements: Bachelors Degree in Computer Science, Information Technology, or a related field. Relevant certifications (e.g., CCNA, Fortinet NSE, Palo Alto PCNSA/PCNSE, AWS/Azure Fundamentals) preferred. Strong communication skills and willingness to work flexible rotational shifts. Proactive, self-motivated, and a strong team player. Interested Candidates share your updated resume to: careers@alldigitech.com
Posted 1 week ago
3.0 - 8.0 years
22 - 25 Lacs
Mumbai
Work from Office
About the role Our support application team performs application vulnerability assessments and document vulnerabilities which were found and provides recommendations for remediation according to BFSI guidelines and industry best practices. As an Application Security Manager, you will provide guidance to the application team on application security best practices, support remediation effort and track open issues and follow up to ensure remediation. You will work along with cross functional business teams to get closure of identified gaps and utilize escalation matrix effectively wherever necessary. You will conduct application security assessment results review and mitigation approval. You will keep abreast of new technologies to ensure that the organization remains at the forefront of security. Key Responsibilities Support and Testing Vulnerability Assessments & Penetration Testing (Automated + Manual) on business critical assets with security tools like BurpSuite, Nessus, Nmap, Accunetix, Metasploit Netsparker, Qualys etc. Analysis Perform in-depth analysis of VAPT results, Review assessment reports to provide risk mitigation & recommendations on that basis. Collaboration Collaborate with the application team and provide them guidance on application security best practices, support remediation effort and track open issues and follow up to ensure remediation. Qualifications & Skills Educational Qualification Engineering Graduate in CS, IT, EC or InfoSec, CyberSec or MCA equivalent with relevant experience Certifications OSCP Compliance Knowledge of cyber security trends & hacking techniques, MITRE ATT&CK framework with hacker mindset. Network Security Knowledge of Network Security technology in areas of Firewall, IPS, VPN, Gateway security solutions (proxy, web filtering) Key Technologies Familiarity with OWASP, SANS vulnerabilities along with its validations in source code and other security frameworks & Compliance, Knowledge of Networking concepts & Good understanding of latest Network /security technologies such as Cloud security and recent trends.
Posted 1 week ago
6.0 - 8.0 years
7 - 10 Lacs
Ahmedabad
Work from Office
Experience: 6+ Years Key Responsibilities: Design, implement, and manage secure network solutions including firewalls, VPNs, IDS/IPS, and endpoint protection. Monitor and analyze network traffic to identify suspicious behavior and respond to threats. Perform vulnerability assessments and penetration testing to identify risks and provide mitigation strategies. Maintain and update security systems, hardware, and software, including firewalls, routers, switches, and antivirus platforms. Respond to and investigate security incidents, breaches, and alerts. Develop and enforce network security policies, procedures, and best practices. Collaborate with other IT teams to ensure overall system security and performance. Conduct security audits and prepare reports for management and compliance. Keep up to date with the latest cybersecurity trends, threats, and technology solutions. Requirements: Education & Experience: Bachelors degree in Computer Science, Information Technology, or related field. 6+ years of experience in network security or IT security-related roles. Technical Skills: Strong knowledge of network protocols, firewalls (e.g., Palo Alto, Fortinet, Cisco ASA), IDS/IPS, and SIEM tools. Proficiency in configuring and managing routers, switches, and network appliances. Experience with VPNs, SSL, IPsec, and secure remote access solutions. Familiarity with industry standards and frameworks (e.g., NIST, ISO 27001, CIS Controls). Scripting skills (e.g., Python, Bash) are a plus. Soft Skills: Excellent problem-solving and analytical skills. Strong communication and documentation abilities. Ability to work independently and in a team environment.
Posted 1 week ago
8.0 - 10.0 years
10 - 12 Lacs
Gurugram
Work from Office
As a Product Security Architect (Software, Hardware/Firmware) , you will be responsible for ensuring the security, integrity, and confidentiality of the hardware, software systems and applications developed by Luminous. You will work closely with development teams, project managers, and other stakeholders to design, implement, and maintain robust security measures and best practices throughout the software development lifecycle. Your primary objective will be to identify potential security vulnerabilities, define security requirements, and implement effective solutions to safeguard sensitive data and protect against cyber threats. Qualification/ Personal Attributes Qualification Bachelors / Master s degree in Computer Science, Information Security or similar Experience 8-10 years of experience in software & firmware security (for Web application, Mobile App in IoT domain) Proven experience as a Software & firmware Security Architect or in a similar role. In-depth knowledge of software security principles, secure coding practices, Database security and common security vulnerabilities. Drafting polices related to product security. Expertise in Cloud Security Experience in DevSecOps Experience with security testing tools and methodologies, including static code analysis, dynamic analysis, and penetration testing. Strong understanding of authentication and authorization protocols (e.g., OAuth, SAML, JWT) and encryption techniques. Familiarity with compliance standards such as OWASP, ISO 27001, NIST, and PCI DSS. Proven experience as an IoT Security Architect or a similar role with a focus on IoT security. Solid understanding of IoT architectures, protocols, and technologies. In-depth knowledge of IoT security principles, secure design patterns, and common IoT vulnerabilities. Experience with IoT security frameworks and industry standards (e.g., IoT Security Foundation, IEC 62443, NIST SP 800-53). Familiarity with IoT device security features (e.g., hardware security modules, Trusted Platform Modules). Strong understanding of network security and encryption technologies Excellent communication and collaboration skills to work effectively with cross-functional teams. Relevant certifications such as CISSP, CSSLP, or CISM are a plus. Team handling experience (with Pen tester, Security analyst & DevSecOps engineer) Skills & Attributes Problem-solving skills with a sharp analytical mind Capability to collaborate with cross functional teams/3rd parties Understanding the business side of the application An ardent researcher of market trends and technology evaluation Job Description Responsibilities 1. Security Architecture Design: Develop and design the security architecture for software applications and systems, taking into consideration various factors like scalability, performance, and usability while ensuring robust security measures. Create and maintain security policies, standards, and guidelines for the development and deployment of software applications. 2. Threat Modeling and Risk Assessment: Perform threat modeling and risk assessments for software projects to identify potential security risks and vulnerabilities. Collaborate with cross-functional teams to prioritize and address security issues based on the severity of risks. 3. Secure Coding Practices: Advise development teams on secure coding practices and conduct code reviews to identify and rectify security flaws. Promote the adoption of security-related best practices and coding standards across the development teams. 4. Security Testing: Plan and oversee security testing activities, including penetration testing, vulnerability scanning, and code analysis. Plan and oversee security testing activities for IoT devices and applications, including penetration testing and vulnerability assessments. Analyze and interpret the results of security testing and work with the development teams to address identified issues. 5. Authentication and Authorization: Design and implement strong authentication and authorization mechanisms to control access to software applications and data. Integrate industry-standard authentication and authorization protocols into the software systems. 6. Encryption and Data Protection: Ensure the appropriate use of encryption techniques to protect sensitive data at rest and in transit. Implement data protection mechanisms to safeguard the confidentiality and integrity of data. 7. Incident Response and Security Monitoring: Collaborate with the incident response team to develop incident response plans and participate in security incident handling and investigations. Implement security monitoring solutions to detect and respond to security incidents proactively. 8. Compliance and Governance: Support compliance audits and assessments related to software security. Stay up-to-date with industry security trends, regulations, and best practices to ensure compliance with relevant security standards. 9. IoT Data Security: Establish data security and privacy measures for IoT data storage, transmission, and processing. Implement encryption and data access controls to safeguard sensitive data collected by IoT devices. 10. Network Security for IoT: Design and implement secure communication protocols for IoT networks, ensuring data confidentiality and integrity. Implement network segmentation and access controls to isolate and protect critical IoT components.
Posted 1 week ago
8.0 - 10.0 years
27 - 30 Lacs
Gurugram
Work from Office
NAB is looking for Security Assurance Consultant to join our dynamic team and embark on a rewarding career journey Undertake short-term or long-term projects to address a variety of issues and needs Meet with management or appropriate staff to understand their requirements Use interviews, surveys etc. to collect necessary data Conduct situational and data analysis to identify and understand a problem or issue Present and explain findings to appropriate executives Provide advice or suggestions for improvement according to objectives Formulate plans to implement recommendations and overcome objections Arrange for or provide training to people affected by change Evaluate the situation periodically and make adjustments when needed Replenish knowledge of industry, products and field
Posted 1 week ago
8.0 - 10.0 years
9 - 13 Lacs
Bengaluru
Work from Office
Decoding Skill Wheels: At the core lies - Behavioural Strategy and Critical Thinking - thought process essential to be successful in every role at CynLr. On top of this. there rests a layer of Key Principles . - the foundational perspective required for the role. This can also be treated as the areas that would be evaluated in prospects for every role. ABOUT THE ROLE This Role is meant to Design and Build Processes and IT practices that Augment and Facilitate all members of the Organization to be more Productive and accelerate towards their goals while using the IT infrastructure, while ensuring efficient, secure, and sustainable usage of the same. Process for the sake of a process, will not be entertained. We often tend to question every practice and process if it disrupts productivity and ease of use. Utility & Convenience precedes every other objective. . Excellent knowledg e of Microsoft Operating Systems and the Microsoft offe rings across various product lines that can be utilized. Designing and setting up continuous workflow & connected experience with Microsoft Apps, Office and Office 365 administration (including Teams and OneDrive) and PC apps, across teams and groups of the organization. Azure and SharePoint Policy design and management for apps and file sharing between organizations and users, that make the access to information to be more organized and easier. Knowledge of all computer components and peripherals and must be adept at researching and coming up with best suited HW configurations (laptop, PC, Workstation, server, Printer, conferencing system, Network systems, etc). Must be adept at Identifying Products and SW (Laptops models, SWs, etc) by assessing on best access to Support, Service, cost of Acquisition, maintenance, and upgrades/scalability - also richness of the ecosystem. Good at identifying, negotiating, and building relationship with the right vendor ecosystem for HW, SW & Service. A strongly connected network of vendors is a plus. Hands-on experience with Hardware Set-up/Networking setup. Must be adept at assembling PCs and workstations/local server setups. Excellent m onitoring & troubleshooting skills with HW, connectivity, OS layer and application issues. Must be adept at setting up Azure Devops Infrastructure and Active Directory for User Management and design user policies. Good with Network administration, Asset and Network Security - Intune. Setup Remote workflow and remote desktop connectivity . Inter-office infrastructure, across different countries including US and Europe. Must have Understandin g of : Computer Hardware & Workstations Office Productivity & Workflow automation Network Database and security Device configuration and User account p olicies
Posted 1 week ago
2.0 - 7.0 years
3 - 7 Lacs
Mumbai, Mumbai Suburban, Ahmedabad
Work from Office
Responsible for network uptime, performance, and other related services. Network monitoring and proactive network uptime maintenance. Network management (routing), Router Configuration, troubleshooting, upgradation, Link Performance Management of L3 and L2 Switch on day-to-day basis. Support administration, Change Management, Liaison with Bandwidth Provider officials and external vendors. Responsible for Implementation of Firewall Rules and Policies Management, Intrusion Management, Antivirus & Patch Management, Security Management NAT/PAT, SSH, signatures, etc. Responsible for Troubleshooting of any security related issues. Plan & implement comprehensive security policies and practices for entire infrastructure. Signatures updating, blocking of unwanted traffic, Antivirus updates, Patch updates, managing the network security on day-to-day basis. Monitoring any flooding, DoS/DDoS, Intrusion attempt in real time. Experience of working of in EMS/NMS Tool Good experience on Fortinet Firewalls, Load Balancer & Security components. Responsibilities: Responsible for network uptime, performance, and other related services. Responsible for Implementation of Firewall Rules and Policies Management, Intrusion Management, Antivirus & Patch Management, Security Management NAT/PAT, SSH, signatures, etc. Responsible for Troubleshooting of any security related issues. What we are looking for: Any Engineering Gratuate-B.E. or B.Tech (in computer / IT / EEE / Telecommunication) , MCA Able to work in 24 * 7 shift Good English & Hindi communication skills CCNP/equivalent or higher certification is mandatory Experience in large scale ICT projects Job Skills " * " indicates required fields Choose Job Location Linkedin Profile (URL) Accepted file types: doc, docx, rtf, pdf, Max. file size: 2 MB. This field is for validation purposes and should be left unchanged. Applicant Details: Accepted file types: doc, docx, rtf, pdf, Max. file size: 2 MB. This field is for validation purposes and should be left unchanged. Get In touch Are you interested in working with us? This field is for validation purposes and should be left unchanged. 78, Ratnajyot Industrial Estate, Irla Lane, Vile Parle (W), Mumbai 400056. INDIA.
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane