Jobs
Interviews

3740 Nist Jobs - Page 13

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 13.0 years

13 - 17 Lacs

Noida

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Network Security Operations Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitating the transition to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, while also addressing any emerging security challenges that may arise during the implementation process. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Assist in the development and maintenance of security policies and procedures.- Evaluate and recommend security technologies and solutions to enhance the security posture. Professional & Technical Skills: - Must To Have Skills: Proficiency in Network Security Operations.- Strong understanding of cloud security principles and best practices.- Experience with security frameworks such as NIST, ISO 27001, or CIS.- Familiarity with security tools and technologies for threat detection and response.- Knowledge of compliance requirements related to cloud security. Additional Information:- The candidate should have minimum 2 years of experience in Network Security Operations.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Kolkata

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Okta Identity Management Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and transitioning to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. You will engage in strategic discussions to enhance security measures and provide guidance on implementing effective security solutions. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills in security practices.- Evaluate and recommend new security technologies and tools to improve the overall security posture. Professional & Technical Skills: - Must To Have Skills: Proficiency in Okta Identity Management.- Strong understanding of cloud security principles and frameworks.- Experience with identity and access management solutions.- Familiarity with security compliance standards such as ISO 27001 and NIST.- Ability to conduct risk assessments and vulnerability assessments. Additional Information:- The candidate should have minimum 5 years of experience in Okta Identity Management.- This position is based at our Kolkata office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Kolkata

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and transitioning to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud technologies and security threats. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills in cloud security.- Evaluate and recommend new security technologies and practices to improve overall security posture. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management.- Strong understanding of cloud security principles and best practices.- Experience with identity and access management solutions.- Familiarity with compliance frameworks such as ISO 27001, NIST, or GDPR.- Ability to conduct risk assessments and develop mitigation strategies. Additional Information:- The candidate should have minimum 5 years of experience in CyberArk Privileged Access Management.- This position is based at our Kolkata office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Noida

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Okta Identity Management Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and transitioning to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. You will engage in strategic discussions to enhance security measures and provide guidance on implementing effective security solutions across the organization. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Conduct regular assessments of security architecture to identify areas for improvement.- Facilitate training sessions to enhance team knowledge on cloud security best practices. Professional & Technical Skills: - Must To Have Skills: Proficiency in Okta Identity Management.- Strong understanding of cloud security principles and frameworks.- Experience with identity and access management solutions.- Familiarity with security compliance standards such as ISO 27001 and NIST.- Ability to analyze and mitigate security risks effectively. Additional Information:- The candidate should have minimum 5 years of experience in Okta Identity Management.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

Noida

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Saviynt Identity Platform Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and facilitating the transition to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud security challenges. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular assessments of cloud security measures to identify areas for improvement.- Collaborate with cross-functional teams to ensure alignment of security practices with business objectives. Professional & Technical Skills: - Must To Have Skills: Proficiency in Saviynt Identity Platform.- Good To Have Skills: Experience with CyberArk Privileged Access Management, SailPoint IdentityNow.- Strong understanding of cloud security principles and best practices.- Experience in designing and implementing security frameworks for cloud environments.- Familiarity with compliance standards such as ISO 27001, NIST, and GDPR. Additional Information:- The candidate should have minimum 3 years of experience in Saviynt Identity Platform.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

Pune

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Cyber Threat Intelligence Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and transitioning to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. You will engage in discussions to refine security strategies and provide guidance on implementing effective security measures across the organization. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular assessments of cloud security measures to identify potential vulnerabilities and recommend improvements.- Collaborate with cross-functional teams to ensure alignment of security practices with business objectives. Professional & Technical Skills: - Must To Have Skills: Proficiency in Cyber Threat Intelligence.- Strong understanding of cloud security principles and frameworks.- Experience with threat modeling and risk assessment methodologies.- Familiarity with security compliance standards such as ISO 27001, NIST, and GDPR.- Ability to analyze and respond to security incidents effectively. Additional Information:- The candidate should have minimum 3 years of experience in Cyber Threat Intelligence.- This position is based at our Pune office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

7.0 - 12.0 years

13 - 17 Lacs

Nagpur

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : ServiceNow Governance, Risk, and Compliance (GRC) Good to have skills : Security Architecture DesignMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Your typical day will involve designing and implementing security solutions, collaborating with cross-functional teams, and ensuring compliance with governance and risk management standards. Roles & Responsibilities:- Expected to be an SME, collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Design and implement security solutions to protect the organization's cloud infrastructure.- Collaborate with cross-functional teams to ensure the security architecture meets business requirements.- Ensure compliance with governance and risk management standards.- Conduct risk assessments and develop mitigation strategies.- Stay up-to-date with the latest security trends and technologies.- Provide guidance and support to junior security professionals. Professional & Technical Skills: - Must To Have Skills: Proficiency in ServiceNow Governance, Risk, and Compliance (GRC).- Good To Have Skills: Experience with Security Architecture Design.- Strong understanding of cloud security principles and best practices.- Experience in designing and implementing security controls for cloud environments.- Knowledge of industry standards and regulations related to cloud security.- Familiarity with security frameworks such as ISO 27001 and NIST.- Excellent problem-solving and analytical skills.- Strong communication and collaboration abilities. Additional Information:- The candidate should have a minimum of 7.5 years of experience in ServiceNow Governance, Risk, and Compliance (GRC).- This position is based at our Pune office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Noida

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : SailPoint IdentityNowMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and transitioning to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, while also addressing any emerging security challenges that may arise during the implementation process. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge on security protocols.- Evaluate and recommend new security technologies to improve existing frameworks. Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityIQ.- Good To Have Skills: Experience with SailPoint IdentityNow.- Strong understanding of cloud security principles and best practices.- Experience in designing and implementing security frameworks for cloud environments.- Familiarity with compliance standards such as ISO 27001, NIST, and GDPR. Additional Information:- The candidate should have minimum 5 years of experience in SailPoint IdentityIQ.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Mumbai

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and overseeing the transition to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge on security architecture.- Evaluate and recommend new security technologies to improve the existing framework. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Architecture Design.- Strong understanding of cloud security principles and practices.- Experience with risk assessment and management methodologies.- Knowledge of compliance frameworks such as ISO 27001, NIST, or CIS.- Familiarity with security tools and technologies for threat detection and response. Additional Information:- The candidate should have minimum 7.5 years of experience in Security Architecture Design.- This position is based in Mumbai.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Noida

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Integrated Security Risk Management Good to have skills : Security Architecture DesignMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and transitioning to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud technologies and security threats. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and maintain comprehensive documentation of security policies and procedures.- Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements. Professional & Technical Skills: - Must To Have Skills: Proficiency in Integrated Security Risk Management.- Good To Have Skills: Experience with Security Architecture Design.- Strong understanding of cloud security principles and best practices.- Experience with risk assessment methodologies and frameworks.- Familiarity with compliance standards such as ISO 27001, NIST, and GDPR. Additional Information:- The candidate should have minimum 5 years of experience in Integrated Security Risk Management.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

Noida

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Integrated Security Risk Management Good to have skills : Security Architecture DesignMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and transitioning to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Engage in continuous learning to stay updated with the latest security trends and technologies.- Assist in the development of security policies and procedures to enhance organizational security posture. Professional & Technical Skills: - Must To Have Skills: Proficiency in Integrated Security Risk Management.- Good To Have Skills: Experience with Security Architecture Design.- Strong understanding of risk assessment methodologies and frameworks.- Experience in implementing security controls in cloud environments.- Familiarity with compliance standards such as ISO 27001, NIST, and GDPR. Additional Information:- The candidate should have minimum 3 years of experience in Integrated Security Risk Management.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Operation Automation Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking an experienced and innovative SOAR Architect to lead the design, development, and implementation of advanced Security Orchestration, Automation, and Response (SOAR) solutions. The ideal candidate will leverage their expertise in platforms like Splunk Phantom, Chronicle SOAR, and Cortex XSOAR to optimize and automate incident response workflows, enhance threat detection, and improve overall security operations efficiency. Roles & Responsibilities:- SOAR Strategy and Architecture:Develop strategies for automation, playbook standardization, and process optimization.- Playbook Development:Create, test, and deploy playbooks for automated threat detection, investigation, and response. Collaborate with SOC teams to identify repetitive tasks for automation and translate them into SOAR workflows.- Integration and Customization:Integrate SOAR platforms with existing security tools, including SIEM, threat intelligence platforms, and endpoint protection. Customize connectors and APIs to enable seamless communication between security tools.- Collaboration and Leadership:Work closely with SOC analysts, threat hunters, and other stakeholders to align automation efforts with organizational goals. Provide technical mentorship to analysts on SOAR platform utilization.- Performance Optimization:Continuously evaluate SOAR platform performance and implement improvements for scalability and reliability. Monitor automation workflows and troubleshoot issues to ensure consistent operations.- Compliance and Best Practices:Ensure that all SOAR implementations align with industry standards, compliance regulations, and organizational policies. Stay up to date with the latest advancements in SOAR technology and incident response practices. Professional & Technical Skills: - Proficiency in scripting and programming Python to develop custom playbooks and integrations.- Strong understanding of security operations, incident response, and threat intelligence workflows.- Proven track record of integrating SOAR with SIEM solutions (e.g., Splunk, Chronicle), EDR, and other security tools.- Ability to troubleshoot complex integration and automation issues effectively. Additional Information:- Certifications such as Splunk Phantom Certified Admin, XSOAR Certified Engineer, or equivalent.- Experience with cloud-native SOAR deployments and hybrid environments.- Familiarity with frameworks like MITRE ATT&CK, NIST CSF, or ISO 27001.- A 15 year full-time education is required- 3.5 years of hands-on experience with SOAR platforms like Splunk Phantom (On-Prem and Cloud), Chronicle SOAR, and Cortex XSOAR. Qualification 15 years full time education

Posted 1 week ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Chennai

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and transitioning to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. You will engage in discussions to refine security strategies and provide guidance on implementing effective security measures across the organization. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge on security practices.- Evaluate emerging security technologies and recommend improvements to existing frameworks. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Architecture Design.- Strong understanding of cloud security principles and frameworks.- Experience with risk assessment and management methodologies.- Knowledge of compliance standards such as ISO 27001, NIST, and GDPR.- Familiarity with security tools and technologies for threat detection and response. Additional Information:- The candidate should have minimum 7.5 years of experience in Security Architecture Design.- This position is based in Chennai.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

3.0 - 6.0 years

4 - 10 Lacs

Bengaluru, Karnataka, India

On-site

Greetings from Netsach - A Cybersecurity Company. Overview of the Job Profile This position is responsible for establishing and maintaining a corporate-wide information security management program to ensure that information assets are adequately protected. Job Title: Infosec Delivery Consultant Exp: 3-5yrs Work Location: Bangalore Job Type: Full-time Interested candidates please share your resume at [HIDDEN TEXT] and please register at netsachglobal.com and send us your resume. Job Description: Understanding the Policies and Procedures of the Client and suggesting improvement points related to Information Security. Understanding the setup of the On-Premise/Cloud Infrastructure of Clients and suggesting improvement points related to Information Security. Preparation of Policies and Procedures for Information Security. Impart training on Information Security. Performing Infosec Internal Audits covering all departments as per ISO 27001 requirements. Requirements Degree in Engineering (Computer Science/IT) /MCA/ Business administration a technology-related field required. Minimum of 3-4 years of experience in a combination of risk management, information security and IT jobs Should be flexible working in US Shift timing. Professional security management certification (Like ISO 27001 Lead Auditor / Lead Implementer Certification or CISA or CISSP) will be an added advantage. Knowledge of common information security management frameworks, such as ISO/IEC 27001, SSAE 18 SOC2, Privacy Framework ISO27701, and NIST (Optional). Knowledge of security controls of AWS / Microsoft Azure will be an added advantage Excellent written and verbal communication skills and a high level of personal integrity Innovative thinking and leadership with an ability to lead and motivate cross-functional, interdisciplinary teams Why should this job excite you Opportunity to make an early impact on one of the most promising, high-growth SaaS startups in India A high-performing action-oriented team Immense exposure to the founders and the leadership Opportunity to shape the future of B2B SaaS Customer Success team with YOUR innovative ideas The competitive compensation package, benefits, and employee-friendly work culture. Thank You Emily Jha [HIDDEN TEXT] Netsach - A Cyber Security Company www.netsachglobal.com

Posted 1 week ago

Apply

8.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Industry: Renewable Energy / IT Services / Cybersecurity / Infrastructure Technology About Us: SUJOSU Technology is an innovation-driven technology firm offering GeoAcquire , a purpose-built Land Acquisition & Lease Management Solution for renewable energy and infrastructure developers. Alongside this, we provide a comprehensive suite of IT services, workflow automation , and cybersecurity compliance consulting —helping enterprises digitize operations while staying secure and compliant. We are looking for a sharp, ambitious, and entrepreneurial Business Development Manager to drive growth across verticals, particularly in land-tech, enterprise IT, and cybersecurity . Key Responsibilities: Identify, pursue, and close B2B opportunities for: GeoAcquire (land acquisition & lease lifecycle software) Custom IT services (web apps, workflow tools, integration services) Cybersecurity offerings , including ISO 27001, DPDP compliance consulting , and data protection services. Engage decision-makers in renewable energy companies, EPC contractors, infrastructure developers, utilities , and mid-size enterprises. Promote cybersecurity services to CIOs, CISOs, and compliance heads with tailored messaging around governance and risk. Understand customer needs and pain points across land acquisition, IT modernization, and security posture, and recommend suitable solutions. Develop strong client relationships, run product demos, manage RFPs, and negotiate commercial terms. Collaborate with pre-sales, product, legal, and delivery teams to craft winning proposals and ensure successful handoffs. Maintain an up-to-date CRM, sales pipeline, and monthly/quarterly forecasts. Represent the company at industry events , tech expos , and cybersecurity forums . Qualifications: 4–8 years of B2B sales or business development experience in enterprise software, IT services, or cybersecurity consulting . Proven track record of closing complex deals across multiple stakeholders. Domain knowledge in at least one of the following: Land acquisition or GIS-driven platforms Enterprise IT/automation solutions Cybersecurity frameworks (ISO 27001, DPDP, NIST, SOC2, etc.) Strong written and verbal communication skills with consultative selling ability. Familiarity with compliance needs of industries like energy, infrastructure, BFSI, and government is a plus. Bachelor's degree required; MBA or technical certification (ISO/Infosec/Cyber) preferred. Bonus Skills: Understanding of land aggregation models or regulatory processes in solar/wind projects. Awareness of data privacy laws in India and SE Asia (e.g., DPDP Act). Network in renewable energy or cybersecurity communities. What We Offer: Competitive compensation package with performance incentives. Opportunity to work across emerging technology domains with purpose-driven clients. Exposure to multiple growth sectors: renewables, cybersecurity, automation . High-impact role with leadership visibility and room to grow.

Posted 1 week ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

We believe real value is powered by the unique skills and experiences of our professionals. The interchange of ideas from a diverse group of people gives our teams an expanded perspective and the ability to find better solutions for our clients. Req Id : 109974 Job Title : Incident Response Analyst Business Unit sector : CPL-BECIO-CIO Department: BVCPL DIGITAL OFFICE Work Location : INPUNE Opportunity Type : Staff Relocation eligible : Yes Full time/Part time : Full-Time Contract Hire Only for this Project : No Visa Sponsorship Available: No Recruiter : Indranee Bindu Job Summary The Incident Response Analyst in the computer security incident response team will be responsible for developing and executing standards, procedures, and processes to uncover, resist and recover from security incidents. This position is for an early career analyst that will learn and grow throughout their security career. This is a very technically challenging career track in cyber security and technical acumen, passion, and determination will be highlighted in the interview process. Key Responsibilities The Incident Response Analyst fulfills the following tasks: Responds to computer security incidents according to the computer security incident response policy and procedures. Provides technical guidance to first responders for handling cybersecurity incidents. Provides timely and relevant updates to appropriate stakeholders and decision makers. Communicates investigation findings to relevant business units to help improve the cybersecurity posture. Validates and maintains incident response plans and processes to address potential threats. Compiles and analyzes data for management reporting and metrics. Analyzes potential impact of new threats and communicates risks back to detection engineering functions. Performs root-cause analysis to document findings and participate in root-cause elimination activities as required. Triages and assesses the risk of incidents, performing real-time analysis and managing workload during investigations/incidents. Creates runbooks for frequently occurring incidents to automate or at least assist with the resolution of those cases. Management Responsibilities Individual Contributor Preferred Qualifications A successful Incident Response Analyst candidate will have the expertise and skills described below. Education, Training And Past Experience Candidates will be evaluated primarily on their ability to demonstrate the competencies required to be successful in the role, as described above. BE/BTech, BS or MA in computer science, information security or a related field. Bachelor's Degree (in Business, Technology, Computer Science or related field), preferred or equivalent experience. Candidate must have 5 years of experience in incident response. Familiarity with incident response frameworks and methodologies, including frameworks like NIST 800-61 and MITRE ATT&CK. Experience with incident response tools and technologies, including tools for security information and event management (SIEM), forensics, and/or threat intelligence even in a lab environment is beneficial. Experience with reporting and communicating incident details, improving incident response processes and recovering from security incidents is beneficial. Minimum Qualifications Candidates will be evaluated based on their ability to perform the duties listed above while demonstrating the skills and competencies necessary to be highly effective in the role. These skills and competencies include: Ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily understood, authoritative and actionable manner. Understands organizational mission, values, goals, and consistent application of this knowledge. Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one Ability to effectively influence others to modify their opinions, plans, or behaviors. A team-focused mentality, with the proven ability to work effectively with diverse stakeholders. Strong problem-solving and troubleshooting skills. All applicants must be able to complete pre-employment onboarding requirements (if selected) which may include any/all of the following: criminal/civil background check, drug screen, and motor vehicle records search, in compliance with any applicable laws and regulations. Certifications Contact Compensation Work Environment/Physical Demands Typical office environment Competencies Salary Plan ITS: Information Technology Service Job Grade 004 BVH, Inc., its subsidiaries and its affiliated companies, complies with all Equal Employment Opportunity (EEO) affirmative action laws and regulations. Black & Veatch does not discriminate on the basis of age, race, religion, color, sex, national origin, marital status, genetic information, sexual orientation, gender Identity and expression, disability, veteran status, pregnancy status or other status protected by law. Black & Veatch is committed to being an employer of choice by creating a valuable work experience that keeps our people engaged, productive, safe and healthy. We offer professionals an array of health and welfare benefits that vary based on their geographic region and employment status. This may include health, life accident and disability insurances, paid time off, financial programs and more. Professionals may also be eligible for a performance-based bonus program. By valuing diverse voices and perspectives, we cultivate an authentically inclusive environment for professionals and are able to provide innovative and effective solutions for clients.

Posted 1 week ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

We believe real value is powered by the unique skills and experiences of our professionals. The interchange of ideas from a diverse group of people gives our teams an expanded perspective and the ability to find better solutions for our clients. Req Id : 110025 Job Title : Incident Response Analyst Business Unit sector : CPL-BECIO-CIO Department: BVCPL DIGITAL OFFICE Work Location : INPUNE Opportunity Type : Staff Relocation eligible : Yes Full time/Part time : Full-Time Contract Hire Only for this Project : No Visa Sponsorship Available: No Recruiter : Indranee Bindu Job Summary The Incident Response Analyst in the computer security incident response team will be responsible for developing and executing standards, procedures, and processes to uncover, resist and recover from security incidents. This position is for an early career analyst that will learn and grow throughout their security career. This is a very technically challenging career track in cyber security and technical acumen, passion, and determination will be highlighted in the interview process. Key Responsibilities The Incident Response Analyst fulfills the following tasks: Responds to computer security incidents according to the computer security incident response policy and procedures. Provides technical guidance to first responders for handling cybersecurity incidents. Provides timely and relevant updates to appropriate stakeholders and decision makers. Communicates investigation findings to relevant business units to help improve the cybersecurity posture. Validates and maintains incident response plans and processes to address potential threats. Compiles and analyzes data for management reporting and metrics. Analyzes potential impact of new threats and communicates risks back to detection engineering functions. Performs root-cause analysis to document findings and participate in root-cause elimination activities as required. Triages and assesses the risk of incidents, performing real-time analysis and managing workload during investigations/incidents. Creates runbooks for frequently occurring incidents to automate or at least assist with the resolution of those cases. Management Responsibilities Individual Contributor Preferred Qualifications Candidates will be evaluated primarily on their ability to demonstrate the competencies required to be successful in the role, as described above. BE/BTech, BS or MA in computer science, information security or a related field.Bachelor's Degree (in Business, Technology, Computer Science or related field), preferred or equivalent experience. Candidate must have 5 years of experience in incident response. Familiarity with incident response frameworks and methodologies, including frameworks like NIST 800-61 and MITRE ATT&CK. Experience with incident response tools and technologies, including tools for security information and event management (SIEM), forensics, and/or threat intelligence even in a lab environment is beneficial. Experience with reporting and communicating incident details, improving incident response processes and recovering from security incidents is beneficial. Minimum Qualifications Candidates will be evaluated based on their ability to perform the duties listed above while demonstrating the skills and competencies necessary to be highly effective in the role. These skills and competencies include: Ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily understood, authoritative and actionable manner. Understands organizational mission, values, goals, and consistent application of this knowledge. Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one Ability to effectively influence others to modify their opinions, plans, or behaviors. A team-focused mentality, with the proven ability to work effectively with diverse stakeholders. Strong problem-solving and troubleshooting skills. All applicants must be able to complete pre-employment onboarding requirements (if selected) which may include any/all of the following: criminal/civil background check, drug screen, and motor vehicle records search, in compliance with any applicable laws and regulations. Certifications Contact Compensation Work Environment/Physical Demands Typical office environment Competencies Salary Plan ITS: Information Technology Service Job Grade 004 BVH, Inc., its subsidiaries and its affiliated companies, complies with all Equal Employment Opportunity (EEO) affirmative action laws and regulations. Black & Veatch does not discriminate on the basis of age, race, religion, color, sex, national origin, marital status, genetic information, sexual orientation, gender Identity and expression, disability, veteran status, pregnancy status or other status protected by law. Black & Veatch is committed to being an employer of choice by creating a valuable work experience that keeps our people engaged, productive, safe and healthy. We offer professionals an array of health and welfare benefits that vary based on their geographic region and employment status. This may include health, life accident and disability insurances, paid time off, financial programs and more. Professionals may also be eligible for a performance-based bonus program. By valuing diverse voices and perspectives, we cultivate an authentically inclusive environment for professionals and are able to provide innovative and effective solutions for clients.

Posted 1 week ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

We believe real value is powered by the unique skills and experiences of our professionals. The interchange of ideas from a diverse group of people gives our teams an expanded perspective and the ability to find better solutions for our clients. Req Id : 110024 Job Title : Incident Response Analyst Business Unit sector : CPL-BECIO-CIO Department: BVCPL DIGITAL OFFICE Work Location : INPUNE Opportunity Type : Staff Relocation eligible : Yes Full time/Part time : Full-Time Contract Hire Only for this Project : No Visa Sponsorship Available: No Recruiter : Indranee Bindu Job Summary The Incident Response Analyst in the computer security incident response team will be responsible for developing and executing standards, procedures, and processes to uncover, resist and recover from security incidents. This position is for an early career analyst that will learn and grow throughout their security career. This is a very technically challenging career track in cyber security and technical acumen, passion, and determination will be highlighted in the interview process. Key Responsibilities The Incident Response Analyst fulfills the following tasks: Responds to computer security incidents according to the computer security incident response policy and procedures. Provides technical guidance to first responders for handling cybersecurity incidents. Provides timely and relevant updates to appropriate stakeholders and decision makers. Communicates investigation findings to relevant business units to help improve the cybersecurity posture. Validates and maintains incident response plans and processes to address potential threats. Compiles and analyzes data for management reporting and metrics. Analyzes potential impact of new threats and communicates risks back to detection engineering functions. Performs root-cause analysis to document findings and participate in root-cause elimination activities as required. Triages and assesses the risk of incidents, performing real-time analysis and managing workload during investigations/incidents. Creates runbooks for frequently occurring incidents to automate or at least assist with the resolution of those cases. Management Responsibilities Individual Contributor Preferred Qualifications Candidates will be evaluated primarily on their ability to demonstrate the competencies required to be successful in the role, as described above. BE/BTech, BS or MA in computer science, information security or a related field.Bachelor's Degree (in Business, Technology, Computer Science or related field), preferred or equivalent experience. Candidate must have 5 years of experience in incident response. Familiarity with incident response frameworks and methodologies, including frameworks like NIST 800-61 and MITRE ATT&CK. Experience with incident response tools and technologies, including tools for security information and event management (SIEM), forensics, and/or threat intelligence even in a lab environment is beneficial. Experience with reporting and communicating incident details, improving incident response processes and recovering from security incidents is beneficial. Minimum Qualifications Candidates will be evaluated based on their ability to perform the duties listed above while demonstrating the skills and competencies necessary to be highly effective in the role. These skills and competencies include: Candidate must have 5 years of experience in incident response. Ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily understood, authoritative and actionable manner. Understands organizational mission, values, goals, and consistent application of this knowledge. Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one Ability to effectively influence others to modify their opinions, plans, or behaviors. A team-focused mentality, with the proven ability to work effectively with diverse stakeholders. Strong problem-solving and troubleshooting skills. All applicants must be able to complete pre-employment onboarding requirements (if selected) which may include any/all of the following: criminal/civil background check, drug screen, and motor vehicle records search, in compliance with any applicable laws and regulations. Certifications Contact Compensation Work Environment/Physical Demands Typical office environment Competencies Salary Plan ITS: Information Technology Service Job Grade 004 BVH, Inc., its subsidiaries and its affiliated companies, complies with all Equal Employment Opportunity (EEO) affirmative action laws and regulations. Black & Veatch does not discriminate on the basis of age, race, religion, color, sex, national origin, marital status, genetic information, sexual orientation, gender Identity and expression, disability, veteran status, pregnancy status or other status protected by law. Black & Veatch is committed to being an employer of choice by creating a valuable work experience that keeps our people engaged, productive, safe and healthy. We offer professionals an array of health and welfare benefits that vary based on their geographic region and employment status. This may include health, life accident and disability insurances, paid time off, financial programs and more. Professionals may also be eligible for a performance-based bonus program. By valuing diverse voices and perspectives, we cultivate an authentically inclusive environment for professionals and are able to provide innovative and effective solutions for clients.

Posted 1 week ago

Apply

5.0 - 8.0 years

12 - 15 Lacs

Pune

Work from Office

Title: Infrastructure and Cloud Specialist Experience: 5+ Years and above Position Type : Full-time Timing: Willing to work in US Time zone and extended shift hours. Location : Preferred Mumbai & Pune Location Only. Roles and Responsibilities: Having extensive knowledge and experience in Infrastructure deployments. Architect, implement, and manage cloud environments across Azure, GCP, and AWS. Design multi-cloud strategies, including workload migration, resource optimization, and cost management. Configure and manage identity & access management (IAM) across different cloud providers. Manage Microsoft Azure access and authentication. Create conditional access rules and configure MFA in Microsoft Azure. Configure and manage external and guest access for O365. Monitor O365 alerts and take corrective actions. Create and monitor data loss prevention policies. Create reports capturing user adoption, team usage, app usage, active users, and meeting metrics. Configure Information Rights Management for O365 workloads Configure and monitor data sensitivity labels. Assist with O365 eDiscovery searches and investigations. Manage and optimize Microsoft Azure cloud environments, ensuring security and compliance. Implement and maintain Microsoft Defender for Cloud to protect workloads and improve security posture. Configure and manage Entra ID Enterprise Applications, including authentication, access policies, and API integrations. Conduct risk assessments and security audits to identify vulnerabilities and mitigation strategies. Develop and enforce identity and access management (IAM) policies using Entra ID. Monitor security alerts, investigate incidents, and implement proactive threat mitigation strategies. Collaborate with IT and security teams to enhance cloud security frameworks and best practices. Mentor and provide knowledge transfer of M365 technologies and administration tasks. Independently manage individual work schedule with minimal oversight and proactively communicate status, progress, and risks to management and project leadership. Strong working knowledge of Active Directory, Exchange 2016-2019 installation, configuration, and support, Office 365 configuration and support, Exchange Online Protection, External DNS record configuration (SPF, DKIM, and DMARC), and PowerShell for automation, maintenance, and reporting Strong knowledge of Microsofts Advanced Threat Services and Compliance Providing technical expertise on Office 365 applications: Teams, SharePoint Online, Azure, OneDrive, and PowerBI Experience with PowerShell Scripting for automation. Installing and configuring load balances like Zeus, KEMP, etc Design and implementation of the virtual environment with VMware ESX 4. x and later on HP, DELL, etc with local SCSI and centralized Fiber Channel storage. Deploying the New VM from the template and cloning an existing VM as per the client's request through the change management process. Experience with configuring Cisco, DELL Switches, and Routers. Experience with Fiber Channel switch configuration. Worked on VoIP technologies. Manages servers, including Office365 e-mail, Active Directory, VMWare, SAN storage, print, domain, application, and backup servers and their associated operating systems and software Knowledge of distributed file services and replication and Configuring alarms, managing tasks, events, and alarms, root cause & system log analysis, and reporting. Moving VMs from one LUN to another LUN using Storage VMotion. Adding new virtual disks and extending existing volumes, disk, and hardware monitoring. Installing, configuring, and managing virtual infrastructure and virtual center. Installation OS and configuration of virtual machines in an enterprise SAN environment. Creating raw partitions and iSCSI storage partitions. Moving physical machine to virtual machine using P2V converter. Troubleshooting problems with the help of Event Logs, troubleshooting virtual machine issues. Managing VMs through web access, Configurations of Virtual switches, and network connections. Knowledge of Microsoft System Center Configuration Manager. Experience with Cisco IronPort email gateway configuration. Worked on cloud infrastructures like Amazon, and Azure with VPC network configuration. Adding and deleting users. Kernel compiling. FTP, SSH, SCP Protocols, Software & patch addition, modification & removal. Planning and Implementation of SAN storage solution Allocation of storage to blade servers (Creation of LUNs) Mirrors and RAID 0, 1, and 5 levels. Experience with configuring and managing Virtual disks. Planning and Implementation Virtual Desktop Infrastructure. Support for configuration of thin clients to connect to local servers. IP tables. Identifying project needs and planning an Implementation solution for the Desktop needs, Manage users, groups, permissions, and roles. Planning Implementing and MPLS Network. Installation and configuration of Data Center Router and Branch routers Switches Managing Leased Line Network, Servers Installation OS & MySQL and Oracle enterprise servers in virtual Farm. Worked with command-line editors to create automation jobs and monitoring. Planning and Implementing Apache Web Server, Samba, solutions (In-house) Migration and configuration of CRM, ERP, LMS, Database, and Corporate Website Servers in Virtual farm at DC. Security hardening and Monitoring of VMs & ESX servers (CPU, Memory, Disk, Network Utilization) for Security Compliance. Develops, implements and maintains policies, procedures and associated training plans for network resource administration, appropriate use, business continuity and disaster recovery Experience with Amazon S3, VPN, EC2, CloudFront, CodeBuild, CloudWatch, Load Balancer, etc Required Skills: Worked on Production, DEV, and TEST environments. Worked on Datacenter Implementation. Worked on several Infrastructure and application migrations. Worked on Cloud Migration services. Supported International clients. Ability to work independently and handle crisis management. Managed 100+ servers with multiple technologies like Windows, VMware, Hyper-V, etc. Ability to perform multiple, technical, highly complex tasks with the need to regularly upgrade skills to meet dynamic job conditions Strong knowledge of centralized and automated systems and application deployment via scripting. Strong knowledge of routing, VLAN, and firewall configuration. Industry-standard certifications such as Security+, CISSP, GSEC, ITIL, Microsoft, and Cisco certifications added value. Designing and implementing on-site, off-site, and international server infrastructure. Assessing and administering all equipment, hardware, and enterprise software upgrades. Practice in network asset management, including maintenance of network component inventory, life cycle management, and documentation. Experience with cloud platforms (e.g., AWS, Azure, or GCP) is preferred. Strong expertise in Microsoft Azure, Google Cloud Platform (GCP), and AWS cloud services. Knowledge of cloud networking, hybrid cloud architectures, and performance tuning. Strong background in VMware, Windows and networking. Strong expertise in Microsoft Azure, Microsoft Defender for Cloud, and Entra ID Enterprise Applications. Experience with cloud security posture management (CSPM) and cloud workload protection (CWP). Knowledge of identity and access management (IAM), OAuth 2.0, SAML, and OpenID Connect. Familiarity with Azure API Management, Azure Logic Apps, and automation workflows. Understanding of compliance frameworks, including ISO 27001, NIST, and the Digital Operational Resilience Act (DORA). Technologies: Operating System: Windows, VMware ESX, Citrix, etc Virtualization: KVM, OpenStack, VMware, Hyper-V, Citrix, RedHat Networking: Cisco Nexus, ASA Firewall, SonicWALL, VPN, etc Software: Nginx, Python, Apache, Docker, cPanel, PHPmyAdmin, WordPress, Jira, Confluence, SpiceWorks, etc Monitoring: Ossec, Nagios, Cacti, MRTG, LibreNMS, Observium, etc Database: MySQL, SQL, Sybase ASE, Oracle, DB2, etc Mail Server: Microsoft Exchange, Office 365, Zimbra, Qmail, Cisco IronPort, etc Source Control and Continuous Integration: CVS, Docker, Visual Source, CCNet, Slack, etc VoIP: Trixbox, Asterisk, Elastix, Skype for Business, etc Backup Software: Veeam, Symantec, Linux custom scripting. Load Balancer: F5, Citrix Netscaler, KEMP, Loadbalancer, Zeus (Zenoss), etc Storage: EMC, Nimble, Compellent, HP, etc Cloud Services: Microsoft Azure, AWS, etc Regards, Stella Mary HR Stella.mary@mlogica.com

Posted 1 week ago

Apply

5.0 - 8.0 years

12 - 16 Lacs

Mumbai, Pune

Work from Office

Title: Infrastructure and Cloud Specialist Experience: 5+ Years and above Position Type : Full-time Timing: Willing to work in US Time zone and extended shift hours. Location : Preferred Mumbai & Pune Location Only. Roles and Responsibilities: Having extensive knowledge and experience in Infrastructure deployments. Architect, implement, and manage cloud environments across Azure, GCP, and AWS. Design multi-cloud strategies, including workload migration, resource optimization, and cost management. Configure and manage identity & access management (IAM) across different cloud providers. Manage Microsoft Azure access and authentication. Create conditional access rules and configure MFA in Microsoft Azure. Configure and manage external and guest access for O365. Monitor O365 alerts and take corrective actions. Create and monitor data loss prevention policies. Create reports capturing user adoption, team usage, app usage, active users, and meeting metrics. Configure Information Rights Management for O365 workloads Configure and monitor data sensitivity labels. Assist with O365 eDiscovery searches and investigations. Manage and optimize Microsoft Azure cloud environments, ensuring security and compliance. Implement and maintain Microsoft Defender for Cloud to protect workloads and improve security posture. Configure and manage Entra ID Enterprise Applications, including authentication, access policies, and API integrations. Conduct risk assessments and security audits to identify vulnerabilities and mitigation strategies. Develop and enforce identity and access management (IAM) policies using Entra ID. Monitor security alerts, investigate incidents, and implement proactive threat mitigation strategies. Collaborate with IT and security teams to enhance cloud security frameworks and best practices. Mentor and provide knowledge transfer of M365 technologies and administration tasks. Independently manage individual work schedule with minimal oversight and proactively communicate status, progress, and risks to management and project leadership. Strong working knowledge of Active Directory, Exchange 2016-2019 installation, configuration, and support, Office 365 configuration and support, Exchange Online Protection, External DNS record configuration (SPF, DKIM, and DMARC), and PowerShell for automation, maintenance, and reporting Strong knowledge of Microsofts Advanced Threat Services and Compliance Providing technical expertise on Office 365 applications: Teams, SharePoint Online, Azure, OneDrive, and PowerBI Experience with PowerShell Scripting for automation. Installing and configuring load balances like Zeus, KEMP, etc Design and implementation of the virtual environment with VMware ESX 4. x and later on HP, DELL, etc with local SCSI and centralized Fiber Channel storage. Deploying the New VM from the template and cloning an existing VM as per the client's request through the change management process. Experience with configuring Cisco, DELL Switches, and Routers. Experience with Fiber Channel switch configuration. Worked on VoIP technologies. Manages servers, including Office365 e-mail, Active Directory, VMWare, SAN storage, print, domain, application, and backup servers and their associated operating systems and software Knowledge of distributed file services and replication and Configuring alarms, managing tasks, events, and alarms, root cause & system log analysis, and reporting. Moving VMs from one LUN to another LUN using Storage VMotion. Adding new virtual disks and extending existing volumes, disk, and hardware monitoring. Installing, configuring, and managing virtual infrastructure and virtual center. Installation OS and configuration of virtual machines in an enterprise SAN environment. Creating raw partitions and iSCSI storage partitions. Moving physical machine to virtual machine using P2V converter. Troubleshooting problems with the help of Event Logs, troubleshooting virtual machine issues. Managing VMs through web access, Configurations of Virtual switches, and network connections. Knowledge of Microsoft System Center Configuration Manager. Experience with Cisco IronPort email gateway configuration. Worked on cloud infrastructures like Amazon, and Azure with VPC network configuration. Adding and deleting users. Kernel compiling. FTP, SSH, SCP Protocols, Software & patch addition, modification & removal. Planning and Implementation of SAN storage solution Allocation of storage to blade servers (Creation of LUNs) Mirrors and RAID 0, 1, and 5 levels. Experience with configuring and managing Virtual disks. Planning and Implementation Virtual Desktop Infrastructure. Support for configuration of thin clients to connect to local servers. IP tables. Identifying project needs and planning an Implementation solution for the Desktop needs, Manage users, groups, permissions, and roles. Planning Implementing and MPLS Network. Installation and configuration of Data Center Router and Branch routers Switches Managing Leased Line Network, Servers Installation OS & MySQL and Oracle enterprise servers in virtual Farm. Worked with command-line editors to create automation jobs and monitoring. Planning and Implementing Apache Web Server, Samba, solutions (In-house) Migration and configuration of CRM, ERP, LMS, Database, and Corporate Website Servers in Virtual farm at DC. Security hardening and Monitoring of VMs & ESX servers (CPU, Memory, Disk, Network Utilization) for Security Compliance. Develops, implements and maintains policies, procedures and associated training plans for network resource administration, appropriate use, business continuity and disaster recovery Experience with Amazon S3, VPN, EC2, CloudFront, CodeBuild, CloudWatch, Load Balancer, etc Required Skills: Worked on Production, DEV, and TEST environments. Worked on Datacenter Implementation. Worked on several Infrastructure and application migrations. Worked on Cloud Migration services. Supported International clients. Ability to work independently and handle crisis management. Managed 100+ servers with multiple technologies like Windows, VMware, Hyper-V, etc. Ability to perform multiple, technical, highly complex tasks with the need to regularly upgrade skills to meet dynamic job conditions Strong knowledge of centralized and automated systems and application deployment via scripting. Strong knowledge of routing, VLAN, and firewall configuration. Industry-standard certifications such as Security+, CISSP, GSEC, ITIL, Microsoft, and Cisco certifications added value. Designing and implementing on-site, off-site, and international server infrastructure. Assessing and administering all equipment, hardware, and enterprise software upgrades. Practice in network asset management, including maintenance of network component inventory, life cycle management, and documentation. Experience with cloud platforms (e.g., AWS, Azure, or GCP) is preferred. Strong expertise in Microsoft Azure, Google Cloud Platform (GCP), and AWS cloud services. Knowledge of cloud networking, hybrid cloud architectures, and performance tuning. Strong background in VMware, Windows and networking. Strong expertise in Microsoft Azure, Microsoft Defender for Cloud, and Entra ID Enterprise Applications. Experience with cloud security posture management (CSPM) and cloud workload protection (CWP). Knowledge of identity and access management (IAM), OAuth 2.0, SAML, and OpenID Connect. Familiarity with Azure API Management, Azure Logic Apps, and automation workflows. Understanding of compliance frameworks, including ISO 27001, NIST, and the Digital Operational Resilience Act (DORA). Technologies: Operating System: Windows, VMware ESX, Citrix, etc Virtualization: KVM, OpenStack, VMware, Hyper-V, Citrix, RedHat Networking: Cisco Nexus, ASA Firewall, SonicWALL, VPN, etc Software: Nginx, Python, Apache, Docker, cPanel, PHPmyAdmin, WordPress, Jira, Confluence, SpiceWorks, etc Monitoring: Ossec, Nagios, Cacti, MRTG, LibreNMS, Observium, etc Database: MySQL, SQL, Sybase ASE, Oracle, DB2, etc Mail Server: Microsoft Exchange, Office 365, Zimbra, Qmail, Cisco IronPort, etc Source Control and Continuous Integration: CVS, Docker, Visual Source, CCNet, Slack, etc VoIP: Trixbox, Asterisk, Elastix, Skype for Business, etc Backup Software: Veeam, Symantec, Linux custom scripting. Load Balancer: F5, Citrix Netscaler, KEMP, Loadbalancer, Zeus (Zenoss), etc Storage: EMC, Nimble, Compellent, HP, etc Cloud Services: Microsoft Azure, AWS, etc Regards, Stella Mary HR Stella.mary@mlogica.com

Posted 1 week ago

Apply

0.0 - 4.0 years

0 Lacs

Delhi, Delhi

On-site

SOC Analyst (Tier 2) Locations & Number of Openings Delhi: 15 openings Jaipur: 15 openings Pune: 15 openings Chandigarh: 15 openings Experience: 4 years Certification: Minimum CISA (required) Job Description We are hiring a SOC Analyst (Tier 2) to handle advanced security threats and incidents. You will investigate escalations from Tier 1, perform deep-dive analysis, and assist in coordinating response efforts. Key Responsibilities Investigate escalated security alerts, incidents, and vulnerabilities. Analyze logs, network traffic, and endpoint data for potential threats. Coordinate with Tier 1 to share best practices and streamline incident triaging. Work with cross-functional teams (IT, NOC, etc.) to contain and remediate security incidents. Maintain accurate incident records in SIEM and ticketing systems. Preferred Skills & Tools Experience Security Monitoring : SIEM, SOAR Identity & Access : IDAM, PAM Threat Detection & Response : ESP+IPmediation, UTM+TrueView Knowledge of relevant frameworks (ISO 27001, NIST) and threat intelligence sources. Qualifications 4+ years of experience in a Security Operations Center or cybersecurity role. CISA certification (required). Hands-on experience with intrusion detection/prevention, threat intelligence, and log analysis. Familiarity with compliance requirements and regulations. Strong communication, collaboration, and analytical skills. Additional Details Training and growth opportunities in advanced cybersecurity tools. May involve rotating shifts or on-call schedules in a 24/7 SOC environment. How to Apply Send your CV to mailto:shreyag@aeroqube.com with the subject line “SOC Analyst (Tier 2) – [Preferred Location].” #SOC #Tier2 #CISA #SIEM #SOAR #IDAM #PAM #UTM #SecurityOperations #Hiring #DelhiJobs #JaipurJobs #PuneJobs #ChandigarhJobs

Posted 1 week ago

Apply

40.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Vestas is well-known in wind technology and actively contributes to its development. Vestas’ core business comprises the development, manufacture, sale, marketing, and maintenance of Wind Turbines. Come and join us at Vestas! Vestas Technology & Operations > Frontend Engineering & Technology > Global Power Plant Solutions Vestas Technology & Operations (VTO) is where new product solutions envisioned, developed, improved, and verified before we in Front-end Engineering & Technology take full technical accountability of deployment in customer projects. Within VTO and Front-end Engineering & Technology, you will find our Global Power Plant Solutions team. A team that enables our regional colleagues with Technical- and Functional Excellence. Responsibilities Maintain up-to-date knowledge of key CS standards & frameworks including ISA/IEC 62443, ISO 27000 Series, C2M2 Framework, NIST CSF, AESCSF, NERC-CIP, EU NIS2 Directive, EU Cyber Resilience Act and Country-specific Critical Infrastructure cybersecurity legislation Identify and mitigate contractual risks in alignment with Vestas' internal guidance Review the Cyber security contract language in alignment with Vestas' business units with stakeholder engagement Customer negotiations to enable the regions to close technical deals on cyber security offerings Collaborate closely with teams across Vestas' business units, Cyber community in the organization to ensure cybersecurity commitments are realistic and deliverable Translate identified cybersecurity gaps from customer contracts into clear, structured requirements to product teams Follow up on mitigation plans, timelines, and implementation feasibility with product and engineering teams Conduct gap analysis between contractual cybersecurity commitments and actual capabilities delivered Monitor evolving global cybersecurity legislation relevant to OT and industrial control systems (ICS) Analyze and interpret evolving cyber security legislation requirements impact on Vestas' offerings Initiate cross-functional alignment and implementation where necessary Prepare and deliver training material related to all the above Qualifications Master's / Bachelors in Cybersecurity / Computer Science / Similar engineering specialization Cyber security models, frameworks, systems, principles, concepts, designs & architectures for IT & OT systems International and National Legislation & Standards related to OT Safety & Cyber security Extensive knowledge of cybersecurity standards (e.g., IEC 62443, NIST, ISO 27001) Good exposure to industrial control system Effective communication, negotiation, and presentation skills in English Experience working in a global, cross-functional, and matrix organization Acumen with Industry certifications such as IEC 62443, GICSP, CISSP, CISM, or similar are preferred Familiarity with energy or renewables industry and operational environments Competencies OT systems development, design, architecture, and deployment in the electric utility industry Technical and organizational cyber security implementation projects Sales contract reviews, revisions, and customer negotiations Product stakeholder management What We Offer In this position, you will be able to put your competencies and experience to the test in a modern and growing company. You will have the opportunity to help improve the position of Vestas in key markets while being part of a company with rapid growth. Join Vestas and you will cultivate your career in an inspiring environment at a renowned wind turbine and power plant OEM, which has an ongoing dedication to sustainability. We value individual initiative, the willingness to take initiative, and the right balance between creativity and quality in all solutions. We offer you an exciting and inspiring job with great opportunities for professional and personal development within the major player in wind energy. In this position, you will be at the heart of the action of the wind industry. Despite being the largest presence in the industry, Vestas is responsive, giving you the freedom to act creatively in a truly global environment, within a highly diverse, skilled, and knowledgeable team. Team members with experience working in Regional Engineering & Technology are highly valued across multiple functions in Vestas - working within Power Plant Solutions opens career paths in Engineering and Project-facing roles within Vestas. Additional Information Your primary workplace will be Vestas India, Chennai. Please note: We do amend or withdraw our jobs and reserve the right to do so at any time, including before the advertised closing date. Please be advised to apply on or before 31st August 2025. Our commitment to a fair hiring At Vestas, we evaluate all candidates solely on professional experience, education, and relevant skills. To support a fair recruitment process, please remove any photos, dates of birth or graduation dates, gender pronouns, marital status, or other personal details not relevant to the role, before submitting your CV. Please keep your CV focused on work and educational details, and the necessary information that we contact you (email and phone number). We train our hiring teams in inclusive evaluation and regularly review process outcomes to ensure fairness. DEIB Statement At Vestas, we recognise the value of diversity, equity, and inclusion in driving innovation and success. We strongly encourage individuals from all backgrounds to apply, particularly those who may hesitate due to their identity or feel they do not meet every criterion. As our CEO states, "Expertise and talent come in many forms, and a diverse workforce enhances our ability to think differently and solve the complex challenges of our industry". Your unique perspective is what will help us powering the solution for a sustainable, green energy future. BEWARE – RECRUITMENT FRAUD It has come to our attention that there are a number of fraudulent emails from people pretending to work for Vestas. Read more via this link, https://www.vestas.com/en/careers/our-recruitment-process About Vestas Vestas is the energy industry’s global partner on sustainable energy solutions. We are specialised in designing, manufacturing, installing, and servicing wind turbines, both onshore and offshore. Across the globe, we have installed more wind power than anyone else. We consider ourselves pioneers within the industry, as we continuously aim to design new solutions and technologies to create a more sustainable future for all of us. With more than 185 GW of wind power installed worldwide and 40+ years of experience in wind energy, we have an unmatched track record demonstrating our expertise within the field. With 30,000 employees globally, we are a diverse team united by a common goal: to power the solution – today, tomorrow, and far into the future. Vestas promotes a diverse workforce which embraces all social identities and is free of any discrimination. We commit to create and sustain an environment that acknowledges and harvests different experiences, skills, and perspectives. We also aim to give everyone equal access to opportunity. To learn more about our company and life at Vestas, we invite you to visit our website at www.vestas.com and follow us on our social media channels. We also encourage you to join our Talent Universe to receive notifications on new and relevant postings.

Posted 1 week ago

Apply

9.0 years

1 - 8 Lacs

Hyderābād

On-site

Home to the world's best loved and trusted hygiene, health, and nutrition brands. Our purpose defines why we exist: to protect, heal and nurture in the relentless pursuit of a cleaner, healthier world. We are a global team united by this purpose. Join us in our fight to make access to the highest quality hygiene, wellness, and nourishment a right and not a privilege. Information Technology & Digital About the role Reckitt is seeking a skilled and experienced IT Controls professional to join our team in the 1st Line of Defence (1LOD). This role will be responsible for implementing, remediating, and ensuring adherence to IT controls across systems, with a strong focus on the SAP environment. The candidate will work closely with various business units to proactively manage IT General Control (ITGC) issues, ensure timely remediation, and maintain a compliant IT environment. Your responsibilities Remediation and Compliance: Implement IT controls and remediate control deficiencies in collaboration with control owners, ensuring adherence to the ITGC framework and other relevant standards. Issue Tracking and Reporting: Develop and maintain a detailed tracking system for ongoing remediation efforts, providing regular updates to relevant stakeholders. SAP Systems Expertise: Leverage knowledge of SAP systems to identify, evaluate, and address control deficiencies specific to SAP environments. Coordination and Collaboration: Work with control owners to ensure timely execution of remediation actions, facilitating alignment on corrective measures. Documentation Management: Maintain up-to-date and accurate documentation for all remediation efforts and control adjustments. Risk Acceptance and Escalation: Support the risk acceptance process for issues that cannot be remediated, in consultation with relevant stakeholders. The experience we're looking for With 9+ years of experience and minimum 5 years of experience in IT controls, IT audit, or a related field within the 1LOD. Strong understanding of IT General Controls (ITGC) and IT control frameworks such as COBIT/NIST/ISO 27001/SOX. Proven experience in hands-on remediation of IT control deficiencies and managing risk acceptance. SAP systems experience is essential, with knowledge of control requirements specific to SAP environments. SAP systems experience is essential, with knowledge of control requirements specific to SAP environments, including SAP Change Control processes. Demonstrated ability to collaborate with cross-functional teams and effectively influence stakeholders. Language skills: Fluency in German, Polish, or Spanish (depending on role and region) is highly desirable. Relevant certifications, such as CISA, CISM, or CISSP, are a plus. The skills for success What we offer With inclusion at the heart of everything we do, working alongside our four global Employee Resource Groups, we support our people at every step of their career journey, helping them to succeed in their own individual way. We invest in the wellbeing of our people through parental benefits, an Employee Assistance Program to promote mental health, and life insurance for all employees globally. We have a range of other benefits in line with the local market. Through our global share plans we offer the opportunity to save and share in Reckitt's potential future successes. For eligible roles, we also offer short-term incentives to recognise, appreciate and reward your work for delivering outstanding results. You will be rewarded in line with Reckitt's pay for performance philosophy. Equality

Posted 1 week ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

Remote

At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. Senior Security Consulting EY Technology: Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 250,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization. EY Technology supports our technology needs through three business units: Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster and pursue those opportunities more rapidly. Enterprise Workplace Technology (EWT) – EWT supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience. Information Security (Info Sec) - Info Sec prevents, detects, responds, and mitigates cyber-risk, protecting EY and client data, and our information management systems. The opportunity As a Security Consultant within EY’s internal Global Information Security team, the individual will be a trusted security advisor to the Client Technology Platforms Delivery organization within IT Services. The Client Technology Platforms delivery organization is responsible for end-to-end delivery of technology programs and projects supporting EY’s Client Techmology service lines including delivery of a global managed services platform, big data and analytics solutions as well as individual line of business solutions and services. This role will directly engage in supporting a team of architects, engineers, and product managers for delivery on programs and projects, defining security risks and controls, providing security guidance, identifying and prioritizing security-related requirements, promoting secure-by-default designs and facilitating delivery of information security services throughout the system development life cycle (SDLC). The role will also develop and directly communicate appropriate risk treatment and mitigation options to address security vulnerabilities translated vulnerabilities into business risk terminology for communication to business stakeholders. Your Key Responsibilities Support a technical team with a focuse on the following responsibilities: Define security architectures and provide pragmatic security guidance that balance business benefit and risks Engage IT project teams throughout the SDLC to identify and prioritize applicable security controls and provide guidance on how to implement these controls Perform threat modeling and risk assessments of information systems, applications and infrastructure Maintain and enhance the Information Security risk assessment and certification methodologies Define security configuration standards for shared and multi-tenant platforms and technologies Develop appropriate risk treatment and mitigation options to address security risks identified during security review or audit Translate technical vulnerabilities into business risk terminology for business units and recommend corrective actions to customers and project stakeholders Provide knowledge sharing and technical assistance to other team members Act as Subject Matter Expert (SME) in responsible technologies and have deep technical understanding of responsible services and technology portfolios Skills And Attributes For Success Significant working security experience and knowledge in the design, implementation, and operation of security controls in the following areas: Identity and Access Management – Experience with Azure Active Directory (AAD) based Identity and Access Management and Authorization design and integration with API, IDaaS, and Federation technologies. Cloud Security – Technical understanding of virtualization, cloud infrastructure, and public cloud offerings and experience designing security configuration and controls within cloud-based solutions e.g., Microsoft Azure and Azure PAAS services or another cloud platform (GCP, AWS, IBM, AliCloud, etc.) Infrastructure Security – Experience with the integration of cloud native infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management, Web Application Firewalls (WAFs), Application and API Gateways, intrusion detection and prevention, security monitoring, and data encryption solutions. Application Security - Experience with the design and testing of security controls for multi-tier business solutions including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging. Working familiarity with REST API and microservices architecture. Strong leadership and organizational skills Ability to appropriately balance firm security needs with business impact & benefit Ability to facilitate compromise to incrementally advance security strategy and objectives Ability to team well with others to facilitate and enhance the understanding & compliance to security policies Although not required, it is preferred that candidates possess additional working security experience and knowledge in one or more of the following areas: Operational Security – Experience with defining operational security models and procedures for business solutions including the operation and maintenance of infrastructure and application security controls. Information Security Standards – Knowledge of common information security standards such as: ISO 27001/27002, CSA and CIS Controls, NIST CSF, PCI/DSS, FEDRAMP. Product Management – working with broader business and technology teams on aspects of security that affect all phases of PI Planning from concept to design to implementation and then operational support. Agile & DevSecOps Methodologies – Experience promoting automated security features in pipelines and security testing as a central feature in Agile workflows as a contributing member within an Agile development or DevOps environment. To qualify for the role, you must have: Advanced degree in Computer Science or a related discipline; or equivalent work experience. Candidates are preferred to hold or be actively pursuing related professional certifications within the GIAC family of certifications or CISSP, CISM or CISA or similar cloud-security oriented certifications. Five or more years of experience in the management of a significant Information Security risk management function Experience in managing the communication of security findings and recommendations to IT project teams, business leadership and technology management executives Ideally, you’ll also have Exceptional judgment, tact, and decision-making ability Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change Excellent , communication, organizational, and decision-making skills Strong English language skills are required What Working At EY Offers We offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings, and a wide range of discounts, offers and promotions. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.

Posted 1 week ago

Apply

7.0 years

0 Lacs

Tamil Nadu, India

On-site

About BNP Paribas India Solutions Established in 2005, BNP Paribas India Solutions is a wholly owned subsidiary of BNP Paribas SA, European Union’s leading bank with an international reach. With delivery centers located in Bengaluru, Chennai and Mumbai, we are a 24x7 global delivery center. India Solutions services three business lines: Corporate and Institutional Banking, Investment Solutions and Retail Banking for BNP Paribas across the Group. Driving innovation and growth, we are harnessing the potential of over 10000 employees, to provide support and develop best-in-class solutions. About BNP Paribas Group BNP Paribas is the European Union’s leading bank and key player in international banking. It operates in 65 countries and has nearly 185,000 employees, including more than 145,000 in Europe. The Group has key positions in its three main fields of activity: Commercial, Personal Banking & Services for the Group’s commercial & personal banking and several specialized businesses including BNP Paribas Personal Finance and Arval; Investment & Protection Services for savings, investment, and protection solutions; and Corporate & Institutional Banking, focused on corporate and institutional clients. Based on its strong diversified and integrated model, the Group helps all its clients (individuals, community associations, entrepreneurs, SMEs, corporate and institutional clients) to realize their projects through solutions spanning financing, investment, savings and protection insurance. In Europe, BNP Paribas has four domestic markets: Belgium, France, Italy, and Luxembourg. The Group is rolling out its integrated commercial & personal banking model across several Mediterranean countries, Turkey, and Eastern Europe. As a key player in international banking, the Group has leading platforms and business lines in Europe, a strong presence in the Americas as well as a solid and fast-growing business in Asia-Pacific. BNP Paribas has implemented a Corporate Social Responsibility approach in all its activities, enabling it to contribute to the construction of a sustainable future, while ensuring the Group's performance and stability Commitment to Diversity and Inclusion At BNP Paribas, we passionately embrace diversity and are committed to fostering an inclusive workplace where all employees are valued, respected, and can bring their authentic selves to work. We prohibit Discrimination and Harassment of any kind, and our policies promote equal employment opportunity for all employees and applicants, irrespective of, but not limited to their gender, gender identity, sex, sexual orientation, ethnicity, race, color, national origin, age, religion, social status, mental or physical disabilities, veteran status etc. As a global Bank, we truly believe that inclusion and diversity of our teams is key to our success in serving our clients and the communities we operate in. About Business Line/Function ITG is a group function established recently (2019) in ISPL with presence in Mumbai, Chennai. We collaborate with various business lines of the group to provide IT Services. BNP PARIBAS, the leading bank in the European Union and a leading international player, is seeking to complement and reinforce its existing teams in the areas of IT risk management, cybersecurity and the fight against digital fraud. Within IT Group, Informatics Directorate Of BNP Paribas, The Cybersecurity & Digital Fraud Department's Mission Aims To Structure, Strengthen And Harmonize IT Risk Management And Cybersecurity For The Overall BNP Paribas Group (approximately 30 Entities) And defining the vision and strategy for IT risk management and cybersecurity, and ensuring the implementation of this strategy within the Group’s operating entities, monitoring the security of the Group's information systems, steering the IT Continuity and Resilience strategy and methodological framework. The evolving Cyber threats landscape increases the security risk of financial sector, that leads BNP Paribas to strengthen its Cybersecurity maturity, IT risk management and Operation Resilience. Within IT Group Cybersecurity & Digital Fraud department, you will be part of the team based in India. Job Title Cybersecurity Expert Date 30-Sep-2025 Department ITG CDF.IN Location: Chennai Business Line / Function CDF Cybersecurity Framework Reports To (Direct) Grade (if applicable) (Functional) Number Of Direct Reports NA Directorship / Registration NA Position Purpose Key role to develop Indian platform, ensuring core Cybersecurity, IT Risk and Operational Resilience activities are performed with the required efficiency and quality to protect BNP Paribas. The Cybersecurity Framework team develops and maintains the cybersecurity policies and requirements at BNP Paribas Group level, covering all cybersecurity topics (Artificial Intelligence, Application security, Data security, cloud security, IAM, asset management, SWIFT etc..), that will must be enforced by the Group entities. Responsibilities Contribute to the definition of new cyber security requirements (or review of existing) regarding 28 cyber topics (Artificial Intelligence, Application security, Data security, cloud security, IAM, asset management, SWIFT etc..) that will be applicable to all group entities. Defining procedure based on the requirements defined. Ensure projects are delivered on defined timeline and meet high-quality standards (both technical precision and grammatical accuracy) Hosting and animation of workshops to share, discuss, and consult on these new cyber security requirements and procedure with worldwide group experts. Regularly report on the status of projects including challenges. Contribute to the definition/review of patterns (grouping) of these cyber security requirements, applicable to all group entities according to level of risk exposure, all within the group cyber security program to assess the maturity of the entities through Cyber Maturity Assessment (CMA). Contribute to the evolution of these patterns (inclusion of new cyber security requirements) as notable group programs progress (such as Zero trust, DLP, etc...) Contribute to the definition of evidence to provide in front of each cyber security requirement to be validated through CMA. Regularly discuss, share, and challenge BNP PARIBAS entities on applicable patterns. Contribute to the evolution of the group security program (cyber security requirements, evidence, and their assessment) within Group GRC IT tool. Perform the gap assessment with different regulations (EU GDPR, DORA etc.,) and propose new requirements to achieve compliance. Advance knowledge by completing necessary certifications at least one certification yearly (CISSP, CCSP, CCSK, CCNA etc.,). Technical & Behavioral Competencies Minimum 7 years work experience Proven experience with cross-cultural & international working environment and collaborating with large and geographically dispersed teams. Advanced communication skills (Strong writing, editing, presenting) Ability to articulate technical concepts to non-technical stakeholders. In-depth understanding of cyber security and continuity frameworks and standards such as NIST, ISO27001, ISO ISO22301etc. Demonstrate a positive motivated attitude. Rigorous and an eye for detail. Ability to prioritize and multi-task with flexibility and adaptability. Ability to manage conflicting priorities and multiple tasks. Strong knowledge and understanding of current trends of cyber security. Industry certifications are preferred : CISSP, CISM, CRISC, CISA, ISO27001 LA, etc. Skills Referential Behavioural Skills: Ability to synthetize / simplify Active listening Ability to share / pass on knowledge Communication skills - oral & written Transversal Skills Ability to anticipate business / strategic evolution Ability to set up relevant performance indicators Ability to understand, explain and support change Education Level Bachelor Degree or equivalent Experience Level At least 7 years Other/Specific Qualifications MICROSOFT WORD (Proficient) MICROSOFT EXCEL (Proficient)

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies