Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
10.0 - 12.0 years
0 Lacs
Pune/Pimpri-Chinchwad Area
On-site
Job Responsibilities: 1. Quality Management System (QMS) Development and Maintenance Develop, implement, and maintain a QMS aligned with ISO/IEC 17025 and other applicable quality standards. Define and enforce quality processes, test procedures, and documentation practices to ensure accuracy and consistency in test results. Conduct regular reviews and gap analyses to assess compliance with sector-specific regulatory frameworks. Oversee the management of quality records, audit logs, corrective actions, and preventive actions (CAPA). 2. Compliance with Sector-Specific Standards and Regulations Ensure compliance with industry standards and regulations across multiple sectors, including: Automotive: ISO 11452, CISPR 25, ISO 7637, SAE J551, ISO/SAE 21434 (cybersecurity), and OEM-specific standards. Cybersecurity: ISO/SAE 21434: Cybersecurity Risk Management for automotive applications. IEC 62443: Industrial control system cybersecurity standards. NIST, ISO 27001: Cybersecurity frameworks for data protection and threat mitigation. Industrial and Commercial: IEC 61000 series, FCC Part 15/18, IEEE standards, and relevant cybersecurity protocols. Military/Defense: MIL-STD-461, MIL-STD-464, MIL-STD-810, RTCA/DO-160. Residential and Consumer Electronics: IEC, FCC, and CE marking standards. Interface Testing: Validation of CAN, LIN, FlexRay, Ethernet, and RF interfaces used in automotive and industrial applications. Ensuring compliance with interoperability, data integrity, and security standards. Stay up to date with changing regulatory requirements and communicate updates to internal teams. 3. Audit, Accreditation, and Continuous Improvement Plan, conduct, and manage internal audits to ensure compliance with ISO/IEC 17025, ISO 9001, and ISO 21434 standards. Prepare the lab for external audits and accreditation assessments by regulatory authorities and certification bodies. Manage the resolution of non-conformities identified during audits through corrective and preventive actions (CAPA) . Lead root cause analysis (RCA) to identify process inefficiencies and implement effective solutions. Promote continuous improvement through Lean, Six Sigma, and other quality methodologies to enhance testing efficiency and reliability. 4. Cybersecurity and Interface Testing Oversight Establish quality protocols for cybersecurity testing in compliance with ISO/SAE 21434, IEC 62443, and NIST frameworks. Oversee penetration testing, vulnerability assessments, and security audits for automotive and industrial systems. Ensure interface validation for CAN, LIN, FlexRay, and Ethernet protocols to meet performance and security benchmarks. Collaborate with technical teams to assess cybersecurity risks and identify threats to system integrity and interoperability. Implement quality controls to ensure that interfaces maintain data accuracy, security, and compliance with sector-specific standards. 5. Customer and Stakeholder Communication Act as the primary point of contact for quality-related concerns, audits, and technical inquiries from clients and regulatory bodies. Collaborate with internal teams to ensure that customer requirements for EMC, cybersecurity, and interface testing are clearly defined and met. Facilitate client audits and ensure that all necessary documentation and quality evidence is available for review. Address and resolve customer complaints related to quality issues, ensuring customer satisfaction and trust. 6. Training, Development, and Team Leadership Develop and deliver training programs to lab personnel on quality management principles, compliance standards, and sector-specific protocols. Conduct specialized training sessions on cybersecurity best practices, interface validation protocols, and quality auditing procedures. Foster a culture of continuous learning and quality awareness , ensuring that all team members understand and follow established quality processes. Lead and mentor the quality team, ensuring effective collaboration and high performance. 7. Data Analysis, Performance Monitoring, and Reporting Analyze quality performance data to identify trends, root causes, and improvement opportunities. Establish and track Key Performance Indicators (KPIs) to assess the effectiveness of quality processes and ensure consistent test results. Generate detailed quality reports for management, highlighting audit findings, risk assessments, and corrective actions. Utilize statistical tools such as SPC, Pareto analysis, and FMEA to improve lab performance and test reliability. 8. Risk Management and Preventive Action Implement risk management frameworks to identify, assess, and mitigate quality-related risks across testing operations. Conduct Failure Mode and Effects Analysis (FMEA) for EMC, cybersecurity, and interface testing to proactively identify and address potential failure points. Develop and enforce contingency plans to manage quality-related disruptions and ensure business continuity. Qualifications and Experience: Education: Bachelor’s degree in Electronics Engineering, Computer Science, Quality Management, or a related technical discipline. Advanced degree (e.g., Master’s in Quality, Engineering, or Cybersecurity) preferred. Experience: Minimum 10-12 years of experience in quality management, preferably in an EMC testing, cybersecurity, or interface validation environment. Proven experience managing quality processes in industries such as automotive, industrial, military, residential, and commercial sectors. Strong knowledge of ISO/IEC 17025, ISO 9001, ISO 21434, IEC 62443, and other relevant standards. Hands-on experience in cybersecurity risk assessment, penetration testing, and interface protocol validation. Track record of successful audit management and regulatory compliance. Certifications: Certified Quality Manager (CQM), ISO 9001 Lead Auditor, or equivalent quality certifications. Cybersecurity certifications (e.g., CISSP, CISM, CEH ) are highly desirable. Six Sigma Green/Black Belt certification is a plus. Skills and Competencies: Technical Expertise: In-depth knowledge of EMC testing methodologies, cybersecurity frameworks, and interface testing protocols. Analytical Skills: Strong data analysis and problem-solving abilities to identify quality trends and drive continuous improvement. Project Management: Ability to manage multiple projects, timelines, and resources effectively. Communication Skills: Excellent verbal and written communication skills, with the ability to engage with internal teams, clients, and auditors. Leadership and Teamwork: Strong leadership skills with the ability to guide and mentor cross-functional teams. Attention to Detail: Commitment to maintaining accuracy, compliance, and quality consistency across all testing processes. Show more Show less
Posted 1 week ago
20.0 years
0 Lacs
Gurgaon, Haryana, India
On-site
About Rackspace Cyber Defence Rackspace Cyber Defence is our next generation cyber defence and security operations capability that builds on 20+ years of securing customer environments to deliver proactive, risk-based, threat-informed and intelligence driven security services. Our purpose is to enable our customers to defend against the evolving threat landscape across on-premises, private cloud, public cloud and multi-cloud workloads. Our goal is to go beyond traditional security controls to deliver cloud-native, DevOps-centric and fully integrated 24x7x365 cyber defence capabilities that deliver a proactive , threat-informed , risk-based , intelligence-driven approach to detecting and responding to threats. Our mission is to help our customers: Proactively detect and respond to cyber-attacks – 24x7x365 Defend against new and emerging risks that impact their business Reduce their attack surface across private cloud, hybrid cloud, public cloud, and multi-cloud environments Reduce their exposure to risks that impact their identity and brand Develop operational resilience Maintain compliance with legal, regulatory and compliance obligations What we’re looking for To support our continued success and deliver a Fanatical Experience™ to our customers, Rackspace Cyber Defence is looking for an Indian based Security Operations Analyst (L3) to support Rackspace’s strategic customers. This role is particularly well-suited to a self-starting, experienced and motivated Sr. Sec Ops Analyst, who has a proven record of accomplishment in the cloud security monitoring and incident detection domain. As a Security Operations Analyst(L3), you will be responsible for detecting, analysing, and responding to threats posed across customer on-premises, private cloud, public cloud, and multi-cloud environments. The primary focus will be on triaging alerts and events (incident detection), which may indicate malicious activity, and determining if threats are real or not. You will also be required to liaise closely with the customer’s key stakeholders, which may include incident response and disaster recovery teams as well as information security. Key Accountabilities Should have experience of 10 years in SOC and 5 years in Azure Sentinel. Ensure the Customer’s operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner. Critical incident handling & closure. Escalation management and handling escalations from L2 Analysts. Proactive discovery of threats based on MITRE ATT&CK framework. Deep investigation and analysis of critical security incidents. Post breach forensic incident analysis reporting. Review the weekly and monthly reports. Review new use cases created by L2 and implement in cloud-native SIEM (Security Information and Event Management). Assist with customer onboarding (such as use case development, identifying data sources, configuring data connectors etc) Advanced threat hunting. Develop custom dashboards and reporting templates. Develop complex to customer specific use cases. Advanced platform administration. Solution recommendation for issues. Co-ordinate with vendor for issue resolution. Basic and intermediate playbook and workflow enhancement. Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc. Develop the custom parsers for the incident and alert enrichment. Problem specific playbook and workflow creation and enhancements Required to work flexible timings. Skills & Experience Existing experience as a Security Operations Analyst, or equivalent Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools such as: - Microsoft Sentinel Microsoft 365 Defender Microsoft Defender for Cloud Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint Firewalls and network security tools such as Palo Alto, Fortinet, Juniper, and Cisco Web Application Firewall (WAF) tools such as Cloudflare, Akamai and Azure WAF Email Security tools such as Proofpoint, Mimecast and Microsoft Defender for Office Data Loss Prevention (DLP) tools such as Microsoft Purview, McAfee and Symantec Nice to have skills/experience includes: Google Cloud Platform (GCP) security tools such as Chronicle and Security Command Centre Amazon Web Services (AWS) security tools such as Security Hub, AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail Experience of analysing malware and email headers, and has skills in network security, intrusion detection and prevention systems; operating systems; risk identification and analysis; threat identification and analysis and log analysis Experience of security controls, such as network access controls; identity, authentication, and access management controls (IAAM); and intrusion detection and prevention controls Knowledge of security standards (good practice) such as NIST, ISO27001, CIS (Center for Internet Security), OWASP and Cloud Controls Matrix (CCM) etc Experience with scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell Experience with DevOps practices and tools such as Backlogs, Repo’s, Pipelines, Artifacts, CI/CD, JIRA, Azure DevOps, CircleCI, GitHub Actions, Ansible and/or Jenkins Computer science, engineering, or information technology related degree (although not a strict requirement) Holds one, or more, of the following certificates (or equivalent): - Certified Information Security Systems Professional (CISSP) Microsoft Certified: Azure Security Engineer Associate (AZ500) Microsoft Certified: Security Operations Analyst Associate (SC-200) CREST Practitioner Intrusion Analyst (CPIA) CREST Registered Intrusion Analyst (CRIA) CREST Certified Network Intrusion Analyst (CCNIA) Systems Security Certified Practitioner (SSCP) Certified Cloud Security Professional (CCSP) GIAC Certified Incident Handler (GCIH) GIAC Security Operations Certified (GSOC) A highly self-motivated and proactive individual who wants to learn and grow and has an attention to detail A great analyser, trouble-shooter and problem solver who understands security operations, programming languages and security architecture Highly organised and detail oriented. Ability to prioritise, multitask and work under pressure An individual who shows a willingness to go above and beyond in delighting the customer Show more Show less
Posted 1 week ago
20.0 years
0 Lacs
Gurgaon, Haryana, India
On-site
Rackspace Security (Public Cloud) Security Engineer L3 (Endpoint Security) About Rackspace Cyber Defence Rackspace Cyber Defence is our next generation cyber defence and security operations capability that builds on 20+ years of securing customer environments to deliver proactive, risk-based, threat-informed and intelligence driven security services. Our purpose is to enable our customers to defend against the evolving threat landscape across on-premises, private cloud, public cloud and multi-cloud workloads. Our goal is to go beyond traditional security controls to deliver cloud-native, DevOps-centric and fully integrated 24x7x365 cyber defence capabilities that deliver a proactive , threat-informed , risk-based , intelligence-driven approach to detecting and responding to threats. Our mission is to help our customers: Defend against new and emerging risks that impact their business Reduce their attack surface across private cloud, hybrid cloud, public cloud, and multi-cloud environments Reduce their exposure to risks that impact their identity and brand Develop operational resilience Maintain compliance with legal, regulatory and compliance obligations What we’re looking for To support our continued success and deliver a Fanatical Experience™ to our customers, Rackspace Cyber Defence is looking for an Indian based Security Engineer, with a specialism in Endpoint Security to support Rackspace’s strategic customers. This role is particularly well-suited to a self-starting, experienced and motivated Sr. Security Engineer, who has a proven record of accomplishment in the design, delivery, management, operation and continuous improvement of enterprise-level Endpoint Security platforms or delivering Managed Endpoint Detection & Response (EDR) services to customers. The primary focus will be on the design, implementation, management, operation and continuous improvement of cloud-native Endpoint Detection & Response (EDR) platforms such as Crowdstrike Falcon or Microsoft Defender for Endpoint; used by the Rackspace Cyber Defence Center to deliver managed security services to our customers. You will also be required to liaise closely with the customer’s key stakeholders, which may include incident response and disaster recovery teams as well as information security. Key Accountabilities Ensure the Customer’s operational and production environment remains healthy and secure at all the times Assist with customer onboarding – customer/device onboarding, policy configuration, platform configuration and service transition to security operations team(s). Advance platform administration. Critical platform incident handling & closure. As an SME, act as an L3 escalation and point of contact for SecOps Analysts during an incident response process As an SME, act as a champion and centre of enablement by delivering training, coaching and thought leadership across Endpoint Security and Endpoint Detection & Response. Develop and document runbooks, playbooks and knowledgebase articles that drive best practice across teams. Drive continuous improvement of Rackspace Managed EDR services through custom development, automation and integration; in collaboration with SecOps Engineering and other Security Engineering team(s) Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc. Co-ordinate with vendor for issue resolution. Required to work flexible timings Skills & Experience Should have 8+ years experience in Security Engineering Experience working in either large, enterprise environments or managed security services environments with a focus on Endpoint Detection & Response Experience of working with cloud native Endpoint Security and Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint and/or Microsoft Defender for Cloud Experience of working in two (or more) of the following additional security domains: o SIEM platforms such as Microsoft Sentinel (preferred), Google Chronicle, Splunk, QRadar, LogRhythm, Securonix etc. o AWS (Amazon Web Services) Security Hub including AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail . Experience of analysing malware and email headers, and has skills in network security, intrusion detection and prevention systems; operating systems; risk identification and analysis; threat identification and analysis and log analysis Experience of security controls, such as network access controls; identity, authentication, and access management controls (IAAM); and intrusion detection and prevention controls Knowledge of security standards (good practice) such as NIST, ISO27001, CIS (Center for Internet Security), OWASP and Cloud Controls Matrix (CCM) etc Knowledge of scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell Knowledge of Malware reverse engineering, threat detection and threat hunting. Computer science, engineering, or information technology related degree (although not a strict requirement) Holds one, or more, of the following certificates (or equivalent): - o Microsoft Certified: Azure Security Engineer Associate (AZ500) o Microsoft Certified: Security Operations Analyst Associate (SC-200) o Systems Security Certified Practitioner (SSCP) o Certified Cloud Security Professional (CCSP) o GIAC Certified Incident Handler (GCIH) o GIAC Security Operations Certified (GSOC) o CrowdStrike admin Certified A highly self-motivated and proactive individual who wants to learn and grow and has an attention to detail A great analyser, trouble-shooter and problem solver who understands security operations, programming languages and security architecture Highly organised and detail oriented. Ability to prioritise, multitask and work under pressure An individual who shows a willingness to go above and beyond in delighting the customer A good communicator who can explain security concepts to both technical and non-technical audiences About Rackspace Technology We are the multicloud solutions experts. We combine our expertise with the world’s leading technologies — across applications, data, and security — to deliver end-to-end solutions. We have a proven record of advising customers based on their business challenges, designing solutions that scale, building and managing those solutions, and optimizing returns into the future. Named a best place to work, year after year according to Fortune, Forbes, and Glassdoor, we attract and develop world-class talent. Join us on our mission to embrace technology, empower customers and deliver the future. More about Rackspace Technology Though we are all different, Rackers thrive through our connection to a central goal: to be a valued member of a winning team on an inspiring mission. We bring our whole selves to work every day. And we embrace the notion that unique perspectives fuel innovation and enable us to best serve our customers and communities around the globe. We welcome you to apply today and want you to know that we are committed to offering equal employment opportunity without regard to age, colour, disability, gender reassignment or identity or expression, genetic information, marital or civil partner status, pregnancy or maternity status, military or veteran status, nationality, ethnic or national origin, race, religion or belief, sexual orientation, or any legally protected characteristic. If you have a disability or special need that requires accommodation, please let us know. Show more Show less
Posted 1 week ago
8.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Job Description: About Us At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities, and shareholders every day. One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We’re devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being. Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization. Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!\ Global Business Services Global Business Services delivers Technology and Operations capabilities to Lines of Business and Staff Support Functions of Bank of America through a centrally managed, globally integrated delivery model and globally resilient operations. Global Business Services is recognized for flawless execution, sound risk management, operational resiliency, operational excellence, and innovation. In India, we are present in five locations and operate as BA Continuum India Private Limited (BACI), a non-banking subsidiary of Bank of America Corporation and the operating company for India operations of Global Business Services Process Overview* Cyber Threat Evaluation Analyst The Global Information Security organization (GIS) at Bank of America protects bank information systems, confidential and proprietary data, and customer information. The Cyber Threat Evaluation and Prevention Team (CTEP) assesses threats and emerging risks, evaluates cyber security controls, and defines observations to remediate risks. Job Description* The Evaluation Analyst plays an essential role in the Cyber Threat Defense Framework. The CTEP Evaluation Analyst conducts threat and incident evaluations and identifies opportunities for process and control enhancement. They support the CTEP Evaluation Manager in improving defense capabilities based on threats, incidents, and issues throughout the bank. The analyst assists ongoing evaluations by comprehensively documenting threats and ensuring all threats/incidents are comprehensive, complete, and accurate. Analyses include reviews of: Threats identified from internal and external intelligence sources. Cyber incidents managed at the Bank (e.g., third-party incidents). Assessments conducted by GIS teams (e.g., Adaptive Threat Simulations). Responsibilities* Within CTEP, the Evaluation team: Analyzes threats and incidents sourced from GIS partner teams to identify and triage process and control weaknesses in context of risks arising from the threat. Documents defensive posture, process and control weaknesses, and overall risk of each threat. Reviews threats/incidents holistically to identify broad themes and strategic issues, enabling GIS to protect against cyber threats effectively and proactively. Requirements* Education* - BE/B.Tech/MCA Experience Range* - 8+ Years Foundational skills* Strong technical writing capabilities; writing technical content in a broadly consumable format. Functional knowledge of information security, IT infrastructure, and risk management. Ability to prioritize and manage time effectively and work independently with minimal direction. Knowledge of Cyber Industry Frameworks like MITRE/NIST. Strategic thinking AND attention to detail – ability to think “like a threat actor.” Proficient computer/analytics skills – esp. Jira, Excel, Word, Power Point, Alteryx, etc. Desired skills* Experience with cyber threat intelligence collection, analysis, and reporting. Experience responding to and managing security incidents and events. Experience creating, executing, and documenting assessments and exercises. General understanding of bank policies, specific to data and privacy, third parties, incident management, vulnerability management, etc. Work Timings* - 6:30 AM - 09:30 PM Job Location* - Hyderabad, Chennai, Mumbai Show more Show less
Posted 1 week ago
3.0 - 6.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. JD 2 – Risk Consulting - Protect Tech – Senior (IT audit – General skills) No. of positions (India): 4 Key Responsibilities Your key responsibilities will include: Consistently deliver quality client services. Drive high-quality work products within expected timeframes and on budget. Monitor progress manage risk and ensure key stakeholders are kept informed about progress and expected outcomes. Foster relationships with client personnel to analyse, evaluate, and enhance information systems to develop and improve security at procedural and technology levels. Use knowledge of the current IT environment and industry trends to identify engagement and client service issues and communicate this information to the engagement team and client management through written correspondence and verbal presentations. Stay abreast of current business and industry trends relevant to the client's business. Demonstrate deep technical capabilities and professional knowledge. Demonstrate ability to quickly assimilate to new knowledge. Skills And Attributes For Success You will leverage your proven track record of IT Audit experience and strong personal skills, to effectively deliver quality results in the assessment, design, and support implementation of controls, security and IT risk solutions. To qualify for the role, you must have A bachelor’s or master’s degree and approximately 3-6 years of related work experience At least 2-4 years of experience in IT Risk and Compliance Design IT Risk Controls framework such as IT SOX Implementation and Testing of internal controls such as IT general controls, IT application controls, IPE related controls, interface controls etc. Identify control gaps, weaknesses and areas of improvements. Conducting IT internal control reviews, and review of SOC1 or SOC2 reports Knowledge of IT risk, information security or cyber security frameworks such as COSO, COBIT, ISO, NIST etc. IT Compliance and regulatory assessments – IT Risk and Controls assessment with exposure of any of the technologies such as SAP, Oracle, Workday, MS Dynamics or emerging technologies such as Cloud, RPA, AI/ML IT Infrastructure and Architecture risk assessments including data quality and data migration reviews, data privacy reviews, OS DB reviews etc. Strong exposure working in client facing roles, collaborate with cross functional teams including internal audits, IT security and business stakeholders to assess control effectiveness and facilitate remediation activities. Excellent communication, documentation and report writing skills. Good to have relevant industry certifications such as CISA, CISM, CISSP, CRISC, CCSK, ISO 27001, and others (as relevant) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
2.0 - 3.0 years
0 Lacs
Greater Kolkata Area
On-site
Summary Position Summary Job title: Third Party Cyber Risk Services- Consultant (Solution Delivery Associate) About At Deloitte, we do not offer you just a job, but a career in the highly sought-after risk management field. We are one of the business leaders in the risk market. We work with a vision to make the world more prosperous, trustworthy, and safe. Deloitte’s clients, primarily based outside of India, are large, complex organizations that constantly evolve and innovate to build better products and services. In the process, they encounter various risks and the work we do to help them address these risks is increasingly important to their success—and to the strength of the economy and public security. By joining us, you will get to work with diverse teams of professionals who design, manage, and implement risk-centric solutions across a variety of domains. In the process, you will gain exposure to the risk-centric challenges faced in today’s world by organizations across a range of industry sectors and become subject matter experts in those areas. Our Risk and Financial Advisory services professionals help organizations effectively navigate business risks and opportunities—from strategic, reputation, and financial risks to operational, cyber, and regulatory risks—to gain competitive advantage. We apply our experience in ongoing business operations and corporate lifecycle events to help clients become stronger and more resilient. Our market-leading teams help clients embrace complexity to accelerate performance, disrupt through innovation, and lead in their industries. We use cutting-edge technology like AI/ML techniques, analytics, and RPA to solve Deloitte’s clients‘most complex issues. Working in Risk and Financial Advisory at Deloitte US-India offices has the power to redefine your ambitions. The Team Cyber & Strategic Risk We help organizations create a cyber-minded culture, reimagine risk to uncover strategic opportunities, and become faster, more innovative, and more resilient in the face of ever-changing threats. We provide intelligence and acuity that dynamically reframes risk, transcending a manual, reactive paradigm. Third Party Risk Management (TPRM) capability is part of the wider Cyber & Strategic Risk portfolio within Deloitte Risk and Financial Advisory. The TPRM team is focused on helping our clients identify and manage the cyber risks arising from their association with third parties or service providers. We help our clients to define their overall third-party cyber risk strategy, design and implement enterprise-wide programs and technology that focus on identifying and reducing risks; help them evaluate their priorities, strengths and weaknesses and roll out large scale organizational changes to achieve goals. Work you’ll do The key job responsibilities will be to: Perform ongoing third-party cyber risk assessments to help clients identify and evaluate complex business and technology risks related to their third parties, and provide recommendations for managing those risks Provide periodic status updates including potential risks and delays to the project delivery to project manager and client Assist in the selection and tailoring of third-party cyber risk management approaches, methods and tools to support delivery of third-party cyber risk assessment services Required Skills 2 to 3 years of relevant experience in information security Good understanding of information security and risk frameworks/standards (ISO 27001/2, NIST 800 series, PCI-DSS, etc.) Demonstrate knowledge of key risk areas such as cyber risk, compliance risk and regulatory risk Demonstrate knowledge in one or more of the following cyber risk domains, including: Security Governance and Management Security Policies and Procedures Application Security Controls Access Controls Network Security Operations Security Architectures Identity Management Disaster Recovery & Business Continuity Incident Response Risk Management Privacy and Data Protection Encryption Experience with internal controls, risk assessments, business process and internal IT control testing or operational auditing Excellent verbal and written communication skills Excellent inter-personal skills Preferred Skills CISSP/CISA (or equivalent) Good understanding of legal and regulatory requirements around information security and data privacy, such as OCC Bulletin 29, FFIEC, HIPAA Security/Privacy, etc. Prior consulting experience Experience with internal controls, risk assessments, business process, and internal IT control testing or operational auditing Qualification Bachelor’s/ Master’s degree in information technology or related field Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Benefits At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Professional development From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career. Requisition code: 301301 Show more Show less
Posted 1 week ago
10.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
We are Reckitt Home to the world's best loved and trusted hygiene, health, and nutrition brands. Our purpose defines why we exist: to protect, heal and nurture in the relentless pursuit of a cleaner, healthier world. We are a global team united by this purpose. Join us in our fight to make access to the highest quality hygiene, wellness, and nourishment a right and not a privilege. Information Technology & Digital In IT and D, you'll be a force for good, whether you're championing cyber security, defining how we harness the power of technology to improve our business, or working with data to guide the innovation of consumer loved products. Working globally across functions, you'll own your projects and process from start to finish, with the influence and visibility to achieve what needs to be done. And if you're willing to bring your ideas to the table, you'll get the support and investment to make them happen. Your potential will never be wasted. You'll get the space and support to take your development to the next level. Every day, there will be opportunities to learn from peers and leaders through working on exciting, varied projects with real impact. And because our work spans so many different businesses, from Research and Product Development to Sales, you'll keep learning exciting new approaches. About The Role We are looking for an experienced IT&D Manager, Manufacturing Network Architect to lead the design and implementation of secure and scalable network solutions for our global manufacturing operations. The role will focus on integrating IT and OT systems, enabling smart manufacturing, and supporting Private 5G and Industrial Network transformation. Your responsibilities Design and implement secure, scalable, and resilient network architectures for manufacturing, integrating IoT and OT while leveraging technologies like Private 5G, SD-WAN, SASE, ZTNA, and SDN to support high availability and hybrid IT/OT environments. Implement advanced security technologies, including Palo Alto firewalls, IDS/IPS, endpoint protection, network segmentation, and Cisco ISE-based identity services with Software-Defined Segmentation (SGT/TrustSec). Support Zero Trust architecture initiatives by enforcing robust network segmentation, identity-based access, and application-aware policies. Ensure regulatory compliance by aligning network designs and operations with industry standards such as IEC 62443, NIST, and corporate security policies. Lead the design, implementation, and optimization of wireless networks (including Cisco Wireless and DNA Center) to meet quality of service and reliability requirements. Provide technical leadership for end-to-end regional infrastructure solutions covering Wireless, Switching, ISE, DNA Center, Software-Defined Access (SDA), and manufacturing-specific use cases. Develop and maintain comprehensive documentation for network architectures, firewall configurations, access policies, and change management records. Collaborate with cross-functional teams, including manufacturing, security, enterprise IT, site managers, and external vendors, to gather requirements and deliver tailored solutions. Manage vendor relationships and contracts, including solution evaluations, negotiations, and selection to ensure best-fit solutions for manufacturing networks. Conduct performance analysis and continuous optimization of network infrastructure to enhance security, performance, scalability, and operational efficiency. Execute strategies for continuous improvement, aligning regional infrastructure platforms with evolving business goals and technology trends. Define and implement standardized methodology templates across projects to streamline engineering processes and improve team productivity. Stay current with industry trends and emerging technologies, proactively identifying innovations applicable to manufacturing networks. Perform regular assessments of infrastructure and product performance, identifying and driving necessary improvements. The experience we're looking for Bachelor’s degree in information technology, Computer Science, or a related field. Minimum of 10 years of hands-on experience as a Network Architect, specializing in designing and managing complex network infrastructures. Proven track record of integrating IT and OT networks within manufacturing or industrial environments. Cisco Certified Network Professional (CCNP) or Cisco Certified Internetwork Expert (CCIE) – preferred. Palo Alto Networks Certified Network Security Engineer (PCNSE) certification. Expertise in Palo Alto Firewalls – deployment, management, and policy implementation. Strong knowledge of Cisco Identity Services Engine (ISE), including Security Group Tags (SGT) and TrustSec frameworks. Proficient in Cisco Catalyst Switching, Wireless (including Cisco Wireless LAN Controllers), DNA Center, and Software-Defined Access (SDA). Experience with security tools and technologies such as firewalls, IDS/IPS, endpoint protection, and OT network segmentation. Hands-on experience implementing Software-Defined Access (SD-Access) and policy-driven network segmentation. Familiarity with emerging wireless technologies including Private 5G and IoT connectivity (preferred). Excellent communication and interpersonal skills, with the ability to collaborate effectively and explain technical concepts to both technical and non-technical stakeholders. The skills for success Product Development, system development, Project Management, Programme Management, Design Thinking, Process Automisation, IT Service Management, Innovation Processes, Innovation, User Experience Design, Change Analyst, Change Management, Digital Transformation, Value Analysis, Change Management, Adoption, Technology Adoption Lifecycle, Stakeholder Relationship Management, Vendor Management, Outstanding Communication, stakeholder engagement, Digital Strategy, Product Solution Architecture, Cyber Security Strategy, Cyber Security, Data Privacy, Portfolio Management, Data Governance, Product Compliance, Media Analytics, advertising, Consumer Engagement, Market Value, Market Chain, Data Driven Practices, Advanced Analytics, Data Analytics, Governance. What we offer With inclusion at the heart of everything we do, working alongside our four global Employee Resource Groups, we support our people at every step of their career journey, helping them to succeed in their own individual way. We invest in the wellbeing of our people through parental benefits, an Employee Assistance Program to promote mental health, and life insurance for all employees globally. We have a range of other benefits in line with the local market. Through our global share plans we offer the opportunity to save and share in Reckitt's potential future successes. For eligible roles, we also offer short-term incentives to recognise, appreciate and reward your work for delivering outstanding results. You will be rewarded in line with Reckitt's pay for performance philosophy. Equality We recognise that in real life, great people don't always 'tick all the boxes'. That's why we hire for potential as well as experience. Even if you don't meet every point on the job description, if this role and our company feels like a good fit for you, we still want to hear from you. All qualified applicants will receive consideration for employment without regard to age, disability or medical condition; colour, ethnicity, race, citizenship, and national origin; religion, faith; pregnancy, family status and caring responsibilities; sexual orientation; sex, gender identity, gender expression, and transgender identity; protected veteran status; size or any other basis protected by appropriate law. Show more Show less
Posted 1 week ago
4.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Summary Position Summary Position: Cyber Security Senior BISO Analyst (L3.5) Location: USI Job Summary Cyber Security BISO Team works with the Deloitte Function Specific Subsidiaries (FSS) & Chief Information Security Officer (CISO) organization directly supporting Deloitte’s Enabling Areas functions. The role involves close integration with various internal and external client-service leaders, technical and non-technical stakeholders to drive widespread cyber security program adoption. The Business Information Security Officer (BISO) Analyst will work closely with the Application teams of various lines of businesses (LOB), including the Office of Chief Information Officer (OCIO). In this role, you will support a group/team to develop a deep understanding of the business to facilitate specialized information security risk-based discussions. This role requires a proactive individual with a keen eye for detail and a strong understanding of cybersecurity frameworks such as, ISO, NIST, CIS. This fast-paced multi-faceted environment requires a highly motivated, self-driven, strong team player who demonstrates an intrinsic desire for continuous personal and professional growth. Key Responsibilities: Oversight & Alignment: Partner with Deloitte’s central Cyber Security organization to ensure consistent adoption of security frameworks, policies, and controls within business units and client teams. Security Strategy Development: Collaborate with business leaders to develop and implement information security strategies that align with business goals and regulatory requirements. Risk Management: Identify, assess, and prioritize information security risks within the enabling areas. Develop and implement risk mitigation strategies. Policy and Compliance: Ensure compliance with relevant information security policies, standards, and regulations (e.g., ISO 27001, NIST, SOC 2, HIPAA). Maintain ongoing audit readiness. Incident Response: Lead the response to security incidents within the enabling areas, including investigation, containment, and remediation efforts. Vulnerability Management: Monitor cyber threats relevant to the business domain. Support risk assessments, issue management, and incident response coordination. Stakeholder Engagement: Serve as the primary point of contact for information security matters within the enabling areas. Build strong relationships with business leaders and other stakeholders. Mitigation Projects: Lead or support projects involving third-party risk, vulnerability remediation, data protection, secure application development, and identity & access governance Security Architecture: Work with IT and business teams to design and implement secure systems and processes that support business operations. Continuous Improvement: Stay current with emerging security threats and trends. Recommend and implement improvements to the organization's security posture Qualifications: Education: Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field. Experience: Minimum of 4 years of experience in information security 2-4 years of risk management experience or direct participation in risk management processes, including application risk classification and application control assessments. 2-4 years of experience in vulnerability management, cybersecurity, or a related field. Experience with vulnerability assessment tools (e.g., Nessus, Qualys, Rapid7). Experience with GRC platforms (e.g., ServiceNow, Archer, or similar). Certifications: Relevant certifications such as CISSP, CISM, CISA, or equivalent. Technical Skills: Strong understanding of information security principles, technologies, and best practices. Experience with risk management, incident response, and security architecture. Business Acumen: Ability to understand business operations and align security strategies with business objectives. Communication: Excellent verbal and written communication skills. Ability to effectively communicate complex security concepts to non-technical stakeholders. Leadership: Proven ability to lead cross-functional teams and manage multiple projects simultaneously. Soft Skills: Excellent analytical and problem-solving skills. Strong communication skills, both written and verbal. Ability to work independently and as part of a team. Detail-oriented with a strong focus on accuracy and quality. Ability to work in a fast-paced environment and manage multiple tasks simultaneously. This role is ideal for a motivated individual who is passionate about cybersecurity and eager to contribute to the organization's security posture. If you have a strong background in vulnerability management and a commitment to continuous improvement, we encourage you to apply. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Benefits At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Professional development From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career. Requisition code: 301153 Show more Show less
Posted 1 week ago
2.0 - 3.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Summary Position Summary Job title: Third Party Cyber Risk Services- Consultant (Solution Delivery Associate) About At Deloitte, we do not offer you just a job, but a career in the highly sought-after risk management field. We are one of the business leaders in the risk market. We work with a vision to make the world more prosperous, trustworthy, and safe. Deloitte’s clients, primarily based outside of India, are large, complex organizations that constantly evolve and innovate to build better products and services. In the process, they encounter various risks and the work we do to help them address these risks is increasingly important to their success—and to the strength of the economy and public security. By joining us, you will get to work with diverse teams of professionals who design, manage, and implement risk-centric solutions across a variety of domains. In the process, you will gain exposure to the risk-centric challenges faced in today’s world by organizations across a range of industry sectors and become subject matter experts in those areas. Our Risk and Financial Advisory services professionals help organizations effectively navigate business risks and opportunities—from strategic, reputation, and financial risks to operational, cyber, and regulatory risks—to gain competitive advantage. We apply our experience in ongoing business operations and corporate lifecycle events to help clients become stronger and more resilient. Our market-leading teams help clients embrace complexity to accelerate performance, disrupt through innovation, and lead in their industries. We use cutting-edge technology like AI/ML techniques, analytics, and RPA to solve Deloitte’s clients‘most complex issues. Working in Risk and Financial Advisory at Deloitte US-India offices has the power to redefine your ambitions. The Team Cyber & Strategic Risk We help organizations create a cyber-minded culture, reimagine risk to uncover strategic opportunities, and become faster, more innovative, and more resilient in the face of ever-changing threats. We provide intelligence and acuity that dynamically reframes risk, transcending a manual, reactive paradigm. Third Party Risk Management (TPRM) capability is part of the wider Cyber & Strategic Risk portfolio within Deloitte Risk and Financial Advisory. The TPRM team is focused on helping our clients identify and manage the cyber risks arising from their association with third parties or service providers. We help our clients to define their overall third-party cyber risk strategy, design and implement enterprise-wide programs and technology that focus on identifying and reducing risks; help them evaluate their priorities, strengths and weaknesses and roll out large scale organizational changes to achieve goals. Work you’ll do The key job responsibilities will be to: Perform ongoing third-party cyber risk assessments to help clients identify and evaluate complex business and technology risks related to their third parties, and provide recommendations for managing those risks Provide periodic status updates including potential risks and delays to the project delivery to project manager and client Assist in the selection and tailoring of third-party cyber risk management approaches, methods and tools to support delivery of third-party cyber risk assessment services Required Skills 2 to 3 years of relevant experience in information security Good understanding of information security and risk frameworks/standards (ISO 27001/2, NIST 800 series, PCI-DSS, etc.) Demonstrate knowledge of key risk areas such as cyber risk, compliance risk and regulatory risk Demonstrate knowledge in one or more of the following cyber risk domains, including: Security Governance and Management Security Policies and Procedures Application Security Controls Access Controls Network Security Operations Security Architectures Identity Management Disaster Recovery & Business Continuity Incident Response Risk Management Privacy and Data Protection Encryption Experience with internal controls, risk assessments, business process and internal IT control testing or operational auditing Excellent verbal and written communication skills Excellent inter-personal skills Preferred Skills CISSP/CISA (or equivalent) Good understanding of legal and regulatory requirements around information security and data privacy, such as OCC Bulletin 29, FFIEC, HIPAA Security/Privacy, etc. Prior consulting experience Experience with internal controls, risk assessments, business process, and internal IT control testing or operational auditing Qualification Bachelor’s/ Master’s degree in information technology or related field Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Benefits At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Professional development From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career. Requisition code: 301301 Show more Show less
Posted 1 week ago
0 years
0 Lacs
India
Remote
🛡️ Cyber Security Intern 📍 Location: Remote (100% Virtual) 📅 Duration: 3 Months 💸 Stipend for Top Interns: ₹15,000 🎁 Perks: Certificate | Letter of Recommendation | Full-Time Offer (Based on Performance) About INLIGHN TECH INLIGHN TECH is an emerging edtech platform that empowers students through hands-on, real-world learning experiences. Our Cyber Security Internship is designed to equip aspiring professionals with practical skills in ethical hacking, network defense, and vulnerability assessment through project-based learning. 🚀 Internship Overview As a Cyber Security Intern , you will gain real-world exposure to security tools, frameworks, and attack simulations . You will assist in identifying potential vulnerabilities, analyzing threats, and learning how to protect digital assets in real-time environments. 🔧 Key Responsibilities Assist in network monitoring , intrusion detection, and log analysis Conduct basic vulnerability scans and help remediate identified risks Use tools such as Wireshark, Nmap, Burp Suite, Metasploit , and Kali Linux Understand and apply frameworks like OWASP Top 10 and NIST Work on ethical hacking simulations and penetration testing Prepare basic reports on threats, vulnerabilities, and risk mitigation strategies Stay up to date with the latest cybersecurity trends and attack vectors ✅ Qualifications Currently pursuing or recently completed a degree in Cyber Security, IT, Computer Science , or a related field Basic understanding of networking, Linux systems, and cybersecurity principles Familiarity with ethical hacking tools and scripting (Python/Bash) is a plus Strong analytical and problem-solving skills Eagerness to learn, explore, and grow in the field of information security 🎓 What You’ll Gain Hands-on experience with cybersecurity tools and techniques Understanding of real-world security challenges and responses A portfolio of cybersecurity tasks/projects to showcase your skills Internship Certificate upon successful completion Letter of Recommendation for top-performing interns Opportunity for a Full-Time Offer based on performance Show more Show less
Posted 1 week ago
2.0 - 3.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Summary Position Summary Job title: Third Party Cyber Risk Services- Consultant (Solution Delivery Associate) About At Deloitte, we do not offer you just a job, but a career in the highly sought-after risk management field. We are one of the business leaders in the risk market. We work with a vision to make the world more prosperous, trustworthy, and safe. Deloitte’s clients, primarily based outside of India, are large, complex organizations that constantly evolve and innovate to build better products and services. In the process, they encounter various risks and the work we do to help them address these risks is increasingly important to their success—and to the strength of the economy and public security. By joining us, you will get to work with diverse teams of professionals who design, manage, and implement risk-centric solutions across a variety of domains. In the process, you will gain exposure to the risk-centric challenges faced in today’s world by organizations across a range of industry sectors and become subject matter experts in those areas. Our Risk and Financial Advisory services professionals help organizations effectively navigate business risks and opportunities—from strategic, reputation, and financial risks to operational, cyber, and regulatory risks—to gain competitive advantage. We apply our experience in ongoing business operations and corporate lifecycle events to help clients become stronger and more resilient. Our market-leading teams help clients embrace complexity to accelerate performance, disrupt through innovation, and lead in their industries. We use cutting-edge technology like AI/ML techniques, analytics, and RPA to solve Deloitte’s clients‘most complex issues. Working in Risk and Financial Advisory at Deloitte US-India offices has the power to redefine your ambitions. The Team Cyber & Strategic Risk We help organizations create a cyber-minded culture, reimagine risk to uncover strategic opportunities, and become faster, more innovative, and more resilient in the face of ever-changing threats. We provide intelligence and acuity that dynamically reframes risk, transcending a manual, reactive paradigm. Third Party Risk Management (TPRM) capability is part of the wider Cyber & Strategic Risk portfolio within Deloitte Risk and Financial Advisory. The TPRM team is focused on helping our clients identify and manage the cyber risks arising from their association with third parties or service providers. We help our clients to define their overall third-party cyber risk strategy, design and implement enterprise-wide programs and technology that focus on identifying and reducing risks; help them evaluate their priorities, strengths and weaknesses and roll out large scale organizational changes to achieve goals. Work you’ll do The key job responsibilities will be to: Perform ongoing third-party cyber risk assessments to help clients identify and evaluate complex business and technology risks related to their third parties, and provide recommendations for managing those risks Provide periodic status updates including potential risks and delays to the project delivery to project manager and client Assist in the selection and tailoring of third-party cyber risk management approaches, methods and tools to support delivery of third-party cyber risk assessment services Required Skills 2 to 3 years of relevant experience in information security Good understanding of information security and risk frameworks/standards (ISO 27001/2, NIST 800 series, PCI-DSS, etc.) Demonstrate knowledge of key risk areas such as cyber risk, compliance risk and regulatory risk Demonstrate knowledge in one or more of the following cyber risk domains, including: Security Governance and Management Security Policies and Procedures Application Security Controls Access Controls Network Security Operations Security Architectures Identity Management Disaster Recovery & Business Continuity Incident Response Risk Management Privacy and Data Protection Encryption Experience with internal controls, risk assessments, business process and internal IT control testing or operational auditing Excellent verbal and written communication skills Excellent inter-personal skills Preferred Skills CISSP/CISA (or equivalent) Good understanding of legal and regulatory requirements around information security and data privacy, such as OCC Bulletin 29, FFIEC, HIPAA Security/Privacy, etc. Prior consulting experience Experience with internal controls, risk assessments, business process, and internal IT control testing or operational auditing Qualification Bachelor’s/ Master’s degree in information technology or related field Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Benefits At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Professional development From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career. Requisition code: 301301 Show more Show less
Posted 1 week ago
140.0 years
0 Lacs
Gurgaon, Haryana, India
On-site
About NCR VOYIX NCR VOYIX Corporation (NYSE: VYX) is a leading global provider of digital commerce solutions for the retail, restaurant and banking industries. NCR VOYIX is headquartered in Atlanta, Georgia, with approximately 16,000 employees in 35 countries across the globe. For nearly 140 years, we have been the global leader in consumer transaction technologies, turning everyday consumer interactions into meaningful moments. Today, NCR VOYIX transforms the stores, restaurants and digital banking experiences with cloud-based, platform-led SaaS and services capabilities. Not only are we the leader in the market segments we serve and the technology we deliver, but we create exceptional consumer experiences in partnership with the world’s leading retailers, restaurants and financial institutions. We leverage our expertise, R&D capabilities and unique platform to help navigate, simplify and run our customers’ technology systems. Our customers are at the center of everything we do. Our mission is to enable stores, restaurants and financial institutions to exceed their goals – from customer satisfaction to revenue growth, to operational excellence, to reduced costs and profit growth. Our solutions empower our customers to succeed in today’s competitive landscape. Our unique perspective brings innovative, industry-leading tech to all the moving parts of business across industries. NCR VOYIX has earned the trust of businesses large and small — from the best-known brands around the world to your local favorite around the corner. Title: Information Security Engineer III Location: Gurugram, India About NCR Voyix NCR VOYIX Corporation (NYSE: VYX) is a leading global provider of digital commerce solutions for the retail, restaurant and digital banking industries. NCR VOYIX transforms retail stores, restaurant systems and digital banking experiences with comprehensive, platform-led SaaS and services capabilities. NCR VOYIX is headquartered in Atlanta, Georgia, with approximately 15,000 employees in 35 countries across the globe. Information Security Engineer III This role is part of NCR’s Global Information Security team. This team is responsible for developing and implementing NCR’s corporate information security program. The primary goal of the program is to protect the confidentiality, integrity, and availability of information resources. Key information security functions and activities include architecture and design for NCR information security controls, developing and enforcing policies and standards, security awareness training, risk management, assessment, and testing, monitoring and metrics, incident management, and threat and vulnerability management. The Information Security Engineer III shall be responsible for the day-to-day activities required to respond for both routine and high severity incidents. The Information Security Engineer III shall work in a collaborative manner with incident responders, key incident management team members, management, and other stakeholders to ensure security incidents are contained, eradicated, remediated and after-action review is held according to corporate policy. The Information Security Engineer III is expected to contribute to weekly status calls and is On-Call which includes working off hours/weekends and respond to ad-hoc requests as part of this position. The Information Security Engineer III will work with stakeholders and team members to assist with improving incident response processes that are aligned with the mission of the office of the CISO. Key Responsibilities As an active member of the team, monitor and process response for security events on a 24x7 basis. Lead Postmortem exercises post incidents with a focus to identify deficiencies requiring additional attention. Triage, respond to and escalate security incidents. Provide or facilitate the forensics analysis of security events. Leverage automation and orchestration solutions to automate repetitive tasks. Work alongside other security team members to hunt for and identify security issues generated from the network, including third-party relationships. Evaluate SOC policies and procedures/playbooks and recommend updates to management as appropriate. Coordinate incident response activities across multiple independently managed environments and security teams. Leverage knowledge in multiple security disciplines, such as Windows, Unix, Linux, data loss prevention (DLP), endpoint controls, Public Cloud, and networking, to offer global solutions for a complex heterogeneous environment. Utilize multiple security/threat intelligence tools and resources to understand threats. Analyze and respond to minor and major incidents, reported SPAM and Phishing e-mails. Partner with the detection engineering team to improve tool usage and workflow, as well as with the advanced threats and assessment team to mature monitoring and response capabilities. Provide leadership in process improvement and automation of incident response activities. Support 24/7 operations Perform other duties as assigned Skills And Qualifications Strong knowledge of network, backend systems, operating systems, applications, and web services in a manner that allows for the interaction of all as it relates to security and services. 5+ Years as a Senior incident responder/leader of incident response Ability to apply analytical expertise and critical thinking to security incidents Ability to assimilate, understand and utilize various security technologies Ability to collaborate within a geographically distributed team of Incident Response Analysts Demonstrated team or functional leadership experience Experience processing and analyzing intelligence in support of management decision making Current Information Security related certification preferred. Current Public cloud related certification preferred. Knowledge of relevant information security and incident response frameworks such as NIST Cyber Security Framework, MITRE ATT&CK Framework. Strong communication skills and ability to work in a collaborative atmosphere Strong attention to detail Ability to deal with ambiguity and translate high level objectives into detailed tasks Ability to prioritize work with multiple, simultaneous work assignments. Ability and willingness to learn new tools and processes. Experience documenting business processes or technical procedures preferred. Offers of employment are conditional upon passage of screening criteria applicable to the job EEO Statement Integrated into our shared values is NCR Voyix’s commitment to diversity and equal employment opportunity. All qualified applicants will receive consideration for employment without regard to sex, age, race, color, creed, religion, national origin, disability, sexual orientation, gender identity, veteran status, military service, genetic information, or any other characteristic or conduct protected by law. NCR Voyix is committed to being a globally inclusive company where all people are treated fairly, recognized for their individuality, promoted based on performance and encouraged to strive to reach their full potential. We believe in understanding and respecting differences among all people. Every individual at NCR Voyix has an ongoing responsibility to respect and support a globally diverse environment. Statement to Third Party Agencies To ALL recruitment agencies: NCR Voyix only accepts resumes from agencies on the preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Voyix employees, or any NCR Voyix facility. NCR Voyix is not responsible for any fees or charges associated with unsolicited resumes “When applying for a job, please make sure to only open emails that you will receive during your application process that come from a @ncrvoyix.com email domain.” Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Ahmedabad, Gujarat, India
On-site
About The Company e.l.f. Beauty, Inc. stands with every eye, lip, face and paw. Our deep commitment to clean, cruelty free beauty at an incredible value has fueled the success of our flagship brand e.l.f. Cosmetics since 2004 and driven our portfolio expansion. Today, our multi-brand portfolio includes e.l.f. Cosmetics, e.l.f. SKIN, pioneering clean beauty brand Well People, Keys Soulcare, a groundbreaking lifestyle beauty brand created with Alicia Keys and Naturium, high-performance, biocompatible, clinically-effective and accessible skincare. In our Fiscal year 24, we had net sales of $1 Billion and our business performance has been nothing short of extraordinary with 24 consecutive quarters of net sales growth. We are the #2 mass cosmetics brand in the US and are the fastest growing mass cosmetics brand among the top 5. Our total compensation philosophy offers every full-time new hire competitive pay and benefits, bonus eligibility (200% of target over the last four fiscal years), equity, flexible time off, year-round half-day Fridays, and a hybrid 3 day in office, 2 day at home work environment. We believe the combination of our unique culture, total compensation, workplace flexibility and care for the team is unmatched across not just beauty but any industry. Visit our Career Page to learn more about our team: https://www.elfbeauty.com/work-with-us Position Summary We are seeking a highly skilled and proactive Security Risk Manager to join our growing security team. You will be responsible for assessing, monitoring, and mitigating information security risks associated with third-party vendors and service providers. This role ensures vendor relationships comply with organizational security policies, industry regulations, and best practices to protect sensitive data and systems Responsibilities Conduct comprehensive security risk assessments internally and of third-party vendors, including cloud providers, SaaS vendors, and IT service providers Evaluate internal and third-party security controls, policies, and compliance with frameworks such as NIST, ISO 27001, SOC 2, GDPR, HIPAA, and PCI-DSS Perform due diligence reviews, including security questionnaires, audits, and contract reviews Identify, document, and prioritize risks related to vendor access, data handling, and system integrations Work with procurement and legal teams to ensure security requirements are included in vendor contracts and SLAs Prepare risk reports for senior leadership, highlighting key vendor risks and mitigation strategies Communicate security expectations to vendors and internal stakeholders Maintain a centralized vendor risk repository with up-to-date documentation Stay updated on emerging threats, regulatory changes, and industry best practices Enhance vendor risk assessment processes and tools for efficiency and effectiveness Cross-train team members on risk management principles. Actively participate in the broader corporate security efforts, including infrastructure security, end-user training, and vulnerability management Qualifications Bachelor’s degree in Information Security, Cybersecurity, Risk Management, or related field 5+ years of experience in IT risk management, vendor risk assessment, or third-party security evaluations Strong knowledge of security frameworks (NIST, ISO 27001, SOC 2, GDPR, etc.) Experience with vendor risk assessment tools Strong GRC (Governance, Risk, and Compliance) platform knowledge Familiarity with cloud security, data privacy laws, and contractual security clauses Strong communication and interpersonal skills, with the ability to collaborate effectively with technical and non-technical stakeholders Minimum Work Experience 5 Maximum Work Experience 10 This job description is intended to describe the general nature and level of work being performed in this position. It also reflects the general details considered necessary to describe the principal functions of the job identified, and shall not be considered, as detailed description of all the work required inherent in the job. It is not an exhaustive list of responsibilities, and it is subject to changes and exceptions at the supervisors’ discretion. e.l.f. Beauty respects your privacy. Please see our Job Applicant Privacy Notice (www.elfbeauty.com/us-job-applicant-privacy-notice) for how your personal information is used and shared. Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Hybrid Description and Requirements "At BMC trust is not just a word - it's a way of life!" We are an award-winning, equal opportunity, culturally diverse, fun place to be. Giving back to the community drives us to be better every single day. Our work environment allows you to balance your priorities, because we know you will bring your best every day. We will champion your wins and shout them from the rooftops. Your peers will inspire, drive, support you, and make you laugh out loud! We help our customers free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead - and are relentless in the pursuit of innovation! The IZOT product line includes BMC’s Intelligent Z Optimization & Transformation products, which help the world’s largest companies to monitor and manage their mainframe systems. The modernization of mainframe is the beating heart of our product line, and we achieve this goal by developing products that improve the developer experience, the mainframe integration, the speed of application development, the quality of the code and the applications’ security, while reducing operational costs and risks. We acquired several companies along the way, and we continue to grow, innovate, and perfect our solutions on an ongoing basis. We are looking for Application Security Engineer to take ownership of security testing for enterprise products deployed on mainframe environments. In this role, you will assess application-layer security risks, identify vulnerabilities in product implementations, and lead secure architecture reviews. The ideal candidate brings deep offensive security skills along with familiarity in testing applications running on or integrated with IBM mainframe systems. Primary Roles And Responsibilities Conduct penetration testing and red teaming exercises targeting mainframe environments and the surrounding application ecosystem. Perform code-assisted and black-box penetration testing against enterprise applications/systems interacting with RACF, DB2, CICS, MQ, and related subsystems. Identify risks in authentication, authorization, data handling, and communications within mainframe-integrated products. Create threat models and guide product teams in mitigating high-impact vulnerabilities early in the SDLC. Drive remediation efforts through hands-on collaboration and secure design guidance. Author technical reports and deliver executive summaries tailored to various audiences. Stay current on vulnerabilities, exploits, and testing techniques relevant to legacy enterprise technologies and mainframe ecosystems. Assess common integration patterns (SOA, REST/JSON, MQ) for security risks. To ensure you’re set up for success, you will bring the following skillset & experience: 5+ years of experience in penetration testing, with a specialization in systems/applications integrating with mainframe environments. Deep knowledge of mainframe communication protocols and security mechanisms. Demonstrated experience conducting red team-style assessments or advanced threat emulation on mainframe systems. Proficient in tools such as: Mainframe utilities: REXX, ISPF panels, NetView Security tools: Nmap, Burp Suite, Wireshark, custom scripts Strong scripting and automation skills (Python, REXX, Bash, or similar). Strong communication and leadership skills, with a proven ability to lead technical teams or projects. Experience producing board-level reports and presenting findings to senior stakeholders. Exposure to hybrid environments (mainframe to cloud integrations, modernization efforts). Familiarity with modern enterprise integration methods (REST, SOAP, MQ, FTP) that interface with mainframe services Whilst these are nice to have, our team can help you develop in the following skills: Industry certifications such as OSCP, OSCE, CRTP, GIAC GPEN, GXPN, or CISSP. Background in regulated industries such as banking, insurance, or government, where mainframes are core infrastructure. Knowledge of COBOL, PL/I, or other mainframe-centric programming languages. Experience with compliance standards like PCI-DSS, NIST, or SOX as they apply to mainframes. CA-DNP BMC Software maintains a strict policy of not requesting any form of payment in exchange for employment opportunities, upholding a fair and ethical hiring process. At BMC we believe in pay transparency and have set the midpoint of the salary band for this role at 2,117,800 INR. Actual salaries depend on a wide range of factors that are considered in making compensation decisions, including but not limited to skill sets; experience and training, licensure, and certifications; and other business and organizational needs. The salary listed is just one component of BMC's employee compensation package. Other rewards may include a variable plan and country specific benefits. We are committed to ensuring that our employees are paid fairly and equitably, and that we are transparent about our compensation practices. ( Returnship@BMC ) Had a break in your career? No worries. This role is eligible for candidates who have taken a break in their career and want to re-enter the workforce. If your expertise matches the above job, visit to https://bmcrecruit.avature.net/returnship know more and how to apply. Min salary 1,588,350 Our commitment to you! BMC’s culture is built around its people. We have 6000+ brilliant minds working together across the globe. You won’t be known just by your employee number, but for your true authentic self. BMC lets you be YOU! If after reading the above, You’re unsure if you meet the qualifications of this role but are deeply excited about BMC and this team, we still encourage you to apply! We want to attract talents from diverse backgrounds and experience to ensure we face the world together with the best ideas! BMC is committed to equal opportunity employment regardless of race, age, sex, creed, color, religion, citizenship status, sexual orientation, gender, gender expression, gender identity, national origin, disability, marital status, pregnancy, disabled veteran or status as a protected veteran. If you need a reasonable accommodation for any part of the application and hiring process, visit the accommodation request page. Mid point salary 2,117,800 Max salary 2,647,250 Show more Show less
Posted 1 week ago
10.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
About Company At Delaplex, we believe true organizational distinction comes from exceptional products and services. Founded in 2008 by a team of like-minded business enthusiasts, we have grown into a trusted name in technology consulting and supply chain solutions. Our reputation is built on trust, innovation, and the dedication of our people who go the extra mile for our clients. Guided by our core values, we don’t just deliver solutions, we create meaningful impact. We are seeking a cybersecurity consultant to support IEC 62443 (4-1/4-2) certification efforts, coach development teams, conduct internal audits, and ensure compliance with OT security standards and global regulations. Overview This role focuses on improving and maintaining processes and workflows to ensure compliance with OT cybersecurity frameworks in product development. The consultant will support the deployment and implementation of these processes across development teams working on physical products with electronics and connectivity. Key Responsibilities Collaborate with global teams to adapt and implement policies aligned with IEC 62443-4-1. Coach product development teams to follow defined security processes. Advise on implementing security features in line with IEC 62443-4-2. Conduct internal audits and assessments. Requirements: Bachelor's or master's degree in science/engineering with 10+ years of experience, including 3+ years in relevant cybersecurity roles. Hands-on experience with IEC 62443 (4-1 and 4-2), ISO 27001, and other security standards and regulations. Experience auditing IEC 62443-4-1 for embedded devices. Understanding of system engineering processes in software development. Nice to Have: Training or certification in ISA IC 32, IC46, IC47, or equivalent. Familiarity with global OT regulations like CRA, NIS2, RED DA, etc. Knowledge of frameworks such as OWASP, NIST CSF, CSA CCM, and IoT SF Security Guidelines. Skills: security features implementation,cybersecurity,security,regulations,security processes,system engineering,isa,auditing,iec 62443,product development,iso 27001 Show more Show less
Posted 1 week ago
0 years
0 Lacs
Kolkata, West Bengal, India
On-site
Designing, Implementing, and Managing scalable, Secure, and cost-effective cloud infrastructure solutions using Microsoft Azure. Key Responsibilities : • Cloud Solution Design : Architect end-to-end Azure IaaS solutions, including virtual machines, networking, storage, and identity services, ensuring alignment with business objectives and technical requirements. • Migration Strategy : Plan and execute the migration of on-premises infrastructure to Azure, minimizing downtime and ensuring data integrity. • Automation & Infrastructure as Code (IaC) : Utilize tools like Terraform, ARM templates, and Azure CLI to automate infrastructure provisioning and Management. • Security & Compliance : Implement Azure security features such as Azure Active Directory, Network Security Groups, and Azure Firewall to protect infrastructure and ensure compliance with industry standards. • Performance Optimization : Monitor and optimize Azure resources for performance and cost-efficiency, ensuring workloads run smoothly and within Budget. • Collaboration & Leadership : Work closely with development, operations, and security teams to align Azure solutions with business needs, providing technical leadership throughout the project lifecycle. • Documentation & Training : Develop comprehensive architectural documentation and provide training to teams on Azure best practices, cloud adoption strategies, and security. Required Skills : • Technical Expertise : Proficiency in Azure IaaS services (e.g., Virtual Machines, Virtual Networks, Load Balancers) and PaaS offerings (e.g., Azure App Services, Azure Functions). • Networking Knowledge : Strong understanding of networking concepts such as IP addressing, routing, VPNs, and DNS within the Azure environment. • Scripting & Automation : Experience with scripting languages (e.g., PowerShell, Python) and automation tools like Terraform, ARM templates, and Azure DevOps. • Security & Compliance : Experience in implementing security measures and ensuring compliance with standards like HIPAA, SOC2, or NIST. • Monitoring & Troubleshooting : Familiarity with Azure monitoring tools (e.g., Azure Monitor, Log Analytics) and performance tuning techniques. Show more Show less
Posted 1 week ago
7.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Manager - Information Security (Governance, Risk & Compliance) Location: Bengaluru About the Team At Navi, the InfoSec team safeguards our digital ecosystem - ensuring the confidentiality, integrity, and availability of critical systems and data. We lead the charge on information security risk management, regulatory compliance, and data protection, while championing a security-first culture across all teams. Our mission: Protect what powers Navi - securely, compliantly, and confidently. About the Role As Manager – Information Security (GRC), you will lead Navi’s Information security governance, risk, and compliance efforts across the group. You’ll ensure alignment with RBI, IRDAI, SEBI, and global security standards by shaping policy, driving audit readiness, and embedding secure practices across tech, product, and infrastructure. This role combines regulatory depth, technical oversight, and cross-functional collaboration to minimize risk and strengthen Navi’s security posture in a fast-paced, regulated environment. What We Expect From You As Navi operates in the regulatory space, this role requires interpreting and helping implement regulations related to cyber security by Reserve Bank of India (RBI), IRDAI and SEBI, as well as any other applicable regulatory guidance related to the service offerings issued by relevant institutions. Further to the point above, ensure on-going monitoring and tech-compliance with existing regulatory expectations across these dimensions Lead the Information security - GRC practice for Navi group level. Ensuring that information security principles, policies, frameworks, standards and controls are defined, implemented and managed effectively. Partner and collaborate extensively with cross-functional teams, such as Engineering, Infrastructure, IT, Legal, and help minimize information security risks Architect and deliberate on the solutions that are compliant with relevant regulatory cybersecurity requirements Conduct and review results of Technology Risk Assessment, recommending mitigation strategies to bring the Risk to appropriate levels Nav is looking for a Senior Manager Information Security (GRC) to be part of the information security Ensure readiness of the organization for internal and external audits by keeping all documents, evidences, ready If required, represent Navi in Board and Board Committee meetings, as well as in discussions with regulators Conduct Security awareness programs, train personnel on data security & privacy related processes and responsibilities Review / conduct Third Party Risk Assessments & Vendor assessments before onboarding Review security solutions / controls implemented by Tech / Engineering teams, controls at data center, cyber / information security incidents, IT BCP and DR drills, cloud security controls Identify and define Security KPIs including weekly, monthly reports and update Security Dashboards Must Haves Minimum 7+ years of experience working in information security GRC Prior experience in the Fintech/Startup industry and knowledge of one of the regulatory compliances like PCI DSS, RBI Master Directives, IRDA, SEBI cyber security guideline is preferred. Hands-on approach in solving complex security problems Experience with Information Security & Risk Management frameworks like ISO27001, NIST SP 800-37, etc Cyber Kill Chain, MITRE ATT&CK, or other relevant frameworks Working knowledge of Cloud environments like AWS, GCP, Oracle cloud is beneficial Exposure to Agile methodologies, DevOps, Cloud technologies is beneficial Soft Skills Ability to multitask and meet deadlines, and to prioritize in a highly dynamic work environment Ability to balance risk, potential impact, resourcing, business drivers, and timelines Excellent verbal and written communication skills Strong Product Thinking Strong problem solving Business acumen Technology grounding Strategic thinking Strong written and verbal communication skills with a talent for articulating. Inside Navi We are shaping the future of financial services for a billion Indians through products that are simple, accessible, and affordable. From Personal & Home Loans to UPI, Insurance, Mutual Funds, and Gold - we’re building tech-first solutions that work at scale, with a strong customer-first approach. Founded by Sachin Bansal & Ankit Agarwal in 2018, we are one of India’s fastest-growing financial services organisations. But we’re just getting started! Our Culture The Navi DNA Ambition. Perseverance. Self-awareness. Ownership. Integrity. We’re looking for people who dream big when it comes to innovation. At Navi, you’ll be empowered with the right mechanisms to work in a dynamic team that builds and improves innovative solutions. If you’re driven to deliver real value to customers, no matter the challenge, this is the place for you. We chase excellence by uplifting each other and that starts with every one of us. Why You'll Thrive at Navi At Navi, it’s about how you think, build, and grow. You’ll thrive here if: You’re impact-driven : You take ownership, build boldly, and care about making a real difference. You strive for excellence : Good isn’t good enough. You bring focus, precision, and a passion for quality. You embrace change : You adapt quickly, move fast, and always put the customer first. Show more Show less
Posted 1 week ago
12.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
This role is for one of the Weekday's clients Min Experience: 12 years Location: mumbai, Bengaluru JobType: full-time We are seeking a highly experienced and knowledgeable Director - Data Privacy and Law to lead our organization's global privacy and compliance strategy. This senior leadership role is pivotal in shaping, implementing, and overseeing the company's data privacy policies and ensuring full compliance with international and local regulations including GDPR, PIPL, and applicable data protection acts. The ideal candidate will have a deep understanding of privacy frameworks, regulatory expectations, and a passion for building trustworthy data governance practices. Requirements Key Responsibilities: Strategic Privacy Leadership: Lead the design, development, and implementation of the company's global data privacy and compliance strategy. Advise executive leadership on evolving data privacy laws and potential impacts to business operations across jurisdictions. Policy Development & Governance: Draft, review, and maintain internal privacy policies and procedures ensuring alignment with global standards such as GDPR, PIPL, and other data protection acts. Develop comprehensive privacy notices and manage updates based on regulatory changes or business expansion. Compliance & Risk Management: Conduct Privacy Impact Assessments (PIAs) and Data Protection Impact Assessments (DPIAs) for new and existing projects. Lead privacy audits and gap assessments in accordance with NIST, ISO/IEC 27701, and other relevant frameworks. Develop controls to mitigate privacy risks and monitor their effectiveness regularly. Regulatory Engagement & Training: Liaise with Data Protection Authorities and other regulators on matters related to privacy incidents, compliance inquiries, and reporting obligations. Oversee privacy training and awareness programs across all levels of the organization to foster a culture of compliance. Incident Response & Data Breach Management: Lead the organization's response to data breaches or security incidents involving personal data, ensuring timely containment, assessment, and notification as required by law. Maintain and test data breach protocols and readiness on a regular basis. Key Skills & Qualifications: 12-20 years of experience in legal, compliance, or privacy roles with strong exposure to data privacy and protection laws. In-depth knowledge of global privacy laws and regulations including GDPR (EU), PIPL (China), CCPA, and other regional data protection acts. Demonstrated experience in leading privacy assessments, drafting privacy policies, and managing privacy programs. Strong understanding of industry-standard privacy frameworks such as NIST Privacy Framework, ISO/IEC 27001/27701. Certification from the International Association of Privacy Professionals (IAPP) such as CIPP/E, CIPP/US, or CIPM is highly preferred. Proven ability to partner with cross-functional teams including Legal, IT, Security, HR, and Product. Excellent communication, stakeholder management, and leadership skills. Bachelor's degree in Law, Compliance, Cybersecurity, or related fields. Advanced degree (JD/LLM) is a plus Show more Show less
Posted 1 week ago
8.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Senior System Administrator Location: Pune, Maharashtra, India Onit, Inc. is seeking a Senior Systems Administrator to manage and optimize a diverse global IT cloud infrastructure. The role focuses on Microsoft 365, Entra ID, SSO, Exchange administration, Email Security (Mimecast), and IT governance while contributing to cross-functional initiatives. Key Responsibilities: Microsoft 365 & Exchange Administration: Manage user accounts, licensing, permissions, and roles across multiple M365 tenants. Manage Exchange Online mail flow, retention policies, and security measures (Mimecast). Implement security protocols like MFA, Conditional Access, and threat management. Migrate and Manage One Drive, SharePoint and MS Teams. Ensure compliance with regulations (e.g., GDPR) and manage eDiscovery and audit logs. Platform Optimization: Monitor platform performance and usage, recommend cost-saving optimizations. Develop governance policies and stay updated on the Microsoft roadmap. Backup, Recovery, and Security: Configure backup solutions and update disaster recovery plans. Utilize Mimecast for filtering, encryption, archiving, and continuity. IT Infrastructure Support: Manage hosting, domain, and Cloudflare. Collaborate on AWS infrastructure projects. Required Skills: 8+ years as Global Admin for M365, Entra ID & Exchange administration, including automation and migrations. Proficiency in PowerShell for scripting and administration. Expertise in email security (Mimecast), protocols (SMTP, POP3, IMAP) & Security Standards (SPF, DKIM, DMARC) Experience with Azure AD, IAM, and compliance frameworks (NIST, GDPR, ISO 27001). Knowledge of CrowdStrike, Cloudflare, and Zero-Trust principles. Preferred Certifications: MS-102: Microsoft 365 Administrator Microsoft 365 Certified : Messaging Administrator Associate SC-300: Microsoft Identity and Access Administrator About Onit: Onit is a global leader in enterprise workflow solutions, transforming business processes in Legal, IT, HR, and Finance with cutting-edge platforms and smarter workflows. Show more Show less
Posted 1 week ago
6.0 - 10.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
At Cadence, we hire and develop leaders and innovators who want to make an impact on the world of technology. Position: Sr. Information Security Analyst Grade: IT3 Location: Noida/Bangalore Job Description Key Responsibilities Led and implement security architecture and solutions to safeguard enterprise systems, networks, and data. Conduct vulnerability assessments, penetration testing, and risk assessments to identify and mitigate security threats. Develop and enforce security policies, procedures, and best practices to ensure compliance with internal standards and industry regulations. Collaborate with cross-functional teams to design secure systems and provide guidance on secure coding practices and vulnerability management. Continuously monitor the security landscape for new threats and ensure proactive defense mechanisms are in place. Required Skills & Qualification Hands-on experience in securing corporate environment. Hands-on experience in security frameworks (NIST, ISO 27001, CIS) and experience with risk management and compliance Hands-on experience securing Windows (Workstations and Servers), Linux (Workstations and Servers), and Mac Hands-on experience conducting risk management by identifying gaps and providing strategies for mitigation. Hands-on experience documenting vulnerability assessment results in a clear and actionable format. Expertise in network security, firewalls, IDS/IPS, and security monitoring tools such as SIEM Proficiency with cloud security technologies (AWS, Azure, GCP) and securing cloud-based infrastructure. Experience with incident response, forensics, and managing security incidents from detection to resolution. Determines security violations and inefficiencies. Knowledge of mergers and acquisitions Experience Should have relevant experience of at least 6-10 years. Qualification Engineering (Computers, Electronics, IT) or equivalent We’re doing work that matters. Help us solve what others can’t. Show more Show less
Posted 1 week ago
12.0 years
0 Lacs
Mumbai Metropolitan Region
On-site
This role is for one of the Weekday's clients Min Experience: 12 years Location: mumbai, Bengaluru JobType: full-time We are seeking a highly experienced and knowledgeable Director - Data Privacy and Law to lead our organization's global privacy and compliance strategy. This senior leadership role is pivotal in shaping, implementing, and overseeing the company's data privacy policies and ensuring full compliance with international and local regulations including GDPR, PIPL, and applicable data protection acts. The ideal candidate will have a deep understanding of privacy frameworks, regulatory expectations, and a passion for building trustworthy data governance practices. Requirements Key Responsibilities: Strategic Privacy Leadership: Lead the design, development, and implementation of the company's global data privacy and compliance strategy. Advise executive leadership on evolving data privacy laws and potential impacts to business operations across jurisdictions. Policy Development & Governance: Draft, review, and maintain internal privacy policies and procedures ensuring alignment with global standards such as GDPR, PIPL, and other data protection acts. Develop comprehensive privacy notices and manage updates based on regulatory changes or business expansion. Compliance & Risk Management: Conduct Privacy Impact Assessments (PIAs) and Data Protection Impact Assessments (DPIAs) for new and existing projects. Lead privacy audits and gap assessments in accordance with NIST, ISO/IEC 27701, and other relevant frameworks. Develop controls to mitigate privacy risks and monitor their effectiveness regularly. Regulatory Engagement & Training: Liaise with Data Protection Authorities and other regulators on matters related to privacy incidents, compliance inquiries, and reporting obligations. Oversee privacy training and awareness programs across all levels of the organization to foster a culture of compliance. Incident Response & Data Breach Management: Lead the organization's response to data breaches or security incidents involving personal data, ensuring timely containment, assessment, and notification as required by law. Maintain and test data breach protocols and readiness on a regular basis. Key Skills & Qualifications: 12-20 years of experience in legal, compliance, or privacy roles with strong exposure to data privacy and protection laws. In-depth knowledge of global privacy laws and regulations including GDPR (EU), PIPL (China), CCPA, and other regional data protection acts. Demonstrated experience in leading privacy assessments, drafting privacy policies, and managing privacy programs. Strong understanding of industry-standard privacy frameworks such as NIST Privacy Framework, ISO/IEC 27001/27701. Certification from the International Association of Privacy Professionals (IAPP) such as CIPP/E, CIPP/US, or CIPM is highly preferred. Proven ability to partner with cross-functional teams including Legal, IT, Security, HR, and Product. Excellent communication, stakeholder management, and leadership skills. Bachelor's degree in Law, Compliance, Cybersecurity, or related fields. Advanced degree (JD/LLM) is a plus Show more Show less
Posted 1 week ago
6.0 - 8.0 years
0 Lacs
Pune, Maharashtra, India
On-site
