Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
6.0 - 11.0 years
6 - 11 Lacs
Pune
Work from Office
Job ID: 199874 Required Travel :Minimal Managerial - No LocationIndia- Pune (Amdocs Site) Who are we Amdocs helps those who build the future to make it amazing. With our market-leading portfolio of software products and services, we unlock our customers innovative potential, empowering them to provide next-generation communication and media experiences for both the individual end user and enterprise customers. Our employees around the globe are here to accelerate service providers migration to the cloud, enable them to differentiate in the 5G era, and digitalize and automate their operations. Listed on the NASDAQ Global Select Market, Amdocs had revenue of $5.00 billion in fiscal 2024. For more information, visit www.amdocs.com In one sentence We are seeking a highly skilled and experienced Senior Governance, Risk, and Compliance (GRC) Specialist to join our dynamic team. The ideal candidate will have a strong background in GRC, with a proven track record of managing and implementing comprehensive risk management and compliance programs, particularly within the EMEA (Europe, Middle East, and Africa) and IMEA (India, Middle East, and Africa) regions. What will your job look like Develop and maintain governance frameworks, policies, and procedures. Ensure compliance with industry standards, regulations, and contractual obligations. Identify, assess, and prioritize security risks, implementing mitigation strategies. Conduct regular risk assessments, audits, and maintain risk registers. Ensure adherence to GDPR, CRA, and other relevant security regulations. Monitor and enforce security compliance across EMEA and IMEA regions. Develop and deliver compliance training programs for employees. Prepare and present security reports to senior management and stakeholders. Collaborate with internal teams and liaise with external auditors and regulators. Communicate security risks and mitigation strategies effectively to stakeholders. All you need is... Bachelor's degree in Business Administration, or a related field. Professional certification (e.g., CISA, CRISC, CISSP) is preferred. Minimum of 6 years of experience in governance, risk management, and compliance. Strong knowledge of relevant laws, regulations, and industry standards, particularly in the EMEA and IMEA regions. Strong understanding of NIST CSF, CIS, ISO 27001, PCI DSS, and Data Protection frameworks. Excellent analytical, problem-solving, and decision-making skills. Strong communication and interpersonal skills, with experience in defending and explaining security risks and mitigations to customers and stakeholders. Ability to work independently and as part of a team. Proficiency in GRC software and tools. Why you will love this job: You will be able to demonstrates an understanding of key business drivers and ensures strategic directions are followed and the organization succeeds You will be able to gathers relevant data, identifies trends and root causes, and draws logical conclusions to develop solutions You will have ability to assess details, systems and other factors as part of a single and comprehensive picture We are a dynamic, multi-cultural organization that constantly innovates and empowers our employees to grow. Our people our passionate, daring, and phenomenal teammates that stand by each other with a dedication to creating a diverse, inclusive workplace! We offer a wide range of stellar benefits including health, dental, vision, and life insurance as well as paid time off, sick time, and parental leave Amdocs is an equal opportunity employer. We welcome applicants from all backgrounds and are committed to fostering a diverse and inclusive workforce
Posted 2 weeks ago
6.0 - 7.0 years
10 - 14 Lacs
Pune
Work from Office
Job ID: 197283 Required Travel :Minimal Managerial - Yes Location: :India- Pune (Amdocs Site) Who are we Amdocs helps those who build the future to make it amazing. With our market-leading portfolio of software products and services, we unlock our customers innovative potential, empowering them to provide next-generation communication and media experiences for both the individual end user and enterprise customers. Our approximately 30,000 employees around the globe are here to accelerate service providers migration to the cloud, enable them to differentiate in the 5G era, and digitalize and automate their operations. Listed on the NASDAQ Global Select Market, Amdocs had revenue of $4.89 billion in fiscal 2023. In one sentence The Information Security Lead develops, maintains, and publishes required information security standards, procedures, and guidelines per domain of responsibility. Responsible for conceiving and executing forward-looking security systems or processes design, implements programs for user awareness, compliance monitoring, security controls design and implementation. What will your job look like You will maintain the organization's information security effectiveness and efficiency by defining and leading the implementation of security approaches, standards and procedures supporting strategic plans and directions You will lead teams to resolve Information Security challenges. Provide the information security requirements for cross-organization projects and accompany the implementation of the requirements. Utilize deep information security understanding to support internal and external business-related activities, formulate IS solutions based on technical and business requirements. Maintain a detailed knowledge of IS solutions and present them to our customers. You will lead unit level initiatives and ensure competency to meet the needs of the team/ Amdocs /Customers. You will design solutions and formulate response to RFx, create POC/demos, and present IS solutions to customers/corporate stakeholders. Utilize deep technical knowledge of IS products and services to align appropriate solutions based on client need. You will lead and manage Information Security Projects, including (as required) budget and resources, customer relationships, timelines, deliverables, quality and overall management. You will recommend information technology strategies, policies, and procedures by evaluating the organization's outcomes, identifying problems, evaluating trends, and anticipating requirements. You will keep updated with emerging security threats and alerts; conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts; collaborate with other cyber threat researchers. You will be accountable for meeting quality objectives, adherence to best practices, quality processes, and methodologies; lead continuous improvement via Root Cause Analysis, Lessons Learned, and Prevention processes; Track quality KPIs and continuously improve quality and measurements. You will promote clarity and alignment with ongoing, effective communication to the project team regarding the unit s goals and status, project matters, companywide changes, special initiative status, etc.; Strive for strong and healthy working relationships within the team. You will provide technical guidance and training to information owners, other security managers, and IT associates. Information Security Manager functions include: You will lead, manage and mentor teams in specific domains such as risk assessment, cyber technologies, corporate security, PMI, SOC, Penetration testing, security operations, etc. You will attract, develop and retain talent to build and maintain strong, effective and competent teams, and ensure the enhancement of their knowledge. Coach and empower the team and foster an environment that encourages teamwork based on motivation and inspiration. Responsible for HR processes such as recruitment, onboarding, definition of clear goals and objectives, ongoing performance management and feedback, career development, and growth of the team and its members. Manage day to day employee relations. 12. Information Security Expert functions include: You will be the technical expert and leader of certain domains such as IT, Application and GRC. All you need is... 1. 6-7 years of experience in the information security management ecosystem 2. Familiarity with industry standards and frameworks, such as NIST, CIS, ISO 27001, and GDPR. 3. Strong understanding of security best practices, including, vulnerability management, system hardening, patch management, and secure coding. 4. Proven experience working with security tools such as CrowdStrike, InsightVM, Tripwire, WIZ etc. 5. Experience with cloud security platforms (AWS, Azure) and native security services 6. Knowledge of network security principles & solutions, including IAM, firewalls, IDS/IPS, and secure network design. 7. Good team player - an advantage 8. Ability to scale up - for cross-domain security tools Why you will love this job: You will have the influence on many of the security teams in Amdocs and therefor the whole company You will bring the innovation into security teams in Amdocs You will have the independence to design the role as you think and like Amdocs is an equal opportunity employer. We welcome applicants from all backgrounds and are committed to fostering a diverse and inclusive workforce
Posted 2 weeks ago
5.0 - 9.0 years
13 - 17 Lacs
Noida
Work from Office
Primary/Essential Duties and Key Responsibilities Review, test, and implement security solutions related to Email Protection (eg. Proofpoint, Barracuda, SpamTitan, Mimecast, or Barracuda) DLP – Must have Public Cloud (eg. AWS, Azure, or GCP) – Must have ZTNA solutions (eg. Zscaler, Axis, Prisma Access) - Strongly encouraged. DDOS/WAF (eg. Cloudflare, Silverline, Cloud Armor) – Strongly encouraged. Firewalls/IDS/Network Detection and Response tools – Must have Assess network security architectures, document findings and recommendations based on industry best practices. Solid understanding of network protocols, including TCP/IP, DNS, DHCP, and routing protocols – Must have Define and review security policies to control access to systems. – Must Have Experience with firewall administration, VPN configuration, and network intrusion detection/prevention systems – Must Have Strong knowledge of security best practices and standards (e.g., ISO 27001, NIST) Relevant certifications such as CISSP, CISA, CISM, or CCNP Security are a plus Perform implementations and configuration of network security technologies Apply Zero Trust principals to control network access to resources Recommend, create, and maintain security configuration baselines to be used to harden systems Ensure all systems security operations and maintenance activities are properly documented and updated. Automate manual tasks for improved efficiencies (eg. infrastructure as code) Support Enterprise Risk with audits and compliance initiatives Assist in developing requirements and driving deliverables Knowledge, Skills and Abilities Strong knowledge and understanding of both network and application layer firewall concepts Hands-on experience with Enterprise Class firewalls Knowledge of security frameworks including NIST, ISO, CIS, OWASP 10, etc Understanding of SSL/TLS certificates and implementation (Private and public key infrastructure) Working knowledge with Powershell, Ansible, Terraform, RegEx, Chef or Puppet are preferred – nice to have Experience with Public Cloud provider infrastructure, system deployments and product release operations a plus Excellent written and verbal communication skills Excellent teamwork and collaboration skills Results oriented, high energy, self-motivated Required Qualifications Minimum five (5) years of experience in a Network Security Engineering role working with Firewalls, DDOS/WAF, IPS and ZTNA Bachelors or Masters in Information Systems, Information Security, or related fields; preferred but not required Industry recognized Security certification such as CSSP, CISSP, or Security+, etc
Posted 2 weeks ago
0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Job Summary Cognizant is seeking an Corporate Security CyberTools Engineering & Architecture Associate Director to join our team to provide Security Engineering Services. This position reports to our Director and is a member of the team providing cybersecurity design architecture and tools management. Responsibilities Act as a subject matter expert for cybersecurity engineering including the development and documentation of reference architectures and technical solution designs for infrastructure services inclusive of data center and Cloud (server storage and networking). Infrastructure management tuning and administration of core tools including VPN DNS DHCP DDoS Participate and support the Change Board process to ensure changes are managed in accordance with process standards and policy requirements Audit and validate compliance with approved firewall rules and security device configurations Support disaster recovery and business continuity activities Document update and maintain policies procedures and job aids associated with management of the environment Provide data flow design and analysis to support cybersecurity requirements and reference architecture Develop standards and baselines in accordance with best practice compliance requirements and NIST guidance Develop reports recurring deliverables and presentations for management and executive stakeholders Certifications Required VMware NSX-T Firewall PaloAlto CheckPoint Microsoft Azure Algosec Show more Show less
Posted 2 weeks ago
10.0 years
0 Lacs
Bhubaneswar, Odisha, India
On-site
📍 Location: 3rd Floor, F3, Ryan Tower, Technology Corridor, Near Trident Academy, Chandaka Industrial Estate, Infocity, Chandrasekharpur, Bhubaneswar, Odisha – 751024 🏢 Company: Threatsys Technologies Private Limited 🏢 About the Company Threatsys Technologies Private Limited is a forward-thinking cybersecurity company headquartered in Bhubaneswar, India. We specialise in delivering comprehensive, tailored cybersecurity solutions to businesses, government agencies, and institutions. Our expertise includes Vulnerability Assessment & Penetration Testing (VAPT), Security Operations Centre (SOC) services, threat intelligence, incident response, cloud and network security, and cyber forensics. At Threatsys, we combine advanced technologies with deep industry knowledge to help organisations identify vulnerabilities, respond swiftly to incidents, and build resilient security postures. Our mission is to empower clients to confidently protect their digital assets and maintain trust in an increasingly complex cyber landscape. Educational Qualifications: Bachelor’s Degree in: Cybersecurity Computer Science Information Technology Business Administration Or a related technical field Preferred: Master’s in Business Administration (MBA) or a Master's in Information Security for senior roles. Professional Certifications (Recommended): Cybersecurity Certifications (to build technical credibility): CompTIA Security+ Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) Certified Information Security Manager (CISM) Sales or Business Certifications (to support strategic and sales functions): HubSpot Inbound Sales Certification Salesforce Sales Cloud Consultant Certification Strategic Selling, SPIN Selling, or Challenger Sales Training Relevant Experience: 5–10 years of combined experience in: Cybersecurity (technical, pre-sales, or product-related) B2B technology sales (preferably in IT or cybersecurity) Proven track record of: Meeting or exceeding sales targets Selling complex technical solutions to enterprise clients Managing end-to-end sales pipelines (lead generation to closing) Working with cross-functional teams (technical, product, marketing) Preferred: Experience with channel partners, resellers, or MSSPs (Managed Security Service Providers). Core Skills Required: Technical Knowledge: Understanding of cybersecurity solutions: Network security (firewalls, VPNs, IDS/IPS) Endpoint protection (EDR/XDR) Cloud security (AWS, Azure) Identity and Access Management (IAM) SIEM/SOC operations Familiarity with compliance frameworks: NIST, ISO 27001, PCI-DSS, GDPR, HIPAA Sales & Management Skills: Strategic planning and business development Account-based selling and lead nurturing Proposal and contract negotiation Sales pipeline management (CRM tools like Salesforce, HubSpot) Forecasting and reporting to leadership Soft Skills: Excellent communication and presentation skills Strong interpersonal and relationship-building abilities Ability to translate technical solutions into business value Leadership and team management skills High emotional intelligence and adaptability Show more Show less
Posted 2 weeks ago
1.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Job Description WHO WE ARE Led by the Chief Information Security Officer (CISO), Technology Risk secures Goldman Sachs against hackers and other cyber threats. We are responsible for detecting and preventing attempted cyber intrusions against the firm, helping the firm develop more secure applications and infrastructure, developing software in support of our efforts, measuring cybersecurity risk, and designing and driving implementation of cybersecurity controls. The team has global presence across the Americas, APAC, India and EMEA. Within Technology Risk, Global Cyber Defense and Intelligence (GCDI) team identifies malicious activity, manages the lifecycle of vulnerabilities within GS technologies, and investigates and manages threats across the firm. We are a team of security, software, and product engineers that allow the firm to respond appropriately to firm risks using detection models, security architecture, and cutting-edge cyber threat analysis to manage internal and external threats against the firm. YOUR IMPACT In this role, you will have the opportunity to significantly enhance the organization's security posture by being part of the Security Orchestration and Automated Response (SOAR) program to automate and streamline incident response, reducing reaction times and improving overall threat management efficiency. Technical expertise and leadership will drive continuous improvement, ensuring robust protection against evolving cyber threats. How You Will Fulfill Your Potential As a Security Engineer in GCDI’s Threat Management Center, you will be an integral part of a technical team that is responsible for providing the GCDI organization with security sensors and data sets that increase awareness of current and potential Cyber Threats. This role offers the chance to fully harness and expand your technical expertise in advanced SOAR technologies, driving critical security initiatives that directly impact the organization’s resilience against cyber threats. The position also provides continuous exposure to the latest innovations in automated threat response, allowing the candidate to stay ahead of emerging threats and industry trends. This will not only solidify their standing as an expert in the field but also open up opportunities for further career growth and influence within the cybersecurity domain. Job Responsibilities Enable a world-class cyber defense program by working closely with other technical, incident management, and forensic personnel to develop a fuller understanding of the intent, objectives, and activity of cyber threat actors Work at the forefront of designing an innovative threat and security incident management solution Develop and optimize SOAR playbooks, integrating various security tools and platforms to automate threat detection, incident response, and remediation processes. Work closely with cross-functional teams, including SOC, IT, DevOps, and Risk Management, to align SOAR capabilities with organizational security objectives. Customize SOAR workflows, scripts, and connectors to meet the specific needs of the organization, ensuring seamless interoperability between systems. Participate in a 24x7 coverage model to prevent and remediate security threats against Goldman Sachs’ global business network Basic Qualifications Strong verbal and written communication skills, with the ability to convey complex technical concepts to both technical and non-technical stakeholders. Strong analytical and problem-solving skills, with a proactive approach to identifying and addressing security challenges. In-depth understanding of security frameworks (MITRE ATT&CK, NIST), threat intelligence, and automation strategies. Strong sense of ownership and driven to manage tasks to completion Proficient scripting skills utilizing both Python and PowerShell Preferred Qualifications 1+ years of experience in cybersecurity, with SOAR technologies and incident response. Proficiency in SOAR platforms (e.g., Splunk Phantom, Demisto, Siemplify), scripting languages (Python, PowerShell), and integration with security tools (SIEM, EDR, etc.). Knowledge conducting incident response within a major public cloud (i.e. AWS, Google, Azure) Any of following certifications: GNFA, GCFE, GCFA, CCFP, CFCE, ACE, OSCP, GCFR #TechRiskCybersecurity About Goldman Sachs At Goldman Sachs, we commit our people, capital and ideas to help our clients, shareholders and the communities we serve to grow. Founded in 1869, we are a leading global investment banking, securities and investment management firm. Headquartered in New York, we maintain offices around the world. We believe who you are makes you better at what you do. We're committed to fostering and advancing diversity and inclusion in our own workplace and beyond by ensuring every individual within our firm has a number of opportunities to grow professionally and personally, from our training and development opportunities and firmwide networks to benefits, wellness and personal finance offerings and mindfulness programs. Learn more about our culture, benefits, and people at GS.com/careers. We’re committed to finding reasonable accommodations for candidates with special needs or disabilities during our recruiting process. Learn more: https://www.goldmansachs.com/careers/footer/disability-statement.html © The Goldman Sachs Group, Inc., 2023. All rights reserved. Goldman Sachs is an equal employment/affirmative action employer Female/Minority/Disability/Veteran/Sexual Orientation/Gender Identity Show more Show less
Posted 2 weeks ago
0 years
0 Lacs
Kochi, Kerala, India
On-site
Job Summary Key Responsibilities, Deliverables / Outcomes Privacy Program Delivery & Management Lead delivery of end-to-end privacy consulting engagements by managing the team (gap assessments, impact assessments, data mapping, RoPA creation, DPIAs, privacy strategy, audits). Interpret, implement, and align customer policies and controls with applicable regulations such as GDPR, UAE PDPL, KSA PDPL, India DPDP. Translate regulatory requirements into actionable and auditable privacy controls. Track, report, and manage project scope, timelines, quality, and outcomes across multiple customer projects. Serve as the primary privacy advisor and point of contact for client stakeholders (CISOs, DPOs, Legal). Conduct senior-level presentations, workshops, and steering committee meetings. Drive customer satisfaction and retention by proactively identifying privacy risks and recommending strategic solutions. Stay abreast of evolving data protection laws, privacy technologies, and regulator interpretations across regions. Guide privacy impact assessments for IT, Cloud, HR, CRM, and third-party vendors. Provide expertise on implementing technical and organizational controls for personal data. Mentor and guide junior consultants and privacy analysts. Contribute to internal privacy delivery frameworks, tools, accelerators, and knowledge repositories. Key Skills Deep knowledge of UAE PDPL, KSA PDPL, DPDP Act (India), GDPR, ISO 27701 and other frameworks Strong understanding of cross-border data transfers, data lifecycle management, and privacy risk frameworks. Experience in leading privacy projects across BFSI, Healthcare, Retail, or Government sectors. Excellent client communication, stakeholder management, and delivery leadership. Key Competencies Certifications: CIPP/E, CIPM, CIPT, ISO 27701 Lead Implementer/Auditor. Familiarity with privacy automation tools (e.g., OneTrust, BigID, TrustArc). Knowledge of cyber regulations (NIST, ISO 27001, PCI DSS, HIPAA) and their intersection with privacy. Show more Show less
Posted 2 weeks ago
14.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Job Purpose We are seeking an experienced and visionary Data Center Solution Architect with a specialization in Network Security to lead the design, development, and implementation of secure, scalable, and efficient data center solutions. The ideal candidate will have 14+ years of extensive experience in network security, infrastructure architecture, and data center operations. You will play a pivotal role in ensuring the security and reliability of our data centers, aligning technology strategies with business objectives, and collaborating with cross-functional teams to deliver best-in-class solutions. Job Location Mumbai/Chennai Roles & Responsibilities Solution Design and Architecture: Develop and architect end-to-end network security solutions for data centers, including firewalls, DDoS, SIEM, EDR, WAF intrusion detection/prevention systems (IDS/IPS), VPNs, and secure access mechanisms. Design highly available, scalable, and disaster-resilient network infrastructures tailored to data center environments. Evaluate and recommend security technologies and frameworks that align with industry standards and business requirements. Security Implementation and Compliance: Lead the integration of security protocols across multi-cloud, hybrid cloud, and on-premises environments. Ensure compliance with industry standards such as ISO 27001, NIST, GDPR, PCI-DSS, and other regulatory frameworks. Conduct security audits and risk assessments for existing data center infrastructures. Collaboration and Leadership: Work closely with IT, DevOps, and business units to align data center security solutions with organizational goals. Mentor and guide technical teams in implementing best practices for data center and network security. Act as a subject matter expert (SME) in high-level client engagements, proposals, and solution demonstrations. Technology Strategy and Innovation: Stay updated with the latest trends and advancements in network security and data center technologies. Proactively identify and address emerging threats and vulnerabilities. Lead proof-of-concept (PoC) initiatives to evaluate new tools and solutions. EDUCATIONAL QUALIFICATIONS: (degree, training, and certification required) BE/B-Tech or equivalent with Computer Science/IT or Electronics & Communication Relevant Experience 14+ years of experience in network security, IT infrastructure, and data center operations. Proven expertise in designing and implementing secure data center network architectures. Advanced knowledge of security technologies, including firewalls, VPNs, SD-WAN, DDoS protection, and Zero Trust Architecture. Proficiency with networking protocols and technologies such as TCP/IP, MPLS, BGP, OSPF, DNS, VLANs, and others. Hands-on experience with cloud platforms (e.g., AWS, Azure, Google Cloud) and hybrid cloud security. Strong understanding of virtualization technologies (e.g., VMware, Hyper-V) and container security (e.g., Kubernetes, Docker). Relevant certifications such as CISSP, CCIE Security, AWS Certified Security, Azure Security Engineer Associate, TOGAF. Experience with automation tools (e.g., Ansible, Terraform) for secure infrastructure deployment. Familiarity with SIEM, threat intelligence platforms, and incident response frameworks. Excellent communication, presentation, and stakeholder management skills. Show more Show less
Posted 2 weeks ago
8.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Are you a seasoned application security expert with a passion for safeguarding software applications? Join our team as the Head of Application Security and lead the charge in defining and executing our application security strategy. This leadership role is pivotal in ensuring the security of our software applications through robust DevSecOps practices, threat modeling, secure coding, and compliance with regulatory frameworks such as BSP, PCI-DSS, and ISO 27001. Key Responsibilities: Develop and execute an application security strategy aligned with business and regulatory requirements. Establish security policies, standards, and best practices for application development and deployment. Conduct security assessments, threat modeling, and code reviews to identify vulnerabilities. Implement and oversee security automation tools such as SAST, DAST, and IAST to enhance secure development. Lead and mentor a team of security engineers and analysts to improve security posture. Collaborate with development, DevOps, and infrastructure teams to integrate security into CI/CD pipelines (DevSecOps). Manage security incident response related to application vulnerabilities and breaches. Ensure compliance with regulatory frameworks such as BSP, PCI-DSS, ISO 27001, and NIST standards. Engage in security awareness training and promote secure coding practices across teams. Stay updated on emerging threats, vulnerabilities, and cybersecurity trends. Qualifications: Bachelor’s or Master’s degree in Computer Science, Information Security, or a related field. 8+ years of experience in application security, with at least 3 years in a leadership role. Strong knowledge of secure software development lifecycle (SSDLC) and DevSecOps practices. Experience with security testing tools such as Burp Suite, OWASP ZAP, Veracode, or similar. Expertise in authentication, authorization, encryption, and identity management principles. Familiarity with cloud security (AWS, Azure, or GCP) and container security (Kubernetes, Docker). Relevant certifications such as CISSP, CISM, OSCP, CEH, or CSSLP are preferred. Excellent problem-solving, communication, and leadership skills. Join us and be a part of a team that prioritizes security and innovation. Apply now to make a significant impact on our application security landscape! Show more Show less
Posted 2 weeks ago
5.0 years
0 Lacs
Kurla, Maharashtra, India
On-site
At Black & Veatch, our employee-owners go beyond the project. For over a century, we have been breaking down social, economic and geographic barriers by making life's critical resources accessible to all. Working with us, you will help provide critical expertise as we, along with our valued clients, deliver solutions that positively impact communities around the world. Our professionals are our greatest asset, and we believe nothing is more important than the health, happiness and professional growth of our employee-owners. With a focus on flexible work-life balance options, an expanding and diverse workforce, and limitless career growth opportunities, we will give you our best to help you give us your best, and together we can build a world of difference. Req Id : 106000 Opportunity Type : Staff Relocation eligible : No Full time/Part time : Full-Time Contract Hire Only for this Project : No Visa Sponsorship Available: No Job Summary The Industrial Cybersecurity Analyst contributes to technical consulting projects and implementation services for critical infrastructure clients. The Industrial Cybersecurity Analyst leverages their technical and industry knowledge of OT networks and industrial cybersecurity to contribute to the completion of multiple engagement phases. In this role, you will assess/support clients’ security posture, develop recommendations to enhance their programs and technologies, and implement recommendations outlined in master plans. This role blends technical capabilities with analysis and technical support. The role requires a wide range of duties, including onsite/online assessments, compliance and standards reviews, security architecture analyses, plan development, and technology implementation and integration. The role also supporting our Industrial Cyber Security Lead in analysis, risk management workshops, as well as the ability to write a customer maturity analysis. The Industrial Cybersecurity Analyst demonstrates capabilities with minimal level of oversight from more senior level professionals. The scope and size of projects they contribute to are generally medium to large in size or they may own a small to moderate portion of a larger project. Key Responsibilities Technical Consulting and Implementation Capabilities: Assess people, process, and technical dimensions of client cybersecurity posture Develops and write master plans that combine analyses, reviews, and recommendations of client industrial cyber programs, technologies, and networks Assist workshops, data collection, tabletop exercises and client interviews Assist asset and vulnerability scanning of customer networks, including the installation of scanning and monitoring technologies Assist walk-downs of client sites to assess cyber and physical security postures Applies industrial cybersecurity standards and regulatory requirements (e.g., NERC CIP, NIST, IE62443) to customer programs Assist technical (e.g., segmentation, hardening, technology integration) and programmatic (e.g., policies, response plans) implementation of master plans and recommendations Contributes to quality review on own engagements Develop applicable knowledge bases by using best practices to redefine tools and techniques. Outline specific performance measures, targets, and goals to articulate the business case for realized efficiencies or added value Challenge client’s current strategy and direction through persuasive discussions. Define competitive advantage and achievable value to the client through use of the strategic change components and metrics. Formulate issue-based hypotheses and develop analytical plan for testing. Contribute to analysis of impact of strategic changes by defining linkages and interdependencies. Utilize specialized knowledge to produce complex work products and solutions across all phases of an engagement Anticipate and resolve technical problems with minimal technical assistance from others Develop, present, and defend conclusions, recommendations, and implementation plans Identify technical issues impacting an engagement and proposes solutions Analyze and apply best practices knowledge of the industry Contribute to the development of service packages as part of the team’s service offerings Management Responsibilities Individual Contributor Preferred Qualifications Bachelor's Degree or relevant work experience Has managed/supported significant engagements Experience applying common OT standards and regulations (e.g., NIST, IE6433, CMMC, NERC CIP) 5+ years in a technical/consulting environment All applicants must be able to complete pre-employment onboarding requirements (if selected) which may include any/all of the following: criminal/civil background check, drug screen, and motor vehicle records search, in compliance with any applicable laws and regulations. Knowledge of business continuity planning and disaster recovery Knowledge of anti-virus and anti-spam technologies Knowledge of technology asset management Knowledge of technology hardware and software platforms and systems Skill in analytical and technical documentation Skill in verbal and written communication Skill in articulating complex, technical information to both technical and non-technical audiences Skill in analyzing significant volumes of detailed information and understanding the security implications Skill in understanding complex systems across diverse technical platforms Intermediate skill level in Microsoft office and software update tools Intermediate skill level in secure content, network security and web filtering software Intermediate skill level in security vulnerability scanning tools Ability to balance and manage competing high priority work demands Ability to build relationships and foster teamwork Ability to work in a team environment Ability to conduct sensitive security investigations and maintain confidentiality Preferred Qualifications Experience at customer sites Proven experience with OT penetration testing and/or red teaming Experience with OT Security-by-design and/or new OT in construction Proven ability to install monitoring technologies (e.g., Nozomi, Dragos, Tenable, Claroty) Experience scoping technical projects Proven ability to assess security architectures of OT networks Direct experience in planning and facilitating risk workshops, table-top exercises, and other client-facing work sessions Experience conducting maturity and technical assessments Proven team leadership and management experience Graduate degree preferred Certifications Other relevant cybersecurity certifications (e.g., Nozomi, Fortinet, Dragos, Tenable) – preferred CompTIA Security+ SANS Certificate in relevant to OT Cyber Security such as GICSP, GICP, ACS, GSEC, GRID, GCIH, CEH, CISM CISSP ISA/IEC 62443 suite of certifications Work Environment/Physical Demands BandV Office Environment or Client Site Work involves frequent finger/hand manipulation in using a keyboard and mouse. Work may involve stairs, walking, long moments of standing. Minimum Qualifications Bachelor’s Degree or relevant work experience. 4+ years experience in a business/consulting environment. All applicants must be able to complete pre-employment onboarding requirements (if selected) which may include any/all of the following: criminal/civil background check, drug screen, and motor vehicle records search, in compliance with any applicable laws and regulations. Certifications Certifications related to area of expertise, where applicable preferred. Work Environment/Physical Demands Normal office environment Competencies Action oriented Interpersonal savvy Customer focus Salary Plan CST: Consulting Job Grade 003 BVH, Inc., its subsidiaries and its affiliated companies, complies with all Equal Employment Opportunity (EEO) affirmative action laws and regulations. Black & Veatch does not discriminate on the basis of age, race, religion, color, sex, national origin, marital status, genetic information, sexual orientation, gender Identity and expression, disability, veteran status, pregnancy status or other status protected by law. Black & Veatch is committed to being an employer of choice by creating a valuable work experience that keeps our people engaged, productive, safe and healthy. We offer professionals an array of health and welfare benefits that vary based on their geographic region and employment status. This may include health, life accident and disability insurances, paid time off, financial programs and more. Professionals may also be eligible for a performance-based bonus program. By valuing diverse voices and perspectives, we cultivate an authentically inclusive environment for professionals and are able to provide innovative and effective solutions for clients. Show more Show less
Posted 2 weeks ago
0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Key Responsibilities: Design and deploy secure, scalable, and reliable cloud infrastructure on Microsoft Azure. Implement Infrastructure as Code using tools like Terraform, Bicep, or ARM templates. Monitor system performance and ensure high availability and disaster recovery. Automate deployments and workflows using PowerShell, Azure CLI, or DevOps pipelines. Maintain and enhance cloud network architectures including VNets, NSGs, VPNs, and firewalls. Ensure cloud environments adhere to compliance, security, and governance policies. Collaborate with DevOps, security, and development teams to support CI/CD pipelines and infrastructure needs. Troubleshoot infrastructure-related issues, system failures, and performance bottlenecks. Provide technical documentation and contribute to best practices and standards development. Required Skills and Qualifications: Proven experience as an Azure Infrastructure Engineer, Cloud Engineer, or similar role. Strong understanding of Azure IaaS/PaaS services including VMs, Storage, Azure Networking, Azure Monitor, Key Vault, Load Balancer, and Azure Active Directory. Experience with Infrastructure as Code (IaC) – Terraform, Bicep, ARM templates. Proficiency in PowerShell, Azure CLI, or other scripting languages. Experience with Azure DevOps, GitHub Actions, or other CI/CD tools. Knowledge of networking, firewalls, DNS, VPNs, and security best practices in cloud environments. Familiarity with monitoring and logging tools (Azure Monitor, Log Analytics). Understanding of identity and access management in Azure (RBAC, AAD). Preferred Qualifications: Microsoft Certified: Azure Administrator Associate, Azure Solutions Architect, or similar. Experience with hybrid cloud setups and on-prem to cloud migrations. Knowledge of Kubernetes (AKS) and containerization is a plus. Familiarity with compliance frameworks like ISO 27001, SOC 2, or NIST. Understanding of identity and access management in Azure (RBAC, AAD). Preferred Qualifications: Microsoft Certified: Azure Administrator Associate, Azure Solutions Architect, or similar. Experience with hybrid cloud setups and on-prem to cloud migrations. Knowledge of Kubernetes (AKS) and containerization is a plus. Familiarity with compliance frameworks like ISO 27001, SOC 2, or NIST. Show more Show less
Posted 2 weeks ago
7.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Line of Service Advisory Industry/Sector Not Applicable Specialism Operations Management Level Manager Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. Job Description Network Security, Cloud Security, ITGC Reviews, Compliance Reviews, ISO Risk Consulting Purpose of the Job /Role Lead/Manage/Perform Security Reviews which includes Cloud Security and Data Security, Threat and Vulnerability Management, Identity and access management, Technology controls, process controls, and governance, risk and compliance elements, IT General Controls. Responsibilities Should manage/ oversee/execute engagements around Cyber Risk and Maturity Assessments, Cyber Strategy, Cloud Security, Data Protection, Third Party Risk Management, Enterprise Architecture reviews. Knowledge on NIST CSF, ISO 27001, ISO 27701, ISO 27017, DPDP Act Experience in financial sector companies like banks, NBFCs and FinTechs Mandatory Skill- Strategy and Governance Preferred Skill- Cyber Strategy Years of Experience Required: 7- 10 years Education Qualification Minimum Qualification: BE/ BTech Minimum 7 years for Managers Postgraduates in any stream would be preferred (not mandatory) Prior Big 4 experience would be an added advantage Experience in IT Risk Advisory/ Assurance for varied industry segments preferred Excellent communication skills - both written and oral Certifications CISA/CISM/ISO will be added advantage Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Technology, Master of Business Administration Degrees/Field Of Study Preferred Certifications (if blank, certifications not specified) Required Skills Strategy Plan Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Coaching and Feedback, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Learning Agility, Managed Services, Optimism, Privacy Compliance, Professional Courage {+ 13 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date Show more Show less
Posted 2 weeks ago
10.0 years
0 Lacs
West Bengal, India
Remote
Summary Job description Position Title: ServiceNow Architect (HAM, ITSM, SecOps, IRM, GenAI) Location: India (Remote) Experience Level: 10+ years (including minimum 6+ years in ServiceNow and 3+ years in an Architect role) Role Overview: We are looking for a highly experienced and strategic ServiceNow Architect to lead the design, development, and implementation of enterprise-grade solutions across multiple ServiceNow modules. The ideal candidate will possess deep technical expertise, strong architectural acumen, and a proven ability to translate complex business needs into scalable ServiceNow solutions. This role involves working across key modules including Hardware Asset Management (HAM), IT Service Management (ITSM), Security Operations (SecOps), Vulnerability Response (VR), Integrated Risk Management (IRM), and Generative AI (GenAI). Key Responsibilities: Architectural Design & Strategy: Design and implement comprehensive ServiceNow solutions aligned with enterprise architecture and governance standards. Define platform best practices and lead technical design and roadmap discussions. Collaborate with cross-functional stakeholders to ensure technical alignment with business goals. Module-Specific Expertise: HAM: Optimize the asset lifecycle; manage integrations with tools like SCCM and JAMF. ITSM: Architect ITIL-aligned processes including Incident, Change, Problem, and Knowledge Management. SecOps & VR: Design and implement use cases for threat intelligence, security incident response, and vulnerability management. IRM: Lead implementations for policy compliance, risk, audit, and vendor risk management. GenAI: Explore and implement ServiceNow’s Generative AI capabilities including Virtual Agent, Predictive Intelligence, and Now Assist. Platform Development & Delivery: Oversee technical teams in delivering high-quality configurations, customizations, and third-party integrations. Manage release processes ensuring performance, scalability, and security. Provide technical leadership, code reviews, and mentorship to ServiceNow developers. Stakeholder Engagement: Act as a trusted advisor to business units, product owners, and executives. Translate business requirements into effective ServiceNow architecture and workflows. Present technical strategies and solutions to senior leadership. Required Skills & Experience: 10+ years in IT, with a minimum of 6+ years on the ServiceNow platform. Proven experience in at least four of the following modules: HAM, ITSM, SecOps (including VR), IRM, GenAI Proficiency in JavaScript, Glide API, Flow Designer, IntegrationHub, and platform data architecture. Strong background in secure integrations via REST/SOAP, MID Server, JDBC. Familiarity with Agile/Scrum methodologies and DevOps practices. Excellent communication, documentation, and stakeholder management skills. Preferred Certifications: ServiceNow Certified System Administrator (CSA) – Required ServiceNow Certified Implementation Specialist (CIS) – Minimum Two Modules Preferred Certified Application Developer (CAD) – Preferred Experience with Now Assist, AI Search, or Generative AI within ServiceNow. Desirable Attributes: Knowledge of risk and compliance frameworks such as NIST or ISO 27001. Experience with large-scale, multi-region ServiceNow implementations. Show more Show less
Posted 2 weeks ago
10.0 years
0 Lacs
Tamil Nadu, India
Remote
Summary Job description Position Title: ServiceNow Architect (HAM, ITSM, SecOps, IRM, GenAI) Location: India (Remote) Experience Level: 10+ years (including minimum 6+ years in ServiceNow and 3+ years in an Architect role) Role Overview: We are looking for a highly experienced and strategic ServiceNow Architect to lead the design, development, and implementation of enterprise-grade solutions across multiple ServiceNow modules. The ideal candidate will possess deep technical expertise, strong architectural acumen, and a proven ability to translate complex business needs into scalable ServiceNow solutions. This role involves working across key modules including Hardware Asset Management (HAM), IT Service Management (ITSM), Security Operations (SecOps), Vulnerability Response (VR), Integrated Risk Management (IRM), and Generative AI (GenAI). Key Responsibilities: Architectural Design & Strategy: Design and implement comprehensive ServiceNow solutions aligned with enterprise architecture and governance standards. Define platform best practices and lead technical design and roadmap discussions. Collaborate with cross-functional stakeholders to ensure technical alignment with business goals. Module-Specific Expertise: HAM: Optimize the asset lifecycle; manage integrations with tools like SCCM and JAMF. ITSM: Architect ITIL-aligned processes including Incident, Change, Problem, and Knowledge Management. SecOps & VR: Design and implement use cases for threat intelligence, security incident response, and vulnerability management. IRM: Lead implementations for policy compliance, risk, audit, and vendor risk management. GenAI: Explore and implement ServiceNow’s Generative AI capabilities including Virtual Agent, Predictive Intelligence, and Now Assist. Platform Development & Delivery: Oversee technical teams in delivering high-quality configurations, customizations, and third-party integrations. Manage release processes ensuring performance, scalability, and security. Provide technical leadership, code reviews, and mentorship to ServiceNow developers. Stakeholder Engagement: Act as a trusted advisor to business units, product owners, and executives. Translate business requirements into effective ServiceNow architecture and workflows. Present technical strategies and solutions to senior leadership. Required Skills & Experience: 10+ years in IT, with a minimum of 6+ years on the ServiceNow platform. Proven experience in at least four of the following modules: HAM, ITSM, SecOps (including VR), IRM, GenAI Proficiency in JavaScript, Glide API, Flow Designer, IntegrationHub, and platform data architecture. Strong background in secure integrations via REST/SOAP, MID Server, JDBC. Familiarity with Agile/Scrum methodologies and DevOps practices. Excellent communication, documentation, and stakeholder management skills. Preferred Certifications: ServiceNow Certified System Administrator (CSA) – Required ServiceNow Certified Implementation Specialist (CIS) – Minimum Two Modules Preferred Certified Application Developer (CAD) – Preferred Experience with Now Assist, AI Search, or Generative AI within ServiceNow. Desirable Attributes: Knowledge of risk and compliance frameworks such as NIST or ISO 27001. Experience with large-scale, multi-region ServiceNow implementations. Show more Show less
Posted 2 weeks ago
2.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Join a team dedicated to supporting the crucial mission of improving health outcomes. At Merative, you can apply your skills – and grow new ones – with colleagues who have deep expertise in health and technology. Merative provides data, analytics and software for the health industry. Our clients include providers, health plans, employers, life sciences companies and governments around the world. With industry-leading products and focused innovation, we help customers improve decision-making and performance so that together, we drive real progress in health. Learn more at merative.com We are seeking an experienced and proactive Sr. Analyst, Information Security Operations to join our team and help safeguard our organization’s data, systems, and networks. This critical role involves the development, implementation, and management of security controls and measures designed to intercept and prevent internal and external attacks, safeguarding our email, data, e-commerce, and web-based systems. The ideal candidate will possess strong technical expertise in network security, vulnerability assessments, penetration testing, and incident response. In this role, you will play a key part in identifying potential threats, performing cybersecurity audits, and responding to breaches while ensuring compliance with cybersecurity policies and best practices. The Sr. Analyst is essential for maintaining the integrity of our systems and protecting sensitive information across the organization. Key Responsibilities: Develop and Execute Security Controls: Design, implement, and manage security measures to prevent unauthorized access to systems and networks. Implement effective countermeasures to combat internal and external threats. Manage Firewalls and Encryption Protocols: Maintain and configure hardware, software, network firewalls, and encryption protocols to protect critical infrastructure and data. Administer Cybersecurity Policies: Administer and enforce policies controlling both physical and virtual access to systems, ensuring they align with industry standards and organizational goals. Conduct Security Audits and Testing: Perform network security audits, vulnerability assessments, and system testing to identify weaknesses. Evaluate system security configurations for efficacy and compliance with cybersecurity standards. Penetration Testing and Vulnerability Assessments: Conduct penetration tests and vulnerability assessments of applications, operating systems, and networks to proactively identify risks and vulnerabilities. Incident Response and Breach Management: Monitor for, respond to, and mitigate cybersecurity breaches and incidents. Identify intrusions and take action to isolate, block, and remove unauthorized access. Research and Threat Analysis: Conduct research on emerging cybersecurity threats, analyze root causes of incidents, and develop strategies to prevent future breaches. Security Solution Implementation: Assist in the creation and implementation of security solutions that enhance system defense mechanisms, addressing both known and evolving security challenges. Business Impact Communication: Communicate with management regarding the impact of security incidents, breaches, or attempted intrusions on the business. Report on the potential loss, alteration, or destruction of data or systems. Collaboration: Work in collaboration with internal teams or external Professional Services and Outsourcing functions to ensure security solutions meet organizational needs. Skills & Qualifications: Experience: 2- 3+ years of experience in cybersecurity, information security operations, or a similar role within a corporate environment. Technical Expertise: Strong proficiency in security protocols, firewalls, encryption, penetration testing, network security, and vulnerability management. Knowledge of Security Tools: Familiarity with various security testing tools, intrusion detection systems (IDS), and security incident management platforms. Incident Response: Hands-on experience in managing and responding to cybersecurity incidents, intrusions, and breaches. Penetration Testing: Proven expertise in conducting penetration tests and vulnerability assessments to identify and remediate security risks. Compliance & Standards: Knowledge of cybersecurity regulations and frameworks (e.g., GDPR, NIST, ISO 27001, PCI DSS) and experience in ensuring compliance. Problem-Solving: Strong analytical and troubleshooting skills, with the ability to analyze security incidents and determine root causes. Communication Skills: Strong ability to communicate complex security issues to non-technical stakeholders and provide actionable insights for business leadership. Preferred Qualifications: Bachelor’s degree in Information Security, Computer Science, or related field. Relevant cybersecurity certifications (e.g., CISSP, CEH, CompTIA Security+, OSCP). Familiarity with cloud security and hosted network environments. Experience with secure development practices and collaboration with software engineering teams on cybersecurity. Knowledge of securing web-based solutions and e-commerce platforms. Work Environment & Additional Information: Ability to work independently and as part of a team to achieve security objectives and improve overall security posture. The role is client-focused and may involve external interactions depending on business needs. Why Join Us? This is an exciting opportunity for an experienced cybersecurity professional to make a significant impact on an organization’s information security infrastructure. If you’re looking to work in a fast-paced, innovative environment with opportunities to grow and develop your skills, this role is perfect for you. We offer competitive salaries, benefits, and a collaborative team environment where your contributions will help drive our company’s security initiatives forward. It is the policy of Merative to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, HIV status, or any other characteristic protected by federal, state or local law. In addition, Merative will provide reasonable accommodations for qualified individuals with disabilities. Show more Show less
Posted 2 weeks ago
8.0 - 10.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Job description: Job Description Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ͏ Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ͏ i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ͏ 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ͏ Deliver No Performance Parameter Measure 1Customer centricityTimely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers.2Support sales team to create wins% of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Security Log Monitoring . Experience: 8-10 Years . Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome. Show more Show less
Posted 2 weeks ago
10.0 years
0 Lacs
Madhya Pradesh, India
Remote
Summary Job description Position Title: ServiceNow Architect (HAM, ITSM, SecOps, IRM, GenAI) Location: India (Remote) Experience Level: 10+ years (including minimum 6+ years in ServiceNow and 3+ years in an Architect role) Role Overview: We are looking for a highly experienced and strategic ServiceNow Architect to lead the design, development, and implementation of enterprise-grade solutions across multiple ServiceNow modules. The ideal candidate will possess deep technical expertise, strong architectural acumen, and a proven ability to translate complex business needs into scalable ServiceNow solutions. This role involves working across key modules including Hardware Asset Management (HAM), IT Service Management (ITSM), Security Operations (SecOps), Vulnerability Response (VR), Integrated Risk Management (IRM), and Generative AI (GenAI). Key Responsibilities: Architectural Design & Strategy: Design and implement comprehensive ServiceNow solutions aligned with enterprise architecture and governance standards. Define platform best practices and lead technical design and roadmap discussions. Collaborate with cross-functional stakeholders to ensure technical alignment with business goals. Module-Specific Expertise: HAM: Optimize the asset lifecycle; manage integrations with tools like SCCM and JAMF. ITSM: Architect ITIL-aligned processes including Incident, Change, Problem, and Knowledge Management. SecOps & VR: Design and implement use cases for threat intelligence, security incident response, and vulnerability management. IRM: Lead implementations for policy compliance, risk, audit, and vendor risk management. GenAI: Explore and implement ServiceNow’s Generative AI capabilities including Virtual Agent, Predictive Intelligence, and Now Assist. Platform Development & Delivery: Oversee technical teams in delivering high-quality configurations, customizations, and third-party integrations. Manage release processes ensuring performance, scalability, and security. Provide technical leadership, code reviews, and mentorship to ServiceNow developers. Stakeholder Engagement: Act as a trusted advisor to business units, product owners, and executives. Translate business requirements into effective ServiceNow architecture and workflows. Present technical strategies and solutions to senior leadership. Required Skills & Experience: 10+ years in IT, with a minimum of 6+ years on the ServiceNow platform. Proven experience in at least four of the following modules: HAM, ITSM, SecOps (including VR), IRM, GenAI Proficiency in JavaScript, Glide API, Flow Designer, IntegrationHub, and platform data architecture. Strong background in secure integrations via REST/SOAP, MID Server, JDBC. Familiarity with Agile/Scrum methodologies and DevOps practices. Excellent communication, documentation, and stakeholder management skills. Preferred Certifications: ServiceNow Certified System Administrator (CSA) – Required ServiceNow Certified Implementation Specialist (CIS) – Minimum Two Modules Preferred Certified Application Developer (CAD) – Preferred Experience with Now Assist, AI Search, or Generative AI within ServiceNow. Desirable Attributes: Knowledge of risk and compliance frameworks such as NIST or ISO 27001. Experience with large-scale, multi-region ServiceNow implementations. Show more Show less
Posted 2 weeks ago
10.0 years
0 Lacs
Bihar, India
Remote
Summary Job description Position Title: ServiceNow Architect (HAM, ITSM, SecOps, IRM, GenAI) Location: India (Remote) Experience Level: 10+ years (including minimum 6+ years in ServiceNow and 3+ years in an Architect role) Role Overview: We are looking for a highly experienced and strategic ServiceNow Architect to lead the design, development, and implementation of enterprise-grade solutions across multiple ServiceNow modules. The ideal candidate will possess deep technical expertise, strong architectural acumen, and a proven ability to translate complex business needs into scalable ServiceNow solutions. This role involves working across key modules including Hardware Asset Management (HAM), IT Service Management (ITSM), Security Operations (SecOps), Vulnerability Response (VR), Integrated Risk Management (IRM), and Generative AI (GenAI). Key Responsibilities: Architectural Design & Strategy: Design and implement comprehensive ServiceNow solutions aligned with enterprise architecture and governance standards. Define platform best practices and lead technical design and roadmap discussions. Collaborate with cross-functional stakeholders to ensure technical alignment with business goals. Module-Specific Expertise: HAM: Optimize the asset lifecycle; manage integrations with tools like SCCM and JAMF. ITSM: Architect ITIL-aligned processes including Incident, Change, Problem, and Knowledge Management. SecOps & VR: Design and implement use cases for threat intelligence, security incident response, and vulnerability management. IRM: Lead implementations for policy compliance, risk, audit, and vendor risk management. GenAI: Explore and implement ServiceNow’s Generative AI capabilities including Virtual Agent, Predictive Intelligence, and Now Assist. Platform Development & Delivery: Oversee technical teams in delivering high-quality configurations, customizations, and third-party integrations. Manage release processes ensuring performance, scalability, and security. Provide technical leadership, code reviews, and mentorship to ServiceNow developers. Stakeholder Engagement: Act as a trusted advisor to business units, product owners, and executives. Translate business requirements into effective ServiceNow architecture and workflows. Present technical strategies and solutions to senior leadership. Required Skills & Experience: 10+ years in IT, with a minimum of 6+ years on the ServiceNow platform. Proven experience in at least four of the following modules: HAM, ITSM, SecOps (including VR), IRM, GenAI Proficiency in JavaScript, Glide API, Flow Designer, IntegrationHub, and platform data architecture. Strong background in secure integrations via REST/SOAP, MID Server, JDBC. Familiarity with Agile/Scrum methodologies and DevOps practices. Excellent communication, documentation, and stakeholder management skills. Preferred Certifications: ServiceNow Certified System Administrator (CSA) – Required ServiceNow Certified Implementation Specialist (CIS) – Minimum Two Modules Preferred Certified Application Developer (CAD) – Preferred Experience with Now Assist, AI Search, or Generative AI within ServiceNow. Desirable Attributes: Knowledge of risk and compliance frameworks such as NIST or ISO 27001. Experience with large-scale, multi-region ServiceNow implementations. Show more Show less
Posted 2 weeks ago
3.0 years
0 Lacs
Pune, Maharashtra, India
On-site
About Us We are a global climate technologies company engineered for sustainability. We create sustainable and efficient residential, commercial and industrial spaces through HVACR technologies. We protect temperature-sensitive goods throughout the cold chain. And we bring comfort to people globally. Best-in-class engineering, design and manufacturing combined with category-leading brands in compression, controls, software and monitoring solutions result in next-generation climate technology that is built for the needs of the world ahead. Whether you are a professional looking for a career change, an undergraduate student exploring your first opportunity, or recent graduate with an advanced degree, we have opportunities that will allow you to innovate, be challenged and make an impact. Join our team and start your journey today! Job Title Security Analyst Reports to Sr. Manager Job Purpose As a Security Analyst , you will be a key member of our Global Cybersecurity Team, helping to strengthen Copeland’s cybersecurity posture. This role involves monitoring tools and dashboards, identifying and mitigating security vulnerabilities, and collaborating with teams to address risks effectively. You will also contribute to continuously improving our vulnerability management processes and play an active role in ensuring our IT systems remain secure. Key Responsibilities Monitor security tools and dashboards to identify vulnerabilities, assess risks, and propose compensating controls to reduce threats. Communicate findings to appropriate teams and track vulnerabilities through resolution. Create detailed vulnerability reports for technical teams and summary reports for management. Collaborate with IT and development teams to prioritize and remediate vulnerabilities. Maintain an up-to-date database of vulnerabilities, including their status and remediation progress. Contribute to the development and improvement of vulnerability management processes and tools. Duties And Responsibilities Support product security programs, projects, and initiatives to align with organizational security objectives. Lead small to medium-scale security initiatives, ensuring timely and successful execution. Collaborate with business units and engineering teams to implement security policies, establish sustainable processes, and enhance compliance while reducing risk. Identify and address gaps within the cybersecurity program, applying your expertise to strengthen the organization’s security posture. Conduct security scans, validate vulnerabilities through penetration testing, and retest fixes to ensure effectiveness. Recommend and participate in initiatives to prevent repeated vulnerability findings. Provide support for cybersecurity projects, technical discussions, and collaborative meetings. Respond to and assist in resolving outputs from security tools and engagement activities. Qualifications Bachelor’s degree in Engineering, Computer Science, or related discipline 3+ years of experience in vulnerability assessment, penetration testing, or cybersecurity. Hands-on experience with vulnerability scanning tools and remediation processes. Knowledge of networking, operating systems (Windows, Linux), and application security. Some experience with programming or scripting and familiarity with DevSecOps practices. Experience with vulnerability frameworks (NIST, CVSS, etc.) Proficient in MS Office (Word, Excel, PowerPoint, etc.) Strong communication skills, with the ability to deliver clear oral, written, and visual presentations. Strong organizational skills, with the ability to plan, prioritize, and align tasks effectively. Customer-focused mindset with a strong eagerness to learn and grow. SANS GIAC, Network+, Security+ or other industry certifications preferred Key Competencies Customer Focus, Tech Savvy, Action Oriented, Collaborates, Communicates Effectively, Instills Trust, Being Resilient Our Commitment to Our People Across the globe, we are united by a singular Purpose: Sustainability is no small ambition. That’s why everything we do is geared toward a sustainable future—for our generation and all those to come. Through groundbreaking innovations, HVACR technology and cold chain solutions, we are reducing carbon emissions and improving energy efficiency in spaces of all sizes, from residential to commercial to industrial. Our employees are our greatest strength. We believe that our culture of passion, openness, and collaboration empowers us to work toward the same goal - to make the world a better place. We invest in the end-to-end development of our people, beginning at onboarding and through senior leadership, so they can thrive personally and professionally. Flexible and competitive benefits plans offer the right options to meet your individual/family needs. We provide employees with flexible time off plans, including paid parental leave (maternal and paternal), vacation and holiday leave. Together, we have the opportunity – and the power – to continue to revolutionize the technology behind air conditioning, heating and refrigeration, and cultivate a better future. Learn more about us and how you can join our team! Our Commitment to Inclusion & Belonging At Copeland, we cultivate a strong sense of inclusion and belonging where individuals of all backgrounds, and with diverse perspectives, are embraced and treated fairly to enable a stronger workforce. Our employee resource groups play an important role in culture and community building at Copeland. Equal Opportunity Employer Copeland is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, age, marital status, political affiliation, sexual orientation, gender identity, genetic information, disability or protected veteran status. We are committed to providing a workplace free of any discrimination or harassment. Show more Show less
Posted 2 weeks ago
8.0 years
0 Lacs
Mumbai Metropolitan Region
On-site
Description The Information Security program protects Burns & McDonnell data, systems, and employees from evolving cyber threats with focus on continually reducing cybersecurity risk for the company. The Senior Information Security Analyst functions as a subject matter expert in evaluating the overall security posture. They will assess and identify vulnerabilities, analyze risks, and recommend solutions to mitigate these risks. Responsibilities Risk Assessment: Conduct regular assessments of the organization's cybersecurity measures to identify vulnerabilities and risks. Monitoring and Analysis: Use various tools to monitor networks and systems for security breaches or intrusions. Analyze security breaches to understand their root causes. Incident Response: Play a key role in responding to security incidents and breaches, including assisting with investigations and remediation efforts. Reporting: Prepare detailed reports on security issues, such as breach incidents, current risk status, and improvement recommendations. Policy Development Support: Assist in developing and updating the organization's security policies and procedures based on the findings and evolving threat landscape. Training: Perform security awareness training program related to phishing campaigns. All other duties as assigned. Qualifications Bachelor's degree in Information Security, Computer Science, Computer Engineering, Information Technology, or related field. Minimum 8 years of experience in Information Security. Information Security certification (CISSP, GSEC, Security ) Demonstrated expert knowledge with two or more Information Security technologies such as EDR, IPS, SIEM, SOAR, CASB, CAASM, IAM, PAM, NAC, MFA, and DLP Broad understanding of network and security protocols such as, DNS, SPF/DKIM/DMARC, SSL/TLS, TCP/UDP, IPSec. Experience with CIS Critical Security Controls, OWASP Top 10, and MITRE ATT&CK framework. Demonstrated knowledge and experience of securing cloud environments such as Azure, AWS, and GCP. Broad experience and familiarity with Information Technology such as routers, load balancers, web application gateways, PKI, and Active Directory. Demonstrated knowledge of compliance frameworks (ISO 27001, SOC 2, NIST, FedRAMP, etc.). Demonstrated ability to evaluate cybersecurity risk and propose risk mitigations to technical and non-technical audiences. Highly effective oral and written communication skills with ability to convey security concepts and risks to non-technical personnel. Job Engineering Primary Location India-Maharashtra-Mumbai Schedule: Full-time Travel: No Req ID: 251102 Job Hire Type Experienced Not Applicable #BMI N/A Show more Show less
Posted 2 weeks ago
5.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Job Description: AML RightSource is a leading provider of anti-money laundering (AML) and financial crimes compliance solutions. Our team of experts is dedicated to providing our clients with the highest quality of service, while ensuring compliance with regulatory requirements. We are currently seeking a Senior SOC Analyst to join our team. Responsibilities: Monitor and analyze security events from multiple sources, including security information and event management (SIEM) systems, network and host-based intrusion detection/prevention systems, and other security technologies. Conduct investigations into security incidents, analyze evidence, and report findings to management. Provide technical guidance and support to junior SOC analysts. Develop and maintain standard operating procedures for the SOC. Participate in security assessments and penetration testing activities. Conduct threat hunting activities to identify and respond to advanced persistent threats (APTs). Participate in incident response activities and coordinate with other teams to contain and remediate security incidents. Maintain awareness of new and emerging security threats, vulnerabilities, and mitigation techniques. Collaborate with other teams, including the IT team, to ensure the security of the organization's infrastructure and systems. Provide regular reports to management on the SOC's performance and effectiveness. Requirements: Bachelor's degree in Computer Science, Information Systems, or related field. Minimum of 5 years of experience in a SOC or security operations role. Strong knowledge of security technologies, including SIEM systems, intrusion detection/prevention systems, and other security tools. Familiarity with security standards and frameworks, such as NIST, ISO, and SOC 2. Strong knowledge for scripting languages viz Python, PowerShell, bash Experience with security incident response, including investigation, containment, and remediation. Excellent analytical and problem-solving skills. Ability to work well in a team environment. Strong verbal and written communication skills. Relevant security certifications, such as CISSP, CISM, or GSEC, are highly desirable. AML RightSource is committed to fostering a diverse work environment and is proud to be an equal opportunity employer. We provide equal employment opportunities to all qualified applicants without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Show more Show less
Posted 2 weeks ago
10.0 years
0 Lacs
Uttar Pradesh, India
Remote
Summary Job description Position Title: ServiceNow Architect (HAM, ITSM, SecOps, IRM, GenAI) Location: India (Remote) Experience Level: 10+ years (including minimum 6+ years in ServiceNow and 3+ years in an Architect role) Role Overview: We are looking for a highly experienced and strategic ServiceNow Architect to lead the design, development, and implementation of enterprise-grade solutions across multiple ServiceNow modules. The ideal candidate will possess deep technical expertise, strong architectural acumen, and a proven ability to translate complex business needs into scalable ServiceNow solutions. This role involves working across key modules including Hardware Asset Management (HAM), IT Service Management (ITSM), Security Operations (SecOps), Vulnerability Response (VR), Integrated Risk Management (IRM), and Generative AI (GenAI). Key Responsibilities: Architectural Design & Strategy: Design and implement comprehensive ServiceNow solutions aligned with enterprise architecture and governance standards. Define platform best practices and lead technical design and roadmap discussions. Collaborate with cross-functional stakeholders to ensure technical alignment with business goals. Module-Specific Expertise: HAM: Optimize the asset lifecycle; manage integrations with tools like SCCM and JAMF. ITSM: Architect ITIL-aligned processes including Incident, Change, Problem, and Knowledge Management. SecOps & VR: Design and implement use cases for threat intelligence, security incident response, and vulnerability management. IRM: Lead implementations for policy compliance, risk, audit, and vendor risk management. GenAI: Explore and implement ServiceNow’s Generative AI capabilities including Virtual Agent, Predictive Intelligence, and Now Assist. Platform Development & Delivery: Oversee technical teams in delivering high-quality configurations, customizations, and third-party integrations. Manage release processes ensuring performance, scalability, and security. Provide technical leadership, code reviews, and mentorship to ServiceNow developers. Stakeholder Engagement: Act as a trusted advisor to business units, product owners, and executives. Translate business requirements into effective ServiceNow architecture and workflows. Present technical strategies and solutions to senior leadership. Required Skills & Experience: 10+ years in IT, with a minimum of 6+ years on the ServiceNow platform. Proven experience in at least four of the following modules: HAM, ITSM, SecOps (including VR), IRM, GenAI Proficiency in JavaScript, Glide API, Flow Designer, IntegrationHub, and platform data architecture. Strong background in secure integrations via REST/SOAP, MID Server, JDBC. Familiarity with Agile/Scrum methodologies and DevOps practices. Excellent communication, documentation, and stakeholder management skills. Preferred Certifications: ServiceNow Certified System Administrator (CSA) – Required ServiceNow Certified Implementation Specialist (CIS) – Minimum Two Modules Preferred Certified Application Developer (CAD) – Preferred Experience with Now Assist, AI Search, or Generative AI within ServiceNow. Desirable Attributes: Knowledge of risk and compliance frameworks such as NIST or ISO 27001. Experience with large-scale, multi-region ServiceNow implementations. Show more Show less
Posted 2 weeks ago
0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Job Overview: We are actively hiring an experienced Application Security Expert to lead our security testing, vulnerability management, and threat mitigation efforts. This role involves securing applications, mobile platforms, APIs, and cloud environments while ensuring compliance with industry standards and regulations. The ideal candidate will have strong expertise in security testing, cloud security, DevSecOps integration, and security architecture, with a proven ability to mentor teams and lead secure development practices. Job Responsibilities: Security Testing: Perform SAST, SCA, DAST, IAST, mobile, and API security testing to identify and resolve vulnerabilities. Vulnerability Management: Conduct VAPT, prioritize vulnerabilities, and mitigate risks using threat modeling and OWASP ASVS. Cloud Security: Secure AWS and Azure environments, ensuring compliance with CIS Benchmarks and GDPR/HIPAA. Compliance & Regulations: Ensure compliance with PCI DSS, HIPAA, GDPR, and other security frameworks. DevSecOps Integration: Integrate security into SDLC, automate security checks within CI/CD pipelines using Jenkins and Azure DevOps. Security Architecture: Design secure application architectures and advocate secure coding practices across teams. Leadership & Training: Lead security assessments, mentor junior team members, and conduct security awareness workshops. Job Requirements: Technical Proficiency: Legacy: Java, .NET; Modern: React, Node.js, Python, PHP, Ruby/Rails, and Angular. CMS: Magento-Adobe, and Avocode. Cloud Skills: Expertise in AWS and Azure. Security & Compliance: Knowledge of OWASP Top 10, OWASP ASVS, PCI DSS, HIPAA, GDPR, NIST, and CIS Benchmarks. Security Testing Expertise: Proficiency in SAST, DAST, IAST, penetration testing, and threat modeling. DevSecOps & SDLC Integration: Experience in embedding security in CI/CD pipelines and secure SDLC practices. Soft Skills: Strong communication, leadership, and collaboration skills. Preferred Certifications CISSP, CEH, GWAPT, AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer Associate. Why QualiZeal? Award-Winning Workplace : Certified as a Great Place to Work® and recognized by ET NOW as the Best Organization for Women in 2025. Proven Engagement: Industry-recognized client and employee Net Promoter Scores (NPS). Growth-Focused Culture : Equal-opportunity employer with a strong emphasis on leadership development, training, and continuous learning. Flexible & Supportive Environment : We value empathy, recognize contributions, and support work-life balance. Transparent Leadership : Open-book management with a collaborative, inclusive approach. Rapid Growth : 850+ professionals strong and on track to reach 3000+ employees — an exciting time to join. About QualiZeal: QualiZeal is North America's fastest-growing independent digital quality engineering services company. With a diverse portfolio of digital transformation services encompassing Quality Engineering, Digital Engineering, Advisory and Transformation, and Emerging Technology Testing, QualiZeal empowers organizations of all sizes globally to achieve quality excellence and sustainable market leadership. Trusted by 70+ global enterprises and with a headcount of 850+ elite software quality engineers, QualiZeal is pioneering AI-enabled Quality Engineering innovation. QualiZeal has consistently maintained an outstanding client Net Promoter Score (NPS) of over 75, reflecting its unwavering commitment to client satisfaction and service excellence. Show more Show less
Posted 2 weeks ago
2.0 - 3.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Summary Position Summary Job title: Third Party Cyber Risk Services- Consultant (Solution Delivery Associate) About At Deloitte, we do not offer you just a job, but a career in the highly sought-after risk management field. We are one of the business leaders in the risk market. We work with a vision to make the world more prosperous, trustworthy, and safe. Deloitte’s clients, primarily based outside of India, are large, complex organizations that constantly evolve and innovate to build better products and services. In the process, they encounter various risks and the work we do to help them address these risks is increasingly important to their success—and to the strength of the economy and public security. By joining us, you will get to work with diverse teams of professionals who design, manage, and implement risk-centric solutions across a variety of domains. In the process, you will gain exposure to the risk-centric challenges faced in today’s world by organizations across a range of industry sectors and become subject matter experts in those areas. Our Risk and Financial Advisory services professionals help organizations effectively navigate business risks and opportunities—from strategic, reputation, and financial risks to operational, cyber, and regulatory risks—to gain competitive advantage. We apply our experience in ongoing business operations and corporate lifecycle events to help clients become stronger and more resilient. Our market-leading teams help clients embrace complexity to accelerate performance, disrupt through innovation, and lead in their industries. We use cutting-edge technology like AI/ML techniques, analytics, and RPA to solve Deloitte’s clients‘most complex issues. Working in Risk and Financial Advisory at Deloitte US-India offices has the power to redefine your ambitions. The Team Cyber & Strategic Risk We help organizations create a cyber-minded culture, reimagine risk to uncover strategic opportunities, and become faster, more innovative, and more resilient in the face of ever-changing threats. We provide intelligence and acuity that dynamically reframes risk, transcending a manual, reactive paradigm. Third Party Risk Management (TPRM) capability is part of the wider Cyber & Strategic Risk portfolio within Deloitte Risk and Financial Advisory. The TPRM team is focused on helping our clients identify and manage the cyber risks arising from their association with third parties or service providers. We help our clients to define their overall third-party cyber risk strategy, design and implement enterprise-wide programs and technology that focus on identifying and reducing risks; help them evaluate their priorities, strengths and weaknesses and roll out large scale organizational changes to achieve goals. Work you’ll do The key job responsibilities will be to: Perform ongoing third-party cyber risk assessments to help clients identify and evaluate complex business and technology risks related to their third parties, and provide recommendations for managing those risks Provide periodic status updates including potential risks and delays to the project delivery to project manager and client Assist in the selection and tailoring of third-party cyber risk management approaches, methods and tools to support delivery of third-party cyber risk assessment services Required Skills 2 to 3 years of relevant experience in information security Good understanding of information security and risk frameworks/standards (ISO 27001/2, NIST 800 series, PCI-DSS, etc.) Demonstrate knowledge of key risk areas such as cyber risk, compliance risk and regulatory risk Demonstrate knowledge in one or more of the following cyber risk domains, including: Security Governance and Management Security Policies and Procedures Application Security Controls Access Controls Network Security Operations Security Architectures Identity Management Disaster Recovery & Business Continuity Incident Response Risk Management Privacy and Data Protection Encryption Experience with internal controls, risk assessments, business process and internal IT control testing or operational auditing Excellent verbal and written communication skills Excellent inter-personal skills Preferred Skills CISSP/CISA (or equivalent) Good understanding of legal and regulatory requirements around information security and data privacy, such as OCC Bulletin 29, FFIEC, HIPAA Security/Privacy, etc. Prior consulting experience Experience with internal controls, risk assessments, business process, and internal IT control testing or operational auditing Qualification Bachelor’s/ Master’s degree in information technology or related field Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Benefits At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Professional development From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career. Requisition code: 301301 Show more Show less
Posted 2 weeks ago
5.0 years
0 Lacs
Andaman and Nicobar Islands, India
On-site
Rockwell Automation is a global technology leader focused on helping the world’s manufacturers be more productive, sustainable, and agile. With more than 28,000 employees who make the world better every day, we know we have something special. Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that’s you we would love to have you join us! Job Description Job Summary: As an OT Cybersecurity Consultant, you will assess, designing, and implementing cybersecurity solutions tailored to industrial environments. You will work with clients to identify vulnerabilities, align security strategies with industry frameworks, and ensure compliance with regulatory requirements. Additionally, you will help develop go-to-market strategies and cybersecurity service offerings to align with client needs. You will also play a key role as a technical product consultant, becoming a trusted expert and primary point of contact for customers regarding our cybersecurity solutions. Responsibilities will include conducting product demonstrations, proof-of-concept (POC) engagements, and virtual proof-of-value (vPOV) initiatives. Your ability to translate technical capabilities into business value will be essential in driving adoption and customer success. Additionally, you will become an expert in Verve Industrial's cybersecurity software platform, leveraging its capabilities to help clients identify and mitigate risks. This will involve integrating Verve Industrial's solutions into client environments, configuring security tools, and providing hands-on training. You will work with product development teams to provide customer feedback and ensure continuous improvement of the software. You will report to the Global Manager. Your Responsibilities Provide advisory services to clients on OT cybersecurity strategies, risk management, and regulatory compliance. Help clients assess, develop and improve their OT cybersecurity programme using your domain expertise, assessments, existing policies, standards and procedures, industry standards and frameworks, plus your Rockwell peers and industry SMEs. Analyse and apply OT cybersecurity frameworks (e.g., NIST CSF, IEC 62443, NERC CIP, MITRE ATT&CK for ICS) to assess security posture and recommend mitigation strategies. Evaluate risks to critical infrastructure and industrial systems, recommending security controls. Help design and implement security policies, standards, and procedures to meet compliance requirements. Develop and deliver client-focused reports, roadmaps, and presentations to executive stakeholders. Help develop cybersecurity solutions and consulting methodologies that align with market trends. Conduct product demonstrations, proof-of-concept (POC) engagements, and virtual proof-of-value (vPOV) initiatives to drive customer engagement and adoption. Be as a subject matter expert on Verve Industrial's cybersecurity software platform, supporting clients in deployment, configuration, and optimization. Collaborate with Verve Industrial's product and engineering teams to provide feedback for software enhancements and feature improvements. Serve as a trusted advisor, bridging technical and business considerations to deliver impactful security solutions. The Essentials - You Will Have Bachelor's Degree in Cybersecurity, Computer Science, Engineering, or a related field. The Preferred - You Might Also Have 5+ years of experience in OT cybersecurity, industrial security, or critical infrastructure protection. Hands-on experience with OT security frameworks such as NIST CSF, IEC 62443, or NERC CIP. Familiarity with risk assessments, compliance audits, security control evaluation, and GRC practices in industrial environments. Experience developing security policies, procedures, and incident response plans tailored for OT environments. Strong understanding of threat intelligence and adversary tactics related to ICS and OT. Experience with security technologies such as firewalls, intrusion detection systems (IDS), endpoint protection, and network segmentation for OT networks. Experience conducting product demonstrations, proof-of-concepts, or proof-of-value engagements to showcase cybersecurity solutions. Hands-on experience with Verve Industrial's software platform, including deployment, configuration, and integration. Previous consulting experience or a background working in industrial sectors such as manufacturing, energy, or critical infrastructure. Ability to explain complex cybersecurity concepts to both technical and non-technical audiences. Certifications such as IEC 62443, GICSP, CISSP, CISM, or equivalent . Experience gathering requirements and translating them to the technical team. What We Offer Our benefits package includes … Comprehensive mindfulness programmes with a premium membership to Calm. Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching programme – Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program. Personalised wellbeing programmes through our OnTrack programme. On-demand digital course library for professional development. and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. Rockwell Automation’s hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office. Show more Show less
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The job market for NIST (National Institute of Standards and Technology) professionals in India is rapidly growing. As more companies focus on cybersecurity and data protection, the demand for individuals skilled in NIST guidelines and frameworks is on the rise. Job seekers with expertise in NIST can find a variety of opportunities across different industries in India.
These cities are known for their thriving tech industries and have a high demand for NIST professionals.
The average salary range for NIST professionals in India varies based on experience level. Entry-level positions may start around INR 4-6 lakhs per year, while experienced professionals can earn upwards of INR 15-20 lakhs per year.
In the field of NIST, a typical career path may include roles such as NIST Analyst, NIST Consultant, and NIST Manager. As professionals gain more experience and expertise, they can progress to Senior NIST Consultant, NIST Architect, and even Chief Information Security Officer (CISO).
In addition to expertise in NIST, employers often look for professionals with the following related skills: - Cybersecurity - Risk management - Compliance - Information security - Security frameworks (e.g., ISO 27001)
As you explore opportunities in the NIST job market in India, remember to showcase your expertise, stay updated with industry trends, and prepare thoroughly for interviews. With the right skills and preparation, you can confidently pursue a successful career in NIST in India. Best of luck!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.