Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 years
0 Lacs
Gurgaon Rural, Haryana, India
On-site
Job Title: Security Test Engineer / Application Security Analyst Key Responsibilities Perform comprehensive vulnerability assessments and penetration testing, including tests for CSRF, XSS, SQL Injection, and other OWASP Top 10 vulnerabilities. Conduct Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) on applications and APIs. Use security tools such as ZAP Proxy, Trivy, Burp Suite, Nikto, etc., to detect and validate vulnerabilities. Develop and execute test plans and test cases aligned with security frameworks and standards (e.g., OWASP, NIST). Collaborate with cross-functional teams to integrate security testing into CI/CD pipelines. Participate in bug triage and root cause analysis for identified vulnerabilities. Analyze application logs and system behavior to detect anomalies and trace potential threats. Review and evaluate security policies, propose improvements, and assist in ensuring policy enforcement. Maintain documentation related to security findings, test cases, and remediation guidance. Required Qualifications Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or related field. 5 + years of experience in security testing, vulnerability scanning, and application hardening. Strong understanding of web application security principles and secure coding practices. Hands-on experience with ZAP Proxy, Trivy, and/or similar tools. Familiarity with SAST/DAST tools and techniques. Knowledge of network and application-layer protocols and attacks. Solid understanding of bug triage processes and tracking systems like JIRA or Bugzilla. Strong analytical and problem-solving skills, with attention to detail. Skills: nikto,zap testing,sql injection,proxy,vulnerability,bug triage,penetration testing,vulnerability assessments,testing,analytical skills,root cause analysis,trivy,problem-solving skills,security frameworks,test cases,dynamic application security testing (dast),zap proxy,security policies,ci/cd pipelines,burp suite,static application security testing (sast) Show more Show less
Posted 1 week ago
0 years
0 Lacs
Mulshi, Maharashtra, India
On-site
Area(s) of responsibility Job Title: SME - CyberArk Job Description: We are looking for an experienced and dedicated CyberArk Architect to design, implement, and manage comprehensive CyberArk solutions. The successful candidate will be responsible for the end-to-end deployment of CyberArk Privileged Access Management (PAM) solutions, ensuring secure and efficient management of privileged accounts and access. Key Responsibilities Lead the design and architecture of CyberArk PAM solutions, ensuring alignment with business and security requirements. Plan and execute the end-to-end implementation of CyberArk solutions, including installation, configuration, and integration with existing systems. Develop and maintain CyberArk policies, procedures, and best practices. Conduct risk assessments and security audits to identify potential vulnerabilities and recommend mitigation strategies. Collaborate with cross-functional teams, including IT, security, and compliance, to ensure successful deployment and integration of CyberArk solutions. Provide technical leadership and guidance to junior team members and stakeholders. Monitor and maintain the health and performance of the CyberArk environment, ensuring optimal functionality and security. Stay current with the latest CyberArk technologies, features, and industry trends, and provide recommendations for continuous improvement. Qualifications Bachelor's degree in Computer Science, Information Security, or a related field. Master's degree preferred. Experience in cybersecurity, with a focus on Privileged Access Management (PAM) solutions. Proven experience in designing, implementing, and managing CyberArk solutions from scratch. Strong knowledge of CyberArk components, including the Enterprise Password Vault (EPV), Central Policy Manager (CPM), Privileged Session Manager (PSM), and more. Experience with security frameworks and standards such as NIST, ISO 27001, and CIS Controls. Proficiency in scripting and automation using tools such as PowerShell, Python, or similar. Excellent problem-solving skills and the ability to think strategically about security challenges. Strong communication and interpersonal skills, with the ability to work effectively with diverse teams and stakeholders. Certified in CyberArk Guardian. Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Job Title: Security Test Engineer / Application Security Analyst Key Responsibilities Perform comprehensive vulnerability assessments and penetration testing, including tests for CSRF, XSS, SQL Injection, and other OWASP Top 10 vulnerabilities. Conduct Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) on applications and APIs. Use security tools such as ZAP Proxy, Trivy, Burp Suite, Nikto, etc., to detect and validate vulnerabilities. Develop and execute test plans and test cases aligned with security frameworks and standards (e.g., OWASP, NIST). Collaborate with cross-functional teams to integrate security testing into CI/CD pipelines. Participate in bug triage and root cause analysis for identified vulnerabilities. Analyze application logs and system behavior to detect anomalies and trace potential threats. Review and evaluate security policies, propose improvements, and assist in ensuring policy enforcement. Maintain documentation related to security findings, test cases, and remediation guidance. Required Qualifications Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or related field. 5 + years of experience in security testing, vulnerability scanning, and application hardening. Strong understanding of web application security principles and secure coding practices. Hands-on experience with ZAP Proxy, Trivy, and/or similar tools. Familiarity with SAST/DAST tools and techniques. Knowledge of network and application-layer protocols and attacks. Solid understanding of bug triage processes and tracking systems like JIRA or Bugzilla. Strong analytical and problem-solving skills, with attention to detail. Skills: nikto,zap testing,sql injection,proxy,vulnerability,bug triage,penetration testing,vulnerability assessments,testing,analytical skills,root cause analysis,trivy,problem-solving skills,security frameworks,test cases,dynamic application security testing (dast),zap proxy,security policies,ci/cd pipelines,burp suite,static application security testing (sast) Show more Show less
Posted 1 week ago
8.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Role: Senior Security Specialist Location : Bangalore Working Model : Hybrid Final Round Interview : F2F Summary of essential job functions The overall responsibility of the team is to provide assurance to the management on the Information Security, Compliance and Risk Management of the organization globally. The candidate would be expected to lead security assessments of Products and Infrastructure globally. Education, Certification and Experience: Qualification Required: Bachelor/Master’s degree in Computer/ Information science, Software Engineering, Cybersecurity, or a related field Certification preferred: OSCP, OSWE, OSEP, ECSA|LPT, CPT, CEH Minimum experience: 08-10 years in Vulnerability Assessment and Penetration Testing- Thin & Thick Client, API , Infrastructure, Cloud, Mobile Competency Requirements: Performs a combination of duties in accordance with departmental guidelines: Hands-on experience in Vulnerability Assessment (VA) and Penetration Testing (PT) for Web, APIs, AI/ML models, Mobile , Network, and Infrastructure. Strong command of OWASP Top 10 with practical knowledge of attack vectors and mitigation strategies. Familiarity with industry standards and frameworks such as OSSTMM, OQASP, CESG, CREST, NIST, ISSAF, and PTES. Expertise in Secure Development Lifecycle (SDLC), including Threat Modeling, Secure Coding Practices, and Security Assessments. Proficient in both Static and Dynamic Application Security Testing (SAST, DAST, IAST), and Software Composition Analysis (SCA). Experience conducting secure code reviews and identifying logic flaws in code bases written in Java, .NET, C/C++, Python, etc. Knowledge of cryptographic protocols, secure communication, data security and key management. Hands-on with commercial and open-source tools: Burp Suite, OWASP ZAP, Acunetix, AppSpider,SQLMap, Nmap, Metasploit, Nessus, OpenVAS, Fortify, Checkmarx, Veracode, SonarQube, NexusIQ and Snyk. Proficient in assessing mobile applications (thick/hybrid clients) using tools like Dex2jar, ADB, Frida. Exposure to AuthN/AuthZ protocols such as OAuth, SAML, OIDC; ability to read, write, and interpret application logic. Familiarity with vulnerability standards: CVSS, CVE, CWE, CAPEC; and patch management lifecycle. Experience automating tasks via shell scripting and Python/Ruby/Php etc. Proficiency in secure code development and reviewing DAST/SAST reports across languages. Understanding security aspects in AWS, Azure, and GCP including IAM, VPC/VNet, S3/Blob storage, API gateway, Load Balancers, WAF, Containers (Docker), and Kubernetes. Experience in infrastructure/network penetration testing and exploitation techniques on Windows/Linux environments. Experience in mentoring, leading teams, and managing security assessments under tight deadlines. Manage third-party security assessments, including vendor risk evaluations, engagement oversight, and ensuring compliance with organizational security standards. Proven ability to provide technical oversight and drive engagement quality across security projects. Exposure to agile/scrum development methodologies and ability to work with cross-functional teams. Familiarity with security standards like PCI DSS, SOC, ISO 27001. Participation in bug bounty program and CTFs is a strong plus. Proactive learning approach, staying updated with evolving cybersecurity trends and technologies. Job Responsibilities: Plan, conduct, and close end-to-end Vulnerability Assessments and Penetration Tests for Web Applications, APIs, Mobile Apps, Thick Clients, Infrastructure, and Cloud environments. Perform both manual and automated security assessments to identify, validate, and prioritize vulnerabilities. Review application code in various programming languages and provide actionable remediation recommendations. Reproduce reported vulnerabilities with proof-of-concept (PoC) and assess associated risks. Evaluate new security tools and products for adoption and integration. Guide development teams on Secure Coding standards and OWASP-aligned practices. Lead and contribute to secure SDLC processes, threat modeling workshops, and risk reviews. Manage and triage security bugs from Bug Bounty programs, working closely with engineering teams to ensure timely resolution. Maintain and improve the security posture of applications across business units, aligning with best practices. Act as a security advisor on project teams, influencing architecture and design decisions. Drive security awareness initiatives and conduct training sessions for developers and QA teams. Update and maintain InfoSec policies and procedures in line with emerging threats, technologies, and compliance requirements; provide support to both internal and external auditors during security assessments and audits. Other Requirements: Strong ethics and understanding of ethics in business and information security. Proficiency in English (both written and oral communication skills). Ability to complete tasks and deliver professionally written reports for clients. Ability to present findings to technical staff and executives. Ability to interact with 247 internal stakeholders to review their requirements. Should be able to think “out of the box” and implement new attack vectors. Self-motivated, curious, knowledgeable pertaining to news and current events Show more Show less
Posted 1 week ago
125.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
FC Global Services India LLP (First Citizens India), a part of First Citizens BancShares, Inc., a top 20 U.S. financial institution, is a global capability center (GCC) based in Bengaluru. Our India-based teams benefit from the company’s over 125-year legacy of strength and stability. First Citizens India is responsible for delivering value and managing risks for our lines of business. We are particularly proud of our strong, relationship-driven culture and our long-term approach, which are deeply ingrained in our talented workforce. This is evident across all key areas of our operations, including Technology, Enterprise Operations, Finance, Cybersecurity, Risk Management, and Credit Administration. We are seeking talented individuals to join us in our mission of providing solutions fit for our clients’ greatest ambitions. Job Description Job Title: Head of Cybersecurity India Location: Bengaluru, India Job Level: L5 Job Category: Managing Director Position Overview First Citizens India, is rapidly expanding its presence in Bengaluru as a strategic extension of global operations. Focused on scaling enterprise and digital support capabilities across business, risk technology, operations, and cybersecurity. This growth aligns with our commitment to delivering secure and compliant services globally. We are looking for a dynamic and experienced Head of Cybersecurity to establish and lead the cybersecurity function. This leader will be responsible for building a world-class team that supports enterprise cybersecurity operations for the US while also driving security governance, compliance, and regulatory readiness for the India entity. The role will serve as a key bridge between global cybersecurity strategy and local execution, ensuring alignment with enterprise policies and evolving Indian regulations. It includes oversight of security operations, risk governance incident response, identity and access management and regulatory engagement. Key Responsibilities Strategic Leadership & Capability Growth Engage with global stakeholders and to drive the development and implementation of cybersecurity strategy. Ensure consistent and transparent communication with global stakeholders, with strong focus on governance, reporting, and issue resolution. Collaborate with global leadership to determine capability buildout in India to support global operations. Hire, lead, and mentor a diverse team of cybersecurity professionals across GRC, Identity & Access, Cloud, and Infrastructure Security. Continuously focus on maturity growth of teams in India in line with best in class global capability centers. Actively support the capability agenda via certifications, learning pathways and career development opportunties. Develop internal capabilities through certifications, learning pathways, and career growth opportunities. Local CISO and Risk, Compliance & Regulatory Management Define and implement the cybersecurity roadmap for First Citizens India entity in line with global standards (NIST, ISO 27001, CIS, Zero Trust) and local regulatory requirements Act as the senior-most security leader in India, representing cybersecurity in board, regulatory, and risk governance forums. Collaborate with the global ECSO team to localize security frameworks and manage cross-border security programs. Own regulatory compliance related to Indian operations (IT Act, DPDP) and support global regulatory needs (SOX, GDPR, GLBA). Build partnerships with industry bodies, regulators, and external stakeholders to stay ahead of compliance and threat landscapes. Operational Security Oversight Create routines and mechanisms to provide delivery and operational oversight for work being done from India team. Lead all aspects of cybersecurity operations including Security Operations Center (SOC), incident response, threat intelligence, endpoint protection, cloud security, and data loss prevention. Ensure robust security monitoring, vulnerability management, and access governance across hybrid infrastructure. Manage audits, compliance activities, risk assessments, and implementation of security tools and controls. Coordinate response and resolution for security incidents and ensure business continuity readiness. India Site Leadership As a key member of the India Leadership Team, shape and support site-wide priorities including capability development, talent strategy, Inclusion and Belonging, employee engagement, and local governance. Represent the Cybersecurity function in cross-functional leadership forums, contributing to the strategic and cultural evolution of First Citizens India. Champion and foster a high-trust, high-performance culture anchored in integrity, resilience, and collaboration. Drive internal awareness and training to embed security-first culture among associates. Team Building & People Leadership Help with India related enterprise risk assessments, vendor risk programs, and third-party security evaluations. Qualifications & Experience Bachelor’s or Master’s degree in Information Security, Computer Science, or related discipline. 18+ years of progressive experience in technology, preferably cybersecurity, including 10+ years in a leadership role. Certifications: CISSP, CISM, or equivalent preferred. Experience in BFSI, global capability centers, or regulated industries with mature risk and control frameworks. Deep expertise in security architecture, endpoint/cloud security, regulatory compliance, SIEM/SOC, and third-party risk. Strong stakeholder management experience with global teams, regulators, and leadership. Experience working in a global matrix organization. Understanding of cybersecurity legal landscape and evolving guidelines. Why Join Us Purpose-Driven Growth: At First Citizens India, you’ll help build the digital and operational foundation of a 125+ year-old U.S. bank that is now scaling globally with purpose and ambition. Leadership Impact: This role is not just operational—it’s strategic. You will directly shape the security culture, infrastructure, and trustworthiness of a growing organization. Innovation & Autonomy: Operate at the forefront of cybersecurity by leveraging modern tools, frameworks, and global partnerships—while influencing key decisions locally. Inclusive & Agile Culture: We foster a collaborative, high-trust culture where differences are embraced, and every leader plays a hands-on role in transformation. Equal Employment Opportunity FC Global Services India LLP (First Citizens India) is an Equal Employment Opportunity Employer. We are committed to fostering an inclusive and accessible environment and prohibit all forms of discrimination on the basis of gender, religion, caste, disability, sexual orientation, economic status or any other characteristics protected by the law. We strive to foster a safe and respectful environment in which all individuals are treated with respect and dignity. Our EEO policy ensures fairness throughout the employee life cycle. Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
India
Remote
Job Title: Penetration Tester Location: Remote Experience Required: 5 Years Employment Type: Full-Time Job Summary: We are seeking a highly skilled and experienced Senior Penetration Tester with 5 years of hands-on experience in offensive security. The ideal candidate will be responsible for conducting advanced security assessments, simulating real-world cyberattacks, and providing actionable recommendations to enhance the organization’s security posture. This role demands deep technical expertise, strong analytical skills, and the ability to communicate effectively with both technical and non-technical stakeholders. Key Responsibilities: Plan, execute, and document black-box, grey-box, and white-box penetration tests across various environments (web apps, networks, APIs, mobile, cloud, etc.) Conduct Red Team/Blue Team exercises and collaborate with threat hunters and SOC teams. Identify, exploit, and report vulnerabilities in systems, applications, and infrastructure. Develop and maintain custom exploitation tools, scripts, and payloads . Perform social engineering engagements , including phishing simulations and physical assessments (where applicable). Provide detailed, risk-based reporting , including technical findings, proof-of-concept exploits, and remediation guidance. Stay current with emerging threats, vulnerabilities, and tools in the cybersecurity domain. Mentor junior team members and contribute to the development of internal testing methodologies and frameworks. Participate in threat modeling, architecture reviews, and security design discussions . Required Skills and Qualifications: 5 years of professional experience in penetration testing, red teaming, or offensive security . Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, Cobalt Strike, Nessus, etc. Deep understanding of OWASP Top 10 , MITRE ATT&CK , and NIST security frameworks . Strong knowledge of network protocols, web application architectures, cloud environments (AWS/Azure/GCP), and secure coding practices. Experience with manual testing techniques and not just automated scanners. Strong scripting and automation skills in Python, PowerShell, Bash, or Go . Experience with Active Directory exploitation , privilege escalation, and lateral movement techniques. Demonstrated ability to write clear, concise, and detailed technical reports. Strong verbal and written communication skills. Preferred Certifications (any of the following): Offensive Security Certified Professional (OSCP) Offensive Security Certified Expert (OSCE) Certified Red Team Professional (CRTP) GIAC Penetration Tester (GPEN) Certified Ethical Hacker (CEH) CREST Registered Tester or equivalent Show more Show less
Posted 1 week ago
7.0 years
0 Lacs
India
On-site
Job Overview As a Senior Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining robust security infrastructures to safeguard the organization's digital assets. You will lead initiatives to identify vulnerabilities, respond to incidents, and ensure compliance with industry standards and regulations. Key Responsibilities Security Architecture & Design: Develop and implement security solutions across IT and engineering environments, including firewalls, SIEM, IDS/IPS, and endpoint protection systems. Incident Response & Forensics: Lead investigations into security breaches, conduct root cause analysis, and develop mitigation strategies. Vulnerability Management: Perform regular vulnerability assessments, penetration testing, and manage patching processes to address potential threats. Security Monitoring: Oversee the deployment and tuning of security monitoring tools, ensuring effective detection and response capabilities. Policy Development: Create and maintain security policies, procedures, and documentation in alignment with industry standards like ISO 27001, NIST, and GDPR. Compliance & Audits: Ensure adherence to regulatory requirements and conduct internal audits to assess security posture. Team Leadership & Mentorship: Guide and mentor junior security engineers, fostering a culture of continuous improvement and learning. Stakeholder Collaboration: Work closely with IT, development, and operations teams to integrate security best practices into all aspects of the organization's infrastructure. Required Qualifications Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Experience: Minimum of 7 years in cybersecurity roles, with a focus on engineering, architecture, and incident response. Technical Skills: Proficiency with security tools such as SIEM (e.g., Splunk, QRadar), firewalls, IDS/IPS, and endpoint protection systems. Strong understanding of network protocols, encryption methods, and secure application development principles. Hands-on experience with cloud security platforms (AWS, Azure, GCP) and containerization technologies (e.g., Docker, Kubernetes). Scripting skills in languages like Python, PowerShell, or Bash for automation and tool integration. Certifications: Industry-recognized certifications such as CISSP, CISM, CEH, or GIAC are highly desirable. Preferred Qualifications Advanced Certifications: OSCP, GIAC Security Essentials (GSEC), Microsoft SC-200, or AZ-500. Specialized Knowledge: Experience with industrial control systems (ICS), OT security, and frameworks like IEC 62443. Analytical Tools: Familiarity with data analytics platforms like Tableau or Power BI for reporting and dashboard creation Show more Show less
Posted 1 week ago
0 years
0 Lacs
Kerala, India
On-site
✅ Mandatory Required Qualifications 🔒 All of the following are mandatory — please apply only if you meet these criteria : Experience in cybersecurity, DevSecOps, or security operations Knowledge of firewalls , IDS/IPS , endpoint protection , and log management Hands-on experience with security incident response and forensic analysis Solid experience in CI/CD pipeline security integration Strong understanding of cloud platforms (AWS, Azure, or GCP) and cloud security best practices Familiarity with tools for: Static/dynamic code analysis Container security scanning Secrets detection Proficiency in Python, Bash, or PowerShell for automation Knowledge of compliance frameworks : SOC2, NIST, PCI-DSS, HIPAA aswathy@velodata.in Show more Show less
Posted 1 week ago
0.0 - 8.0 years
0 Lacs
Gujarat
On-site
Location Gujarat,Maharashtra Ahmedabad,Pune Experience Range 8 - 10 Years Qualification BE (EEE) MCA (Computers) Job Description Senior Information Security Engineer Roles and Responsibilities Candidate will work as a member of the Corporate Security Team and assist in various day to day operational activities such as: Analyze findings from vulnerability scans and penetration tests, work with stakeholders to prioritize and remediate issues. Develop and maintain custom testing scripts and tools to simulate real-world attack scenarios. Oversee security architecture and implement advanced security controls to mitigate identified threats. Conduct email security risk assessments and manage email security solutions (e.g., Proofpoint, Mimecast, Microsoft Defender, Cisco Email Security). Monitor, detect, and respond to phishing, spoofing, and email-based attacks. Manage and tune SIEM, EDR, DLP, and other security technologies. Guide the organization's incident response efforts and participate in forensic investigations. Conduct risk assessments and security reviews for infrastructure and applications, both on-prem and in cloud environments. Ensure compliance with industry regulations and security standards (e.g., ISO 27001, NIST, PCI-DSS, GDPR). Contribute to secure SDLC practices by integrating security into CI/CD pipelines. Support vulnerability lifecycle management and recommend remediation strategies to IT and DevOps teams. Mentor junior staff and drive security awareness programs organization wide. Drive Corporate Security Program based on the NIST CSF – Identify, Detect, Protect, Respond and Recover. Develops, publishes, and maintains a comprehensive organization-wide information privacy and security plans, policies, procedures, and guidelines. Function as primary liaison with auditors, internal teams and vendors and be the resident expert on systems and services in use for PCI compliance and reporting Responsible for managing all aspects of the Vulnerability Risk Management Program including vulnerability identification, analysis, remediation coordination and reporting. Lead the development, implementation, and maintenance of security policies, standards, and guidelines. Identify and Monitor Corporate Networks to determine if there have been any attacks. Analyze network traffic to identify anomalies and test information security controls for weaknesses. Design and implement safeguards to protect the system with the help of network engineers and other members of the Technology Services team. Respond to threats by taking mitigating actions to contain the activity and minimize damage. Participate in risk assessments and breach readiness exercises for incident management. Facilitate forensics analysis to determine the source of the threat. Document lessons learned as well as identify process improvements. Communicate security issues to management via reports, dashboards. Provide weekly metrics on overall security posture. Research emerging threats and work with the Security Operations Center (SOC). Drive the Third-party vendor security evaluation. Participate in the security toll-gates on SSDLC projects. Implement innovative solutions to scale the program with emphasis on automation where applicable. Qualifications Basic Qualifications: Bachelor's Degree in Business, Computer Science or in a STEM major (Science, Technology, Engineering, or Math). Minimum of 8 years of experience in Information Security Experience in at least one full lifecycle supporting PCI compliance is a must have Experience in managing and maintaining a vulnerability management program using Qualys is a must have Experience in developing content in Splunk – searches, alerts (including POC and tuning), dashboards, Apps. Experience of Security Incident and Event Management (SIEM) tools (Splunk) – ingesting data (Forwarders, HTTP Event Collectors, add-ons), troubleshooting Splunk Installation. Experience in Endpoint security (EDR) – Detection and Response. Help create policies and SOP for Response workflow. Experience in Cortex XDR preferred. Experience in Security evaluation of third-party tools. Experience in Email Security and running phishing campaign Experience in Incident Management Experience in system and network security. Experience in Network Penetration testing. Knowledge of software development, computer networks and Internet threat activity. Programming experience in python, Perl and HTML/JS Previous enterprise or platform/cloud vulnerability management experience and Cloud Security is a plus Excellent written and verbal communication skills, including experience engaging with executive and technical audiences. Must be able to work in a fast paced, high profile environment.
Posted 1 week ago
3.0 - 6.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Requisition Id : 1578685 As a global leader in assurance, tax, transaction and advisory services, we hire and develop the most passionate people in their field to help build a better working world. This starts with a culture that believes in giving you the training, opportunities and creative freedom. At EY, we don't just focus on who you are now, but who you can become. We believe that it’s your career and ‘It’s yours to build’ which means potential here is limitless and we'll provide you with motivating and fulfilling experiences throughout your career to help you on the path to becoming your best professional self. The opportunity : Consultant-TMT-Assurance-ASU - TR - Technology Risk - Chennai TMT : Industry convergence offers TMT (Technology, Media & Entertainment, and Telecommunications) organizations the chance to evolve and transform, but it also presents challenges around competitiveness and delivering agile corporate strategies for growth. We help TMT companies create compelling employee and customer experiences, retaining skills and talent while achieving enterprise-wide operational excellence. We help them guard their data, brand and reputation. We also enable the pursuit of M&A strategies that methodically create value, reduce risk and transform TMT companies into powerhouses that will lead the technology revolution of the future – building a better working world for all. ASU - TR - Technology Risk : Assurance’s purpose is to inspire confidence and trust to enable a complex world to work. We do so by protecting and serving the public interest, promoting transparency, supporting investor confidence and economic growth and fostering talent to provide future business leaders. We help clients by: Ensuring their accounts comply with the requisite audit standards Providing a robust and clear perspective to audit committees and Providing critical information for stakeholders. Our Service Offerings include External Audit, Financial Accounting Advisory Services (FAAS), IFRS & US GAAP conversion, IPO and other public offering, Corporate Treasury - IFRS 9 accounting & implementation support etc. Your key responsibilities Technical Excellence Working with clients on SOCR and FAIT (Financial Audit Integration) engagements Sharp focus on ITGC Testing Deep knowledge in OS, Network, DB and ERP control testing Process narrative documentation Deep understanding of Compliance subjects (SOCR, FAIT, NIST, ISO and other Info Sec related compliance requirements) Understanding and performing of Testing methodologies Report writing Teaming skills related to on-site delivery Client interation and expectation management Skills and attributes To qualify for the role you must have Qualification BCOM, BCA, BSC, BE/ B.Tech,, or MSC in Computer Science Experience 3 - 6 years of relevant experience What we look for People with the ability to work in a collaborative manner to provide services across multiple client departments while following the commercial and legal requirements. You will need a practical approach to solving issues and complex problems with the ability to deliver insightful and practical solutions. We look for people who are agile, curious, mindful and able to sustain postivie energy, while being adaptable and creative in their approach. What we offer With more than 200,000 clients, 300,000 people globally and 33,000 people in India, EY has become the strongest brand and the most attractive employer in our field, with market-leading growth over compete. Our people work side-by-side with market-leading entrepreneurs, game- changers, disruptors and visionaries. As an organisation, we are investing more time, technology and money, than ever before in skills and learning for our people. At EY, you will have a personalized Career Journey and also the chance to tap into the resources of our career frameworks to better know about your roles, skills and opportunities. EY is equally committed to being an inclusive employer and we strive to achieve the right balance for our people - enabling us to deliver excellent client service whilst allowing our people to build their career as well as focus on their wellbeing. If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible. Join us in building a better working world. Apply now. Show more Show less
Posted 1 week ago
3.0 - 6.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Risk Consulting - Protect Tech – Senior - IT audit – General skills Key Responsibilities Your key responsibilities will include: Consistently deliver quality client services. Drive high-quality work products within expected timeframes and on budget. Monitor progress manage risk and ensure key stakeholders are kept informed about progress and expected outcomes. Foster relationships with client personnel to analyse, evaluate, and enhance information systems to develop and improve security at procedural and technology levels. Use knowledge of the current IT environment and industry trends to identify engagement and client service issues and communicate this information to the engagement team and client management through written correspondence and verbal presentations. Stay abreast of current business and industry trends relevant to the client's business. Demonstrate deep technical capabilities and professional knowledge. Demonstrate ability to quickly assimilate to new knowledge. Skills And Attributes For Success You will leverage your proven track record of IT Audit experience and strong personal skills, to effectively deliver quality results in the assessment, design, and support implementation of controls, security and IT risk solutions. To qualify for the role, you must have A bachelor’s or master’s degree and approximately 3-6 years of related work experience At least 2-4 years of experience in IT Risk and Compliance Design IT Risk Controls framework such as IT SOX Implementation and Testing of internal controls such as IT general controls, IT application controls, IPE related controls, interface controls etc. Identify control gaps, weaknesses and areas of improvements. Conducting IT internal control reviews, and review of SOC1 or SOC2 reports Knowledge of IT risk, information security or cyber security frameworks such as COSO, COBIT, ISO, NIST etc. IT Compliance and regulatory assessments – IT Risk and Controls assessment with exposure of any of the technologies such as SAP, Oracle, Workday, MS Dynamics or emerging technologies such as Cloud, RPA, AI/ML IT Infrastructure and Architecture risk assessments including data quality and data migration reviews, data privacy reviews, OS DB reviews etc. Strong exposure working in client facing roles, collaborate with cross functional teams including internal audits, IT security and business stakeholders to assess control effectiveness and facilitate remediation activities. Excellent communication, documentation and report writing skills. Good to have relevant industry certifications such as CISA, CISM, CISSP, CRISC, CCSK, ISO 27001, and others (as relevant) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
3.0 - 6.0 years
0 Lacs
Coimbatore, Tamil Nadu, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Risk Consulting - Protect Tech – Senior - IT audit – General skills Key Responsibilities Your key responsibilities will include: Consistently deliver quality client services. Drive high-quality work products within expected timeframes and on budget. Monitor progress manage risk and ensure key stakeholders are kept informed about progress and expected outcomes. Foster relationships with client personnel to analyse, evaluate, and enhance information systems to develop and improve security at procedural and technology levels. Use knowledge of the current IT environment and industry trends to identify engagement and client service issues and communicate this information to the engagement team and client management through written correspondence and verbal presentations. Stay abreast of current business and industry trends relevant to the client's business. Demonstrate deep technical capabilities and professional knowledge. Demonstrate ability to quickly assimilate to new knowledge. Skills And Attributes For Success You will leverage your proven track record of IT Audit experience and strong personal skills, to effectively deliver quality results in the assessment, design, and support implementation of controls, security and IT risk solutions. To qualify for the role, you must have A bachelor’s or master’s degree and approximately 3-6 years of related work experience At least 2-4 years of experience in IT Risk and Compliance Design IT Risk Controls framework such as IT SOX Implementation and Testing of internal controls such as IT general controls, IT application controls, IPE related controls, interface controls etc. Identify control gaps, weaknesses and areas of improvements. Conducting IT internal control reviews, and review of SOC1 or SOC2 reports Knowledge of IT risk, information security or cyber security frameworks such as COSO, COBIT, ISO, NIST etc. IT Compliance and regulatory assessments – IT Risk and Controls assessment with exposure of any of the technologies such as SAP, Oracle, Workday, MS Dynamics or emerging technologies such as Cloud, RPA, AI/ML IT Infrastructure and Architecture risk assessments including data quality and data migration reviews, data privacy reviews, OS DB reviews etc. Strong exposure working in client facing roles, collaborate with cross functional teams including internal audits, IT security and business stakeholders to assess control effectiveness and facilitate remediation activities. Excellent communication, documentation and report writing skills. Good to have relevant industry certifications such as CISA, CISM, CISSP, CRISC, CCSK, ISO 27001, and others (as relevant) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
10.0 years
0 Lacs
Bangalore Urban, Karnataka, India
On-site
About Marvell Marvell’s semiconductor solutions are the essential building blocks of the data infrastructure that connects our world. Across enterprise, cloud and AI, automotive, and carrier architectures, our innovative technology is enabling new possibilities. At Marvell, you can affect the arc of individual lives, lift the trajectory of entire industries, and fuel the transformative potential of tomorrow. For those looking to make their mark on purposeful and enduring innovation, above and beyond fleeting trends, Marvell is a place to thrive, learn, and lead. Your Team, Your Impact At Marvell, we are looking for a manager for Vulnerability Management, you will be responsible for developing and implementing strategies to enhance and mature the enterprise vulnerability management program. The role ensures the identification, assessment, and remediation of security vulnerabilities across the enterprise. What You Can Expect Vulnerability Management Program Development – design and implement a comprehensive vulnerability management program. Oversee vulnerability scanning tools to identify security vulnerabilities in enterprise systems, networks, and applications. Own and develop policies, procedures, and best practices for vulnerability scanning, assessment, and remediation. Perform risk-based prioritization of identified vulnerabilities. Collaborate with security analysts to conduct detailed assessments of critical vulnerabilities and develop POAM Work with cross-functional teams to develop remediation plans and timelines. Ensure timely patching or mitigation of vulnerabilities. Partner with IT and business teams to establish patching cadence, work with the change manager, and bring an automated patching process Develop and implement prioritized vulnerability remediation plans and work collaboratively with business. Track and report on remediation progress to stakeholders and leadership. Provide support for incident response and new systems onboarding processes in the application/system/infrastructure vulnerability security domain. Stay updated on emerging threats and vulnerabilities (emerging threats, zero days, latest attacks related to exploitation of vuln) through threat intelligence sources. Integrate threat intelligence into the vulnerability management process to address high-risk areas proactively. Build executive and business information security officer dashboards for the organization Define metrics and reporting to track program effectiveness and improvement. Develop and track key performance indicators (KPIs) for the vulnerability management program. Lead and manage vulnerability management projects, such as implementing new tools or processes. Lead a team of security engineers, providing mentorship and performance management in improving and automating processes wherever possible. Ensure compliance with security frameworks (e.g., ISO 27001, NIST CSF, TISAX, NIST 800-171, and SOX). Prepare for and support internal and external audits related to vulnerability management. What We're Looking For 10+ years of experience in Cybersecurity, vulnerability management, and security operations Bachelor’s Degree in Computer Science, Information Systems, Cybersecurity, or a related field Demonstrated background in deploying, owning, and configuring enterprise-level security tools/technology Experience scaling an enterprise vulnerability program across multiple environments, driving owner accountability and prioritization Hands-on experience and knowledge of vulnerability management tools such as Qualys, Rapid7, Tenable, and orchestration via SOAR or other platforms to automate vulnerability management program. In-depth knowledge across core domains – Vulnerability Management, External Attack Surface Management, Container Scanning, and Security Configuration Management Well-versed in penetration testing, vulnerability scanning, and red teaming methodologies and frameworks such as OWASP Top 10 and CWE 25. Demonstrated knowledge of networking and systems, and current vulnerability and threat trends. Strong understanding of network protocols, operating systems, and security technologies. Experience improving vulnerability prioritization models Excellent communication, collaboration, and interpersonal skills Cyber certifications (e.g., CISM, CISSP) or equivalent Additional Compensation And Benefit Elements With competitive compensation and great benefits, you will enjoy our workstyle within an environment of shared collaboration, transparency, and inclusivity. We’re dedicated to giving our people the tools and resources they need to succeed in doing work that matters, and to grow and develop with us. For additional information on what it’s like to work at Marvell, visit our Careers page. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Show more Show less
Posted 1 week ago
30.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Job Description ORACLE: As the provider of the world’s most complete, open and integrated business software and hardware systems, Oracle is dedicated to unleashing innovation by simplifying IT. With more than 30 years of information technology innovation, Oracle is the recognized industry leader in enterprise application and technology solutions. ORACLE CLOUD: Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance, a comprehensive portfolio of infrastructure and platform cloud services, and the world’s only self-driving autonomous database. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools—so enterprises can bring their past and build their future. The comprehensive nature of Oracle Cloud is a key selection consideration for customers. Oracle has the broadest cloud portfolio in the industry, delivering a complete range of production-level, cross-functional business applications for each part of an organization with information and data shared seamlessly across Oracle Cloud Applications and other systems. Business users have the latest innovations at their fingertips across sales and marketing, customer service, finance and accounting, supply chain management, human capital and talent management—all enriched with social engagement and collaboration tools and an intuitive user interface that works on any mobile device. These applications have been architected on a modern and open cloud platform and infrastructure to simplify integration needs and lower an organization’s total cost of ownership. With such extensive functionality across business processes, customers can solve their business problems with complete solutions that give them end-to-end execution and complete visibility. Oracle IaaS is clearly differentiated, being far more performant, more secure, more reliable and cost efficient as compared to others in the market. Oracle has fundamentally innovated in the IaaS space and continues to gain market share aggressively. Oracle PaaS is anchored by Oracle Autonomous Database (ADB), which offers the most innovative “self-driving” capabilities in the data tier in the marketplace. Combine with ADB, Oracle cloud also offers a complete application development platform that includes app dev, security, integration, identity management, analytics, big data and AI/ML amongst other far broader capabilities. Partners with customers, sales, engineering and product teams to design, demonstrate and deploy Oracle Cloud architectures that address customer business problems. Drives Oracle Cloud customer consumption by accelerating the adoption of Oracle cloud services including discovery, design and deployment. Engages with strategic customers, builds leadership relationships at multiple levels within organizations in order to design and implement solutions. Works directly with customers to gather requirements, develop architectures and translates business needs into solutions. May implement solutions and ensure successful deployments through code development and scripting. Displays product/application understanding through highly customized presentation demonstrations to customers, and at conferences, and events. Supports customer from Proof of Concept (POC) through production deployment of services via resource configuration, planning, and customer education/training. Creates and distributes technical assets (white papers, solution code, blog posts, and video demonstrations). Serves as a leading contributor for customers and sales on technical cloud solutions and customer success. Identifies gaps and enhancements to influence engineering roadmaps for customer driven features. Leading contributor, may provide direction and mentoring to others. Work is non-routine and very complex, involving the application of advanced technical/business skills in area of specialization. May interact with C level. Maintains expertise by staying current on emerging technologies. Minimum qualifications include: 8 years experience with computer applications and tools required. Preferred but not required qualifications include: Bachelor of Science-level university degree in Computer Science, Math, Engineering from accredited university; and/or relevant 8 years technical experience. Advanced degree in relevant field of studies highly desirable. Expertise in and an in depth and thorough knowledge of competitive and industry knowledge in the field of computer applications and tools; System and application design; Implementation of advanced product features; Project management; Solving technical problems with customers in technical environments; Written and verbal communication and interpersonal skills; Needs analysis, positioning, and business justification. 8 years experience and expertise in the clear communication of technical information to others through presentations, demonstrations, written communication and consultative solutioning experience. Career Level - IC4 Responsibilities The SecDevOPS team is focused on delivering secure OCI service delivery and helping customers establish operational controls through deep knowledge of cloud-native application development, event-driven architectures, microservices, DevOps, Infrastructure-as-code, continuous integration, and automated deployment. This role is a mix of being a developer, a technical delivery architect, and an evangelist. In this role, you will actively engage with customers and deliver architecture to support secure design standards, industry-specific compliance requirements, implementation of cloud-native technologies, serverless application development, integrations with OCI or third party software around logging, monitoring, threat management, asset management solutions, write technical blogs, presentation to customers. The qualified candidate will have deep technical knowledge of cloud-native technologies, and the ability to translate complex technical requirements into architecture & service delivery. Additionally, the ideal candidate will have software development, evangelism, instructional design, and cloud security experience. Above all, you will have a passion for learning new technologies and sharing them with a wider audience, and developing automation for repeatable patterns across customers. While much of the focus of this role will revolve around the delivery of security and operations related to cloud security technologies, a large portion of the work will also involve adjacencies including securing and configuring tenancies, networking, encryption, and key or Certificate Management, Web Application Firewalls, SIEM technologies, vulnerability scanning, monitoring & observability, etc. While also interacting directly with customers the role involves regular work with the development organization to drive product improvements and innovations. This is a senior technical Cloud Delivery role, so the Cloud technical experience is the higher priority. A Cloud Engineer in our team is responsible for the successful implementation of non-routine and complex business solutions ensuring high quality and timely delivery within budget to the customers’ happiness. Analyze business needs to help ensure Oracle’s solution meets the customer’s objectives by combining industry-standard methodologies and product knowledge. Effectively applies Oracle’s methodologies and policies while adhering to contractual obligations, thereby minimizing Oracle’s risk and exposure. Exercises judgment and business acumen in selecting methods and techniques for effective project delivery on small to medium engagements. Provides direction and mentoring to junior resources on the delivery team. Ensures deliverables are acceptable and work closely with the Project Management Team to understand and manage project expectations. Collaborates with the consulting/delivery sales team by providing domain credibility. Helps with Technical solution scoping of project Comfortable working in a matrix management environment. Good communication skills to deal with internal collaborators, customers, and vendors. This individual should have a solid technical background and excellent problem-solving skills. Minimum Qualifications Minimum of 8 years of experience in progressively responsible information technology including. 5+ years of experience in developing, implementing, or architecting cloud solutions. 3+ years of technical architecture experience integrating software into cloud infrastructure with hands on programming experience using one of popular programming languages such as in JAVA or Python. Bachelor’s degree in Computer Science, related technical field or equivalent practical experience. Service delivery experience in a cloud-related environment. Ability to speak and write in English fluently Preferred Qualifications Deep technical domain knowledge in one or more of the following: cloud-native application development, event-driven architectures, SecDevOps, Infrastructure-as-code, continuous integration and deployment, container technologies such as Docker and Kubernetes, Observability Experience with continuous integration tools (e.g. Jenkins) Hands-on familiarity with Infrastructure-as-code technologies (e.g. Terraform) Experience with configuration management platforms (e.g. Chef, Puppet, or Ansible) Strong scripting skills (e.g. PowerShell, Python, Bash, Ruby, Go, etc.) Strong practical application development experience on Linux and Windows-based systems Knowledge and/or hands-on experience with OCI, including current OCI Certification (Developer, Solutions Architect, Operations) Coding experience in one or more of the following languages, Java, .Net, Python, or PHP Knowledge and hands-on experience with AWS, Azure, or Google Cloud preferred. knowledge of industry-specific compliance such as PCI, HIPAA, ISO 27001, HITRUST, CIS preferred. Delivery experience with leading security frameworks such as CIS, NIST, Zero Trust, etc. Experience with REST APIs and related development. Self-motivated, team-oriented, and focused on exceeding customer expectations Qualifications Career Level - IC4 About Us As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less
Posted 1 week ago
6.0 - 9.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Job Title: Senior IT Security Analyst - IAM Systems As a Senior IT Security Analyst - IAM Systems, you will engage in advanced IAM cybersecurity tasks with a high level of autonomy. Your contributions will be crucial for maintaining a secure IT environment and anticipating potential threats. This role is primarily responsible for working with the systems that control user identities and access within our organization. This includes implementing, and maintaining systems that manage user identities, credentials, and access controls. This role is on site and reports to either our Pune or Chennai, India office. Responsibilities: Manage user identities and access rights across multiple systems and applications to include Azure, on-prem AD, AWS, and GCP in multi domain environments Coordinate comprehensive incident response and recovery efforts. Manage access controls and monitor user activity for anomalies. Monitor IAM infrastructure to ensure high availability. Participate in development and enforcement of IAM security policies, procedures, and guidelines. Evaluate and recommend new IAM security tools and technologies. Prepare technical reports and presentations on security status and incidents. Implement IAM solutions that meet the needs of the organization. Maintain and optimize the performance of IAM systems. Work closely with IT and security teams to ensure the integration of IAM systems with other technologies. Participate in regular audits to ensure compliance with IAM policies and regulations. Provide technical support and troubleshooting for IAM systems. Keep up-to-date with the latest IAM technologies and trends. Train staff on the use of IAM systems and the importance of maintaining secure access controls. Skills and Qualifications: Experience: 6-9 years of experience in IT security. Education: Bachelor's degree in Computer Science or a related field. On-Premises and Cloud Skills: Experience with both on-premises and cloud (Azure, AWS, GCP) environments. IAM Solutions: Experience with IAM solutions such as SailPoint, Okta, Microsoft Azure AD, or similar. CyberArk experience also a plus. Programming Languages: Proficiency in programming languages such as Python, Java, or C# for use in automation of basic IAM tasks. Security Audits: Competence in conducting thorough security audits. Forensic Analysis: Capability to perform in-depth forensic investigations. Incident Management: Mastery in coordinating incident response efforts. Policy Development: Ability to develop and enforce comprehensive security policies. Training Leadership: Leadership in delivering IAM security trainings. Tools Evaluation: Proficiency in evaluating and integrating new security tools. Analytical Reporting: Skills in preparing detailed technical reports and presentations. Network Security: Understanding of network protocols, firewalls, and other security technologies. CyberArk Certifications (preferred) : CyberArk Defender (PAM-DEF) CyberArk Sentry (PAM-SEN) CyberArk Defender – EPM Technical Skills (required) : Vault Administration: Managing and securing privileged accounts within the CyberArk Vault. PVWA (Privileged Web Access): Using and managing the web interface for privileged access. PSM (Privileged Session Manager): Configuring and managing session monitoring and recording. CPM (Central Policy Manager): Creating and managing policies for password management and rotation. EPM Deployment: Implementing and managing endpoint privilege policies and architecture Problem-Solving and Analytical Skills : Ability to troubleshoot and resolve complex technical issues, and to design and deploy CyberArk solutions with high availability and disaster recovery. Should be a role model and leader for rest of the team. Technical Problem Solving : Leading others in solving complex technical problems using sophisticated analytical thought to exercise judgment and identify innovative solutions Independence and Leadership : Working independently with guidance in only the most complex situations, and potentially leading job family/cross-job family group teams or projects with moderate resource requirements, risk, and/or complexity Project Impact : Impacting the achievement of project objectives, guided by technical and professional standards and guidelines Communication Skills : Communicating difficult concepts and influencing others to adopt a different point of view Advisory Role : Acting as an advisor on advanced and broad-ranging projects Preferred Qualifications: Certifications such as CISSP, CISM, or CEH. Experience with security frameworks like NIST, ISO 27001, or CIS Controls. Familiarity with DevSecOps practices and tools. Strong problem-solving skills and attention to detail. Certifications in IAM or cybersecurity are a plus Excellent communication and interpersonal skills. Applicants may be required to appear onsite at a Wolters Kluwer office as part of the recruitment process. Show more Show less
Posted 1 week ago
30.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Job Description ORACLE: As the provider of the world’s most complete, open and integrated business software and hardware systems, Oracle is dedicated to unleashing innovation by simplifying IT. With more than 30 years of information technology innovation, Oracle is the recognized industry leader in enterprise application and technology solutions. ORACLE CLOUD: Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance, a comprehensive portfolio of infrastructure and platform cloud services, and the world’s only self-driving autonomous database. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools—so enterprises can bring their past and build their future. The comprehensive nature of Oracle Cloud is a key selection consideration for customers. Oracle has the broadest cloud portfolio in the industry, delivering a complete range of production-level, cross-functional business applications for each part of an organization with information and data shared seamlessly across Oracle Cloud Applications and other systems. Business users have the latest innovations at their fingertips across sales and marketing, customer service, finance and accounting, supply chain management, human capital and talent management—all enriched with social engagement and collaboration tools and an intuitive user interface that works on any mobile device. These applications have been architected on a modern and open cloud platform and infrastructure to simplify integration needs and lower an organization’s total cost of ownership. With such extensive functionality across business processes, customers can solve their business problems with complete solutions that give them end-to-end execution and complete visibility. Oracle IaaS is clearly differentiated, being far more performant, more secure, more reliable and cost efficient as compared to others in the market. Oracle has fundamentally innovated in the IaaS space and continues to gain market share aggressively. Oracle PaaS is anchored by Oracle Autonomous Database (ADB), which offers the most innovative “self-driving” capabilities in the data tier in the marketplace. Combine with ADB, Oracle cloud also offers a complete application development platform that includes app dev, security, integration, identity management, analytics, big data and AI/ML amongst other far broader capabilities. Partners with customers, sales, engineering and product teams to design, demonstrate and deploy Oracle Cloud architectures that address customer business problems. Drives Oracle Cloud customer consumption by accelerating the adoption of Oracle cloud services including discovery, design and deployment. Engages with strategic customers, builds leadership relationships at multiple levels within organizations in order to design and implement solutions. Works directly with customers to gather requirements, develop architectures and translates business needs into solutions. May implement solutions and ensure successful deployments through code development and scripting. Displays product/application understanding through highly customized presentation demonstrations to customers, and at conferences, and events. Supports customer from Proof of Concept (POC) through production deployment of services via resource configuration, planning, and customer education/training. Creates and distributes technical assets (white papers, solution code, blog posts, and video demonstrations). Serves as a leading contributor for customers and sales on technical cloud solutions and customer success. Identifies gaps and enhancements to influence engineering roadmaps for customer driven features. Leading contributor, may provide direction and mentoring to others. Work is non-routine and very complex, involving the application of advanced technical/business skills in area of specialization. May interact with C level. Maintains expertise by staying current on emerging technologies. Minimum qualifications include: 8 years experience with computer applications and tools required. Preferred but not required qualifications include: Bachelor of Science-level university degree in Computer Science, Math, Engineering from accredited university; and/or relevant 8 years technical experience. Advanced degree in relevant field of studies highly desirable. Expertise in and an in depth and thorough knowledge of competitive and industry knowledge in the field of computer applications and tools; System and application design; Implementation of advanced product features; Project management; Solving technical problems with customers in technical environments; Written and verbal communication and interpersonal skills; Needs analysis, positioning, and business justification. 8 years experience and expertise in the clear communication of technical information to others through presentations, demonstrations, written communication and consultative solutioning experience. Career Level - IC4 Responsibilities The SecDevOPS team is focused on delivering secure OCI service delivery and helping customers establish operational controls through deep knowledge of cloud-native application development, event-driven architectures, microservices, DevOps, Infrastructure-as-code, continuous integration, and automated deployment. This role is a mix of being a developer, a technical delivery architect, and an evangelist. In this role, you will actively engage with customers and deliver architecture to support secure design standards, industry-specific compliance requirements, implementation of cloud-native technologies, serverless application development, integrations with OCI or third party software around logging, monitoring, threat management, asset management solutions, write technical blogs, presentation to customers. The qualified candidate will have deep technical knowledge of cloud-native technologies, and the ability to translate complex technical requirements into architecture & service delivery. Additionally, the ideal candidate will have software development, evangelism, instructional design, and cloud security experience. Above all, you will have a passion for learning new technologies and sharing them with a wider audience, and developing automation for repeatable patterns across customers. While much of the focus of this role will revolve around the delivery of security and operations related to cloud security technologies, a large portion of the work will also involve adjacencies including securing and configuring tenancies, networking, encryption, and key or Certificate Management, Web Application Firewalls, SIEM technologies, vulnerability scanning, monitoring & observability, etc. While also interacting directly with customers the role involves regular work with the development organization to drive product improvements and innovations. This is a senior technical Cloud Delivery role, so the Cloud technical experience is the higher priority. A Cloud Engineer in our team is responsible for the successful implementation of non-routine and complex business solutions ensuring high quality and timely delivery within budget to the customers’ happiness. Analyze business needs to help ensure Oracle’s solution meets the customer’s objectives by combining industry-standard methodologies and product knowledge. Effectively applies Oracle’s methodologies and policies while adhering to contractual obligations, thereby minimizing Oracle’s risk and exposure. Exercises judgment and business acumen in selecting methods and techniques for effective project delivery on small to medium engagements. Provides direction and mentoring to junior resources on the delivery team. Ensures deliverables are acceptable and work closely with the Project Management Team to understand and manage project expectations. Collaborates with the consulting/delivery sales team by providing domain credibility. Helps with Technical solution scoping of project Comfortable working in a matrix management environment. Good communication skills to deal with internal collaborators, customers, and vendors. This individual should have a solid technical background and excellent problem-solving skills. Minimum Qualifications Minimum of 8 years of experience in progressively responsible information technology including. 5+ years of experience in developing, implementing, or architecting cloud solutions. 3+ years of technical architecture experience integrating software into cloud infrastructure with hands on programming experience using one of popular programming languages such as in JAVA or Python. Bachelor’s degree in Computer Science, related technical field or equivalent practical experience. Service delivery experience in a cloud-related environment. Ability to speak and write in English fluently Preferred Qualifications Deep technical domain knowledge in one or more of the following: cloud-native application development, event-driven architectures, SecDevOps, Infrastructure-as-code, continuous integration and deployment, container technologies such as Docker and Kubernetes, Observability Experience with continuous integration tools (e.g. Jenkins) Hands-on familiarity with Infrastructure-as-code technologies (e.g. Terraform) Experience with configuration management platforms (e.g. Chef, Puppet, or Ansible) Strong scripting skills (e.g. PowerShell, Python, Bash, Ruby, Go, etc.) Strong practical application development experience on Linux and Windows-based systems Knowledge and/or hands-on experience with OCI, including current OCI Certification (Developer, Solutions Architect, Operations) Coding experience in one or more of the following languages, Java, .Net, Python, or PHP Knowledge and hands-on experience with AWS, Azure, or Google Cloud preferred. knowledge of industry-specific compliance such as PCI, HIPAA, ISO 27001, HITRUST, CIS preferred. Delivery experience with leading security frameworks such as CIS, NIST, Zero Trust, etc. Experience with REST APIs and related development. Self-motivated, team-oriented, and focused on exceeding customer expectations Qualifications Career Level - IC4 About Us As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less
Posted 1 week ago
0 years
0 Lacs
Pune
On-site
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. Job Description Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ͏ Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ͏ i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ͏ 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ͏ Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 week ago
4.0 years
9 - 10 Lacs
Bengaluru
On-site
About us At ExxonMobil, our vision is to lead in energy innovations that advance modern living and a net-zero future. As one of the world’s largest publicly traded energy and chemical companies, we are powered by a unique and diverse workforce fueled by the pride in what we do and what we stand for. The success of our Upstream, Product Solutions and Low Carbon Solutions businesses is the result of the talent, curiosity and drive of our people. They bring solutions every day to optimize our strategy in energy, chemicals, lubricants and lower-emissions technologies. We invite you to bring your ideas to ExxonMobil to help create sustainable solutions that improve quality of life and meet society’s evolving needs. Learn more about our What and our Why and how we can work together . ExxonMobil’s affiliates in India ExxonMobil’s affiliates have offices in India in Bengaluru, Mumbai and the National Capital Region. ExxonMobil’s affiliates in India supporting the Product Solutions business engage in the marketing, sales and distribution of performance as well as specialty products across chemicals and lubricants businesses. The India planning teams are also embedded with global business units for business planning and analytics. ExxonMobil’s LNG affiliate in India supporting the upstream business provides consultant services for other ExxonMobil upstream affiliates and conducts LNG market-development activities. The Global Business Center - Technology Center provides a range of technical and business support services for ExxonMobil’s operations around the globe. ExxonMobil strives to make a positive contribution to the communities where we operate and its affiliates support a range of education, health and community-building programs in India. Read more about our Corporate Responsibility Framework. To know more about ExxonMobil in India, visit ExxonMobil India and the Energy Factor India. What role you will play in our team Develop, implement, revise, and support controls activities to uphold the integrity and security of industrial control systems; meeting corporate requirements through compliance with the ICSR standard, preventing and/or mitigating impacts to process operations via cost-effective risk reduction controls. Job location is based out of Bengaluru, Karnataka What you will do Perform Industrial Controls System cybersecurity security risk assessments, support cold eyes reviews and Unit internal audits on control system environment Technical review and development of ICS system architecture, requirements gathering, project design specifications, and factory acceptance testing Development of technical documentation, procedures and training modules Research, development, and review of emerging cybersecurity technologies Collaboration with Houston-based and global site personnel About You Skills and Qualifications Minimum 4 years of OT Cybersecurity experience Bachelor of Engineering degree in the Instrumentation, Electrical/ Electronics discipline and score 60% and above Visionary who can reconcile competing requirements and clarify obscure objectives to form a unifying and viable strategy Strong influencer; able to drive alignment and results across functions Able to work in an unstructured environment to identify key objectives and the actions required to achieve success Engage diverse perspectives and fuel discussion to optimize decision making Experience in OT Cybersecurity field or Industrial Control Systems, in support of field operations and maintenance Strong problem solving and analytical capabilities; high results-orientation Minimum 7 years of experience in the Industrial Control System field, with specific exposure to OT Cybersecurity Effectively lead and supervise global team; able to manage workloads of others Strong written and verbal communication skills; strong public speaker Minimum 5 years of experience working in the Oil and Gas Upstream, Midstream, or Downstream sites directly supporting field operations / maintenance / engineering. Ability to adapt to tight deadlines, heavy workloads, and frequent changes in priorities Required Technical Competencies: Relevant security and controls concepts and processes Strong knowledge of discipline design standards, specifications, codes, and appropriate safety criteria Familiarity with industry standards: IEC 62443 Standards, NIST Cybersecurity Framework Working knowledge of control and safety systems implementation and architecture is preferred Understanding of cybersecurity technical controls / solutions Familiarity with Enterprise IT and networking technologies is preferred Working knowledge of Microsoft Office (Outlook, Excel, Word, PowerPoint, OneNote), Microsoft SharePoint, Microsoft Windows, and Microsoft Internet Explorer Preferred Qualifications/ Experience Proficiency in data collection and analysis with common database and software data analysis tools such as SAP, Analytics for Excel and Tableau Your benefits An ExxonMobil career is one designed to last. Our commitment to you runs deep: our employees grow personally and professionally, with benefits built on our core categories of health, security, finance and life. We offer you: Competitive compensation Medical plans, maternity leave and benefits, life, accidental death and dismemberment benefits Retirement benefits Global networking & cross-functional opportunities Annual vacations & holidays Day care assistance program Training and development program Tuition assistance program Workplace flexibility policy Relocation program Transportation facility Please note benefits may change from time to time without notice, subject to applicable laws. The benefits programs are based on the Company’s eligibility guidelines. Stay connected with us Learn more about ExxonMobil in India, visit ExxonMobil India and Energy Factor India . Follow us on LinkedIn and Instagram Like us on Facebook Subscribe our channel at YouTube EEO Statement ExxonMobil is an Equal Opportunity Employer: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin or disability status. Business solicitation and recruiting scams ExxonMobil does not use recruiting or placement agencies that charge candidates an advance fee of any kind (e.g., placement fees, immigration processing fees, etc.). Follow the LINK to understand more about recruitment scams in the name of ExxonMobil. Nothing herein is intended to override the corporate separateness of local entities. Working relationships discussed herein do not necessarily represent a reporting connection, but may reflect a functional guidance, stewardship, or service relationship. Exxon Mobil Corporation has numerous affiliates, many with names that include ExxonMobil, Exxon, Esso and Mobil. For convenience and simplicity, those terms and terms like corporation, company, our, we and its are sometimes used as abbreviated references to specific affiliates or affiliate groups. Abbreviated references describing global or regional operational organizations and global or regional business lines are also sometimes used for convenience and simplicity. Similarly, ExxonMobil has business relationships with thousands of customers, suppliers, governments, and others. For convenience and simplicity, words like venture, joint venture, partnership, co-venturer, and partner are used to indicate business relationships involving common activities and interests, and those words may not indicate precise legal relationships. Nothing herein is intended to override the corporate separateness of local entities. Working relationships discussed herein do not necessarily represent a reporting connection, but may reflect a functional guidance, stewardship, or service relationship. Exxon Mobil Corporation has numerous affiliates, many with names that include ExxonMobil, Exxon, Esso and Mobil. For convenience and simplicity, those terms and terms like corporation, company, our, we and its are sometimes used as abbreviated references to specific affiliates or affiliate groups. Abbreviated references describing global or regional operational organizations and global or regional business lines are also sometimes used for convenience and simplicity. Similarly, ExxonMobil has business relationships with thousands of customers, suppliers, governments, and others. For convenience and simplicity, words like venture, joint venture, partnership, co-venturer, and partner are used to indicate business relationships involving common activities and interests, and those words may not indicate precise legal relationships.
Posted 1 week ago
2.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Job Description Summary Compte tenu des exigences accrues en matière de cybersécurité des technologies opérationnelles (OT), l’Ingénieur(e) en cybersécurité doit travailler sur les spécifications et fournir le support nécessaire conformément à la stratégie de l'entreprise ainsi qu’aux exigences des clients. Grid Solutions, une entreprise du groupe GE Vernova, sert des clients dans le monde entier et compte aujourd’hui plus de 13 000 employés à travers le monde. Nous fournissons aux compagnies d'électricité et aux industries du monde entier des équipements, des systèmes et des services pour fournir de l'énergie de manière fiable et efficace du point de production aux consommateurs finaux. Nous nous efforçons de relever les défis de la transition énergétique en permettant le raccordement sûr et fiable des ressources énergétiques renouvelables et distribuées au réseau. Pour avoir davantage d'informations sur les solutions Grid de GE, rendez-vous sur notre site internet : https://www.gegridsolutions.com. With the increased demands in Operational Technology OT Cybersecurity work, a Cybersecurity engineer is required to work on specification and providing necessary support in accordance with company strategy and customer requirements. Grid Solutions, a GE Renewable Energy business, serves customers globally with over 13,000 employees. We provide power utilities and industries worldwide with equipment, systems, and services to bring power reliably and efficiently from the point of generation to end power consumers. We are focused on addressing the challenges of the energy transition by enabling the safe and reliable connection of renewable and distributed energy resources to the grid. For more about GE’s Grid Solutions, visit https://www.gegridsolutions.com. Job Description Le rôle : En tant qu’Ingénieur(e) Projet Cybersécurité, vous reporterez directement au responsable du projet et du responsable de ligne désigné, tout en reportant indirectement au responsable de la cybersécurité en ingénierie OT. Vous ferez partie d'une équipe d'ingénieur/es très motivé/es et dynamiques, travaillant sur le développement de projets d'énergies renouvelables dans le monde entier. Le développement de tels projets est un vrai défi technique et implique diverses disciplines d'ingénierie, une contribution grâce au travail d'équipe et une approche innovante. Ce poste implique de diriger et de gérer des projets de cybersécurité pour les clients, de garantir la mise en œuvre réussie des solutions de sécurité et d’assurer un excellent service client tout au long de l'engagement, de collaborer avec les clients, les équipes de cybersécurité internes et d'autres parties prenantes pour assurer une sécurité OT efficace. Les Responsabilités Travailler en étroite collaboration avec les clients pour comprendre l'accord contractuel et les exigences du projet en matière de cybersécurité, Assurer que les exigences contractuelles convenues (phase ITO) ont été appliquées à l'exécution du projet (phase OTR) et clairement reflétées aux équipes de projet, Élaborer des plans de projet complets, des calendriers et des exigences en matière de ressources, Agir en tant que personne principale/responsable et être le premier point de contact pour la livraison des projets en matière de cybersécurité. Fournir des mises à jour régulières et des rapports d'avancement aux clients et aux parties prenantes, Diriger l'exécution des projets de cybersécurité, en veillant au respect des délais et des budgets, Coordonner avec les équipes internes de cybersécurité et les fournisseurs externes pour atteindre les objectifs du projet, Rester informé(e) des menaces émergentes, des vulnérabilités et des meilleures pratiques du secteur en matière de cybersécurité OT et émettre/proposer des recommandations pour améliorer la sécurité, Partager une expertise technique et des conseils aux équipes internes concernant les normes, politiques et procédures de sécurité OT, Collaborer avec les fournisseurs et fournisseurs tiers pour garantir la sécurité des systèmes OT et évaluer leurs capacités en matière de cybersécurité, Reporter et collaborer avec le Leader cybersécurité ingénierie global. Votre Profil Se Démarque Par Votre approche motivante, proactive et axée sur les résultats Votre excellente communication et vos relations interpersonnelles Votre curiosité, résilience et votre désir d’apprendre Votre capacité à respecter les délais avec une qualité élevée, un sens de l'urgence et de la livraison La création de valeur pour les clients Votre capacité à résoudre des problèmes et en identifier les causes racines Votre flexibilité sur vos horaires de travail Compétences/ Expérience(s) Recherchée(s) Diplôme universitaire qualifié dans une discipline d'ingénierie, idéalement génie cybersécurité, informatique, technologies de l'information ou génie informatique et électronique. Une première expérience (< 2 ans) dans la sécurité des projets, de préférence dans un environnement de technologie opérationnelle (OT).Une première expérience (< 2 ans) dans l'industrie électrique ou sur un rôle similaire. Solide compréhension des systèmes de contrôle industriels (ICS), des systèmes de contrôle de supervision et d'acquisition de données (SCADA) et d'autres technologies OT. Connaissance des protocoles et des normes spécifiques à l'OT tels que Modbus, DNP3, IEC 61850 et OPC. Expérience dans la conception et la mise en œuvre de contrôles de sécurité pour les systèmes OT, y compris les pares-feux, les systèmes de détection d'intrusion et les contrôles d'accès. Connaissance des techniques de segmentation du réseau et des architectures de sécurité pour les systèmes OT. Expérience dans le domaine de la sécurité des réseaux de communication industriels et des systèmes selon les normes IEC 62443. Connaissance du cadre de cybersécurité du NIST, du NIS2 et de la CRA. Bonne connaissance des principes, théories et techniques de cybersécurit La différence crée l’énergie. La Mission Handicap Grid Solutions facilite l’intégration des personnes en situation de handicap. The Role As a Cybersecurity Lead, you will be reporting directly to project and designated line manager, while as well indirectly reporting technically to the OT Engineering Cybersecurity Leader. The successful candidate will be part of a highly motivated and dynamic team of engineers working on the development of renewables project worldwide. The development of such projects is technically challenging and involves a variety of engineering disciplines, contribution through teamwork and an innovative approach. This position involves leading and managing cybersecurity project(s) for clients, ensuring the successful implementation of security solutions, and providing excellent customer service throughout the engagement, collaborates with clients, internal cybersecurity teams, and other stakeholders to deliver effective OT security solutions. Responsibilities Work closely with clients to understand the project(s) cybersecurity contractual agreement and requirements. Ensure ITO agreed contract requirements has been carried to project execution OTR and reflected clearly to project teams. Develop comprehensive project plans, timelines, and resource requirements. Main responsible personal and first point of contact for project(s) cybersecurity delivery, providing regular updates and progress reports to clients and stakeholders. Lead the execution of cybersecurity projects, ensuring adherence to timelines and budgets. Coordinate with internal cybersecurity teams and external vendors to achieve project goals. Lead the execution of cybersecurity projects, ensuring adherence to timelines and budgets. Coordinate with internal cybersecurity teams and external vendors to achieve project goals. Stay updated on emerging threats, vulnerabilities, and industry best practices related to OT cybersecurity and make recommendations for security enhancements. Provide technical expertise and guidance to internal teams regarding OT security standards, policies, and procedures. Collaborate with third-party vendors and suppliers to ensure the security of OT systems and evaluate their cybersecurity capabilities. Report and collaborate with global engineering cybersecurity leader. The Candidate Must Be Self-motivating, proactive and results driven approach. Excellent communication and interpersonal abilities. Curious, resilient and willing to learn. Able to work to deadlines with high quality, sense of urgency and delivery. Focused on delivering value to customers. Strong problem-solving and root cause identification skills. Flexibility in working hours. Skills And Experience University Degree qualified in an engineering discipline ideally with Cybersecurity Engineering, Computer Science, Information Technology, or Computer and Electronics engineering. Minimum 2 years’ experience in project security, preferably in an Operational Technology (OT) environment. Minimum 2 years' experience within the Electrical Industry or in a similar role. Solid understanding of industrial control systems (ICS), supervisory control and data acquisition (SCADA) systems, and other OT technologies. Knowledge of OT-specific protocols and standards such as Modbus, DNP3, IEC 61850, and OPC. Experience in designing and implementing security controls for OT systems, including firewalls, intrusion detection systems, and access controls. Familiarity with network segmentation techniques and security architectures for OT systems. Experience in Industrial communication network and system security IEC 62443 standards. Knowledge of NIST Cybersecurity framework, NIS2 and CRA. Good knowledge of Cybersecurity principles, theories, and techniques. Additional Information Relocation Assistance Provided: No Show more Show less
Posted 1 week ago
10.0 years
0 Lacs
Gurugram, Haryana, India
Remote
Roles & Responsibilities Core Skills Key Responsibilities Lead OT architecture design for mining operations, including drilling, hauling, crushing, stockpiling, processing, and transportation. Design hybrid (on-prem + edge + cloud) solutions that handle poor connectivity, latency, and harsh physical environments. Architect integration between OT and enterprise systems (e.g., ERP, fleet management, historian, CMMS). Work closely with business analysts to ensure technical solutions align with operational workflows and business goals. Select and implement appropriate technologies (e.g., MQTT, OPC-UA, edge gateways, cloud connectors). Design OT architectures that enable deployment of AI/ML models at the edge, on-premises, and in the cloud for applications such as predictive maintenance, equipment health monitoring, and operational optimization. Collaborate with data scientists and AI/ML engineers to ensure appropriate data capture, preprocessing, and feature engineering from OT systems (SCADA, PLCs, condition monitoring sensors, etc.). Integrate AI-driven analytics and insights into operator dashboards and IROC visualizations, ensuring actionable intelligence for mining operations. Support model lifecycle considerations in OT environments—edge inferencing, model updates, offline inference, and fail-safe design. Ensure designs are scalable, secure, fault-tolerant, and compliant with industrial security standards (IEC 62443, NIST CSF). Guide the development and deployment of monitoring systems for IROC-based centralized operations. Required Skills And Qualifications 8–10 years of experience in architecting OT solutions for mining operations, particularly in open-pit mining. Deep expertise in OT components: SCADA, PLCs, DCS, telemetry, real-time data acquisition, condition monitoring. Knowledge of industrial communication protocols (OPC UA, Modbus, PROFINET, MQTT). Experience with edge computing platforms (e.g., Azure IoT Edge, AWS IoT Greengrass) and industrial gateways. Proven ability to design solutions tolerant of intermittent connectivity, high latency, and remote geographies. Working knowledge of AI/ML use cases in industrial and mining operations, such as predictive maintenance, equipment utilization analysis, energy optimization, and safety anomaly detection. Familiarity with deployment of AI models on edge platforms (e.g., NVIDIA Jetson, Azure IoT Edge, AWS Greengrass) and their integration with OT systems. Experience designing OT data pipelines to support real-time and historical data needs for AI analytics. Strong understanding of IT/OT convergence principles and industrial cybersecurity. Minimum 3 years of direct experience working with or for a mining organization, with a solid understanding of mining operational challenges. Education Bachelor’s or Master’s in Computer Science, Control Systems Engineering, or relevant fields. Experience 8-11 Years Skills Primary Skill: AI/ML Development Sub Skill(s): AI/ML Development Additional Skill(s): AI/ML Architecture, TensorFlow, Pytorch About The Company Infogain is a human-centered digital platform and software engineering company based out of Silicon Valley. We engineer business outcomes for Fortune 500 companies and digital natives in the technology, healthcare, insurance, travel, telecom, and retail & CPG industries using technologies such as cloud, microservices, automation, IoT, and artificial intelligence. We accelerate experience-led transformation in the delivery of digital platforms. Infogain is also a Microsoft (NASDAQ: MSFT) Gold Partner and Azure Expert Managed Services Provider (MSP). Infogain, an Apax Funds portfolio company, has offices in California, Washington, Texas, the UK, the UAE, and Singapore, with delivery centers in Seattle, Houston, Austin, Kraków, Noida, Gurgaon, Mumbai, Pune, and Bengaluru. Show more Show less
Posted 1 week ago
7.0 - 10.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
About the role - Carry out Cyber Risk and Assurance initiatives independently while ensuring quality and timely delivery. - Perform control testing using security frameworks to determine effectiveness of the control and provide recommendations. - Review adequacy of evidence provided by Technology teams as part of control assurance activities. - Define processes to collaborate with Security and Technology teams for remediation of identified system-level control gaps and work closely with them to ensure implementation cyber security safeguards to improve security posture across the organisation. - Identify, evaluate and monitor technology risks as part of Cyber Risk and Assurance programmes. - Review security exceptions raised by Technology teams to manage the risks associated. - Drive reporting across different Cyber Risk and Assurance initiatives, including reporting to Security Leadership and Cyber/Technology governance committees. - Identify, drive and implement opportunities for process improvement across various initiatives within the Cyber Risk and Assurance team. - Build strong relationships with the stakeholders and lead internal meetings with Technology and Business Process teams. You will be responsible for - Critical thinking with strong attention to detail and good organisational skills. - Strong written, verbal communication and presentation skills, working with all levels of seniority and disciplines within the organisation - Able to build solid working relationships with internal and external stakeholders - At least one professional qualification such as CISA, CISM, CRISC CISSP or equivalent You will need - 7 to 10 years cyber security experience - IT audit and/or IT risk management - Experience of assessing security controls across a variety of technologies and products, recommending improvements where necessary - Hands on Experience with different security frameworks and standards such as ISO 27001, NIST, CIS, PCI, (e.g. controls testing, gap assessments) Whats in it for you? At Tesco, we are committed to providing the best for you. As a result, our colleagues enjoy a unique, differentiated, market- competitive reward package, based on the current industry practices, for all the work they put into serving our customers, communities and planet a little better every day. Our Tesco Rewards framework consists of pillars - Fixed Pay, Incentives, and Benefits. Total Rewards offered at Tesco is determined by four principles -simple, fair, competitive, and sustainable. Your fixed pay is the guaranteed pay as per your contract of employment. Colleagues are entitled to 30 days of leave (18 days of Earned Leave, 12 days of Casual/Sick Leave) and 10 national and festival holidays, as per the company’s policy. In addition to Statutory retirement benefits, Tesco enables colleagues to participate in voluntary programmes like NPS and VPF. Tesco promotes programmes that support a culture of health and wellness including insurance for colleagues and their family. Our medical insurance provides coverage for dependents including parents or in-laws. We offer mental health support through self-help tools, community groups, ally networks, face-to-face counselling, and more for both colleagues and dependents. Through our financial literacy partner, we offer one-to-one financial coaching at discounted rates, as well as salary advances on earned wages upon request. Our SAYE programme allows colleagues to transition from being employees to Tesco shareholders through a structured 3-year savings plan. Our green campus promotes physical wellbeing with facilities that include a cricket pitch, football field, badminton and volleyball courts, along with indoor games, encouraging a healthier lifestyle. About Us Tesco in Bengaluru is a multi-disciplinary team serving our customers, communities, and planet a little better every day across markets. Our goal is to create a sustainable competitive advantage for Tesco by standardising processes, delivering cost savings, enabling agility through technological solutions, and empowering our colleagues to do even more for our customers. With cross-functional expertise, a wide network of teams, and strong governance, we reduce complexity, thereby offering high-quality services for our customers. Tesco in Bengaluru, established in 2004 to enable standardisation and build centralised capabilities and competencies, makes the experience better for our millions of customers worldwide and simpler for over 3,30,000 colleagues Tesco Technology Today, our Technology team consists of over 5,000 experts spread across the UK, Poland, Hungary, the Czech Republic, and India. In India, our Technology division includes teams dedicated to Engineering, Product, Programme, Service Desk and Operations, Systems Engineering, Security & Capability, Data Science, and other roles. At Tesco, our retail platform comprises a wide array of capabilities, value propositions, and products, essential for crafting exceptional retail experiences for our customers and colleagues across all channels and markets. This platform encompasses all aspects of our operations – from identifying and authenticating customers, managing products, pricing, promoting, enabling customers to discover products, facilitating payment, and ensuring delivery. By developing a comprehensive Retail Platform, we ensure that as customer touchpoints and devices evolve, we can consistently deliver seamless experiences. This adaptability allows us to respond flexibly without the need to overhaul our technology, thanks to the creation of capabilities we have built. Show more Show less
Posted 1 week ago
3.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
About Us: ArcelorMittal was formed in 2006 from the strategic merger of European company Arcelor and Indian-owned Mittal Steel. Over a journey of two decades, we have emerged as the world's leading steel and mining company, exerting our influence across 60+ countries with a robust industrial footprint in 18. We are a global team of 158,00+ talented individuals committed to building a better world with smarter low-carbon steel. Our strategies are not just about scale; they're also about leading a transformative change where innovation meets sustainability. We supply to major global markets—from automotive and construction to household appliances and packaging—supported by world-class R&D and distribution networks. ArcelorMittal Global Business and Technologies in India is our new hub of technological innovation and business solutions. Here, you'll find a thriving community of business professionals and technologists who bring together diverse and unique perspectives and experiences to disrupt the global steel manufacturing industry. This fusion ignites groundbreaking ideas and unlocks new avenues for sustainable business growth. We nurture a culture fueled by an entrepreneurial spirit and a passion for excellence, which prioritizes the advancement and growth of our team members. With flexible career pathways and access to the latest technology and business tools, we offer a space where you can learn, take ownership, and face exciting challenges every day. Position Summary: SOx ITGC Lead Our Global IT Compliance Office is looking to build a SOX ITGC Testing and Quality Assurance team to perform testing and independent testing groupwide. This includes. ITGC control testing. Documentation of Test Results in Auditboard. Registering GAPS in Auditboard for non-effective controls. Quality Assurance Reviews of Test Work Papers in Auditboard Proactively checking for the timeline respect for all the Segments Making completion check reviews. Generating compliance reporting / dashboarding Ensuring all documentation complies to PCAOB standards. Our annual process starts with the revision of our SOX ITGC Framework, taking into accounts the experience from the previous year (lessons learned from our Internal Audit and our External auditors), the scope revision, the planning definition… Three testing steps (Round1, Round2, Roll Forward) are planned to cover the SOX risks over the full year. Responsibilities: Team Leadership & Management (50%): Lead, mentor, and develop a team of 17 SOx ITGC Testers, fostering a high-performance, collaborative, and learning-oriented environment. Manage resource allocation, work schedules, and individual performance to ensure efficient and effective audit execution. Conduct regular one-on-one meetings, performance reviews, and provide constructive feedback to team members. Identify training needs and opportunities for team development, promoting continuous skill enhancement and career growth. Oversee the quality assurance of the team's work products, ensuring adherence to audit standards, methodologies, and documentation requirements. Participate in the recruitment, onboarding, and retention of audit talent. ITGC Audit Execution: Conduct comprehensive assessments of IT General Controls (ITGC) impacting financial reporting. Evaluate the design and operating effectiveness of controls related to: Access Management: User provisioning, de-provisioning, access reviews, privileged access management, and segregation of duties (SoD). Change Management: System and application changes, patch management, development, testing, and promotion to production environments. IT Operations: System monitoring, job scheduling, backup and recovery procedures, incident management, and data center physical and environmental security. Program Development: Controls over system development lifecycle (SDLC) processes. Information Security: Cybersecurity measures, data loss prevention, and vulnerability management. Perform risk assessments to identify potential IT threats and vulnerabilities that could impact the integrity of financial data. Conduct detailed control testing, including walkthroughs, inspection of evidence, re-performance, and inquiry. Analyze audit evidence and document work papers with precision and detail, adhering to internal audit standards and regulatory requirements. Control Deficiency Identification and Remediation: Identify and evaluate control deficiencies, communicating findings clearly and concisely to control owners and management. Collaborate with IT and business process owners to understand root causes of deficiencies and assist in developing effective remediation plans. Monitor and track the progress of remediation efforts to ensure timely and effective closure of identified issues. Reporting and Communication: Assist in the preparation of audit reports, detailing audit scope, objectives, findings, and recommendations. Present audit findings and recommendations to senior management and external auditors. Liaise effectively with internal stakeholders (e.g., SOx Compliance team, Internal Audit, IT departments) and external auditors to facilitate SOx compliance efforts and address audit inquiries. General: Stay current with SOx regulations, PCAOB auditing standards, and evolving IT risk and control best practices (e.g., COBIT, NIST CSF, ITIL). Contribute to the continuous improvement of the ITGC audit methodology, processes, and documentation. Educate IT and business process owners on SOx ITGC requirements, risks, and controls. Review ITGC Scoping Exercises performed by the segments. Check all Segments’ RCMs (Risk Control Matrixes) for appropriateness regarding the respective BARA (Business Application Risk Assessment) files describing the scopes ITGC Testing and documenting results in Auditboard as per approved RCMs. Assisting segments with training, best practices sharing (some entities being less mature than others: new scopes, new projects…), expertise, gaps remediation… Independent Quality Assurance reviews of Test Work Papers in Auditboard Proactive monitoring of Segments regarding the predefined timeline, compliance status, deficiencies, and remediation progress with periodic reporting (control performance, open deficiencies… Supporting the central IT Compliance team in front of the internal and external auditors when required. Qualifications: BE/ BTech/ Any Master's Degree [Specify number, e.g., 3-7] years of experience in IT audit, ITGC, SOx compliance, or a related risk advisory role, preferably within a large, global organization. Big Four experience is a plus. Certifications (one or more preferred): Certified Information Systems Auditor (CISA) Certified Internal Auditor (CIA) Certified Information Security Manager (CISM) Certified Public Accountant (CPA) CISSP (Certified Information Systems Security Professional) Strong understanding of: Sarbanes-Oxley Act (SOx) Section 302 and 404 requirements. PCAOB Auditing Standards related to internal controls over financial reporting. IT General Controls (ITGC) domains (e.g., Access Management, Change Management, IT Operations, Program Development, Information Security). Common IT control frameworks (COBIT, NIST, ITIL). IT risks, processes, and controls across various technologies (e.g., ERP systems like SAP/Oracle, operating systems like Windows/UNIX/Linux, databases like Oracle/MSSQL, cloud platforms like AWS/Azure/Google Cloud). Application security, user access management, and privileged access management principles. Skills: Excellent analytical, problem-solving, and critical thinking skills with strong attention to detail. Strong written and verbal communication skills, with the ability to explain complex technical issues to non-technical audiences. Ability to work independently and manage multiple tasks and deadlines in a fast-paced environment. Proficiency in Microsoft Office Suite (Excel, Word, PowerPoint, Visio). Ability to build strong relationships and collaborate effectively with diverse teams. Proactive, self-starter, and results-oriented. Qualification and Experience: Experience 3-5 Years (Relevant) Our Values: Safety: We prioritize a proactive safety-first culture where every employee is empowered to identify and address risks, ensuring a safe working environment for all. Sustainability: We aim for long-term profitability by adapting to evolving social and environmental trends, investing in a circular and decarbonized future for steel, and contributing to a better world. Quality: We strive for excellence in products, processes, and performance through innovation, operational expertise, and a commitment to exceeding customer expectations. Leadership: We maintain a leading position through visionary thinking, a willingness to challenge conventions, and a drive to redefine steel for a new generation through innovation and strategic partnerships. Show more Show less
Posted 1 week ago
2.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
About Us: ArcelorMittal was formed in 2006 from the strategic merger of European company Arcelor and Indian-owned Mittal Steel. Over a journey of two decades, we have emerged as the world's leading steel and mining company, exerting our influence across 60+ countries with a robust industrial footprint in 18. We are a global team of 158,00+ talented individuals committed to building a better world with smarter low-carbon steel. Our strategies are not just about scale; they're also about leading a transformative change where innovation meets sustainability. We supply to major global markets—from automotive and construction to household appliances and packaging—supported by world-class R&D and distribution networks. ArcelorMittal Global Business and Technologies in India is our new hub of technological innovation and business solutions. Here, you'll find a thriving community of business professionals and technologists who bring together diverse and unique perspectives and experiences to disrupt the global steel manufacturing industry. This fusion ignites groundbreaking ideas and unlocks new avenues for sustainable business growth. We nurture a culture fueled by an entrepreneurial spirit and a passion for excellence, which prioritizes the advancement and growth of our team members. With flexible career pathways and access to the latest technology and business tools, we offer a space where you can learn, take ownership, and face exciting challenges every day. Position Summary: SOx ITGC Specialist Our Global IT Compliance Office is looking to build a SOX ITGC Testing and Quality Assurance team to perform testing and independent testing groupwide. This includes. ITGC control testing. Documentation of Test Results in Auditboard. Registering GAPS in Auditboard for non-effective controls. Quality Assurance Reviews of Test Work Papers in Auditboard Proactively checking for the timeline respect for all the Segments Making completion check reviews. Generating compliance reporting / dashboarding Ensuring all documentation complies to PCAOB standards. Our annual process starts with the revision of our SOX ITGC Framework, taking into accounts the experience from the previous year (lessons learned from our Internal Audit and our External auditors), the scope revision, the planning definition… Three testing steps (Round1, Round2, Roll Forward) are planned to cover the SOX risks over the full year. Responsibilities: ITGC Audit Execution: Conduct comprehensive assessments of IT General Controls (ITGC) impacting financial reporting. Evaluate the design and operating effectiveness of controls related to: Access Management: User provisioning, de-provisioning, access reviews, privileged access management, and segregation of duties (SoD). Change Management: System and application changes, patch management, development, testing, and promotion to production environments. IT Operations: System monitoring, job scheduling, backup and recovery procedures, incident management, and data center physical and environmental security. Program Development: Controls over system development lifecycle (SDLC) processes. Information Security: Cybersecurity measures, data loss prevention, and vulnerability management. Perform risk assessments to identify potential IT threats and vulnerabilities that could impact the integrity of financial data. Conduct detailed control testing, including walkthroughs, inspection of evidence, re-performance, and inquiry. Analyze audit evidence and document work papers with precision and detail, adhering to internal audit standards and regulatory requirements. Control Deficiency Identification and Remediation: Identify and evaluate control deficiencies, communicating findings clearly and concisely to control owners and management. Collaborate with IT and business process owners to understand root causes of deficiencies and assist in developing effective remediation plans. Monitor and track the progress of remediation efforts to ensure timely and effective closure of identified issues. Reporting and Communication: Assist in the preparation of audit reports, detailing audit scope, objectives, findings, and recommendations. Present audit findings and recommendations to senior management and external auditors. Liaise effectively with internal stakeholders (e.g., SOx Compliance team, Internal Audit, IT departments) and external auditors to facilitate SOx compliance efforts and address audit inquiries. General: Stay current with SOx regulations, PCAOB auditing standards, and evolving IT risk and control best practices (e.g., COBIT, NIST CSF, ITIL). Contribute to the continuous improvement of the ITGC audit methodology, processes, and documentation. Educate IT and business process owners on SOx ITGC requirements, risks, and controls. Review ITGC Scoping Exercises performed by the segments. Check all Segments’ RCMs (Risk Control Matrixes) for appropriateness regarding the respective BARA (Business Application Risk Assessment) files describing the scopes ITGC Testing and documenting results in Auditboard as per approved RCMs. Assisting segments with training, best practices sharing (some entities being less mature than others: new scopes, new projects…), expertise, gaps remediation… Independent Quality Assurance reviews of Test Work Papers in Auditboard Proactive monitoring of Segments regarding the predefined timeline, compliance status, deficiencies, and remediation progress with periodic reporting (control performance, open deficiencies… Supporting the central IT Compliance team in front of the internal and external auditors when required. Qualifications: BE / BTech / Any Master's Degree 2 years of experience in IT audit, ITGC, SOx compliance, or a related risk advisory role, preferably within a large, global organization. Big Four experience is a plus. Certifications (one or more preferred) Certified Information Systems Auditor (CISA) Certified Internal Auditor (CIA) Certified Information Security Manager (CISM) Certified Public Accountant (CPA) CISSP (Certified Information Systems Security Professional) Strong understanding of: Sarbanes-Oxley Act (SOx) Section 302 and 404 requirements. PCAOB Auditing Standards related to internal controls over financial reporting. IT General Controls (ITGC) domains (e.g., Access Management, Change Management, IT Operations, Program Development, Information Security). Common IT control frameworks (COBIT, NIST, ITIL). IT risks, processes, and controls across various technologies (e.g., ERP systems like SAP/Oracle, operating systems like Windows/UNIX/Linux, databases like Oracle/MSSQL, cloud platforms like AWS/Azure/Google Cloud). Application security, user access management, and privileged access management principles. Skills: Excellent analytical, problem-solving, and critical thinking skills with strong attention to detail. Strong written and verbal communication skills, with the ability to explain complex technical issues to non-technical audiences. Ability to work independently and manage multiple tasks and deadlines in a fast-paced environment. Proficiency in Microsoft Office Suite (Excel, Word, PowerPoint, Visio). Ability to build strong relationships and collaborate effectively with diverse teams. Proactive, self-starter, and result oriented. Qualification and Experience: Experience 2-4 Years Our Values: Safety: We prioritize a proactive safety-first culture where every employee is empowered to identify and address risks, ensuring a safe working environment for all. Sustainability: We aim for long-term profitability by adapting to evolving social and environmental trends, investing in a circular and decarbonized future for steel, and contributing to a better world. Quality: We strive for excellence in products, processes, and performance through innovation, operational expertise, and a commitment to exceeding customer expectations. Leadership: We maintain a leading position through visionary thinking, a willingness to challenge conventions, and a drive to redefine steel for a new generation through innovation and strategic partnerships. Show more Show less
Posted 1 week ago
13.0 years
0 Lacs
Kochi, Kerala, India
On-site
Overview Role description Seasoned SOC Manager with over 13 years of experience in cybersecurity, including 8+ years of specialized expertise and more than 3 years in leadership roles within Security Operations Centers. Proven ability to lead high-performing SOC teams (L1–L3), drive operational excellence, and strengthen organizational security posture through strategic threat detection and incident response initiatives. Key Responsibilities Led 24x7 SOC operations, managing day-to-day activities and incident response efforts. Directed a multidisciplinary team of L1, L2, and L3 analysts to ensure effective threat monitoring and rapid response. Developed, implemented, and maintained SOC policies, playbooks, standard operating procedures (SOPs), and escalation workflows. Oversaw the end-to-end lifecycle of security incidents, including detection, triage, analysis, containment, eradication, and recovery. Acted as a key liaison between security teams, IT, application stakeholders, and executive leadership during incidents and investigations. Administered and optimized security technologies such as SIEM (Splunk, QRadar, ArcSight), SOAR platforms, EDR, IDS/IPS, and threat intelligence tools. Generated and presented regular reports on SOC performance metrics, threat trends, and incident outcomes to senior leadership. Led continuous improvement initiatives, including analyst training programs, process automation, and tool enhancements. Ensured SOC compliance with industry standards, security frameworks (MITRE ATT&CK, NIST, ISO 27001), and regulatory requirements (GDPR, HIPAA, PCI-DSS). Managed SOC staffing activities, including recruitment, onboarding, shift scheduling, and performance evaluations. Skills SOC, SIEM, Threat Monitoring Show more Show less
Posted 1 week ago
25.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
Role Description Who we are: Born digital, UST transforms lives through the power of technology. We walk alongside our clients and partners, embedding innovation and agility into everything they do. We help them create transformative experiences and human-centered solutions for a better world. UST is a mission-driven group of over 30,000+ practical problem solvers and creative thinkers in over 30+ countries. Our entrepreneurial teams are empowered to innovate, act nimbly, and create a lasting and sustainable impact for our clients, their customers, and the communities in which we live. With us, you’ll create a boundless impact that transforms your career—and the lives of people across the world. Visit us at Chief Infrastructure Architect - Director You Are A visionary and highly experienced Chief Infrastructure Architect to lead the enterprise-wide technology architecture across all infrastructure domains. With over 25+ years of proven expertise, the ideal candidate will shape the strategy, design, and transformation of complex infrastructure landscapes—including Wintel, Linux, Network, Voice, Collaboration, Mobility, Observability, End-User Computing, End-User Services, and Service Desk. This role acts as a key advisor to senior leadership and ensures that infrastructure investments align with organizational goals, operational resilience, scalability, and innovation. The Opportunity Define and lead the end-to-end infrastructure architecture strategy for enterprise systems, ensuring alignment with digital transformation goals. Design scalable, secure, and high-performing solutions across multiple domains: Wintel & Linux platforms Network (LAN/WAN/SD-WAN, Wireless, Firewalls) Unified Communication/Voice/Collaboration (Cisco, MS Teams) Mobility & Endpoint Management (Intune, MDM/UEM) Observability and Monitoring (ELK, Prometheus, AppDynamics, etc.) End-User Computing (VDI, physical endpoints, OS lifecycle) End-User Services and Service Desk (ITSM, automation, FCR, CSAT) Serve as a trusted advisor to business and IT executives, translating business requirements into future-ready technical solutions. Lead the architecture governance process and ensure adherence to enterprise standards and regulatory frameworks. Guide infrastructure modernization efforts (cloud adoption, automation, containerization, Zero Trust, SASE, etc.) Evaluate emerging technologies and provide recommendations for adoption or piloting. Collaborate with delivery, engineering, security, DevOps, and application teams to ensure cohesive solutions. Create blueprints, reference architectures, and roadmaps for transformation initiatives. Review RFPs/RFIs and support pre-sales and solutioning efforts for large-scale deals. Mentor a team of architects and senior engineers across domains, fostering knowledge sharing and architectural excellence. What You Need Bachelor’s or Master’s degree in Computer Science, Engineering, or related field. 20+ years of experience in IT Infrastructure and Architecture, with deep, hands-on exposure across all major domains. Proven track record in designing and delivering enterprise-grade infrastructure architectures at scale. Strong knowledge of ITSM, ITIL, and service management practices. Expertise in both traditional data center and cloud-native infrastructures (AWS, Azure, Hybrid Cloud) Excellent communication, leadership, and stakeholder management skills. Deep understanding of security frameworks, DR/BCP planning, and compliance mandates (ISO, NIST, etc.) Preferred Certifications TOGAF or equivalent Enterprise Architecture certification. ITIL Expert / Foundation v4 Microsoft, Cisco, VMware, or Red Hat advanced certifications. Cloud Architect Certifications (AWS Solution Architect Professional, Azure Solutions Architect Expert) What We Believe We’re proud to embrace the same values that have shaped UST since the beginning. Since day one, we’ve been building enduring relationships and a culture of integrity. And today, it's those same values that are inspiring us to encourage innovation from everyone, to champion diversity and inclusion, and to place people at the center of everything we do. Humility We will listen, learn, be empathetic and help selflessly in our interactions with everyone. Humanity Through business, we will better the lives of those less fortunate than ourselves. Integrity We honor our commitments and act with responsibility in all our relationships. Equal Employment Opportunity Statement UST is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. UST reserves the right to periodically redefine your roles and responsibilities based on the requirements of the organization and/or your performance. Skills Solution Architecture,Architecture,Technical Architecture Show more Show less
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The job market for NIST (National Institute of Standards and Technology) professionals in India is rapidly growing. As more companies focus on cybersecurity and data protection, the demand for individuals skilled in NIST guidelines and frameworks is on the rise. Job seekers with expertise in NIST can find a variety of opportunities across different industries in India.
These cities are known for their thriving tech industries and have a high demand for NIST professionals.
The average salary range for NIST professionals in India varies based on experience level. Entry-level positions may start around INR 4-6 lakhs per year, while experienced professionals can earn upwards of INR 15-20 lakhs per year.
In the field of NIST, a typical career path may include roles such as NIST Analyst, NIST Consultant, and NIST Manager. As professionals gain more experience and expertise, they can progress to Senior NIST Consultant, NIST Architect, and even Chief Information Security Officer (CISO).
In addition to expertise in NIST, employers often look for professionals with the following related skills: - Cybersecurity - Risk management - Compliance - Information security - Security frameworks (e.g., ISO 27001)
As you explore opportunities in the NIST job market in India, remember to showcase your expertise, stay updated with industry trends, and prepare thoroughly for interviews. With the right skills and preparation, you can confidently pursue a successful career in NIST in India. Best of luck!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.