The Senior InfoSec Compliance Analyst will play a pivotal role in ensuring that Onit adheres to industry standards and regulatory requirements. This position involves analyzing, implementing, and maintaining compliance protocols, collaborating with internal teams, and providing strategic insights to enhance our security posture. Responsibilities: Lead the planning and execution of security audits (e.g., ISO 27001, SOC 2, PCI DSS, HIPAA, NIST, GDPR). Assess, implement, and maintain new compliance frameworks or controls, leading cross-functional projects for certifications or attestations (e.g., achieving new levels of SOC 2, ISO 27001, or industry-specific standards). Lead compliance-related projects, including process improvements, tool implementations (e.g., GRC platforms), and policy roll-outs. Oversee and coordinate penetration testing activities and manage third-party penetration testing vendors. Complete and manage responses to customer security and privacy questionnaires, providing evidence of controls to support sales. Perform risk assessments; document findings and collaborate with stakeholders to mitigate risks. Develop, review, and maintain security policies, procedures, and standards. Serve as the point of contact for compliance-related incidents and inquiries, conducting investigations and documenting findings. Support vendor management by performing third-party security assessments Mentor and coach junior analysts, promoting a team culture of knowledge-sharing and professional growth. Qualifications/Skills Bachelor’s degree in Information Security, Computer Science, or a related field. Minimum of 6-8 years of experience in years of experience in information security compliance, risk management, or IT audit. Proven experience managing and implementing major compliance frameworks (e.g., ISO 27001, SOC 2, NIST, PCI DSS, HIPAA, GDPR, etc.). Hands-on experience with penetration testing oversight and third-party risk assessments. Track record of leading or participating in successful compliance audits, certifications, and attestation projects. Experience managing multiple compliance projects and initiatives simultaneously. Ability to lead cross-functional teams and work collaboratively across departments. Self-motivated and proactive, with strong organizational and time-management skills. Strong analytical, investigative, and problem-solving skills. Strong written and verbal communication skills. Audit experience working with Enterprise SaaS software is a plus. Auditing knowledge of AWS and cloud infrastructures a plus. Professional certifications such as CISA, CISSP, or similar strongly desired. About Onit Onit is a global leader in enterprise workflow solutions for legal, compliance, sales, IT, HR, and finance departments. With Onit, companies can transform best practices into smarter workflows, better processes, and operational efficiencies. Onit focuses on enterprise legal management, matter management, spend management, contract lifecycle management, and legal holds, transforming how global Fortune 500 companies and corporate legal departments bridge the gap between systems of record and systems of engagement. Show more Show less
Posted 1 week ago
12.0 - 20.0 years
2 - 8 Lacs
Bengaluru / Bangalore, Karnataka, India
On-site
This role is for one of the Weekday's clients Min Experience: 12 years Location: mumbai, Bengaluru JobType: full-time We are seeking a highly experienced and knowledgeable Director Data Privacy and Law to lead our organization's global privacy and compliance strategy. This senior leadership role is pivotal in shaping, implementing, and overseeing the company's data privacy policies and ensuring full compliance with international and local regulations including GDPR, PIPL, and applicable data protection acts. The ideal candidate will have a deep understanding of privacy frameworks, regulatory expectations, and a passion for building trustworthy data governance practices. Requirements Key Responsibilities: Strategic Privacy Leadership: Lead the design, development, and implementation of the company's global data privacy and compliance strategy. Advise executive leadership on evolving data privacy laws and potential impacts to business operations across jurisdictions. Policy Development & Governance: Draft, review, and maintain internal privacy policies and procedures ensuring alignment with global standards such as GDPR, PIPL, and other data protection acts. Develop comprehensive privacy notices and manage updates based on regulatory changes or business expansion. Compliance & Risk Management: Conduct Privacy Impact Assessments (PIAs) and Data Protection Impact Assessments (DPIAs) for new and existing projects. Lead privacy audits and gap assessments in accordance with NIST, ISO/IEC 27701, and other relevant frameworks. Develop controls to mitigate privacy risks and monitor their effectiveness regularly. Regulatory Engagement & Training: Liaise with Data Protection Authorities and other regulators on matters related to privacy incidents, compliance inquiries, and reporting obligations. Oversee privacy training and awareness programs across all levels of the organization to foster a culture of compliance. Incident Response & Data Breach Management: Lead the organization's response to data breaches or security incidents involving personal data, ensuring timely containment, assessment, and notification as required by law. Maintain and test data breach protocols and readiness on a regular basis. Key Skills & Qualifications: 1220 years of experience in legal, compliance, or privacy roles with strong exposure to data privacy and protection laws. In-depth knowledge of global privacy laws and regulations including GDPR (EU), PIPL (China), CCPA, and other regional data protection acts. Demonstrated experience in leading privacy assessments, drafting privacy policies, and managing privacy programs. Strong understanding of industry-standard privacy frameworks such as NIST Privacy Framework, ISO/IEC 27001/27701. Certification from theInternational Association of Privacy Professionals (IAPP)such as CIPP/E, CIPP/US, or CIPM is highly preferred. Proven ability to partner with cross-functional teams including Legal, IT, Security, HR, and Product. Excellent communication, stakeholder management, and leadership skills. Bachelor's degree in Law, Compliance, Cybersecurity, or related fields. Advanced degree (JD/LLM) is a plus.
Posted 1 week ago
8.0 years
0 Lacs
Navi Mumbai, Maharashtra, India
On-site
Dear Candidates , Currently we are looking for Cybersecurity Architect – InfoSec & Data Privacy. Profile- Cybersecurity Architect – InfoSec & Data Privacy Exp- 8 to 10 Years Segment: - Banking Job Location: - Mumbai (Navi Mumbai) JD Below:- - Job Summary - We are seeking a highly skilled Cybersecurity Architect with a strong background in Information Security and Data Privacy to lead the design and implementation of secure systems and infrastructure. This role involves working closely with cross-functional teams to ensure the confidentiality, integrity, and availability of enterprise information systems while maintaining compliance with relevant data protection regulations (e.g., GDPR, CCPA, HIPAA). Key Responsibilities: - Security Architecture Design: Design and implement secure systems, networks, and application architectures across cloud and on-premises environments. Privacy-by-Design: Integrate privacy principles and data protection controls into systems architecture from inception through implementation. Risk Management: Conduct threat modeling, risk assessments, and vulnerability analyses to identify and mitigate potential security and privacy risks. Regulatory Compliance: Ensure architectural solutions support compliance with relevant frameworks and regulations (e.g., ISO 27001, NIST, SOC 2, GDPR, CCPA). Security Governance: Define security standards, reference architectures, and best practices for development, IT, and DevSecOps teams. Technical Leadership: Serve as a security thought leader and advisor to engineering, legal, product, and business teams on security and privacy requirements. Tooling & Automation: Evaluate and implement security tools and automation to enforce policies, detect anomalies, and enhance operational efficiency. Incident Response Support: Participate in investigations and remediation planning in the event of a data breach or security incident. - Qualifications: - Bachelor’s or Master’s degree in Computer Science, Cybersecurity, Information Systems, or a related field. 8+ years of experience in information security, with at least 3 years in a cybersecurity architecture role Proven experience with cloud platforms (AWS, Azure, GCP) and securing cloud-native architectures. Strong understanding of data privacy principles and security technologies. Ability to manage multiple priorities and deliver in a fast-paced environment. Mandatory exposure to RBI regulatory guidelines and SOX audit requirements. Apply Here:- https://lnkd.in/ggKu52H3 Share your CV on mahi.namdev@vservit.com Phone No:-7017311856 Show more Show less
Posted 1 week ago
3.0 - 4.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
About BU: At the heart of everything we do is data and this team. Our premium data assets empower the team to drive desirable outcomes for leading brands across industries. Armed with high volumes of transactional data, digital expertise and unmatched data quality, the team plays a key role in improving all our product offerings. Our data artisans are keen on embracing the latest in technology and trends, so there’s always room to grow and something new to learn here. Why we are looking for you: At Epsilon, we run on our people’s ideas. It’s how we solve problems and exceed expectations. Our team is now growing, and we are on the lookout for an experienced candidate with a strong background in Veracode and Cybersecurity to join our team. The ideal candidate will be responsible for working with Application Security team, conducting vulnerability assessments, and implementing security best practices to safeguard applications and systems. What you will enjoy in this role: Assist Program Manager with day-to-day activities. Monitor static (SAST), dynamic (DAST), and software composition analysis (SCA) using Veracode. Analyze scan results, prioritize vulnerabilities, and collaborate with development teams for remediation. Implement and integrate application security best practices into the SDLC (Secure Development Lifecycle). Provide guidance and training to development teams on secure coding practices. Stay up to date with emerging security threats, vulnerabilities, and industry trends. Work with DevOps teams to integrate security tools into CI/CD pipelines. Support compliance and regulatory requirements (such as OWASP, ISO 27001, NIST, etc.). Work closely with stakeholders and corporate teams (App Sec, Product, Audit, and STS) to track, report and follow up compliance initiatives. Track publish and distribute weekly, monthly, and quarterly reports on Veracode compliance and the status of critical vulnerabilities. Click here to view how Epsilon transforms marketing with 1 View, 1 Vision and 1 Voice. Responsibilities What you will do: 3 to 4 years of experience in Application Security and Cybersecurity. Hands-on experience with Veracode for SAST, DAST, and SCA. Strong understanding of secure coding practices, OWASP Top 10, and CWE vulnerabilities. Experience with DevSecOps tools and security automation. Proficiency in at least one programming language (e.g., Java, Python, JavaScript, C#). Familiarity with cloud security concepts (AWS, Azure, or GCP). Strong analytical and problem-solving skills. Good communication skills to work with cross-functional teams. Expert skills in using Microsoft/equivalent tools: Word, Excel, Power Point, Project. Prior experience in any areas of GDPR, CCPA, Privacy, Information Security, Compliance, Risk and regulatory is an advantage. Hands on experience on OneTrust tool is a great advantage. Qualifications A bachelor’s degree or higher with 3-8 years of experience in Cybersecurity. Certifications such as CEH, CISSP, or Veracode Security Certification is preferred. Show more Show less
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The job market for NIST (National Institute of Standards and Technology) professionals in India is rapidly growing. As more companies focus on cybersecurity and data protection, the demand for individuals skilled in NIST guidelines and frameworks is on the rise. Job seekers with expertise in NIST can find a variety of opportunities across different industries in India.
These cities are known for their thriving tech industries and have a high demand for NIST professionals.
The average salary range for NIST professionals in India varies based on experience level. Entry-level positions may start around INR 4-6 lakhs per year, while experienced professionals can earn upwards of INR 15-20 lakhs per year.
In the field of NIST, a typical career path may include roles such as NIST Analyst, NIST Consultant, and NIST Manager. As professionals gain more experience and expertise, they can progress to Senior NIST Consultant, NIST Architect, and even Chief Information Security Officer (CISO).
In addition to expertise in NIST, employers often look for professionals with the following related skills: - Cybersecurity - Risk management - Compliance - Information security - Security frameworks (e.g., ISO 27001)
As you explore opportunities in the NIST job market in India, remember to showcase your expertise, stay updated with industry trends, and prepare thoroughly for interviews. With the right skills and preparation, you can confidently pursue a successful career in NIST in India. Best of luck!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.