Home
Jobs

1642 Nist Jobs - Page 29

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 4.0 years

15 - 17 Lacs

Hyderabad

Work from Office

Naukri logo

Overview Omnicom Global Solutions is an integral part of Omnicom Group, a leading global marketing and corporate communications company. Omnicom’s branded networks and numerous specialty firms provide advertising, strategic media planning and buying, digital and interactive marketing, direct and promotional marketing, public relations, and other specialty communications services to over 5,000 clients in more than 70 countries. OGS India plays a critical role for our group companies and global agencies by providing stellar products, solutions, and services across Creative Services, Technology, Marketing Science (Data & Analytics), Advanced Analytics, Market Research, Business Support Services, Media Services, and Project Management. With over 4000 talented colleagues in India, we are growing rapidly and are looking for professionals like you to help build the next chapter of our journey. Responsibilities Conduct cybersecurity and privacy risk assessments in alignment with internal frameworks and regulatory requirements. Engage with risk owners and business stakeholders to manage and mitigate identified risks. Develop and present risk reports to senior leaders and governance forums. Advise on cybersecurity architecture and leading practices to strengthen the enterprise risk posture. Assist global agency teams and networks with compliance to cybersecurity regulations and requirements. Monitor the global threat landscape and identify emerging risks; implement proactive control measures. Contribute to the maintenance and effectiveness of the Information Security Management System (ISMS). Participate in risk governance, compliance programs, and strategic risk reduction initiatives. Qualifications 3–5 years of experience in information risk management, cybersecurity, or GRC domains. Proficiency in risk assessment methodologies, threat modelling, and risk mitigation practices. Strong knowledge of cybersecurity frameworks and standards (e.g., ISO 27001, NIST, CIS, GDPR). Experience preparing risk reports and dashboards for leadership audiences. Excellent collaboration and stakeholder engagement skills across global teams. Analytical mindset with the ability to evaluate and prioritize risks effectively. Preferred Qualifications Industry certifications such as CRISC, CISM, CISSP, ISO 27001 Lead Implementer, or similar. Exposure to cloud security risk and compliance monitoring tools. Experience working within enterprise ISMS or regulatory compliance programs .

Posted 1 week ago

Apply

2.0 - 5.0 years

17 - 19 Lacs

Hyderabad

Work from Office

Naukri logo

Overview Omnicom Global Solutions is an integral part of Omnicom Group, a leading global marketing and corporate communications company. Omnicom’s branded networks and numerous specialty firms provide advertising, strategic media planning and buying, digital and interactive marketing, direct and promotional marketing, public relations, and other specialty communications services to over 5,000 clients in more than 70 countries. OGS India plays a critical role for our group companies and global agencies by providing stellar products, solutions, and services across Creative Services, Technology, Marketing Science (Data & Analytics), Advanced Analytics, Market Research, Business Support Services, Media Services, and Project Management. With over 4000 talented colleagues in India, we are growing rapidly and are looking for professionals like you to help build the next chapter of our journey. Let’s build this together! Responsibilities Operate day-to-day Information Security Governance, Risk, and Compliance (GRC) activities across the organization. Support alignment and implementation of security standards including ISO 27001, PCI, NIST, and TISAX. Assist in the execution of Information Security Risk Management policies and procedures. Collaborate on internal and external audit activities, and track remediation efforts to closure. Support documentation, reporting, and evidence gathering for compliance and regulatory assessments. Contribute to the continuous improvement of governance processes, control effectiveness, and risk posture. Coordinate with business units and IT teams to ensure governance standards are understood and adhered to. Qualifications 3–5 years of experience in information security governance, risk, compliance, or audit. Working knowledge of ISO 27001, PCI-DSS, NIST, TISAX, or other major regulatory frameworks. Experience with policy implementation, risk assessment methodologies, and audit coordination. Ability to evaluate and articulate compliance requirements to technical and non-technical teams. Strong documentation, analytical, and reporting skills with attention to detail. Excellent interpersonal and communication skills to work cross-functionally. Preferred Qualifications Certifications such as ISO 27001 Lead Implementer/Auditor, CISA, or similar. Experience with GRC platforms and tools. Exposure to vendor risk management and compliance monitoring.

Posted 1 week ago

Apply

7.0 years

0 Lacs

Greater Hyderabad Area

On-site

Linkedin logo

Job Description Role Profile: The Cyber and IT Audit Manager will oversee IT and cybersecurity audits, managing a team of auditors to assess IT processes and Operational Technology (OT) environments. The manager will ensure audits are aligned with the company’s strategic objectives and regulatory requirements, with a focus on delivering value and identifying critical risks in IT and cybersecurity. This role includes responsibility for overseeing security assessments and implementing audit methodologies that support continuous improvement. Responsibilities ' Manage and execute a portfolio of IT and cybersecurity audits, focusing on complex audits related to IT general controls, cybersecurity frameworks, and OT environments. Oversee medium complexity security assessments for IT and OT systems, ensuring comprehensive audit coverage. Collaborate with the CAE, IT audit Director and IT stakeholders to build an audit pipeline, addressing emerging risks and identifying areas for process improvement. Lead the development of audit programs and methodologies, ensuring alignment with industry best practices and regulatory frameworks (e.g., NIST, COBIT, IEC 62443). Manage audit staff, providing guidance and ensuring adherence to professional standards (IIA, ITGC). Present audit findings to senior management, communicating risks, recommendations, and opportunities for improvement. Qualifications ' 7+ years of experience in IT auditing, cybersecurity, and OT systems. Proven experience managing audits and teams, with a focus on IT governance, cybersecurity, and risk management. Expertise with security assessment tools (e.g., Nmap, Nessus, Kali Linux, Metasploit, Burp Suite) and audit methodologies for IT and OT systems. Strong understanding of industry frameworks (NIST, COBIT, ISO 27001, MITRE ATT&CK) and IEC 62443 for OT environments. OT knowledge and experience is highly desirable. Certifications such as CISSP, CISA, CISM, OSCP, OSWP, CRTP, CEH, HTB CPTS, HTB CBBH, HTB CWEE are preferred. Bachelor’s or Master’s degree in Information Technology, Cybersecurity, or related disciplines. Strong leadership, project management, and communication skills, with the ability to influence stakeholders at all levels. At Nextracker, we are leading in the energy transition, providing the most comprehensive portfolio of intelligent solar tracker and software solutions for solar power plants, as well as strategic services to capture the full value of solar power plants for our customers. Our talented worldwide teams are transforming PV plant performance every day with smart technology, data monitoring and analysis services. For us at Nextracker, sustainability is not just a word. It's a core part of our business, values and our operations. Our sustainability efforts are based on five cornerstones: People, Community, Environment, Innovation, and Integrity. We are creative, collaborative and passionate problem-solvers from diverse backgrounds, driven by our shared mission to provide smart solar and software solutions for our customers and to mitigate climate change for future generations. Culture is our Passion Show more Show less

Posted 1 week ago

Apply

2.0 years

0 Lacs

Kanpur, Uttar Pradesh, India

On-site

Linkedin logo

Description We are looking for a motivated and detail-oriented System Engineer to join our IT Security team. The ideal candidate will assist in monitoring and responding to cybersecurity alerts, supporting incident response efforts, helping to develop and enforce security policies, conducting cybersecurity awareness initiatives, and coordinating with government and industry cybersecurity bodies. Responsibilitie sManage and coordinate responses to cybersecurity incidents, including identifying, analysing, and mitigating the impact of security threats and breaches .Contribute to the development and implementation of IT security policies, ensure organizational compliance, and periodically review policies to align with evolving threats and technologies .Organize training sessions, simulations, and awareness campaigns to educate employees on cybersecurity best practices and protocols .Maintain communication with CERT-In and other relevant government and industry organizations to stay informed about emerging threats and collaborate on security initiatives .Stay updated with current cybersecurity trends, participate in relevant training, earn certifications (e.g., CISSP, CEH, CISM), and attend industry conferences . Eligibili tyBachelor's degree in Computer Science, Information Technology, or a related field (or equivalent practical experience ).Strong understanding of Networking, Operating Systems, System Administration, Threats, and Vulnerabilitie s.Familiarity with cybersecurity frameworks such as NIST, ISO 27001, and CIS Control s.Knowledge of national and international cybersecurity standards, regulations, and best practice s.Professional, courteous, cooperative, and a team player with a high level of integrit y.Excellent communication, presentation, negotiation, and interpersonal skill s.Experience and maturity in interacting with senior stakeholders and building trusted relationship s.Proven ability to manage internal and external communications during and after security incident s.Minimum of 2 years’ experience in security technologies as a Support Engineer or Analys t.Experience in analysing logs from multiple sources (e.g., network devices, servers, applications) to detect and respond to security incident s.Skilled in developing and executing incident response plans, with knowledge of forensics, threat hunting, and investigative technique s.Ability to gather, interpret, and apply cyber threat intelligence to strengthen security postur e.Proficient in scripting languages like Python and PowerShell for automation and tool developmen t.Experience in patch management to ensure systems are secure and up to dat e. Desired Eligibil ityProfessional certifications such as CISSP, CISM, CEH, CompTIA Security+, or similar recognized credentia ls. Tr avelAs and when required, across the country for project execution and monitoring, as well as for coordination with geographically distributed te ams. Communic ationSubmit a cover letter summarising your experience in relevant technologies and software, along with a resume and the Latest passport-size photog raph. Show more Show less

Posted 1 week ago

Apply

5.0 - 10.0 years

20 - 30 Lacs

Jaipur

Work from Office

Naukri logo

PURPOSE OF THE POSITION: We are looking for a highly skilled Information Security Manager to lead and implement ISO 27001 compliance, cybersecurity strategies, and risk management within our organization. The ideal candidate will establish and maintain security policies, manage information security risks, and ensure compliance with regulatory standards like SOC2, GDPR, and NIST frameworks. ROLES & RESPONSIBILITIES: ISO 27001 Implementation & Compliance : - Develop, implement, and maintain an Information Security Management System (ISMS) aligned with ISO 27001 standards. - Conduct ISO 27001 gap analysis, risk assessments, and audits to ensure compliance. - Define and enforce information security policies, procedures, and controls to safeguard data integrity, confidentiality, and availability. - Drive ISO 27001 certification efforts, ensuring successful audits and continuous improvements. - Lead security awareness training programs for employees to enhance the organization's security posture. Cybersecurity Strategy & Risk Management : - Develop and implement a cybersecurity strategy to protect against threats, vulnerabilities, and attacks. - Conduct regular penetration testing, vulnerability assessments, and security audits to identify and mitigate risks. - Implement Zero Trust architecture, access control mechanisms, and security best practices across IT infrastructure. - Monitor threat intelligence, security incidents, and cyber threats, responding with effective mitigation strategies. - Ensure security of cloud infrastructure (AWS, Azure, GCP) by enforcing IAM policies, encryption, and secure configurations. - Establish and manage a Security Incident Response Plan (SIRP) for rapid threat detection and mitigation. Regulatory Compliance & Governance : - Ensure compliance with ISO 27001, SOC2, GDPR, NIST, PCI-DSS, and other industry security frameworks. - Collaborate with internal teams to align security policies with business operations and regulatory requirements. - Work with external auditors and security consultants to maintain compliance certifications and regulatory audits. - Develop and maintain security metrics, dashboards, and reports for leadership and regulatory bodies. Security Operations & Monitoring : - Oversee SIEM (Security Information and Event Management) solutions for real-time threat detection. - Implement and manage Intrusion Detection & Prevention Systems (IDS/IPS), firewalls, and endpoint security solutions. - Develop and enforce incident response, disaster recovery, and business continuity plans. - Ensure data protection, encryption, and secure backup strategies are in place for all critical systems. EDUCATIONAL QUALIFICATION: Any Technical Degree BTech., B.E. BCA, MCA will be preferred. REQUIRED SKILLS & QUALIFICATIONS: - 5+ years of experience in information security, cybersecurity, or compliance roles. - Strong expertise in ISO 27001 implementation, auditing, and certification. - Hands-on experience with security risk assessments, vulnerability management, and threat modeling. - Deep understanding of cybersecurity frameworks (SOC2, NIST, CIS, GDPR, PCI-DSS). - Experience with SIEM solutions (Splunk, ELK, QRadar, or similar) for security monitoring. - Knowledge of firewalls, IDS/IPS, endpoint protection, and cloud security best practices. - Strong understanding of IAM, network security, encryption, and access control policies. - Certifications like CISM, CISSP, CISA, CEH, ISO 27001 Lead Auditor/Implementer are highly preferred. - Strong problem-solving, communication, and stakeholder management skills. PROFESSIONAL ATTRIBUTES: - Strong interpersonal and communication skills, being an effective team player, being able to work with individuals at all levels within the organization and building remote relationships. - Excellent English skills and experience working within a multi-location team. - Excellent prioritization skills, the ability to work well under pressure, and the ability to multi- task. - Ability to work independently with minimal supervision and to resolve problems on non-routine matters. WHY JOIN US? - Opportunity to be part of a rapidly growing, innovative product-based company. - Collaborate with a talented, driven team focused on building high-quality software solutions. - Competitive compensation and benefits package.

Posted 1 week ago

Apply

0.0 - 1.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Job Description Summary We are looking for a smart, security-minded, enthusiastic and friendly cyber security advisor who can work collaboratively with development teams to complete design and SDLC work for Products and Systems. Product Cyber-security Specialist is responsible for the analysis of controllers, systems for cyber security requirements. Conduct tests to verify Cyber security levels and recommend mitigation plans for products, systems during product development stages. As a member of a global and matrixed team, she/he will also be responsible for guiding secure design, testing of different products, control systems. Job Description Essential Responsibilities Involve in reviews, suggest changes, conduct tests to ensure systems, controllers to meet Cyber security requirements. Facilitate decisions and bring teams together to design and document software architecture, modularity, and future- proofing. Support/Involve development of proofs-of-concept to prove out strategy and manage development and product risks. Support production of technical documentation for software architecture, design, verification plans. Engage with development teams and ensure all software developed is compliant to Cyber-security requirements. Collaborate with a team of controls and system engineers developing operational technology software for various subsystems. The position requires an understanding of OT System, cloud application architecture and conversant with all Cyber security requirements. This role requires strong cooperation with system and subsystem teams necessary for command and control of the systems involved. Work with multiple teams in different location to identify vulnerability, suggest remediation to the software to meet customer requirements. Contribute to multi-generation product and tool planning. Qualifications/Requirements Bachelor in computer science/Cyber Security or relevant engineering or equivalent knowledge / experience with 0-1 Years of Experience. Good understanding in Cyber security for Controller, Systems in OT Space. Familiar with penetration testing for Controllers, Systems, Web software’s, CAPEC, Ethical hacking. Good Knowledge/worked on Cyber security tools and solutions like Wireshark, NESSUS, Burp Suite, Nmap, Nozomi, Claroty, Splunk, Acronis, Ivanti, etc. Knowledge in different phases of Software Development Life cycle (SDLC) including Design, Implementation and Testing. Knowledge on web technologies like JavaScript, jQuery, AJAX, JSON, AngularJS, Angular 6, NodeJs, Spring, Hibernate, Spring boot, MVC, RESTful Web Services, Flux, SOAP will be an added advantage. Knowledge on database RDBMS, MySQL NoSQL databases will be an added advantage. Software component: MS Visual Studio, MS Office, MS Visio, SVN, GitHub Linux and Windows OS Familiar with ISA 624443, NIST 800 standards will be an added advantage. Familiar on active directory, certificate management and hardening w.r.t CIS benchmarks for critical assets like switches, windows-based workstation and controllers. Familiar with threat modelling and risk assessment for OT products Additional Information Relocation Assistance Provided: Yes Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

About Us SBI Card is a leading pure-play credit card issuer in India, offering a wide range of credit cards to cater to diverse customer needs. We are constantly innovating to meet the evolving financial needs of our customers, empowering them with digital currency for seamless payment experience and indulge in rewarding benefits. At SBI Card, the motto 'Make Life Simple' inspires every initiative, ensuring that customer convenience is at the forefront of all that we do. We are committed to building an environment where people can thrive and create a better future for everyone. SBI Card is proud to be an equal opportunity & inclusive employer and welcome employees without any discrimination on the grounds of race, colour, gender, religion, creed, disability, sexual orientation, gender identity, marital status, caste etc. SBI Card is committed to fostering an inclusive and diverse workplace where all employees are treated equally with dignity and respect which makes it a promising place to work. Join us to shape the future of digital payment in India and unlock your full potential. Role Purpose Responsible for planning and coordinating with IT and business functions on security architecture & design principle to supports the maintenance of information security, ensuring the integrity, availability & confidentiality of SBI Card internal and customer’s information hosted in cloud. The role is also responsible for assuring that all technology solutions and services being delivered are compliant with our ISMS and that all exceptions and risks are documented and managed. Role Accountability Cloud Security Architecture Lead the design and development of Azure and AWS security architectures for protecting PII/PCI data deployed into different types of cloud and cloud/hybrid systems Lead the security vision and strategy around cloud-based applications, across all types (including Infrastructure, Platform, and Software as a Service (IaaS/PaaS/SaaS) Serve as the central point of contact for Enterprise Security for other Technology teams within the organization for all matters related to cloud security Design and develop security architectures for cloud and cloud/hybrid based systems. Possess a firm understanding of the offerings within Amazon Web Services (AWS) and the Microsoft Azure platforms Design and implement cloud-native architectures and designs that will allow those requirements to be met with a minimal degree of risk to Organization and with appropriate security controls present Represent Security Platform in development and implementation of the overall enterprise cloud architecture Act as the ambassador and senior technical representative for Enterprise Security while engaging with other senior technical leaders throughout organization in design and implementation of cloud and cloud/hybrid based implementations and solutions Works with IT Infrastructure Services, and Application Development organizations to choose appropriate technology solutions and facilitates complete integration into the company environments Develop standards in partnership with Engineering, Infrastructure Services, and Application Development. Lead initiatives designed to share knowledge across Security Platforms and/or Technology teams, identify, recommend, coordinate and deliver timely knowledge to support teams regarding technologies, processes or tools Oversees the development and maintenance of the information security strategy and develop and execute strategies to increase Cloud Security knowledge throughout the enterprise Ensures the effective translation of the security architecture is implemented into the solutions Assist to evaluate all the new initiatives/solutions (including Cloud) with the design recommendations and work with project managers and architects during implementation New Technology & Risks Evaluate and recommend tools and solutions to enhance the security posture of the Enterprise Maintain contact with vendors regarding security system updates and technical support of security products Perform cost-benefit and risk analysis- Analyzes business impact and exposure, based on emerging security threats, vulnerabilities and risks Project Management Lead project implementation for Information risk management projects Ensure integration of security requirements in project design, timely and high quality delivery of projects Partner with SecOps to develops operational run book to ensure smooth transition post implementation Liaison with IT teams and other biz functions to ensure security is engaged in all projects Ensure process documentation and compliance adherence Measures of Success Successful implementation/ adoption of any new solution, technology or framework Timely and in- budget delivery of security projects specifications within time and budget Timely delivery of Cloud Security Architecture covering all types (including Infrastructure, Platform, and Software as a Service (IaaS/PaaS/SaaS) Process Adherence as per MOU Technical Skills / Experience / Certifications Knowledge of enterprise IT Systems, infrastructure and security technologies Knowledge of Information Security Standards like ISO 27001, PCI-DSS, NIST CSF, CSA framework etc. Working knowledge of common and industry standard cloud-native/cloud-friendly authentication mechanisms (OAuth, OpenID, etc.) Experience with deployment orchestration, automation, and security configuration management (Jenkins, Puppet, Chef, etc.) preferred Experience architecting solutions within Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP), VMware NSX, Oracle etc. Experience with assessment, development, implementation, optimization, and documentation of a comprehensive and broad set of security technologies and processes such as secure software development, Application Security, data protection, cryptography, key management, identity and access management (IAM), network security) within SaaS, IaaS, PaaS, and other cloud environments Experience working with cloud security and governance tools, cloud access security brokers (CASBs), and server virtualization technologies Experience with enterprise applications (architecture, development, support, and troubleshooting) Experience performing threat modeling and design reviews to assess security implications and requirements for introduction of new technologies Working knowledge of compliance frameworks and security management standards (e.g., ISO 27001, NIST CSF, CIS etc.) Experience with enterprise architecture and working as part of a cross-functional team to implement solutions Industry standard certifications such as CISSP, CISM, CCSP, CEH, CHFI, Cloud security, ISO27001, SABSA, TOGAF, AWS, Azure etc. Qualification B.Tech / B.E Graduate in IT/Computer Science or equivalent Show more Show less

Posted 1 week ago

Apply

2.0 - 5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Overview ormation Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunk…etc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Micro…etc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organization’s way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned Qualifications B. Tech, B.E or M.C.A 2-5 years’ Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills Show more Show less

Posted 1 week ago

Apply

4.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Role: SOC Analyst Location: Kharadi, Pune Life Unlimited. At Smith+Nephew, we design and manufacture technology that takes the limits off living! The Security Analyst works on the detection and response for potential security incidents on the Smith & Nephew network, systems, and applications. This includes technical analysis and incident management, communications, and reporting. The role works with the Global SOC Manager. The work includes partnering closely with other functions within Information Security, with outsourced tier 1 SOC functions, with the wider IT team including Service Desk, as well as with HR, Legal, Procurement, and other functions. The role interacts with end users and technical resolver teams within Smith & Nephew as well as outsourced suppliers. The working hours are Monday to Friday (11AM - 8PM IST). What will you be doing? Complete alert and incident response activities following standard runbooks and processes, with work to include the initial triage and analysis, recording of the incident with all relevant details to high standards, and documenting all containment and response actions. Uses Smith+Nephew technology platforms and security tools to conduct investigations such as threat hunting or other proactive investigations outside the incident process. Write comprehensive reports including assessment-based findings, outcomes, and propositions for enhancements such as new detection plays, new runbooks or playbooks, process improvements, or tuning detection rules. Mentoring and coaching other team members, sharing skills and experience to enable higher levels of performance. Provide technical domain expertise to projects and initiatives aimed at improving the capability and maturity of Smith & Nephew information security practices. What will you need to be successful? Bachelor´s degree in Computer Science or a related subject preferred or equivalent experience. Licenses/Certifications: Relevant entry- or mid-level security certifications are advantageous but not required. Job-specific training will be provided. Experience: At least 4 years of experience in a relevant Information Security role. Experience working hands-on with SIEM and EDR/XDR technologies for the identification and response to existing and emerging threats. Familiar with MITRE ATT&CK for the identification and mapping of attacker tactics, techniques, and procedures (TTPs). Familiarity with network models (OSI and TCP/IP), common network terminology and concepts, and network equipment. Must be able to correctly interpret logs for firewalls (including WAF and IDS/IPS), Windows and Linux operating system logs, AWS and Azure cloud logs. Familiarity with web-related technologies (Web applications, Web Services, Service Oriented Architectures) and network/web-related protocols. Competences: Understanding of industry frameworks such as MITRE ATT&CK, MITRE D3FEND, NIST CSFv2, and NIST SP800-61r2. Using SIEM (including scripted query languages) and EDR/XDR technologies, threat intelligence tools, and ITSM tools. Familiarity with AWS and Azure cloud technologies and cloud security standards (CSA or equivalent). Understanding of API security and familiarity with AI security concepts (such as NIST AI RMF). Familiarity with ITIL methodology and terminology. Excellent written and oral communication skills, service attitude, and analytical approach to problem solving. Ability to work independently without daily direction, balancing conflicting priorities, and effectively tracking and managing task completion to committed deadlines. You. Unlimited. We believe in crafting the greatest good for society. Our strongest investments are in our people and the patients we serve. Inclusion, Diversity and Equity- Committed to Welcoming, Celebrating and Thriving on Diversity, Learn more about Employee Inclusion Groups on our website (https://www.smith-nephew.com/ ). Other reasons why you will love it here! Your Future: Major medical coverage + policy exclusions and insurance non-medical limit. Educational Assistance. Work/Life Balance: Flexible Personal/Vacation Time Off, Privilege Leave, Floater Leave. Your Wellbeing: Parents/Parents in Law’s Insurance (Employer Contribution of 7,000/- annually), Employee Assistance Program, Parental Leave. Flexibility: Hybrid Work Model (For most professional roles) Training: Hands-On, Team-Customized, Mentorship Extra Perks: Free Cab Transport Facility for all employees; One-Time Meal provided to all employees as per shift. Night shift allowances. Stay connected and receive alerts for jobs like this by joining our talent community. We're more than just a company - we're a community! Follow us on LinkedIn to see how we support and empower our employees and patients every day. Check our Glassdoor page for a glimpse behind the scenes and a sneak peek into You. Unlimited. , life, culture, and benefits at S+N. Explore our new website and learn more about our mission, our team, and the opportunities we offer. Show more Show less

Posted 1 week ago

Apply

10.0 - 15.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

At Cadence, we hire and develop leaders and innovators who want to make an impact on the world of technology. Job Description Position: IT- Staff Software Security Engineer Grade: IT4 Location: Noida/Hyderabad Job Description: Role: Cadence’s Information Security team is seeking a Sr. Software Security Engineer. This role will focus on Cloud and on-premise Software Security controls including WAF and CDN tools. This is a Security Development Operations role that will ensure security tool integration at the source code repo (Perforce, Github etc.), build environment, and artifactory level. As a member of the Information Security team, this role will develop and support the secure software develop life cycle, including DAST, SAST, SCA, penetration testing, and attack surface management. This role reports to Group Director and will interface directly with development teams. Of course, there is broad exposure to other aspects of information security related tasks such as incident response, vulnerability management, and deployment of security solutions. The successful candidate for this position is a highly motivated individual with a strong Application Development and Configuration Management/DevOps background with hands-on experience in building software security within CI/CD. Required Skills & Qualification Hands-on experience in securing corporate environment. Hands-on experience in security frameworks (NIST, ISO 27001, CIS) and experience with risk management and compliance Hands-on experience securing Windows (Workstations and Servers), Linux (Workstations and Servers), and Mac Hands-on experience conducting risk management by identifying gaps and providing strategies for mitigation. Hands-on experience documenting vulnerability assessment results in a clear and actionable format. Expertise in network security, firewalls, IDS/IPS, and security monitoring tools such as SIEM Proficiency with cloud security technologies (AWS, Azure, GCP) and securing cloud-based infrastructure. Experience with incident response, forensics, and managing security incidents from detection to resolution. Determines security violations and inefficiencies. Knowledge of mergers and acquisitions Experience: Should have relevant experience of at least 10-15 years. Qualification: Engineering (Computers, Electronics, IT) or equivalent We’re doing work that matters. Help us solve what others can’t. Show more Show less

Posted 1 week ago

Apply

1.0 years

0 Lacs

Itanagar, Arunachal Pradesh, India

Remote

Linkedin logo

About AccuKnox Careers 2025 AI-Powered Zero Trust CNAPP. Launched in 2020 in co-partnership with Stanford Research Institute (www.sri.com) and is anchored on seminal patented inventions in the areas of Container Security, Anomaly Detection, and Data Provenance. AccuKnox can be deployed in Public and Private Cloud environments. AccuKnox has received seed funding from SRI, National Grid Ventures, z5Capital, and Outliers.vc Candidates Also Search: Software Engineer Jobs AccuKnox Careers 2025 Details Company Name AccuKnox Job Role Solution Engineer Trainee Job Type Full Time Job Location Remote India Education BE/ B.Tech/ M.Sc/ MCA Career Level 0 – 1 Years Salary Not Mentioned Company Website www.accuknox.com Job Description For AccuKnox Careers 2025 Candidates Also Search: Fresher Jobs AccuKnox Pre-Sales Engineering Support: Provide support to customers, partners in supporting Demos, POC (Proof of Concept), AccuKnox Product Marketing Support: Provide support in the area of Product Marketing – Data Sheets, White Papers, Blogs, Videos, Collaterals Security Research: Understand industry compliance, governance standards (PCI, SOC2, GDPR, CCPA, HIPAA), Security Frameworks (MITRE, CIS, OWASP, NIST STIGs), Current and Emerging Threats, Attack vectors (Ransomware, Bitcoin, Zero day) AccuKnox Product Testing: Play the role of “voice of customer” in AccuKnox product testing Skills Required Cloud Platforms: GCP, AWS, Azure, Kubernetes, Openstack, Linux CyberSecurity Products: Aqua, Tigera, Twistlock, Sysdig, Trivy, Clair, Snyk, Anchore, WireShark Development Tools/Languages: Python, Golang, Java, SQL, NoSQL, NumPY Certifications: CKA, CKAD, CKS Compliance, Governance Frameworks: Governance standards (PCI-DSS, SOC2, GDPR, CCPA, HIPAA) Security Frameworks (MITRE, CIS, OWASP, NIST, STIGs) Excellent Communication Skills – Written, Verbal [Word, Excel, PPT, Zoom] Bonus points for Open Source Contributions Experience operating in a 24X7 SOC Writing insightful blogs, white papers Presentations at RSA, BlackHat, DefCon, BSides, etc. Terraform and/or ansible, vault a plus Candidates Also Search: BE/ B.Tech Jobs Qualifications BE, B.Tech, MCA, MSC in Computer Science Knowledge of Public Cloud platforms (AWS, Azure, GCP) preferred MBA preferred Excellent written, verbal, presentation, communication skills AccuKnox Careers 2025 Application Process DOUBLE CLICK TO APPLY ONLINE ! We wish you the best of luck in your AccuKnox Careers 2025 . May your talents shine, and may you find the perfect opportunity that not only meets your professional goals but also brings joy to your everyday work. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Karnataka, India

On-site

Linkedin logo

NIKE, Inc. does more than outfit the world's best athletes. It is a place to explore potential, obliterate boundaries and push out the edges of what can be. The company looks for people who can grow, think, dream and create. Its culture thrives by embracing diversity and rewarding imagination. The brand seeks achievers, leaders and visionaries. At NIKE, Inc. it's about each person bringing skills and passion to a challenging and constantly evolving game. NIKE is a technology company. From our flagship website and five-star mobile apps to developing products, managing big data and providing leading edge engineering and systems support, our teams at NIKE Global Technology exist to revolutionize the future at the confluence of tech and sport. We invest and develop advances in technology and employ the most creative people in the world, and then give them the support to constantly innovate, iterate and serve consumers more directly and personally. Our teams are innovative, diverse, multidisciplinary and collaborative, taking technology into the future and bringing the world with it. Who Are We Looking For We're looking for an Information Security Analyst to join Nike's Corporate Information Security Governance, Risk, and Compliance (GRC) team, which is responsible for enterprise wide GRC ensuring Nike leadership has the information needed to make strategic risk-based decisions and maintain compliance with international regulations while enabling the achievement of Nike business objectives globally. This role will meet with business and technology teams across Nike and consult with them on their security and compliance requirements. We are looking for an individual who is passionate about GRC, someone with a good working knowledge of industry best practice frameworks, such as ISO, NIST and CoBIT. What Will You Work On If this is you, you'll be working with the GRC team and performing these key tasks: Assess moderately complex platforms against Nike security and configuration standards Evaluate and process exceptions to information security policies and standards Participate in complex internal risk assessments, identifying information security risks through analysis of threats and vulnerabilities, and reporting on those risks to Nike business and technology owners Perform risk assessments of critical third-party vendors and ensure the business objectives align with the type and volume of data used in maintaining a "need to know/use" mindset Utilize your thorough understanding of ITGC's to consult with Technology units on compliance matters Champion information security policies, standards, controls, and processes so that compliance requirements are addressed as part of "business as usual" operations Lead Nike business units in control design and control operations related in support of compliance requirements Perform Compliance control validation testing to determine the operating effectiveness of IT controls for scoped systems Provide analysis and insights into data supporting the effectiveness of technical and process-based cyber security controls and establish automated data pipelines that feed data visualization tools, such as Tableau Collaborate effectively with NIKE leaders, managers, employees, and partners to provide deliberate and thoughtful engagement throughout NIKE Help drive execution of the Information Security training programs. Ensure the workforce stays fully informed on information security through formal trainings and oversee the development and delivery of security training and awareness campaigns Effective, positive verbal and written communication skills and experienced creating and developing high-quality PowerPoint presentations Who Will You Work With You will report into the Governance, Risk and Compliance - India Technology Center Director , in support of global GRC processes and procedures, and will work cross-functionally within the Corporate Information Security (CIS) teams and across Nike. You will regularly meet with Nike business and technology teams. What You Bring Knowledge of information security principles and practices, general procedures and guidelines A general understanding of technology use, trends and risks as it applies in a business context and environment Experience reviewing third party SOC reports Experience/working knowledge with PCI DSS (Former QSA is a benefit). Knowledge of information security principles, frameworks, and best practices (e.g., PCI DSS, COBIT, COSO, NIST and ISO 27000) Excellent collaboration skills - must be eager to work as part of a cohesive team and work as a partner to others within Nike, Inc. both at WHQ and globally Experience with ServiceNow, Confluence or JIRA Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's employees, customers, brand reputation, and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. What we’re looking for... Verizon is looking for an innovative and motivated professional who will be responsible for safeguarding the Verizon enterprise. This individual will work on identified threats and will neutralize them through proactive hunting and detection, incident response and mitigation strategies, and ensure continuous operation of Verizon’s on-prem and cloud environments. The Digital Forensics & Incident Response role is an opportunity to work in a fast paced collaborative environment defending Verizon from current and future cyber threats. This position plays a critical role in Verizon’s enterprise computing defense. Executing the Incident Response Lifecycle to drive threat remediation and identify strategic countermeasures improving future defenses. Operating as a trusted advisor on threat analysis during incidents for incident management teams and other stakeholders by following cybersecurity response methodologies such as the NIST CyberSecurity Framework. Serving as a primary point of contact during assigned on-call shifts, responding promptly to incidents, escalations, and critical alerts to minimize downtime and mitigate risks to the enterprise. Deploying security tools and leveraging logs and endpoint forensic analysis in order to complete a detailed and accurate assessment of security alerts and threats affecting the Verizon enterprise and cloud infrastructure. Assisting with the development of security controls for multiple platforms via automated capabilities by using advanced analysis and forensic techniques. Driving identification, analysis, and remediation activities to ensure compliance with relevant regulatory requirements, industry standards, and best practices related to security and data privacy. Providing assistance and analytical evaluations for high-priority and significant security incidents, including composing extensive and comprehensive analysis summaries and facilitating incident-related discussions. Identifying gaps in detections and collaborating with teams across Cyber Security to mitigate threats and improve the overall security posture. Recommending ways to mature and advance the preventive and defensive capabilities of the TMC. This includes leveraging data and knowledge to clearly communicate the use case for alert creation. Collaborating with cross-functional teams to respond, identify, and analyze the root cause of a cybersecurity incident. Conducting risk assessments, in-depth analysis, and forensic investigations to determine the root cause and impact of incidents. Enhancing, and/or implementing DFIR playbooks to ensure cohesive response repeatability. Assisting with producing operational read-outs and case reviews for peers and leadership that accurately capture the effectiveness of the DFIR organization. Continuously honing to build and maintain knowledge, skills, and abilities needed to maintain proficiency in producing thorough and accurate digital forensic analysis. Enhancing techniques, workflows and processes of security controls, compliance assessments, and DFIR procedures to drive the TMC operational and strategic growth (continuous improvement). Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. You’ll Need To Have Bachelor's degree or four or more years of work experience. Four or more years of relevant experience required, demonstrated through work experience and/or military experience. Experience working in Digital Forensic, Incident Response, and/or a Security Operations Center (SOC) environment(s). Even better if you have one or more of the following: Awareness of cyber based adversarial frameworks including MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain. Proficient knowledge of the cyber threat landscape including types of adversaries, campaigns, and the motivations that drive them. Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents. Programming and Scripting Experience to enhance automations, ad-hoc forensic analysis and speed-up response times. Previous experience with log aggregation platforms such as Splunk, Elastic, Snowflake, LogRhythm, etc. Proficient in understanding Operating Systems and their architectures: Windows, Unix/Linux, and MacOS Operating Systems Demonstrates leadership and mentoring skills to help advance the overall capabilities of the TMC organization. Ability to work in a highly collaborative environment needing strong communication, presentation, and leadership-like skills Exhibits initiative, follow-up and follow through with commitments Certifications like: Network+, Security+, CISSP, EnCE, CFCE, C|EH, C|HFI, GCFA, GCFE, GCIH and/or cloud-specific security certifications (e.g. AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Cloud Certified Professional Cloud Security Engineer) If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISO Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Show more Show less

Posted 2 weeks ago

Apply

3.0 - 7.0 years

4 - 8 Lacs

Hyderabad

Work from Office

Naukri logo

Information Security GxP Specialist What you will do Let’s do this. Let’s change the world. In this lead role you will support the GRC Governance / Policy & Audit team working closely with Technology teams to help ensure that GxP controls are in place, GxP deviations are managed and monitored, and security standards are met. The GxP Specialist will assist in owning and maintaining GxP deviation records, performing GxP assessments, managing controlled documents, and supporting regulatory compliance efforts. Roles & Responsibilities: GxP Governance Leadership: Support the GRC organization in leading a team of GxP and/or policy analysts performing tasks related to governance, GxP deviation management, document management, and policy exception processes. GxP Deviation and CAPA Management : Manage and own technology related GxP deviations, CAPA, and CAPA-EV records Manage GxP reporting and monitoring metrics for Technology/IT records Collaborate with record owners and QA to ensure timely record resolution Assist in the identification and evaluation of risks associated with GxP deviation records. Identify and support new record owners across IT/Technology (e.g. office hours, ad-hoc meetings, document management support). Attend enterprise network meetings as needed to represent the Technology / IT function. GxP Deviation Monitoring and Improvements: Recommend deviation management improvement strategies across Technology/IT. Collaborate with Quality, IT application, cybersecurity, and business teams to supervise and resolve identified risks and vulnerabilities associated with deviations and CAPA’s. Assist in conducting CAPA applicability assessments, time studies, and related initiatives to identify impacts and improvement opportunities in IT systems, processes, and policies. Supervise, monitor, and report on the efficiency of existing GxP records, trends, and recommend improvements as needed. Governance and Regulatory Support: Ensure compliance with relevant industry standards and regulatory requirements (e.g., GxP, GDPR, SOX, NIST). Assist in proactive measures to facilitate compliance, such as collaborating with stakeholders to initiate periodic reviews Assist in the preparation for audits and inspections by internal and external parties, providing documentation and evidence of IT GxP deviation management practices. Support the development and implementation of IT governance, risk, and compliance frameworks and continuous improvements. Support the development and implementation of IT governance, risk, and compliance policies as well as supporting documentation, and their continuous improvements. Track and monitor document reviews, and support document owners to ensure timely periodic review completion. What we expect of you We are all different, yet we all use our unique contributions to serve patients. The GxP security professional we seek is collaborative and action-oriented with these qualifications. Basic Qualifications: 5+ years of experience in IT GxP deviation management, IT quality management, IT auditing, or information security. Hands-on experience with deviation management tools and associated frameworks (e.g., ISO 27001, NIST, COBIT). Master’s degree and 4 to 6 years of information technology, Cybersecurity, Risk Management, or a related field experience OR Bachelor’s degree and 6 to 8 years of information technology, Cybersecurity, Risk Management, or a related field experience OR Diploma and 10 to 12 years of information technology, Cybersecurity, Risk Management, or a related field experience Preferred Qualifications: Good understanding of GxP deviation management, controlled document management, IT infrastructure & systems, and security standard methodologies. Ability to assess technical and business risk related to information systems. Excellent problem-solving, analytical, and communication skills. Ability to communicate complex GxP and risk concepts to non-technical collaborators. Familiarity with regulatory frameworks and compliance standards (e.g., GxP, GDPR, HIPAA, SOX). Technical Knowledge : Proficiency with GxP deviation management tools, GRC (Governance, Risk, and Compliance) software, controlled document management tools, enterprise change management tools, and security incident management tools. Experience with security controls related to networks, databases, and cloud environments. Soft Skills: Excellent analytical and troubleshooting skills Strong verbal and written communication skills Ability to work effectively with global, virtual teams High degree of initiative and self-motivation Ability to manage multiple priorities successfully Team oriented, with a focus on achieving team goals Strong presentation and public speaking skills What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now and make a lasting impact with the Amgen team. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.

Posted 2 weeks ago

Apply

1.0 - 3.0 years

0 Lacs

Kanayannur, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Risk Consulting - Protect Tech – Staff (ITGC) Key responsibilities Your key responsibilities will include: Consistently deliver quality client services. Drive high-quality work products within expected timeframes and on budget. Monitor progress manage risk and ensure key stakeholders are kept informed about progress and expected outcomes. Foster relationships with client personnel to analyse, evaluate, and enhance information systems to develop and improve security at procedural and technology levels. Use knowledge of the current IT environment and industry trends to identify engagement and client service issues and communicate this information to the engagement team and client management through written correspondence and verbal presentations. Stay abreast of current business and industry trends relevant to the client's business. Demonstrate deep technical capabilities and professional knowledge. Demonstrate ability to quickly assimilate to new knowledge. Skills And Attributes For Success You will leverage your proven track record of IT Audit experience and strong personal skills, to effectively deliver quality results in the assessment, design, and support implementation of controls, security and IT risk solutions. To qualify for the role, you must have A bachelor’s or master’s degree and approximately 1-3 years of related work experience At least 2-3 years of experience in IT Risk and Compliance Design IT Risk Controls framework such as IT SOX Implementation and Testing of internal controls such as IT general controls, IT application controls, IPE related controls, interface controls etc Identify control gaps, weaknesses and areas of improvements. Conducting IT internal control reviews, and review of SOC1 or SOC2 reports Knowledge of IT risk, information security or cyber security frameworks such as COSO, COBIT, ISO, NIST etc IT Compliance and regulatory assessments – IT Risk and Controls assessment with exposure of any of the technologies such as SAP, Oracle, Workday, MS Dynamics or emerging technologies such as Cloud, RPA, AI/ML IT Infrastructure and Architecture risk assessments including data quality and data migration reviews, data privacy reviews, OS DB reviews etc Strong exposure working in client facing roles, collaborate with cross functional teams including internal audits, IT security and business stakeholders to assess control effectiveness and facilitate remediation activities. Excellent communication, documentation and report writing skills. Good to have relevant industry certifications such as CISA, CISM, CISSP, CRISC, CCSK, ISO 27001, and others (as relevant) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 weeks ago

Apply

1.0 - 3.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Risk Consulting - Protect Tech – Staff (ITGC) Key responsibilities Your key responsibilities will include: Consistently deliver quality client services. Drive high-quality work products within expected timeframes and on budget. Monitor progress manage risk and ensure key stakeholders are kept informed about progress and expected outcomes. Foster relationships with client personnel to analyse, evaluate, and enhance information systems to develop and improve security at procedural and technology levels. Use knowledge of the current IT environment and industry trends to identify engagement and client service issues and communicate this information to the engagement team and client management through written correspondence and verbal presentations. Stay abreast of current business and industry trends relevant to the client's business. Demonstrate deep technical capabilities and professional knowledge. Demonstrate ability to quickly assimilate to new knowledge. Skills And Attributes For Success You will leverage your proven track record of IT Audit experience and strong personal skills, to effectively deliver quality results in the assessment, design, and support implementation of controls, security and IT risk solutions. To qualify for the role, you must have A bachelor’s or master’s degree and approximately 1-3 years of related work experience At least 2-3 years of experience in IT Risk and Compliance Design IT Risk Controls framework such as IT SOX Implementation and Testing of internal controls such as IT general controls, IT application controls, IPE related controls, interface controls etc Identify control gaps, weaknesses and areas of improvements. Conducting IT internal control reviews, and review of SOC1 or SOC2 reports Knowledge of IT risk, information security or cyber security frameworks such as COSO, COBIT, ISO, NIST etc IT Compliance and regulatory assessments – IT Risk and Controls assessment with exposure of any of the technologies such as SAP, Oracle, Workday, MS Dynamics or emerging technologies such as Cloud, RPA, AI/ML IT Infrastructure and Architecture risk assessments including data quality and data migration reviews, data privacy reviews, OS DB reviews etc Strong exposure working in client facing roles, collaborate with cross functional teams including internal audits, IT security and business stakeholders to assess control effectiveness and facilitate remediation activities. Excellent communication, documentation and report writing skills. Good to have relevant industry certifications such as CISA, CISM, CISSP, CRISC, CCSK, ISO 27001, and others (as relevant) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's employees, customers, brand reputation, and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. What we’re looking for... Verizon is looking for an innovative and motivated professional who will be responsible for safeguarding the Verizon enterprise. This individual will work on identified threats and will neutralize them through proactive hunting and detection, incident response and mitigation strategies, and ensure continuous operation of Verizon’s on-prem and cloud environments. The Digital Forensics & Incident Response role is an opportunity to work in a fast paced collaborative environment defending Verizon from current and future cyber threats. This position plays a critical role in Verizon’s enterprise computing defense. Executing the Incident Response Lifecycle to drive threat remediation and identify strategic countermeasures improving future defenses. Operating as a trusted advisor on threat analysis during incidents for incident management teams and other stakeholders by following cybersecurity response methodologies such as the NIST CyberSecurity Framework. Serving as a primary point of contact during assigned on-call shifts, responding promptly to incidents, escalations, and critical alerts to minimize downtime and mitigate risks to the enterprise. Deploying security tools and leveraging logs and endpoint forensic analysis in order to complete a detailed and accurate assessment of security alerts and threats affecting the Verizon enterprise and cloud infrastructure. Assisting with the development of security controls for multiple platforms via automated capabilities by using advanced analysis and forensic techniques. Driving identification, analysis, and remediation activities to ensure compliance with relevant regulatory requirements, industry standards, and best practices related to security and data privacy. Providing assistance and analytical evaluations for high-priority and significant security incidents, including composing extensive and comprehensive analysis summaries and facilitating incident-related discussions. Identifying gaps in detections and collaborating with teams across Cyber Security to mitigate threats and improve the overall security posture. Recommending ways to mature and advance the preventive and defensive capabilities of the TMC. This includes leveraging data and knowledge to clearly communicate the use case for alert creation. Collaborating with cross-functional teams to respond, identify, and analyze the root cause of a cybersecurity incident. Conducting risk assessments, in-depth analysis, and forensic investigations to determine the root cause and impact of incidents. Enhancing, and/or implementing DFIR playbooks to ensure cohesive response repeatability. Assisting with producing operational read-outs and case reviews for peers and leadership that accurately capture the effectiveness of the DFIR organization. Continuously honing to build and maintain knowledge, skills, and abilities needed to maintain proficiency in producing thorough and accurate digital forensic analysis. Enhancing techniques, workflows and processes of security controls, compliance assessments, and DFIR procedures to drive the TMC operational and strategic growth (continuous improvement). Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. You’ll Need To Have Bachelor's degree or four or more years of work experience. Four or more years of relevant experience required, demonstrated through work experience and/or military experience. Experience working in Digital Forensic, Incident Response, and/or a Security Operations Center (SOC) environment(s). Even better if you have one or more of the following: Awareness of cyber based adversarial frameworks including MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain. Proficient knowledge of the cyber threat landscape including types of adversaries, campaigns, and the motivations that drive them. Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents. Programming and Scripting Experience to enhance automations, ad-hoc forensic analysis and speed-up response times. Previous experience with log aggregation platforms such as Splunk, Elastic, Snowflake, LogRhythm, etc. Proficient in understanding Operating Systems and their architectures: Windows, Unix/Linux, and MacOS Operating Systems Demonstrates leadership and mentoring skills to help advance the overall capabilities of the TMC organization. Ability to work in a highly collaborative environment needing strong communication, presentation, and leadership-like skills Exhibits initiative, follow-up and follow through with commitments Certifications like: Network+, Security+, CISSP, EnCE, CFCE, C|EH, C|HFI, GCFA, GCFE, GCIH and/or cloud-specific security certifications (e.g. AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Cloud Certified Professional Cloud Security Engineer) If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISO Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Positions Summary This role as an Application Security Developer, will be part of the Product Security team driving the fix of vulnerability findings from Static application security (SAST) testing and Software Composition Analysis (SCA). Position Responsibilities Identifying the vulnerabilities discovered through security assessments involving SAST and SCA findings Train & Empower Developers on Security principles & coding practices Position Requirements Must Have: B.Tech/B.E in Computer Science with at least (2-5) years relevant professional experience Software development experience in one of the following core languages – Java, JavaScript and .NET Adequate knowledge of web related technologies (Web Apps, Web Services and Service Oriented Architecture) Excellent verbal and written communication skills Experience working in a cross-functional and geographically diversified teams Good To Have Good understanding of OWASP security testing methodology Experience identifying and mitigating security vulnerabilities in web applications and APIs Knowledge on security standards like CWE, NIST and associated standards & best practices Experience with Harness would be an added advantage At CDK, we believe inclusion and diversity are essential in inspiring meaningful connections to our people, customers and communities. We are open, curious and encourage different views, so that everyone can be their best selves and make an impact. CDK is an Equal Opportunity Employer committed to creating an inclusive workforce where everyone is valued. Qualified applicants will receive consideration for employment without regard to race, color, creed, ancestry, national origin, gender, sexual orientation, gender identity, gender expression, marital status, creed or religion, age, disability (including pregnancy), results of genetic testing, service in the military, veteran status or any other category protected by law. Applicants for employment in the US must be authorized to work in the US. CDK may offer employer visa sponsorship to applicants. Show more Show less

Posted 2 weeks ago

Apply

7.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

At DuPont, our purpose is to empower the world with essential innovations to thrive. We work on things that matter. Whether it’s providing clean water to more than a billion people on the planet, producing materials that are essential in everyday technology devices from smartphones to electric vehicles, or protecting workers around the world. Discover the many reasons the world’s most talented people are choosing to work at DuPont. Why Join Us | DuPont Careers Job Title: Security Engineer – Microsoft 365 & Azure Location: Hyderabad, India Reports To: Director of Cybersecurity, Qnity Electronics Segment Position Summary We are seeking a skilled and motivated Security Engineer with deep expertise in Microsoft 365 and Azure security technologies to join our cybersecurity engineering team. This role will focus on the implementation, configuration, and continuous improvement of Microsoft Purview, Defender (365, for Cloud, and Cloud Apps), and Sentinel to safeguard our enterprise collaboration and cloud environments. As part of the Qnity Electronics business unit, you will ensure that security controls applied across the Microsoft cloud estate are technically sound, operationally efficient, and compliant with regulatory and industry standards applicable to a public manufacturing company serving the electronics end market. Key Responsibilities Engineer, configure, and manage Microsoft Purview Information Protection and Data Loss Prevention (DLP) controls for structured and unstructured data across M365 workloads. Deploy and optimize Microsoft Defender for Endpoint, Office 365, Identity, Cloud Apps, and Cloud to ensure threat protection coverage across users, devices, SaaS, and cloud workloads. Design, implement, and maintain Microsoft Sentinel analytics, incident correlation, and response automation for proactive threat detection and response. Apply security controls in accordance with internal policy and external standards (e.g., SOX, NIST 800-53, ISO 27001), ensuring traceability and evidence for audit readiness. Collaborate with infrastructure, compliance, and IT operations teams to enforce secure baselines for Microsoft 365, Azure subscriptions, and hybrid identities (Entra ID). Conduct control gap assessments, assist with remediation efforts, and manage engineering backlog in support of security governance and compliance efforts. Contribute to incident investigations and root cause analysis involving cloud-based services, maintaining logs and telemetry in line with forensic and audit requirements. Support continuous hardening of collaboration tools such as Teams, SharePoint Online, and Exchange Online while enabling business productivity. Required Qualifications 3–7 years of experience in cybersecurity engineering, with specific focus on Microsoft technologies. Strong proficiency with Microsoft Defender suite, Purview, Sentinel, and Azure native security tooling. Demonstrated ability to apply enterprise security controls to cloud platforms with compliance mapping to NIST, SOX, or similar frameworks. Familiarity with Entra ID (Azure AD), Conditional Access, RBAC, and Zero Trust architectures. Experience in a public company or regulated manufacturing environment is strongly preferred. Scripting or automation skills (PowerShell, KQL, ARM/Bicep, or Terraform a plus). Excellent documentation practices and ability to maintain technical records for audit traceability. Preferred Qualifications Microsoft Certified: Cybersecurity Architect Expert or Security Operations Analyst Associate Experience in securing collaboration and manufacturing IT environments with mixed IT/OT boundaries Prior experience supporting security engineering within a divested or restructuring business unit is a plus Join our Talent Community to stay connected with us! On May 22, 2024, we announced a plan to separate our Electronics and Water businesses in a tax-free manner to its shareholders. On January 15, 2025, we announced that we are targeting November 1, 2025, for the completion of the intended separation of the Electronics business (the “Intended Electronics Separation”)*. We also announced that we would retain the Water business. We are committed to ensuring a smooth and successful separation process for the Future Electronics business. We look forward to welcoming new talent interested in contributing to the continued success and growth of our evolving organization. The separation transactions are subject to satisfaction of customary conditions, including final approval by DuPont's Board of Directors, receipt of tax opinion from counsel, the filing and effectiveness of Form 10 registration statements with the U.S. Securities and Exchange Commission, applicable regulatory approvals, and satisfactory completion of financing. For further discussion of risks, uncertainties and assumptions that could impact the achievement, expected timing and intended benefits of the separation transactions, see DuPont’s announcement. DuPont is an equal opportunity employer. Qualified applicants will be considered without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability or any other protected class. If you need a reasonable accommodation to search or apply for a position, please visit our Accessibility Page for Contact Information. DuPont offers a comprehensive pay and benefits package. To learn more visit the Compensation and Benefits page. Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

India

Remote

Linkedin logo

OT Cyber Security Role Description This is a full-time remote role for an OT Cyber Security Architect who is specializing in Disaster Recovery (DR) and Business Continuity Planning (BCP) plays a strategic role in ensuring an organization’s resilience against cyber threats and disruptions. This position involves designing, implementing, and maintaining secure systems and policies to safeguard information, applications, and infrastructure while guaranteeing that business operations can seamlessly recover from disruptive incidents. Disaster Recovery & Business Continuity Responsibilities: • Disaster Recovery: Develop and maintain DR plans to ensure swift recovery of critical systems during cyber or natural disruptions. • Business Continuity: Design frameworks to minimize operational downtime and restore services quickly. • Risk Assessment: Identify threats and vulnerabilities; recommend mitigation strategies. • Secure Architecture: Implement secure systems to protect digital assets and sensitive data. • Compliance: Ensure alignment with standards like ISO 22301 and NIST SP 800-34. • Testing: Conduct regular DR/BCP drills to identify and address gaps. • Incident Response: Coordinate with response teams to align recovery with continuity plans. • Vendor Oversight: Evaluate third-party DR services for compliance and effectiveness. • Training: Educate staff on DR/BCP roles and responsibilities. • Documentation: Maintain comprehensive records for audits and operations. Show more Show less

Posted 2 weeks ago

Apply

12.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

JD: Windows & VMware Specialist We are looking for a highly skilled Windows & VMware Specialist – L4 (Lead/Admin) to join our IT Infrastructure team. This is a customer-facing role that requires strong interpersonal communication, technical leadership, and advanced troubleshooting and analytical skills. The ideal candidate will lead complex support scenarios, drive operational excellence, and ensure high availability across Windows and VMware platforms. Key Responsibilities: Lead the administration and lifecycle management of Windows Server infrastructure and VMware vSphere environments. Serve as the technical lead in critical incidents, ensuring timely resolution and customer satisfaction. Act as a primary technical point of contact in customer-facing discussions for system performance, upgrades, and issue resolution. Mentor and guide junior engineers, ensuring best practices are followed in operations and incident handling. Plan, implement, and support Windows Server (2012/2016/2019/2022) and VMware (vCenter, ESXi, DRS, HA, vMotion) environments. Perform root cause analysis (RCA) for major incidents and lead the development of preventive measures. Ensure patching, upgrades, backups, and monitoring are carried out with minimal impact to business operations. Develop and maintain technical documentation, SOPs, and architectural diagrams. Ensure compliance with security policies, hardening guidelines, and internal audit requirements. Required Skills & Qualifications: 12+ years of enterprise IT experience, with 8+ years in a lead or senior-level role in Windows and VMware administration. Deep hands-on expertise in: Windows Server administration (AD, GPO, DNS, DHCP, Failover Clustering). VMware vSphere, including ESXi, vCenter, snapshots, DRS, and HA. Strong scripting and automation skills using PowerShell or equivalent. Experience with monitoring, backup, and disaster recovery tools like Veeam, SolarWinds, vRealize, or equivalent. Solid understanding of networking fundamentals (TCP/IP, VLANs, firewalls, VPN). Excellent customer-facing communication, problem-solving, and collaboration skills. Familiarity with ITIL practices, especially incident, change, and problem management. Preferred Skills & Certifications: VMware Certified Professional (VCP) or Microsoft Windows Server certification (e.g., AZ-800/AZ-801 or MCSA). Experience in hybrid environments with cloud integration (Azure/AWS). Exposure to infrastructure automation or infrastructure-as-code (IaC) tools like Ansible, Terraform. Knowledge of compliance frameworks such as ISO 27001 or NIST is an added advantage. Show more Show less

Posted 2 weeks ago

Apply

15.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Job Description This role is critical to ensuring a seamless, secure, and cost-effective transition while maximizing business value from the service provider through strong governance, innovation, and continuous service improvements. The individual must also bring strong technical expertise to evaluate solutions, ensure optimal architectural decisions, and lead teams in a highly complex and evolving IT landscape. Responsibilities 1 . Strategic Planning & Transition Execution Vendor Selection, Negotiation & Strategic Relationship Management Technical Expertise & Architectural Leadership Financial & Cost Optimisation Security, Compliance & Risk Management Governance, Performance Monitoring & Continuous Improvement Change Management & Stakeholder Communication Innovation & Future Roadmap Qualifications 15+ years of experience in IT Infrastructure, Compute, Storage, CloudOps, or Managed Services. Proven leadership experience in large-scale IT transitions, outsourcing strategies, and vendor management. Strong technical expertise in: Compute & Storage Architecture Public/Private/Hybrid Cloud Platforms (AWS, Azure, GCP) Software-Defined Storage and Hyperconverged Infrastructure (HCI) IT Automation & Infrastructure as Code (IaC) Disaster Recovery & Business Continuity Planning Cybersecurity & Compliance (ISO 27001, NIST, GDPR) Experience leading multi-million-dollar vendor contracts and partnerships. Track record of driving cost savings, operational efficiencies, and continuous service improvements. Strong knowledge of ITIL frameworks, automation, and service management best practices. Show more Show less

Posted 2 weeks ago

Apply

2.0 - 3.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Job Description About Us Tsaaro’s prime focus is on Data Privacy and Security. Our team of specialist data privacy consultants, information security consultants, and penetration testers help and advise our clients to make running a secure business easier, with high efficiency. Everything we do is tailored to the individual organizational requirements, aligned with their budget and resource challenges. We take a pragmatic, risk-based approach to provide our clients with real-world, workable advice, guidance, and support that helps them to deal with a wide range of security and privacy-related challenges. Responsibilities As a Senior Data Privacy Consultant, you will be entrusted with the following key responsibilities: Design and implement data protection and privacy programs that cater to our clients' specific business needs, ensuring their sensitive information is well safeguarded. Evaluate and assess our clients' data protection and privacy practices, offering valuable insights and actionable recommendations for continual improvement. Demonstrate expertise in various standards, such as ISO 27001/2, ISO 22301, ISO 27018, NIST standards on Cyber Security, HITRUST, ISO 27701, etc., to assist clients in compliance and governance. Provide guidance and support to clients in adhering to a complex web of national and international laws and regulations, including the EU General Data Protection Regulation (GDPR) and other privacy laws. Assist in preparing policies, reports, and schedules for clients and relevant stakeholders, ensuring clear communication and alignment with industry best practices. Conduct thorough audits of Privacy controls to monitor program effectiveness and compliance, ensuring data protection is at its optimal level. Utilize online tools to facilitate Incident Management and Data Subject Rights processes, ensuring efficient and timely responses to potential data incidents. Foster and maintain productive working relationships with client personnel, promoting effective collaboration and understanding of their specific needs. Demonstrate a strong commitment to adhering to workplace policies and procedures, maintaining the highest standards of professionalism and confidentiality. Contribute to cybersecurity engagements, developing cybersecurity strategies, governance, risk, and compliance activities, and cybersecurity policies in line with ISO 27001 and ISO 27701. Perform Gap Assessments, Risk Assessments, ISMS Documentation, Internal Audits, and support during Certification Audits to strengthen overall security frameworks. Requirements Possess a sound knowledge of fundamentals of information security systems. Have 2-3 years of relevant experience in the field. Demonstrate proficiency in standards such as ISO 27001/2, ISO 22301, ISO 27018, NIST standards on Cyber Security, HITRUST, ISO 27701, etc. Exhibit a good understanding of GDPR, CCPA, or other privacy laws. Display competence in governance and reporting, as well as a strong grasp of cyber and privacy risks. Hold relevant qualifications such as CIPM, CIPT, CIPP/E. Showcase excellent communication skills, both written and verbal. Benefits Opportunity to work with a dynamic and innovative team. Career growth and development opportunities. Competitive salary and benefits package. A supportive work environment that values creativity and initiative. check(event) ; career-website-detail-template-2 => apply(record.id,meta)" mousedown="lyte-button => check(event)" final-style="background-color:#6875E2;border-color:#6875E2;color:white;" final-class="lyte-button lyteBackgroundColorBtn lyteSuccess" lyte-rendered=""> Show more Show less

Posted 2 weeks ago

Apply

5.0 - 8.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Function Corporate Audit Role Lead Assistant Manager (Technology Audit) Primary Responsibility Technology lead audit assistant manager shall be responsible for managing and executing audit job (technology audits) Should have capabilities to write technical audit issues for reports which are discussed in the audit committee Shall be responsible to lead of technical audit testing related activities Should be able to demonstrate strong technical skills in areas like cyber security, data privacy, information security (access management, change management, incident monitoring, threat management, etc. Should be able to articulate risks, threat vector, root cause and remediation strategy Should strongly demonstrate skills for risk identification and should be able to assess risk magnitude Should demonstrate strong knowledge od security standards such as NIST CSF, ISO 27001:2013, etc. Should be able to evaluate issue action plan submitted by relevant stake holders post audit closure Competencies & Skills Bachelor of Engineering / B.Tech (E&C or CS or IT) / MCA / MBA Strong hands on experience and in-depth understanding of knowledge of emerging risks around Cyber Security / IT Infrastructure / Information Security Should have done security assessment around security tools such as systems, SIEM , DLP, Anti-APT, etc. Having understanding of digital platforms such as AWS / Azure cloud will be an add-on advantage Effective communication and report writing skills Positive and go getter attitude Should be a team player with a potential to demonstrate team leader skills Should be assertive and result oriented professional. Minimum Qualification Bachelor of Engineering / B.Tech / MCA / MBA One or more Certifications such as CISA / CISSP / CISM / ISO 27001 Lead Minimum Experience At least 5-8 years of experience in information security / Internal Audit Having Big 4 experience shall be add-on advantage Candidate having BFSI experience will a plus but not mandatory Show more Show less

Posted 2 weeks ago

Apply

7.0 - 9.0 years

7 - 17 Lacs

Bengaluru

Hybrid

Naukri logo

Key Responsibilities: • Design and review secure systems and application architectures. • Lead threat modeling, risk assessment, and attack surface analysis. • Advise project teams on security best practices throughout SDLC. • Use SD Elements to capture risks, track remediation, and ensure traceability. • Contribute to architecture boards and governance processes. • Validate secure design for cloud, hybrid, and on-premises environments. Required Skills & Experience: • 7- 9 years in Information Security or related architecture roles. • Experience in VAPT (execution & remediation). • Strong knowledge of application security, secure SDLC. • Hands-on with SD Elements (mandatory). • Expertise in TOGAF, SABSA, or NIST architecture frameworks. • Cloud Security (preferably Azure), DevSecOps knowledge. Certifications (Mandatory/Preferred): • Mandatory: CISSP • Preferred: AZ-500, CCSP Tools/Frameworks Knowledge: • SD Elements, ThreatModeler, Microsoft Defender • TOGAF, SABSA, NIST CSF, OWASP Top 10, MITRE ATT&CK Email ID: akila.s@acesoftlabs.com

Posted 2 weeks ago

Apply

Exploring NIST Jobs in India

The job market for NIST (National Institute of Standards and Technology) professionals in India is rapidly growing. As more companies focus on cybersecurity and data protection, the demand for individuals skilled in NIST guidelines and frameworks is on the rise. Job seekers with expertise in NIST can find a variety of opportunities across different industries in India.

Top Hiring Locations in India

  1. Bangalore
  2. Hyderabad
  3. Mumbai
  4. Delhi
  5. Pune

These cities are known for their thriving tech industries and have a high demand for NIST professionals.

Average Salary Range

The average salary range for NIST professionals in India varies based on experience level. Entry-level positions may start around INR 4-6 lakhs per year, while experienced professionals can earn upwards of INR 15-20 lakhs per year.

Career Path

In the field of NIST, a typical career path may include roles such as NIST Analyst, NIST Consultant, and NIST Manager. As professionals gain more experience and expertise, they can progress to Senior NIST Consultant, NIST Architect, and even Chief Information Security Officer (CISO).

Related Skills

In addition to expertise in NIST, employers often look for professionals with the following related skills: - Cybersecurity - Risk management - Compliance - Information security - Security frameworks (e.g., ISO 27001)

Interview Questions

  • What is NIST and why is it important? (basic)
  • Can you explain the difference between NIST 800-53 and NIST 800-171? (medium)
  • How do you ensure compliance with NIST guidelines in a cloud environment? (advanced)
  • What are the key components of a NIST risk management framework? (medium)
  • Have you ever led a NIST compliance audit? If so, can you describe the process? (advanced)
  • How do you stay updated with the latest NIST guidelines and updates? (basic)
  • Can you give an example of a security control outlined in NIST 800-53? (medium)
  • What is the role of NIST in incident response planning? (medium)
  • How do you handle security incidents in accordance with NIST guidelines? (advanced)
  • Have you worked with NIST SP 800-171 requirements? If so, can you describe your experience? (medium)
  • How do you prioritize security controls when implementing NIST guidelines in an organization? (advanced)
  • What are the key differences between NIST and other security frameworks like ISO 27001? (medium)
  • Can you explain the concept of continuous monitoring in the context of NIST? (medium)
  • How do you ensure data integrity in accordance with NIST guidelines? (advanced)
  • Have you implemented multi-factor authentication in compliance with NIST recommendations? If so, what challenges did you face? (medium)
  • How do you handle vulnerabilities identified through NIST risk assessments? (advanced)
  • Can you describe a successful NIST implementation project you were involved in? (medium)
  • How do you communicate NIST compliance requirements to non-technical stakeholders? (medium)
  • How do you approach security awareness training in alignment with NIST guidelines? (medium)
  • What are the key considerations when developing a NIST-compliant security policy? (medium)
  • How do you assess the effectiveness of security controls based on NIST recommendations? (advanced)
  • Can you provide an example of a security incident response plan based on NIST guidelines? (medium)
  • How do you ensure data privacy in alignment with NIST standards? (medium)
  • What are the key challenges organizations face when implementing NIST guidelines? (medium)

Closing Remark

As you explore opportunities in the NIST job market in India, remember to showcase your expertise, stay updated with industry trends, and prepare thoroughly for interviews. With the right skills and preparation, you can confidently pursue a successful career in NIST in India. Best of luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies