Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 9.0 years
0 Lacs
pune, maharashtra
On-site
The purpose of the role is to design the organization's computer and network security infrastructure to protect its systems and sensitive information from cyber threats. As a Cyber Security Architect at Wipro Limited, you will be responsible for designing and developing enterprise cyber security strategy and architecture. This includes understanding security requirements, evaluating business strategies, and conducting system security vulnerability and risk analyses. You will identify risks associated with business processes, operations, information security programs, and technology projects. Additionally, you will identify and communicate current and emerging security threats and design security architecture elements to mitigate these threats as they emerge. As a Cyber Security Architect, you will provide product best fit analysis to ensure end-to-end security covering different facets of architecture such as layered security, zoning, integration aspects, API, endpoint security, data security, compliance, and regulations. You will have experience in conducting security assessments against NIST Frameworks, SANS, CIS, etc. Moreover, you will provide support during technical deployment, configuration, integration, and administration of security technologies. You should also have experience around ITIL or key process-oriented domains like incident management, configuration management, change management, problem management, etc. Furthermore, you will provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions, and unusual, unauthorized, or illegal activity. You will be responsible for developing a direction to manage the portfolio of to-be-solutions related to cyber risk security to better match business outcome objectives. This includes analyzing the technology environment, enterprise specifics, and client requirements to set a collaboration design framework/architecture. You will be required to develop technical leadership in the design, development, and implementation of custom solutions using modern technology. In addition, your role will involve coordinating with stakeholders regarding cyber security issues and providing timely support and future recommendations. You will assist in maintaining an information security risk register and support internal and external audits related to information security. Moreover, you will support the audit of security best practices and implementation of security principles across the organization to meet business goals, customer requirements, and regulatory requirements. You will also provide training to employees on issues such as spam and unwanted or malicious emails. Your performance will be measured based on customer centricity, timely security breach solutioning, internal stakeholders" and external customers" experience, CSAT, and educating and suggesting the right control to customers. You will also support the sales team in creating wins by ensuring the quality of proposals, timely support, identifying opportunities/leads to sell services, and leading proposals. Join Wipro Limited as a Cyber Security Architect and be part of a modern and innovative organization that empowers you to design your own reinvention and realize your ambitions. Applications from people with disabilities are explicitly welcome.,
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 8-10 Years.
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
This role is a global position that supports the Internal Controls and SOX Compliance Sr. Director in scoping, designing, and supporting IT related controls. You will play a key role in Herbalife's integrated internal control environment. You must possess a strong understanding of scoping and designing controls, including knowledge of COBIT, COSO, and NIST frameworks. Effective communication and collaboration skills with stakeholders across the business are essential. Your responsibilities include assisting in the annual enterprise IT risk assessment, documenting IT SOX narratives, designing IT application controls, supporting the SOX testing plan, evaluating deficiencies, and identifying compensating controls. You will work with control owners to improve processes, address internal control issues, and identify opportunities for control optimization. Providing advice on internal controls, including SOX and cybersecurity, is also part of your role. Required skills include a solid grasp of SOX testing methodologies, risk assessment practices, Oracle experience, and knowledge of COBIT, COSO, and NIST frameworks. You should be able to work effectively in cross-functional teams, analyze problems, communicate effectively, and prioritize tasks with minimal supervision. Proficiency in Excel, Word, PowerPoint, and Visio is necessary. Experience in SOX, internal or external audit, project management, and analysis is required, preferably in a Big 4 Accounting or publicly traded company setting. A Bachelor's Degree in Information Systems, Accounting, Finance, or equivalent, along with a CISA certification, is necessary for this role.,
Posted 2 weeks ago
4.0 - 9.0 years
9 - 19 Lacs
Noida, Gurugram
Work from Office
Role Overview: The Cyber Security Auditor is responsible for auditing cybersecurity processes, risks, and controls. The role requires a strong understanding of industry frameworks like NIST (e.g., NIST CSF, NIST 800-53) and hands-on experience in assessing cybersecurity risks, governance controls, and technical security measures. Key Responsibilities: Risk and Control Assessments: Conduct assessments of cybersecurity risks and controls across network security, application security, vulnerability management, and governance controls. Issue Validation: Perform closure verification and issue validation for security findings, ensuring remediation aligns with risk reduction objectives. Vulnerability Management: Understand vulnerability management and penetration testing programs, patch management processes, threat intelligence, and threat hunting integrations. Governance Controls: Review and test governance controls related to cybersecurity policies, procedures, roles, and responsibilities. Technical Expertise: Test controls for network security, firewalls, IDS/IPS, SIEM tools, and endpoint security. Application Security: Hands-on experience in application security, vulnerability management, patch management, and security monitoring. Network Protocols: Strong knowledge of network protocols (TCP/IP, HTTP, SSL/TLS, DNS, VPN, etc.) and secure configurations. Cloud Security: Familiarity with cloud security controls (AWS, Azure, GCP) and DevSecOps principles. Desired Skills and Certifications: Frameworks and Standards: Strong understanding of NIST frameworks (CSF, 800-53), ISO 27001, CIS Controls, and regulatory requirements. Tools: Experience with GRC tools or IAM/PAM tools such as Archer, SailPoint. Certifications: Professional certifications like CISA, CISSP, CISM, CRISC, CEH, or GIAC certifications (GCIH, GCFA, GPEN) are highly desirable. Emerging Threats: Stay up to date with emerging cyber threats, attack techniques, and regulatory requirements impacting security controls. Top 5 Keywords for LinkedIn Search: Cyber Security Auditor NIST Frameworks (CSF, 800-53) Vulnerability Management Governance, Risk, and Compliance (GRC) Professional Certifications (CISA, CISSP, CISM) These keywords should help you identify candidates with the relevant skills, experience, and certifications for the position. If you need further assistance or have any other questions, feel free to ask! You said: make a good roles and responsibility based on the jd given for a job p[ost Copilot said: Copilot Roles and Responsibilities for Cyber Security Auditor Role Overview: The Cyber Security Auditor is responsible for auditing cybersecurity processes, risks, and controls. This role requires a strong understanding of industry frameworks such as NIST (e.g., NIST CSF, NIST 800-53) and hands-on experience in assessing cybersecurity risks, governance controls, and technical security measures. The auditor will validate control effectiveness and perform closure verification/issue validation to strengthen the organization's cybersecurity posture. Key Responsibilities: Risk and Control Assessments: Conduct comprehensive assessments of cybersecurity risks and controls across various domains including network security, application security, vulnerability management, and governance controls. Evaluate the effectiveness of existing security measures and recommend improvements. Issue Validation and Remediation: Perform closure verification and issue validation for security findings. Ensure remediation efforts align with risk reduction objectives and enhance overall security posture. Vulnerability Management: Understand and assess vulnerability management and penetration testing programs. Oversee patch management processes and integrate threat intelligence and threat hunting activities. Governance Controls: Review and test governance controls related to cybersecurity policies, procedures, roles, and responsibilities. Ensure compliance with regulatory requirements and industry standards. Technical Expertise: Test and validate controls for network security, firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM tools, and endpoint security. Apply hands-on experience in application security, vulnerability management, patch management, and security monitoring. Network Protocols and Secure Configurations: Demonstrate strong knowledge of network protocols (TCP/IP, HTTP, SSL/TLS, DNS, VPN, etc.) and secure configurations. Implement and maintain secure network configurations. Cloud Security and DevSecOps: Familiarity with cloud security controls for platforms such as AWS, Azure, and GCP. Apply DevSecOps principles to integrate security into the development and operations processes. Professional Development: Stay up to date with emerging cyber threats, attack techniques, and regulatory requirements impacting security controls. Pursue relevant professional certifications such as CISA, CISSP, CISM, CRISC, CEH, or GIAC certifications (GCIH, GCFA, GPEN). Desired Skills and Certifications: Frameworks and Standards: Strong understanding of NIST frameworks (CSF, 800-53), ISO 27001, CIS Controls, and regulatory requirements. Tools: Experience with GRC tools or IAM/PAM tools such as Archer, SailPoint. Certifications: Professional certifications like CISA, CISSP, CISM, CRISC, CEH, or GIAC certifications (GCIH, GCFA, GPEN) are highly desirable.
Posted 1 month ago
8.0 - 10.0 years
18 Lacs
Bengaluru / Bangalore, Karnataka, India
On-site
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. Job Description Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Microsoft Endpoint Protection . Experience: 8-10 Years . Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
0.0 years
0 Lacs
Hyderabad / Secunderabad, Telangana, Telangana, India
On-site
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. Job Description Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough