Home
Jobs
Companies
Resume

1769 Nist Jobs - Page 4

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 - 7.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 days ago

Apply

4.0 - 7.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 days ago

Apply

0.0 - 3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Job Description WHO WE ARE Led by the Chief Information Security Officer (CISO), Technology Risk is responsible for governing and overseeing the information security and cybersecurity risk and controls landscape for the Firm. We are responsible for detecting and preventing attempted cyber intrusions against the firm, helping the firm develop more secure applications and infrastructure, developing software in support of our efforts, measuring information security & cybersecurity risk through intelligent tooling, and designing and driving implementation of information security & cybersecurity controls. The team has global presence across the Americas, APAC, India and EMEA. Within Technology Risk, Digital and Risk Assurance is the execution arm, responsible for analysing, triaging, and reporting on newly discovered risks, supporting Engineering Divisions in risk management, supporting our external audits from a technology standpoint, overseeing internal assessments as well as ensuring the integrity of the environment. Goldman Sachs has one of the most progressive Technology Risk teams in the industry and is continuing to push the development of risk in preference to security within technology and the business. Year on year success has led the team to work deeper into the organization and gain valuable insights into how technology needs to function, what its risk really is and how this impacts the business. YOUR IMPACT You will be a key addition to the Digital Risk Office Assurance team, which is primarily responsible for supporting the Engineering Monitoring & Testing program. As part of the first line of defense, the Engineering Monitoring & Testing program was established to independently evaluate the design and performance of key controls. We partner with engineering teams across the firm to help them understand what they can do to reduce and manage their risk and make their systems more resilient. How You Will Fulfill Your Potential Your responsibilities will include governance aspects of Controls Assurance programs, and issue management. You will work with all pillars within Technology Risk to understand the risks being identified and their potential impact. This will be an opportunity to build broad knowledge of the business and technologies across the entire firm and work with engineers at all levels in the organization. Job Responsibilities Partner with business units to perform control evaluation, monitoring and testing efforts of key internal controls to identify control gaps as well as opportunities for effectiveness and efficiency improvements. These assessments will include coverage for other regulatory programs including SOX and RCSA. Collaborate with cross functional teams and stakeholders to evaluate and validate the design, implementation, and performance of key engineering controls. Perform remediation testing to validate if the identified vulnerabilities have been successfully remediated, providing independent assurance that corrective measures have been implemented in a manner that prevents exploitation. Basic Qualifications & Skills Relevant bachelor’s degree (such as computer science, information technology, management information systems or related fields). 0-3 years experience in risk management, risk reporting, audits, control assessment and evaluation, governance, etc. Basic understanding of IT audit methodologies and control frameworks of IT platforms, processes, systems and controls, including areas such as logical access, physical security and change management controls at an infrastructure and application level. Familiarity with risk management framework, industry standards, financial industry regulatory requirements. Experience with any data analysis/visualization tool such as Excel, Tableau, Power BI, R, SQL, etc. Basic understanding of risk management principles or Sarbanes–Oxley Section 404, SOC 1 and SOC 2 reporting. Familiarity with general and cyber security related Information technology controls design and reviews. Ability to work effectively in a global team environment and drive results in a matrixed organization. Results oriented, strong sense of ownership and eagerness to learn. Strong sense of ownership and accountability. Clear communication skills, both verbally and in writing. Preferred Qualifications Understanding of information technology audit and control frameworks such as NIST COBIT and ITIL #TechRiskCybersecurity About Goldman Sachs At Goldman Sachs, we commit our people, capital, and ideas to help our clients, shareholders, and the communities we serve to grow. Founded in 1869, we are a leading global investment banking, securities, and investment management firm. Headquartered in New York, we maintain offices around the world. We believe who you are makes you better at what you do. We're committed to fostering and advancing diversity and inclusion in our own workplace and beyond by ensuring every individual within our firm has a number of opportunities to grow professionally and personally, from our training and development opportunities and firmwide networks to benefits, wellness and personal finance offerings and mindfulness programs. Learn more about our culture, benefits, and people at GS.com/careers . We’re committed to finding reasonable accommodations for candidates with special needs or disabilities during our recruiting process. Learn more: https://www.goldmansachs.com/careers/footer/disability-statement.html © The Goldman Sachs Group, Inc., 2024. All rights reserved. Goldman Sachs is an equal employment/affirmative action employer Female/Minority/Disability/Veteran/Sexual Orientation/Gender Identity Show more Show less

Posted 2 days ago

Apply

0 years

0 Lacs

Bengaluru East, Karnataka, India

On-site

Linkedin logo

Bangalore/ Gurgaon, India A security analyst role within the Global Technology Transversal Application Services (TAS) function, supporting the provision of a robust and consistent security scanning, remediation, and guidance service within the TAS Application Operations team. The team provides a global, centralized Operations, Governance, Audit, Risk & Security service across Application Delivery. What You’ll Be DOING What will your essential responsibilities include? Support the Application Operations (Security) team in all security related activities, forums and discussions. Perform application scanning across the Application Delivery estate using tools such as SonarQube, Checkmarx, JFrog Xray, CAST Highlight, Defender and Qualys. Assist in setting up Jenkins pipeline integration to CI/CD lifecycle. Perform Static Application Security Testing (SAST) and Software Composition Analysis (SCA), including analysis of components in applications to detect vulnerabilities and compliance issues. Work with Application Delivery teams to communicate the outcome of scanning and analysis, and agree remediation actions including target dates for completion, in alignment with Information Security Policy requirements. Assist in Risk Assessments, evaluating the severity of identified vulnerabilities and prioritizing remediation efforts based on potential impact to the organization. Assist in Policy development, contributing to the development and implementation of vulnerability management policies and procedures. Manage the production of reporting and metrics to both internal and external stakeholders. You will report to the Operations Lead. What You Will BRING We’re looking for someone who has these abilities and skills: Required Skills And Abilities Security First mindset. Understanding of vulnerability analysis, scanning and remediation processes. Understanding of CVEs, CVSS. Understanding of security industry compliancy benchmarks and standards i.e. CIS. Understanding of security best practices/standards i.e. OWASP, NIST. Preferable experience with at least 2 coding languages i.e. Java, .NET, C++, Python etc. Desired Skills And Abilities Outstanding analytical, critical thinking and organizational skills, ability to multitask and work to deadlines. Proficiency in Power BI, MS Work and MS Excel: We maintain and continually develop a number of Power BI Dashboards to support provision of critical data and use Excel to support our data capture and analysis and reporting. Excellent communication, interpersonal and relationship building skills (verbal and written) Who WE are AXA XL, the P&C and specialty risk division of AXA, is known for solving complex risks. For mid-sized companies, multinationals and even some inspirational individuals we don’t just provide re/insurance, we reinvent it. How? By combining a comprehensive and efficient capital platform, data-driven insights, leading technology, and the best talent in an agile and inclusive workspace, empowered to deliver top client service across all our lines of business − property, casualty, professional, financial lines and specialty. With an innovative and flexible approach to risk solutions, we partner with those who move the world forward. Learn more at axaxl.com What we OFFER Inclusion AXA XL is committed to equal employment opportunity and will consider applicants regardless of gender, sexual orientation, age, ethnicity and origins, marital status, religion, disability, or any other protected characteristic. At AXA XL, we know that an inclusive culture and a diverse workforce enable business growth and are critical to our success. That’s why we have made a strategic commitment to attract, develop, advance and retain the most diverse workforce possible, and create an inclusive culture where everyone can bring their full selves to work and can reach their highest potential. It’s about helping one another — and our business — to move forward and succeed. Five Business Resource Groups focused on gender, LGBTQ+, ethnicity and origins, disability and inclusion with 20 Chapters around the globe Robust support for Flexible Working Arrangements Enhanced family friendly leave benefits Named to the Diversity Best Practices Index Signatory to the UK Women in Finance Charter Learn more at axaxl.com/about-us/inclusion-and-diversity. AXA XL is an Equal Opportunity Employer. Total Rewards AXA XL’s Reward program is designed to take care of what matters most to you, covering the full picture of your health, wellbeing, lifestyle and financial security. It provides competitive compensation and personalized, inclusive benefits that evolve as you do. We’re committed to rewarding your contribution for the long term, so you can be your best self today and look forward to the future with confidence. Sustainability At AXA XL, Sustainability is integral to our business strategy. In an ever-changing world, AXA XL protects what matters most for our clients and communities. We know that sustainability is at the root of a more resilient future. Our 2023-26 Sustainability strategy, called “Roots of resilience”, focuses on protecting natural ecosystems, addressing climate change, and embedding sustainable practices across our operations. Our Pillars Valuing nature: How we impact nature affects how nature impacts us. Resilient ecosystems - the foundation of a sustainable planet and society - are essential to our future. We’re committed to protecting and restoring nature - from mangrove forests to the bees in our backyard - by increasing biodiversity awareness and inspiring clients and colleagues to put nature at the heart of their plans. Addressing climate change: The effects of a changing climate are far reaching and significant. Unpredictable weather, increasing temperatures, and rising sea levels cause both social inequalities and environmental disruption. We're building a net zero strategy, developing insurance products and services, and mobilizing to advance thought leadership and investment in societal-led solutions. Integrating ESG: All companies have a role to play in building a more resilient future. Incorporating ESG considerations into our internal processes and practices builds resilience from the roots of our business. We’re training our colleagues, engaging our external partners, and evolving our sustainability governance and reporting. AXA Hearts in Action: We have established volunteering and charitable giving programs to help colleagues support causes that matter most to them, known as AXA XL’s “Hearts in Action” programs. These include our Matching Gifts program, Volunteering Leave, and our annual volunteering day - the Global Day of Giving. For more information, please see axaxl.com/sustainability. Show more Show less

Posted 2 days ago

Apply

0 years

0 Lacs

Bengaluru East, Karnataka, India

On-site

Linkedin logo

Bangalore/ Gurgaon, India A security analyst role within the Global Technology Transversal Application Services (TAS) function, supporting the provision of a robust and consistent security scanning, remediation, and guidance service within the TAS Application Operations team. The team provides a global, centralized Operations, Governance, Audit, Risk & Security service across Application Delivery. What You’ll Be DOING What will your essential responsibilities include? Support the Application Operations (Security) team in all security related activities, forums and discussions. Perform application scanning across the Application Delivery estate using tools such as SonarQube, Checkmarx, JFrog Xray, CAST Highlight, Defender and Qualys. Assist in setting up Jenkins pipeline integration to CI/CD lifecycle. Perform Static Application Security Testing (SAST) and Software Composition Analysis (SCA), including analysis of components in applications to detect vulnerabilities and compliance issues. Work with Application Delivery teams to communicate the outcome of scanning and analysis, and agree remediation actions including target dates for completion, in alignment with Information Security Policy requirements. Assist in Risk Assessments, evaluating the severity of identified vulnerabilities and prioritizing remediation efforts based on potential impact to the organization. Assist in Policy development, contributing to the development and implementation of vulnerability management policies and procedures. Manage the production of reporting and metrics to both internal and external stakeholders. You will report to the Operations Lead. What You Will BRING We’re looking for someone who has these abilities and skills: Required Skills And Abilities Security First mindset. Understanding of vulnerability analysis, scanning and remediation processes. Understanding of CVEs, CVSS. Understanding of security industry compliancy benchmarks and standards i.e. CIS. Understanding of security best practices/standards i.e. OWASP, NIST. Preferable experience with at least 2 coding languages i.e. Java, .NET, C++, Python etc. Desired Skills And Abilities Outstanding analytical, critical thinking and organizational skills, ability to multitask and work to deadlines. Proficiency in Power BI, MS Work and MS Excel: We maintain and continually develop a number of Power BI Dashboards to support provision of critical data and use Excel to support our data capture and analysis and reporting. Excellent communication, interpersonal and relationship building skills (verbal and written) Who WE are AXA XL, the P&C and specialty risk division of AXA, is known for solving complex risks. For mid-sized companies, multinationals and even some inspirational individuals we don’t just provide re/insurance, we reinvent it. How? By combining a comprehensive and efficient capital platform, data-driven insights, leading technology, and the best talent in an agile and inclusive workspace, empowered to deliver top client service across all our lines of business − property, casualty, professional, financial lines and specialty. With an innovative and flexible approach to risk solutions, we partner with those who move the world forward. Learn more at axaxl.com What we OFFER Inclusion AXA XL is committed to equal employment opportunity and will consider applicants regardless of gender, sexual orientation, age, ethnicity and origins, marital status, religion, disability, or any other protected characteristic. At AXA XL, we know that an inclusive culture and a diverse workforce enable business growth and are critical to our success. That’s why we have made a strategic commitment to attract, develop, advance and retain the most diverse workforce possible, and create an inclusive culture where everyone can bring their full selves to work and can reach their highest potential. It’s about helping one another — and our business — to move forward and succeed. Five Business Resource Groups focused on gender, LGBTQ+, ethnicity and origins, disability and inclusion with 20 Chapters around the globe Robust support for Flexible Working Arrangements Enhanced family friendly leave benefits Named to the Diversity Best Practices Index Signatory to the UK Women in Finance Charter Learn more at axaxl.com/about-us/inclusion-and-diversity. AXA XL is an Equal Opportunity Employer. Total Rewards AXA XL’s Reward program is designed to take care of what matters most to you, covering the full picture of your health, wellbeing, lifestyle and financial security. It provides competitive compensation and personalized, inclusive benefits that evolve as you do. We’re committed to rewarding your contribution for the long term, so you can be your best self today and look forward to the future with confidence. Sustainability At AXA XL, Sustainability is integral to our business strategy. In an ever-changing world, AXA XL protects what matters most for our clients and communities. We know that sustainability is at the root of a more resilient future. Our 2023-26 Sustainability strategy, called “Roots of resilience”, focuses on protecting natural ecosystems, addressing climate change, and embedding sustainable practices across our operations. Our Pillars Valuing nature: How we impact nature affects how nature impacts us. Resilient ecosystems - the foundation of a sustainable planet and society - are essential to our future. We’re committed to protecting and restoring nature - from mangrove forests to the bees in our backyard - by increasing biodiversity awareness and inspiring clients and colleagues to put nature at the heart of their plans. Addressing climate change: The effects of a changing climate are far reaching and significant. Unpredictable weather, increasing temperatures, and rising sea levels cause both social inequalities and environmental disruption. We're building a net zero strategy, developing insurance products and services, and mobilizing to advance thought leadership and investment in societal-led solutions. Integrating ESG: All companies have a role to play in building a more resilient future. Incorporating ESG considerations into our internal processes and practices builds resilience from the roots of our business. We’re training our colleagues, engaging our external partners, and evolving our sustainability governance and reporting. AXA Hearts in Action: We have established volunteering and charitable giving programs to help colleagues support causes that matter most to them, known as AXA XL’s “Hearts in Action” programs. These include our Matching Gifts program, Volunteering Leave, and our annual volunteering day - the Global Day of Giving. For more information, please see axaxl.com/sustainability. Show more Show less

Posted 2 days ago

Apply

14.0 years

0 Lacs

New Delhi, Delhi, India

On-site

Linkedin logo

Meet the Team Cisco is dedicated to providing innovative IT and network security solutions to our clients. We are currently seeking a highly skilled and motivated Cisco Partner Security and Applications Sales Specialist to join our outstanding team. This specialist will have a crucial role in identifying and encouraging partnerships with potential Cisco Security MSP’s who are selling Cisco Security products within their managed services platform. This is an exciting and outstanding CEO-sponsored opportunity and is essential to our goal of growing our Cisco Security portfolio and increasing our market share. Your Impact The Security Solution Engineer partners with global managed services teams and security partners to craft, develop, and position joint offerings. This role encompasses leading the technical solution process, including initial discussions, crafting technical playbooks, building labs, and supporting regional sales teams. Key responsibilities include driving SP/MSSP strategies, encouraging collaborative relationships with partners, and delivering outstanding security solutions. Expertise in network security (e.g., Firewalls, VPNs, IDS/IPS, Proxies), SASE (SSE, SD-WAN, DLP, CASB), XDR, cloud platforms (AWS, Azure, Google Cloud), and advanced endpoint security is helpful. The role also focuses on educating and empowering diverse audiences, influencing sales processes, sharing security trends, and ensuring direct client and partner engagement. Travel of up to 50% is required, with an emphasis on inclusivity and collaboration to drive innovation and success. Minimum Qualifications (Required) We are seeking a Presales Solutions Engineer with 14+ years of overall experience, including 7+ years of expertise in security technologies. Expertise in cybersecurity industry trends, including Cisco and third-party solutions, with the ability to build and deliver technical content through various formats such as webinars, videos, and blogs. Technical Expertise: Proficient in Zero Trust Architecture, securing cloud workloads, endpoint security, micro-segmentation, advanced threat response, and management, with knowledge of cybersecurity standard processes like CIS Controls and benchmarks. Implementation and Compliance: Experienced in driving complex POVs/POCs, resolving implementation issues, and adhering to security guidelines such as NIST, GDPR, HIPAA, PCI-DSS, and ISO/IEC 27001. Technical Skills: Skilled in scripting languages (e.g., Python) and API frameworks (e.g., REST, SOAP) to support automation and integration tasks. Communication and Problem-Solving: Good communication, presentation, and problem-solving skills and work independently and resolve issues proactively. Preferred Qualifications (Good To Have) Demonstrable experience with one of the major cloud providers (AWS, Azure, GCP, Alibaba) Proficiency with scripting and programming languages related to API integration and service automation these should be clearly defined, objective, non-comparative, relevant, and quantifiable to appropriately evaluate applicants – not including soft skills #WeAreCisco: #WeAreCisco where every individual brings their unique skills and perspectives together to pursue our purpose of powering an inclusive future for all. Our passion is connection—we celebrate our employees’ diverse set of backgrounds and focus on unlocking potential. Cisconians often experience one company, many careers where learning and development are encouraged and supported at every stage. Our technology, tools, and culture pioneered hybrid work trends, allowing all to not only give their best, but be their best. We understand our outstanding opportunity to bring communities together and at the heart of that is our people. One-third of Cisconians collaborate in our 30 employee resource organizations, called Inclusive Communities, to connect, foster belonging, learn to be informed allies, and make a difference. Dedicated paid time off to volunteer—80 hours each year—allows us to give back to causes we are passionate about, and nearly 86% do! Our purpose, driven by our people, is what makes us the worldwide leader in technology that powers the internet. Helping our customers reimagine their applications, secure their enterprise, transform their infrastructure, and meet their sustainability goals is what we do best. We ensure that every step we take is a step towards a more inclusive future for all. Take your next step and be you, with us! Show more Show less

Posted 2 days ago

Apply

4.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Thank you for your interest in working for our Company. Recruiting the right talent is crucial to our goals. On April 1, 2024, 3M Healthcare underwent a corporate spin-off leading to the creation of a new company named Solventum. We are still in the process of updating our Careers Page and applicant documents, which currently have 3M branding. Please bear with us. In the interim, our Privacy Policy here: https://www.solventum.com/en-us/home/legal/website-privacy-statement/applicant-privacy/ continues to apply to any personal information you submit, and the 3M-branded positions listed on our Careers Page are for Solventum positions. As it was with 3M, at Solventum all qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Job Description At Solventum, we enable better, smarter, safer healthcare to improve lives. As a new company with a long legacy of creating breakthrough solutions for our customers’ toughest challenges, we pioneer game-changing innovations at the intersection of health, material and data science that change patients' lives for the better while enabling healthcare professionals to perform at their best. Because people, and their wellbeing, are at the heart of every scientific advancement we pursue. We partner closely with the brightest minds in healthcare to ensure that every solution we create melds the latest technology with compassion and empathy. Because at Solventum, we never stop solving for you. Collaborate with Solventum "Solvers" Around the World Choosing where to start and grow your career has a major impact on your professional and personal life, so it’s equally important you know that the company that you choose to work at, and its leaders, will support and guide you. With a diversity of people, global locations, technologies and products, Solventum is a place where you can collaborate with other "Solvers" to improve the outcomes of healthcare. This position provides an opportunity to transition from other private, public, government or military experience to a Solventum career. (Shalini - please replace/edit above with whatever standard language is appropriate) The Impact You’ll Make in this Role As an AI Engineer in Security Governance and Artificial Intelligence (AI), you will play a crucial role in evaluating Solventum AI use cases and facilitating robust testing and monitoring capabilities. Collaborating across the enterprise, you will work closely with Legal, Privacy, Compliance, and key business and R&D groups to establish repeatable practices that mitigate risks within the AI landscape. This position demands a unique combination of technical expertise, understanding of security controls, and experience in data governance. Your experience in global organizations will be instrumental in guiding the team through the evolving international AI regulatory environment. You will stay abreast of AI trends, technologies, and regulatory developments, continually introducing new ways to address risk. Under the AI umbrella, you will lead and collaborate on risk assessments designed to identify potential threats associated with AI applications and facilitate first of a kind protection solutions. Your Skills and Expertise To set you up for success in this role from day one, Solventum requires (at a minimum) the following qualifications: Bachelor’s Degree or higher (completed and verified prior to start) from an accredited institution 4 years of experience in Information Technology and Information Security OR High School Diploma/GED or higher from a (completed and verified prior to start) and a minimum of eight (8) years of experience in Information Technology and Information Security Programming Skills: Proficiency in programming languages such as Python, Java, or C++ to integrate and model security tools and scripts. Experience with AI Tools and Platforms: Familiarity with AI development platforms (e.g., TensorFlow, PyTorch) and their security implications. Risk Assessment and Management: Ability to perform thorough risk assessments of AI use cases and implement mitigation strategies. Additional qualifications that could help you succeed even further in this role include: Advanced Degree: Master's or Ph.D. in Cybersecurity, AI, or a related field. Knowledge of AI Ethics: Familiarity with ethical considerations and guidelines for AI deployment. Experience in AI/ML Security: Proven experience in evaluating and securing AI and machine learning systems, including familiarity with adversarial attacks and defenses. Experience in healthcare or other highly regulated industry, preferably in a global organization CISSP strongly preferred, or equivalent experience across a broad spectrum of Information Security disciplines Knowledge of Development Lifecycles, either software or AI specific (SDLC), including experience with DevOps or similar highly integrated work environments. Experience in AI strategy, Data Governance, and/or a related role in technology, data science, or AI. An understanding of AI technologies, machine learning, or data analytics with a focus on technical and ethical considerations. 5+ years experience in Security Governance, Risk & Compliance with corresponding increase in skills and responsibilities. Communication Skills: Excellent verbal and written communication skills to convey security findings and recommendations to technical and non-technical stakeholders. Familiarity with potential AI related regulations (NIST AI RMF, ISO 42001, OECD AI Policy framework, and EU AI act with their implications for AI development and use. Understand the foundations and importance of a strong data security posture. Proven record of effectively leading successful initiatives, especially those without pre-defined solutions. Team Collaboration: Ability to work collaboratively with cross-functional teams, including developers, data scientists, and security professionals. Work location: Solventum is committed to maintaining the highest standards of integrity and professionalism in our recruitment process. Applicants must remain alert to fraudulent job postings and recruitment schemes that falsely claim to represent Solventum and seek to exploit job seekers. Please note that all email communications from Solventum regarding job opportunities with the company will be from an email with a domain of @solventum.com . Be wary of unsolicited emails or messages regarding Solventum job opportunities from emails with other email domains. Please note: your application may not be considered if you do not provide your education and work history, either by: 1) uploading a resume, or 2) entering the information into the application fields directly. Solventum Global Terms of Use and Privacy Statement Carefully read these Terms of Use before using this website. Your access to and use of this website and application for a job at Solventum are conditioned on your acceptance and compliance with these terms. Please access the linked document by clicking here, select the country where you are applying for employment, and review. Before submitting your application you will be asked to confirm your agreement with the terms. Show more Show less

Posted 2 days ago

Apply

5.0 years

4 - 7 Lacs

Thiruvananthapuram

On-site

5 - 7 Years 1 Opening Trivandrum Role description We are looking for a highly experienced Senior SecDevOps Analyst to lead and integrate security into every phase of our software development and deployment processes. This is a strategic and hands-on role focused on securing complex, hybrid, and large-scale customer-facing platforms. You will drive security initiatives across CI/CD pipelines, cloud infrastructure, container platforms, and enterprise applications while ensuring compliance, risk management, and effective incident response. Key Responsibilities Security Architecture & Engineering Design and implement secure infrastructure solutions in hybrid cloud and on-prem environments. Define and enforce security best practices for Infrastructure-as-Code (IaC), containerization, and microservices. Collaborate with architecture and engineering teams to ensure secure application design and delivery. DevSecOps Enablement Integrate security tools into CI/CD pipelines (e.g., SAST, DAST, SCA). Automate security and compliance checks using tools like Snyk , Checkov , Prisma Cloud , etc. Promote a DevSecOps culture through enablement, training, and technical documentation. Cloud & Container Security Secure cloud-native infrastructures (AWS, Azure, GCP) focusing on IAM, network segmentation, and data encryption. Deploy and monitor controls for containerized environments (Kubernetes, Docker) and serverless architectures. Monitoring, Detection & Incident Response Develop and maintain security monitoring and response procedures. Work with SOC and IT teams to investigate and resolve security incidents. Conduct root cause analyses and lead post-incident reviews to enhance overall security posture. Compliance & Governance Support audits and compliance programs such as PCI-DSS, ISO 27001, GDPR , and internal policies. Maintain and update documentation related to security controls, policies, and risk mitigation. Participate in third-party risk assessments and vendor security reviews. Collaboration & Leadership Serve as a trusted security advisor to DevOps, product, and IT teams. Mentor junior team members and build security awareness across the organization. Stay abreast of emerging security trends, threats, and technologies. Required Qualifications 8+ years of experience in Security Engineering, DevOps, or SecDevOps roles. Expertise in cloud security (preferably AWS), network security, and system hardening. Proficient in scripting (Python, Bash, PowerShell) and automation. Experience with CI/CD tools such as GitHub Actions, GitLab CI, Jenkins . Strong knowledge of IaC tools (Terraform, CloudFormation). Solid understanding of container security and orchestration (Docker, Kubernetes). Experience with security tools such as SIEM , EDR , vulnerability scanners . Familiarity with security standards and frameworks (NIST, CIS, ISO 27001, PCI-DSS, GDPR). Preferred Qualifications Certifications such as CISSP, CKS, OSCP, AWS Security Specialty . Experience in retail, e-commerce, or other large-scale customer environments. Knowledge of secure payments, fraud prevention, and customer data privacy. Understanding of Zero Trust Architecture and identity-centric security practices. Skills Information Security,Security Monitoring,Infrastructure Security About UST UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.

Posted 2 days ago

Apply

5.0 - 7.0 years

7 - 8 Lacs

Cochin

On-site

Experience: 5- 7 year(s) Experience in cybersecurity, DevSecOps, or security operations. Knowledge of firewalls, intrusion detection/prevention systems, endpoint protection, and log management. Experience performing security incident response and forensic analysis. Solid experience with CI/CD tools and pipeline security integration. Strong understanding of cloud platforms (AWS, Azure, or GCP) and cloud security best practices. Hands-on experience with security tools: static/dynamic analysis, container scanners, secrets scanners. Experience with scripting languages (Python, Bash, PowerShell) for automation. Familiarity with regulatory standards (SOC2, NIST, PCI-DSS, HIPAA). Integrate security tools and practices into CI/CD pipelines (e.g., GitLab CI, Jenkins, GitHub Actions). Automate security scanning (SAST, DAST, SCA, IaC scanning) and enforce policies in build/deployment stages. Work with development and operations teams to implement security controls in cloud and on-prem environments. Harden infrastructure and container images using tools like Ansible, Packer, Terraform, and Docker. Implement and manage Infrastructure-as-Code (IaC) securely using Terraform, CloudFormation, etc. Monitor, detect, and respond to security events using SIEM (e.g., Splunk, Sentinel, or ELK). Perform vulnerability assessments and coordinate remediation efforts with IT and engineering teams. Support incident response processes and investigations. Bachelor’s degree in engineering discipline such as Computer Science, Cybersecurity, or related field. If you are interested in any of the positions mentioned above, Please attach your updated resume to resume@calpinetech.com with an email explaining the position you are looking for, your career goals and your expected salary. Please indicate the job code in the subject line of your email.

Posted 2 days ago

Apply

3.0 years

0 Lacs

Cochin

On-site

Job Title: SOAR Engineer (Cortex XSOAR) Location: Muscat, Oman Company: Securado Salary: OMR 600 – OMR 700 per month Job Type: Full-Time | On-Site About the Company: Securado is a leading Managed Security Services Provider (MSSP) based in the Sultanate of Oman. We specialize in delivering advanced cybersecurity solutions across government, enterprise, and critical infrastructure sectors. Our services focus on preventing cyber incidents, ensuring business continuity, and establishing robust security environments through tailored, cost-effective solutions. Position Summary: Securado is seeking an experienced SOAR Engineer with in-depth knowledge of Cortex XSOAR (formerly Demisto), strong scripting capabilities in Python, and a solid background in security operations. The successful candidate will be responsible for building, maintaining, and optimizing automation workflows to enhance our security incident response capabilities. Key Responsibilities: · Design, develop, and maintain automation playbooks and custom integrations within Cortex XSOAR. · Collaborate with SOC analysts and incident responders to identify automation opportunities. · Integrate SOAR with a variety of security tools including SIEM, EDR, firewalls, and threat intelligence platforms. · Optimize and improve existing playbooks to enhance efficiency and reduce response time. · Develop and maintain Python scripts for automation and system integrations. · Ensure all SOAR configurations comply with internal security policies and industry standards. · Contribute to the continuous improvement of detection and response processes through analysis of security incidents. · Document technical configurations, workflows, and procedures. Required Qualifications: · Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent professional experience. · Minimum of 3 years of experience in cybersecurity or security operations. · At least 2 years of hands-on experience with Cortex XSOAR or a similar SOAR platform. · Proficient in Python scripting, including REST API integrations and JSON processing. · Strong understanding of security principles, incident response, threat intelligence, and MITRE ATT&CK framework. · Experience with SIEM platforms, EDR, firewalls, and ticketing systems. · Solid grasp of networking protocols (HTTP, DNS, SMTP) and common cyberattack techniques. Preferred Qualifications: · Cortex XSOAR Certification (such as PCSAE). · Experience with additional scripting tools (PowerShell, Bash). · Familiarity with NIST incident response guidelines. · Understanding of DevOps and CI/CD practices within a security context. What We Offer: · Opportunity to work with a growing cybersecurity leader in the Middle East. · Exposure to complex, real-world security challenges and advanced automation projects. · Supportive, team-oriented work environment. · Competitive compensation package. Job Types: Full-time, Permanent Pay: Up to ₹35,000.00 per month Schedule: Day shift Application Question(s): Do you have a valid passport and are you willing to relocate to Muscat, Oman for this full-time on-site role? How many years of hands-on experience do you have working with Cortex XSOAR (formerly Demisto) or a similar SOAR platform? Are you proficient in Python scripting, including writing automation scripts and integrating with REST APIs? Do you have experience integrating SOAR platforms with other security tools like SIEM, EDR, or firewalls? Work Location: In person

Posted 2 days ago

Apply

20.0 years

0 Lacs

Hyderābād

On-site

We are seeking a highly skilled and motivated Cloud Security Engineer with a strong background in security research, operations, and assurance, along with cloud architecture expertise. The role involves implementing security controls, conducting in-depth assessments of cloud services, and identifying secure configurations and misconfigurations across enterprise cloud environments. You will work closely with development, DevOps, and security teams to ensure that cloud infrastructure meets industry and organizational security standards. Key Responsibilities: Implement cloud-native and third-party security controls across AWS, Azure, and/or GCP environments. Conduct detailed security assessments of cloud services (IaaS, PaaS, SaaS) to ensure compliance with internal policies and industry frameworks. Identify and remediate secure misconfigurations and vulnerabilities using automated scanning and manual inspection techniques. Collaborate with cloud architects and security engineers to design and recommend secure infrastructure patterns. Stay updated with evolving cloud threats and vulnerabilities, and contribute to threat modeling and risk assessments. Develop scripts and tools to automate security monitoring and compliance validation. Document findings, remediation guidance, and contribute to security standards development. Required Skill Set: Technical Expertise: Strong knowledge of cloud platforms: AWS, Azure, or GCP Hands-on experience with CSPM (Cloud Security Posture Management) tools and cloud-native security services Deep understanding of IAM, encryption, network security, and data protection within cloud environments Experience with CI/CD security integration and DevSecOps practices Familiarity with security standards such as CIS Benchmarks, NIST, ISO 27001 Security Domains: Security Research: Ability to evaluate and analyze security trends, tools, and techniques Security Operations: Incident detection, log analysis, SIEM tools, and response processes Security Assurance: Risk assessments, compliance audits, and policy enforcement Cloud Architecture: Knowledge of secure cloud design patterns and service integrations Tools & Languages: Tools: Prisma Cloud, Wiz, AWS Security Hub, Azure Defender, GCP Security Command Center Scripting: Python Soft Skills: Strong analytical and problem-solving abilities Excellent verbal and written communication skills Team player with cross-functional collaboration experience Ability to manage priorities in a fast-paced environment About Loginsoft: For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science& AI, etc. Expertise in Integrations with Threat Intelligence and Security Products: Built more than 200+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar& Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc. In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions. Job Overview Hyderabad, India 10+ Years Exp Full-Time Position

Posted 2 days ago

Apply

7.0 years

3 - 10 Lacs

Gurgaon

Remote

Job Type: Full Time Job Category: IT Job Description Job Title: Senior Identity Access Management Engineer (PAM Architecture) Job Summary: We are looking for a Senior Identity Access Management Engineer (PAM Architecture) to lead the design of our PAM architecture strategy. This role will also involve contributing to the design and implementation of the PAM platform and its associated tools. Responsibilities: Develop a comprehensive PAM architecture strategy that aligns with organizational objectives and regulatory requirements. Lead the design contribute to the development and deployment of PAM solutions, focusing on workload access controls and secrets management. Contribute to the implementation and management of secrets management solutions ensuring secure storage, access and rotation of privileged credentials. Leverage PAM tools such as CyberArk, HashiCorp Vault, and Microsoft Entra ID to enhance security measures and streamline access management processes. Design PAM policies, standards, and procedures to ensure consistent and secure management of privileged accounts. Ensure PAM practices comply with organizational policies and regulatory requirements. Assess the effectiveness of PAM controls, making data-driven decisions to reduce risk and enhance security posture. Collaborate with technology and business partners to identify and mitigate risks associated with privileged access. Stay current with emerging trends and technologies in PAM and cybersecurity and driving enhancements to existing solutions. Qualifications 7+ years of experience in Privileged Access Management using PAM Solutions like CyberArk/StrongDM as an Architect/SME. Strong industry experience in architecting and designing PAM solutions and deployment across the enterprise. Deep technical understanding of PAM capabilities, controls and security technologies in areas related to identity and access management to address privilege-based risk. Familiarity with regulatory requirements related to PAM, such as PCI DSS, HIPAA, or GDPR. Expertise with build vs. buy solution options. Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, and SIEM solutions. Proficient in Privileged Access Management (PAM) concepts and standard processes, covering privileged account discovery and vaulting, session management, DevOps secret management, and endpoint privilege management. Nice to have: Experience with Python, PowerShell, and Bash. We offer: Culture of Relentless Performance: join an unstoppable technology development team with a 99% project success rate and more than 30% year-over-year revenue growth. Competitive Pay and Benefits: enjoy a comprehensive compensation and benefits package, including health insurance, and a relocation program. Work From Anywhere Culture: make the most of the flexibility that comes with remote work. Growth Mindset: reap the benefits of a range of professional development opportunities, including certification programs, mentorship and talent investment programs, internal mobility and internship opportunities. Global Impact: collaborate on impactful projects for top global clients and shape the future of industries. Welcoming Multicultural Environment: be a part of a dynamic, global team and thrive in an inclusive and supportive work environment with open communication and regular team-building company social events. Social Sustainability Values: join our sustainable business practices focused on five pillars, including IT education, community empowerment, fair operating practices, environmental sustainability, and gender equality. #IdentityAccessManagement #PAMArchitecture #Cybersecurity #ITJobs #SeniorEngineer #PrivilegedAccessManagement #USJobs #InformationTechnology #CyberArk #BeyondTrust #Thycotic #CISSP #CISM #CISA #NIST #GDPR #PCI-DSS Required Skills DevOps Engineer Senior Email Security Engineer

Posted 2 days ago

Apply

15.0 years

0 Lacs

Gurgaon

On-site

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Solution Development Good to have skills : NA Minimum 15 year(s) of experience is required Educational Qualification : 15 years full time education As a Security Solution Architect (SA), candidate would be primarily responsible for solution architecture/presales effort on medium to large complexity or owns multiple components of large complex deals. Lead or work as Lead Solution Architect on complex deals. Independently and with little oversight can come up with the solution. Conduct the solution reviews with SME’s and the delivery approver. Attend calls with the client team to understand the requirement to bring value and differentiated solution. Roles & Responsibilities: • Able to participate in requirements gathering, gathering data requirements, and assisting in the reconciliation of technical requirements. • Prepare end to end solution including effort estimation & costing. • Involved in preparing the client proposal & response. • Develop statement of work • Performs reviews with the delivery leadership. • Participation in the client Orals or presentations. • Leads negotiations or develop business terms & conditions. • Has led solution development for multiple deal types. • Work with delivery leads for the approval of solution/efforts. • Bring out technical differentiators and value in the solution. • Active ownership or accountability in delivering the solution within the specified time frame. • Should be good to work as individual contributor and good team player. • When assigned responsibilities to lead the team, candidate should show leadership qualities to manage the team and get the work done. Professional & Technical Skills: • Candidate must have been a Presales experience with maximum coverage around following GRC or Privacy or Strategy domains. • Skill around domains like Risk & Compliance Advisory and Operation, Compliance Management, Security Strategy Frameworks, Risk and Compliance Strategic Advisory, Cyber Security Assessments, Security Architecture Advisory, NIST CSF, Data Privacy, Third Party Risk Assessment ISO 27001, SOX, GDPR, Risk Assessment Services and GRC automation platforms like Archer, ServiceNow • Interpret customer needs and design appropriate GRC, eGRC, Cyber Security Strategy, Data Privacy Management solutions, experience in developing value-based customer proposal closely working with delivery and sales teams. • Hands on delivery experience across these domains would be added advantage to utilize the experience while solutioning. • Maintain current knowledge of applicable Risk and Data Privacy requirements and accreditation standards, and monitor changes in technology impacting privacy, risk, and compliance posture. • Knowledge of leveraging innovation, automation, Gen Ai in GRC solutioning • Work with delivery and capability team keep abreast with latest assets, offerings, solution accelerators to bring in value adds while solutioning. • Overall knowledge of GRC, TPRM, Data Privacy tool stack • Pre-Sales knowledge on Non GRC Security domains will be an added advantage to work in cross functional deals. • Flexibility on need basis in line with the nature the nature of SA • Strong verbal and written communication are a must to be able to document and present complex topics and solutions. • Strong interpersonal and problem-solving skills • Stay informed about new products, services, technologies, and other information as required to deliver effective solutions • CISSP, CISM, CISA, CGRC • Cloud Security knowledge and certification AWS, Azure • ISO 27k1, 22301, Privacy, Archer, ServiceNow GRC certifications Additional Information: • Minimum 15- year full time education • The candidate should have minimum 15 years of experience • This position is based at our Gurugram office. 15 years full time education

Posted 2 days ago

Apply

3.0 years

2 - 3 Lacs

Gurgaon

Remote

The ideal candidate will be responsible for the design, implementation, configuration, management, and troubleshooting of our Palo Alto Networks security infrastructure. This role requires a deep understanding of network security principles, advanced threat protection, and best practices for securing enterprise networks. The engineer will play a critical role in maintaining the integrity, confidentiality, and availability of our network assets and data. Key Responsibilities: Design & Implementation: Participate in the design and architecture of network security solutions utilizing Palo Alto Networks firewalls. Implement and deploy Palo Alto Networks firewalls (physical and virtual) across various environments. Configuration & Management: Configure, manage, and optimize security policies (Security Rules, NAT, QoS, Policy Based Forwarding, etc.) on Palo Alto firewalls. Administer and fine-tune advanced threat prevention features including Threat Prevention, WildFire, URL Filtering, DNS Security, and Enterprise DLP. Manage VPNs (Site-to-Site, GlobalProtect VPN) for secure remote access and branch office connectivity. Configure and maintain Panorama for centralized management of multiple Palo Alto firewalls. Monitoring & Troubleshooting: Monitor firewall logs and alerts for security incidents and performance issues. Perform root cause analysis and troubleshoot complex network security problems related to firewall functionality, connectivity, and performance. Utilize Packet Tracer, traffic logs, and other Palo Alto tools for in-depth analysis. Security & Compliance: Ensure firewall configurations adhere to industry best practices, security policies, and compliance requirements (e.g., ISO 27001, NIST, PCI DSS). Conduct regular security audits and vulnerability assessments of firewall configurations. Participate in incident response activities related to network security events. Maintenance & Upgrades: Perform regular maintenance, software upgrades, and patch management for Palo Alto firewalls and Panorama. Develop and maintain documentation for firewall configurations, network diagrams, and operational procedures. Collaboration & Support: Collaborate with other IT teams (Network, Systems, Applications) to ensure seamless integration of security solutions. Provide expert-level support and guidance to junior engineers and other teams on Palo Alto Networks technologies. Qualifications: Education: Bachelor’s degree in computer science, Information Technology, Cyber Security, or a related field (or equivalent practical experience). Experience: Minimum of 3-5 years of hands-on experience designing, implementing, and managing Palo Alto Networks firewalls in an enterprise environment. Proven experience with Panorama for centralized management. Experience with advanced security features such as WildFire, Threat Prevention, URL Filtering, and GlobalProtect. Experience with network protocols (TCP/IP, BGP, OSPF), routing, and switching. Technical Skills (Required): Expertise in Palo Alto Networks Next-Generation Firewalls (NGFW). Strong understanding of network security concepts (firewalls, VPNs, IDS/IPS, WAF, DLP, Zero Trust). Proficiency in configuring and troubleshooting VPN technologies (IPSec, SSL VPN). Familiarity with cloud security concepts (e.g., Azure, AWS, GCP) and securing cloud environments with Palo Alto. Experience with scripting languages (e.g., Python) for automation is a plus. Certifications (Preferred): Palo Alto Networks Certified Network Security Engineer (PCNSE) - Highly Preferred Palo Alto Networks Certified Network Security Administrator (PCNSA) Other relevant industry certifications (e.g., CompTIA Security+, CCNA Security, CCNP Security) are a plus.

Posted 2 days ago

Apply

0 years

6 - 8 Lacs

Navi Mumbai

On-site

Engineer Trainee – Cyber Security Career Opportunities at ReBIT (Pass Out Year 2025) Life at ReBIT: Serving since 2016, Reserve Bank Information Technology Pvt. Ltd. (ReBIT) is RBI’s subsidiary for Enterprise Technology and Allied Services. Home | Reserve Bank Information Technology Private Limited (ReBIT) Why Work at ReBIT : We are an ambitious, employee-first organisation that believes in empowering our employees to grow alongside the organization's goals and perform to their full potential. The hired professionals will be a part of our 1000+ workforce and will have opportunity to work in active RBI engagements in which ReBIT is currently involved. We’re set to build a world class team of skilled professionals motivated to make a nationwide impact. They will be a part of our centres of excellence focusing on multiple technologies and will gain exposure in various domains such as Forex, central banking, financial markets, risk monitoring, fintech, and so on. Role Objective: We are looking for candidates who have a zeal for technology and innovation. The Selected candidates will be a part of any of the below Business Units. 1. Cyber Security Operations 2. Cyber Security Engineering/ GRC Eligibility Criteria University degree in the field of engineering and technology stream such as BE/ BTech/MTech/MSc/MCA preferably specialisation in Cyber Security, Computer Engineering, IT or EXTC Job Location : Navi Mumbai Pass out: 2025 Batch ONLY 10th & 12th – 65 % & above Work Mode :Work From Office (5 Days) Experience/Knowledge: Fundamental knowledge in Information Technology Infra and Cyber Security Knowledge of Risk analysis , identification ,resolution and management Awareness on Data security/privacy analysis and related practices Knowledge of Computer hardware / software / programming Networking and System/Database Administration knowledge Network Security Control knowledge as Firewall, Proxy, LB ,WAF etc. New Infra security project deployment skills and excellent verbal and written communication skills Basic knowledge, VPN, VAPT,AD,SOC,DLP,Antivirus,Mail Gateway ,NAC etc Basic knowledge of Application & API Security best practices and standards including OWASP top 10, OSSTMM, SANS Top 25, Attacks, Malware etc Basic knowledge about Information Security, network security, Data security, risk assessment and governance requirements. Understanding of secure coding practices and application security Understanding of the IS and Cyber security Audit Framework Excellent analytical skills Excellent English written and verbal communication. Good at public speaking and stakeholder management Responsibilities Cyber Security Operations Monitoring and protecting IT infrastructure, edge devices, networks, and data. Responsible for preventing data breaches and monitoring and reacting to attacks. Supporting day-to-day support Tasks Cyber Security Engineering/GRC Basic documentation for Infra security services. Documentation of SOP, Product review. Perform Security configuration review & Hardening using CIS benchmarks. Define hardening documents for Firewalls, Load balancers, WAF, IPS/IDS, NTA etc Provide security compliance report to management on periodic basis for Infrastructure landscape. Analysis and evaluation of open vulnerability within IT Infrastructure Responsible for deploying, tuning, and maintaining security policies and enhancements on the web application firewall, Load balancer and infra devices. IT & Security governance, risk, and compliance frameworks and practices (e.g., COBIT, NIST-CSF, ISO). IT & Security risk & security controls (e.g., cyber security, network, infrastructure, applications, and projects). Application Security Testing including SCA, SAST and DAST. Internal control implementation, including the evaluation of the design and operating effectiveness of controls. Knowledge of controls testing techniques and data analysis principles, as well as the ability to interpret results. IT & Security audit, risk, and compliance. Proficiency with Cyber security GRC systems and compliance frameworks Certifications MCSE , CCNA, CEH ,CCSP, ITIL or any other Cyber Security Certification (Good to have)

Posted 2 days ago

Apply

4.0 years

0 Lacs

Bengaluru

On-site

Job title: IoT/OT Cybersecurity - Consultant About At Deloitte, we do not offer you just a job, but a career in the highly sought-after risk Management field. We are one of the business leaders in the risk market. We work with a vision to make the world more prosperous, trustworthy, and safe. Deloitte’s clients, primarily based outside of India, are large, complex organizations that constantly evolve and innovate to build better products and services. In the process, they encounter various risks and the work we do to help them address these risks is increasingly important to their success—and to the strength of the economy and public security. By joining us, you will get to work with diverse teams of professionals who design, manage, and implement risk-centric solutions across a variety of domains. In the process, you will gain exposure to the risk-centric challenges faced in today’s world by organizations across a range of industry sectors and become subject matter experts in those areas. Our Risk and Financial Advisory services professionals help organizations effectively navigate business risks and opportunities—from strategic, reputation, and financial risks to operational, cyber, and regulatory risks—to gain competitive advantage. We apply our experience in ongoing business operations and corporate lifecycle events to help clients become stronger and more resilient. Our market-leading teams help clients embrace complexity to accelerate performance, disrupt through innovation, and lead in their industries. We use cutting-edge technology like AI/ML techniques, analytics, and RPA to solve Deloitte’s clients ‘most complex issues. Working in Risk and Financial Advisory at Deloitte US-India offices has the power to redefine your ambitions. The Team Cyber & Strategic Risk We help organizations create a cyber-minded culture, reimagine risk to uncover strategic opportunities, and become faster, more innovative, and more resilient in the face of ever-changing threats. We provide intelligence and acuity that dynamically reframes risk, transcending a manual, reactive paradigm. The cyber risk services—Identity & access management (IAM) practice helps organizations in designing, developing, and implementing industry-leading IAM solutions to protect their information and confidential data, as well as help them build their businesses and supporting technologies to be more secure, vigilant, and resilient. The IAM team delivers service to clients through following key areas: User provisioning Access certification Access management and federation Entitlements management Work you’ll do Roles & Responsibilities: Consulting and Advisory Provide expert guidance on cybersecurity strategies and best practices for deployment of cybersecurity safeguards IoT and OT environments. Conduct OT risk assessments and recommend mitigation strategies including identification of vulnerabilities, threats and consequences on OT systems. Advise clients on regulatory and compliance requirements related to IoT and OT security. Develop and implement tailored cybersecurity frameworks and policies. Collaborate with clients to design secure IoT and OT architectures. Technical Implementation Deploy, configure and manage cybersecurity solutions within OT environments such as Claroty, Nozomi, Palo Alto IoT Security, Tenable.OT, Dragos Implement network segmentation and access control measures ensuring Safety, Reliability and Productivity of operations. Build sandbox or lab environments at client sites to enable testing of OT cybersecurity solutions and patches Conduct vulnerability assessments on IoT and OT devices leveraging network and device scanning solutions Practice Development Stay current with the latest cybersecurity trends, threats, and technologies. Conduct research on emerging IoT and OT security challenges and solutions. Develop innovative approaches to address complex security issues in IoT and OT environments. Contribute to the development of whitepapers, articles, and thought leadership materials. Required Skills Understanding of: IoT and OT protocols: OPC UA, Modbus, Profibus, Profinet, DNP3, MQTT, Zigbee etc. Industrial Network Architectures: ZTNA, Purdue Model, Software Defined Network Segmenta Experience in deployment or operations of at-least one of the following solutions: OT Security Monitoring: Claroty, Nozomi, Defender for IoT, Cisco Cyber Vision, Dragos, Palo Alto IoT Security, Tenable.OT etc. Knowledge of regulatory and compliance frameworks such as ISA/IEC 62443, NIST 800-82, NOG 104 Qualification Bachelor's or Master's degree in Computer Science, Information Security, or a related field. Preferred specialization in Cyber Physical Systems (CPS) or IoT Security 4+ years of experience in cybersecurity, with a focus on IoT and OT environments. Proven track record of successfully securing IoT and OT systems for large organizations. Relevant certifications such as CISSP, CISM, CEH, or equivalent. Great to have IoT/OT certifications such as GICSP, GRIP or ISA 62443 How you’ll grow At Deloitte, we’ve invested a great deal to create a rich environment in which our professionals can grow. We want all our people to develop in their own way, playing to their own strengths as they hone their leadership skills. And, as a part of our efforts, we provide our professionals with a variety of learning and networking opportunities—including exposure to leaders, sponsors, coaches, and challenging assignments—to help accelerate their careers along the way. No two people learn in the same way. So, we provide a range of resources including live classrooms, team-based learning, and eLearning. DU: The Leadership Center in India, our state-of-the-art, world-class learning Center in the Hyderabad offices is an extension of the Deloitte University (DU) in Westlake, Texas, and represents a tangible symbol of our commitment to our people’s growth and development. Explore DU: The Leadership Center in India. Deloitte’s culture Our positive and supportive culture encourages our people to do their best work every day. We celebrate individuals by recognizing their uniqueness and offering them the flexibility to make daily choices that can help them to be healthy, centered, confident, and aware. Deloitte is committed to achieving diversity within its workforce, and encourages all qualified applicants to apply, irrespective of gender, age, sexual orientation, disability, culture, religious and ethnic background. We offer well-being programs and are continuously looking for new ways to maintain a culture that is inclusive, invites authenticity, leverages our diversity, and where our people excel and lead healthy, happy lives. Learn more about Life at Deloitte. Corporate citizenship Deloitte is led by a purpose: to make an impact that matters. This purpose defines who we are and extends to relationships with Deloitte’s clients, our people and our communities. We believe that business has the power to inspire and transform. We focus on education, giving, skill-based volunteerism, and leadership to help drive positive social impact in our communities. Learn more about Deloitte’s impact on the world. Recruiting tips Finding the right job and preparing for the recruitment process can be tricky. Check out tips from our Deloitte recruiting professionals to set yourself up for success. Check out recruiting tips from Deloitte recruiters. Benefits We believe that to be an undisputed leader in professional services, we should equip you with the resources that can make a positive impact on your well-being journey. Our vision is to create a leadership culture focused on the development and well-being of our people. Here are some of our benefits and programs to support you and your family’s well-being needs. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you. Our people and culture Our people and our culture make Deloitte a place where leaders thrive. Get an inside look at the rich diversity of background, education, and experiences of our people. What impact will you make? Check out our professionals’ career journeys and be inspired by their stories. Professional development You want to make an impact. And we want you to make it. We can help you do that by providing you the culture, training, resources, and opportunities to help you grow and succeed as a professional. Learn more about our commitment to developing our people. © 2024. See Terms of Use for more information. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the "Deloitte" name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms. #CA-LD Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Benefits At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Professional development From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career. Requisition code: 301434

Posted 2 days ago

Apply

3.0 years

3 - 7 Lacs

Bengaluru

On-site

Get to know Okta Okta is The World’s Identity Company. We free everyone to safely use any technology—anywhere, on any device or app. Our Workforce and Customer Identity Clouds enable secure yet flexible access, authentication, and automation that transforms how people move through the digital world, putting Identity at the heart of business security and growth. At Okta, we celebrate a variety of perspectives and experiences. We are not looking for someone who checks every single box - we’re looking for lifelong learners and people who can make us better with their unique experiences. Join our team! We’re building a world where Identity belongs to you. As a Senior IT Internal Auditor, you will work with an agile team in a fast paced/high technology environment on multiple audit engagements across the enterprise throughout the audit cycle. You will participate in activities including identifying and assessing IT risks, developing and executing audit programs, completion of high-quality workpapers, identifying issues and reporting the results to audit stakeholders and management. This position will report to the Internal Audit Manager and will work closely with Business Technology (BT), Security, Engineering and other cross functional stakeholders. We’re looking for an individual with strong technology experience and an understanding of technology audit and IT risk, who is eager to join a small, growing team within a company continuing to experience rapid growth and expansion. Company Description: Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security protections. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. Thousands of customers, including Adobe, Allergan, Chiquita, LinkedIn, and Western Union, trust Okta to help their organizations work faster, boost revenue, and stay secure. To learn more about Okta, visit: https://www.okta.com . Responsibilities: Evaluate the design and operational effectiveness of key cybersecurity and related controls used at Okta Conduct walkthroughs, test controls and document workpapers (in a manner that aligns to our department methodology), assess IT risks, design audit programs, execute fieldwork, and write audit reports Effectively partner with BT, Security, Engineering, and cross functional stakeholders to ensure completion of remediation activities agreed upon during audit projects Gain stakeholder agreement on root causes of issues and appropriate corrective actions, while maintaining positive client relationships Participate in providing risk-based consulting to assist management during the development of business process improvements or the implementation of new systems Provide guidance, training and mentorship to other team members, fostering professional growth and ensuring knowledge transfer across the team Exercise judgment regarding planning, risk assessments, and completion of objectives on complex projects Qualifications: Bachelor’s degree in computer science, information systems, “STEM” (Science, Technology, Engineering and Math) or related major 3+ years of experience in audit with a focus on technology and IT risk Process an understanding of IT general controls including cybersecurity, SDLC, access and change management, logging and monitoring, disaster recovery, and cloud computing Technical expertise in IT systems including infrastructure, cybersecurity, and familiarity with IT governance frameworks Analytical and critical thinking proficiency in analyzing complex data and extracting meaningful insights Ability to identify root causes of issues and recommend appropriate remediation and safeguards Big 4 or similar auditing experience is desirable Strong written and verbal communication skills, including listening and interviewing skills Experience using industry standards/framework such as NIST CSF and COBIT Proven ability to conduct a variety of operational audits, including financial, operational, and IT Experience with cloud-based or software as a service (SaaS) companies is a plus Maintains a CISM, CISSP, CEH, or CISA designation Excellent analytical, organizational, and written/verbal communication skills Position is eligible for hybrid work, so communication, collaboration, and organization are key to your success Ability to effectively discuss audit findings and develop impactful solutions with business partners, focusing on right-sized solutions given the size and complexity of the organization Solutions oriented, with a willingness to roll up your sleeves to “get it done” Ability and desire to work hands on in an evolving, fast-paced environment #LI-CS7 What you can look forward to as a Full-Time Okta employee! Amazing Benefits Making Social Impact Developing Talent and Fostering Connection + Community at Okta Okta cultivates a dynamic work environment, providing the best tools, technology and benefits to empower our employees to work productively in a setting that best and uniquely suits their needs. Each organization is unique in the degree of flexibility and mobility in which they work so that all employees are enabled to be their most creative and successful versions of themselves, regardless of where they live. Find your place at Okta today! https://www.okta.com/company/careers/. Some roles may require travel to one of our office locations for in-person onboarding. Okta is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, ancestry, marital status, age, physical or mental disability, or status as a protected veteran. We also consider for employment qualified applicants with arrest and convictions records, consistent with applicable laws. If reasonable accommodation is needed to complete any part of the job application, interview process, or onboarding please use this Form to request an accommodation. Okta is committed to complying with applicable data privacy and security laws and regulations. For more information, please see our Privacy Policy at https://www.okta.com/privacy-policy/. Okta The foundation for secure connections between people and technology Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With over 7,000 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. More than 19,300 organizations, including JetBlue, Nordstrom, Slack, T-Mobile, Takeda, Teach for America, and Twilio, trust Okta to help protect the identities of their workforces and customers.

Posted 2 days ago

Apply

2.0 - 3.0 years

0 Lacs

Bengaluru

On-site

Description The opportunity: Join our dynamic Threat Intelligence and Detection Engineering (TIDE) team within Cyber Operations, dedicated to safeguarding critical infrastructure. Work alongside motivated professionals in a collaborative environment, leveraging cutting-edge technologies, automation, and innovative GenAI solutions. You'll have opportunities to expand your professional network across various cybersecurity disciplines, including Cyber Defense Center (CDC), Vulnerability Management (VMAD), and Architecture & Engineering (A&E). We prioritize enthusiasm, creativity, and passion for continuous learning over extensive experience. You should be curious, innovative, and excited to explore emerging cybersecurity approaches. How you’ll make an impact: Develop and implement detection engineering content, automation, and integrations across IT/OT environments. Enhance our Security Orchestration, Automation, and Response (SOAR) platform by developing additional integrations and response automations. Incorporate cutting-edge GenAI technologies into operational processes. Build and maintain detection baselines tailored to evolving threats and business-specific use cases. Collaborate closely with Incident Response and Threat Intelligence teams to continuously refine detection capabilities. Conduct proactive technical analyses post-incident to improve operational effectiveness and response efficiency. Monitor cybersecurity trends, emerging threats, and innovative technologies, applying insights to enhance detection and response strategies. Support evaluations and integration of new cybersecurity tools and platforms. Foster continuous improvement initiatives in tooling, automation, and operational processes. Responsible to ensure compliance with applicable external and internal regulations, procedures, and guidelines. Living Hitachi Energy’s core values of safety and integrity, which means taking responsibility for your own actions while caring for your colleagues and the business. Your background: Bachelor's or master’s degree in relevant field. A minimum of 2-3 years in cybersecurity (OT/IT), emphasizing operational procedures in threat monitoring and incident management. A grasp of the IT/OT Threat Landscape. Proficiency in threat detection engineering automation, including the entire Use Case lifecycle. Hands-on experience or strong interest in Microsoft Azure security solutions, particularly Azure Sentinel, including developing detection rules and automations using Kusto Query Language (KQL). Familiarity with Azure cloud infrastructure and enthusiasm for leveraging cloud-native technologies in detection engineering and security monitoring. Hands-on experience with security tech, like firewalls, anomaly detection tools, EDR, and IDS. A foundational understanding of security standards and frameworks such as NIST, CIS, MITRE ATT&CK, and the Cyber Kill Chain. Experience in roles such as SOC, CSIRT, or CSOC would be advantageous. Effective communication skills, allowing you to articulate security issues to peers, stakeholders, and clients. Proficiency in both spoken & written English language is required and German language skills would be a significant asset. Qualified individuals with a disability may request a reasonable accommodation if you are unable or limited in your ability to use or access the Hitachi Energy career site as a result of your disability. You may request reasonable accommodations by completing a general inquiry form on our website. Please include your contact information and specific details about your required accommodation to support you during the job application process. This is solely for job seekers with disabilities requiring accessibility assistance or an accommodation in the job application process. Messages left for other purposes will not receive a response.

Posted 2 days ago

Apply

8.0 - 15.0 years

6 - 8 Lacs

Noida

On-site

Join our Team About this opportunity: Ericsson is seeking an experienced IAM Engineer with a strong background in Identity Management (IDM) and Public Key Infrastructure (PKI) to join our team in Noida or Bangalore. The ideal candidate will bring 8 to 15 years of hands-on experience in designing, implementing, and managing enterprise IAM solutions, ensuring secure and seamless identity lifecycle management and robust cryptographic security. Key Responsibilities: Design, implement, and support enterprise Identity and Access Management (IAM) solutions, focusing on IDM and PKI components. Manage identity lifecycle processes including provisioning, de-provisioning, authentication, authorization, and access governance. Deploy and maintain PKI infrastructure, including certificate lifecycle management, CA operations, and secure key management. Integrate IDM and PKI systems with various applications, cloud platforms, and network services. Collaborate with security teams to enforce access controls, policies, and compliance requirements. Troubleshoot and resolve IAM and PKI related incidents and performance issues. Develop automation scripts and tools to optimize IAM and PKI processes. Participate in security audits and assessments related to IAM and PKI. Document architecture, configurations, and operational procedures. Stay updated with emerging IAM and PKI technologies, trends, and best practices. Required Skills and Qualifications: Bachelor’s or Master’s degree in Computer Science, Information Technology, Cybersecurity, or related field. 8 to 15 years of experience in Identity and Access Management engineering roles. Strong hands-on experience with IDM platforms such as SailPoint, Oracle Identity Manager, IBM Security Identity Manager, or similar. Expertise in PKI technologies including CA management, certificate issuance, revocation, and integration with applications. Experience with directory services (LDAP, Active Directory) and federation technologies (SAML, OAuth, OpenID Connect). Proficiency in scripting languages (Python, Shell, PowerShell) for automation. Knowledge of security standards and compliance frameworks (ISO 27001, NIST, GDPR). Strong troubleshooting, problem-solving, and communication skills. Ability to work collaboratively in cross-functional and global teams. Preferred Qualifications: Certifications such as CISSP, CISA, CISM, or relevant IAM/PKI certifications. Experience in telecom or large-scale enterprise environments. Familiarity with cloud IAM solutions (Azure AD, AWS IAM) and hybrid identity architectures. Exposure to DevOps practices and CI/CD pipelines related to IAM deployments.

Posted 2 days ago

Apply

8.0 - 15.0 years

9 Lacs

Noida

On-site

Join our Team About this opportunity: Ericsson is seeking an experienced GRC Specialist with 8 to 15 years of expertise in Governance, Risk, and Compliance to join our team in Noida or Bangalore. The ideal candidate will have a strong background in managing risk frameworks, compliance programs, and governance processes within large enterprises, preferably in telecom or IT sectors. Key Responsibilities: Develop, implement, and maintain governance, risk, and compliance frameworks aligned with global standards and Ericsson policies. Perform comprehensive risk assessments and compliance audits to identify gaps and recommend remediation actions. Ensure adherence to regulatory requirements such as ISO 27001, GDPR, NIST, COBIT, and ITIL. Manage and monitor compliance controls and policies to mitigate organizational risks. Collaborate with internal stakeholders and external auditors to facilitate audit readiness and compliance reporting. Drive continuous improvement initiatives for GRC processes and tools. Support incident response and business continuity planning from a GRC perspective. Lead awareness programs and training sessions on governance, risk, and compliance topics. Utilize and optimize GRC platforms (e.g., RSA Archer, MetricStream, ServiceNow GRC) for automated risk management and reporting. Required Skills and Qualifications: Bachelor’s or Master’s degree in Information Technology, Cybersecurity, Business Administration, or related field. 8 to 15 years of experience in Governance, Risk, and Compliance roles. In-depth knowledge of GRC frameworks and standards (ISO 27001, NIST, COBIT, GDPR, ITIL). Practical experience with GRC tools and platforms. Strong understanding of cybersecurity risk management and control frameworks. Excellent analytical, organizational, and communication skills. Ability to work collaboratively across teams and influence senior stakeholders. Relevant certifications such as CISA, CISM, CRISC, CISSP, or similar preferred. Preferred Qualifications: Experience in the telecommunications or IT industry. Knowledge of cloud security and compliance frameworks. Familiarity with data privacy regulations and telecom-specific compliance requirements. Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Noida Req ID: 768424

Posted 2 days ago

Apply

0 years

4 - 6 Lacs

Noida

On-site

JOB DESCRIPTION KPMG in India, a professional services firm, is the Indian member firm affiliated with KPMG International and was established in September 1993. Our professionals leverage the global network of firms, providing detailed knowledge of local laws, regulations, markets, and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, and Vadodara. KPMG in India offers services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused, and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment KPMG Advisory professionals provide advice and assistance to enable companies, intermediaries, and public sector bodies to mitigate risk, improve performance, and create value. KPMG firms provide a wide range of Risk Advisory and Financial Advisory Services that can help clients respond to immediate needs as well as put in place the strategies for the longer term. Projects in IT Advisory focus on the assessment and/or evaluation of IT systems and the mitigation of IT-related business risks. They are either IS audit, SOX reviews, Internal audit engagements, IT infrastructure review and/or risk advisory including but not limited to IT audit supports in nature. QUALIFICATIONS • IT Audit + SAP experience with knowledge of IT governance practices Prior IT Audit knowledge in areas of ITGC, ITAC (application/automated controls) SOX 404, SOC-1 and SOC-2 Audits Good to have knowledge of other IT regulations, standards and benchmarks used by the IT industry (e.g. NIST, PCI-DSS, ITIL, OWASP, SOX, COBIT, SSAE18/ISAE 3402 etc.) Technical Knowledge of IT Audit Tools with excellent knowledge of IT Audit process and methodology Exposure to Risk Management and Governance Frameworks/ Systems will be an added advantage Exposure to ERP systems will be added advantage Strong project management, communication (written and verbal) and presentation skills Knowledge of security measures and auditing practices within various applications, operating systems, and databases. Strong self-directed work habits, exhibiting initiative, drive, creativity, maturity, self-assurance, and professionalism Preferred Certifications – CISA/CISSP//CISM Exposure to automation Data Analytics tools such as QlikView/Qlik sense, ACL, Power BI will be an advantage Proficiency with Microsoft Word, Excel, Visio, and other MS Office tools Equal employment opportunity information: KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to you.

Posted 2 days ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

Remote

Linkedin logo

Software Engineer - Privacy and AI Governance Role purpose As a Senior software Engineer (Privacy and AI governance) you will help design, develop and operationalize the technical foundations of Accelya’s Privacy by Design and AI governance programs. You will report directly to Accelya’s Data Protection Officer/AI Governance lead supporting the DPO enforce data protection, AI accountability and privacy by design principles. This role will also have a dotted line to Accelya’s Chief Technology Officers to ensure alignment with technical standards, priorities and devops workflows. This individual will develop effective relationships within the technology division working closely with the technology leadership and being able to embed controls effectively without slowing innovation. As Senior software Engineer (Privacy and AI governance) you will spearhead efforts to ensure that privacy is embedded into our software products’ DNA and that Accelya’s AI initiatives meet the requirements of applicable regulations (e.g., GDPR, EU AI act), AI best practice (such as NIST AI RMF), Accelya trust principles, and customer expectations. Duties & Responsibilities Use automated data discovery tools to identify personal or sensitive data flows Design and develop internal tools, APIs, and automation scripts to support: Data privacy workflows (e.g. DSARs, data lineage, consent management) AI/ML governance frameworks (e.g. model cards, audit logging, explainability checks) Review technical controls for data minimization, purpose limitation, access control, and retention policies. Build integrations with privacy and cloud compliance platforms (e.g. OneTrust, AWS Macie and SageMaker governance tools). Collaborate with the AI/ML teams to establish responsible AI development patterns, including bias detection, transparency, and model lifecycle governance. Contribute to privacy impact assessments (PIAs) and AI risk assessments by providing technical insights. Create dashboards and monitoring systems to flag potential policy or governance violations in pipelines. Support the DPO with technical implementation of GDPR, CCPA, and other data protection regulations. Collaborate with legal, privacy, and engineering teams to prioritize risks and translate findings into clear, actionable remediation plans. Knowledge, Experience & Skills: Must-Haves: Proven software engineering experience, ideally in backend or systems engineering roles Strong programming skills (e.g. Python, Java, or TypeScript) Familiarity with data privacy and protection concepts (e.g., pseudonymization, access logging, encryption) Understanding of AI/ML lifecycle Experience working with cloud environments (especially AWS) Ability to translate legal/policy requirements into technical designs Nice-to-Haves: Experience with privacy or GRC tools (e.g., OneTrust, or BigID) Knowledge of machine learning fairness, explainability, and AI risk frameworks Exposure to data governance frameworks (e.g., NIST AI RMF, ISO/IEC 42001) Prior work with privacy-enhancing technologies (PETs), e.g., differential privacy or federated learning What do we offer? Open culture and challenging opportunity to satisfy intellectual needs Flexible working hours Smart working: hybrid remote/office working environment Work-life balance Excellent, dynamic and multicultural environment About Accelya Accelya is a leading global software provider to the airline industry, powering 200+ airlines with an open, modular software platform that enables innovative airlines to drive growth, delight their customers and take control of their retailing. Owned by Vista Equity Partners long-term perennial fund and with 2K+ employees based around 10 global offices, Accelya are trusted by industry leaders to deliver now and deliver for the future. The company´s passenger, cargo, and industry platforms support airline retailing from offer to settlement, both above and below the wing. Accelya are proud to deliver leading-edge technologies to our customers including through our partnership with AWS and through the pioneering NDC expertise of our Global Product teams. We are proud to enable innovation-led growth for the airline industry and put control back in the hands of airlines. For more information, please visit www.accelya.com Show more Show less

Posted 2 days ago

Apply

0 years

1 Lacs

Patel Nagar, Delhi, India

Remote

Linkedin logo

The rise of remote work has transformed the job market, offering professionals in the USA unprecedented flexibility to work from anywhere while maintaining full-time employment. With companies increasingly adopting “work-from-anywhere” policies, 2025 is a prime year to explore high-paying, fulfilling remote career opportunities. Whether you’re a seasoned professional or just starting out, this guide highlights the top full-time remote jobs hiring right now in the USA, along with actionable insights to help you land your dream role. From tech to healthcare to creative fields, we’ve curated a list of in-demand positions based on current trends and job board data. This SEO-optimized article is designed to help you navigate the remote job landscape, offering details on job roles, required skills, salary ranges, and tips for standing out in a competitive market. Let’s dive into the top full-time remote jobs hiring in the USA in 2025! Why Remote Work is Thriving in 2025 Benefits Remote work has become a cornerstone of the modern workplace, driven by advancements in technology, changing employee expectations, and the proven benefits of flexibility. According to Forbes, around 70% of workers are expected to work remotely at least five days a month by 2025. Companies are tapping into a global talent pool, prioritizing output over office attendance, and offering competitive salaries to attract skilled professionals. Here’s why remote work continues to thrive: Flexibility and Work-Life Balance: Remote jobs allow employees to manage their schedules, reduce commutes, and achieve a better balance between personal and professional lives. Cost Savings for Employers: Companies save on office space and operational costs, enabling them to invest in top talent regardless of location. Technological Advancements: Tools like Zoom, Slack, and advanced CRMs make remote collaboration seamless and efficient. Employee Demand: Surveys show that a significant percentage of workers prefer remote or hybrid roles, pushing employers to adapt. With this backdrop, let’s explore the top full-time remote jobs hiring right now in the USA, organized by industry and demand. Top Full-Time Remote Jobs in Technology Role The tech sector continues to lead the remote work revolution, offering a wide range of roles for developers, engineers, and IT professionals. Here are some of the most sought-after tech positions in 2025: Software Engineer Software engineers design, develop, and maintain applications, making them indispensable in the tech world. Remote software engineering roles are abundant, with companies like Google, Amazon, and startups posting openings daily. Key Responsibilities: Write clean, efficient code for web and mobile applications. Collaborate with cross-functional teams to design software solutions. Debug and optimize existing systems. Stay updated on emerging technologies. Skills Required: Proficiency in languages like Python, Java, JavaScript, or C++. Experience with frameworks like React, Angular, or Django. Knowledge of cloud platforms (AWS, Azure, Google Cloud). Strong problem-solving and communication skills. Salary Range: $100,000–$180,000/year Where to Find Jobs: We Work Remotely, Remote.co, LinkedIn (filter for “remote” jobs). Full Stack Developer Full stack developers handle both front-end and back-end development, making them versatile hires for companies building complex digital products. Key Responsibilities: Develop user-facing interfaces and server-side logic. Integrate APIs and third-party services. Ensure scalability and performance of applications. Work with designers and product managers to align on project goals. Skills Required: Expertise in HTML, CSS, JavaScript, and back-end languages like Node.js or Ruby. Familiarity with databases (SQL, NoSQL). Experience with version control (Git). Agile development experience. Salary Range: $95,000–$165,000/year Where to Find Jobs: FlexJobs, Jobspresso, Remote OK. Also Read: Best Part Time Remote Jobs to Earn Extra Income in the USA Cybersecurity Analyst With cyber threats on the rise, cybersecurity analysts are in high demand to protect company data and systems remotely. Key Responsibilities: Monitor networks for security breaches. Conduct vulnerability assessments and penetration testing. Develop and implement security protocols. Respond to and mitigate cyber incidents. Skills Required: Knowledge of firewalls, encryption, and security frameworks (NIST, ISO). Experience with tools like Splunk or Wireshark. Certifications like CISSP or CompTIA Security+. Analytical and detail-oriented mindset. Salary Range: $90,000–$150,000/year Where to Find Jobs: Nodesk, Remote4Me, LinkedIn. Top Full-Time Remote Jobs in Digital Marketing Digital marketing thrives on flexibility, making it a hotspot for remote opportunities. These roles focus on driving brand awareness and revenue through online channels. SEO Specialist SEO specialists optimize websites to rank higher on search engines, driving organic traffic and boosting visibility. Key Responsibilities: Conduct keyword research and competitor analysis. Optimize on-page elements like meta tags, headers, and content. Build high-quality backlinks to improve domain authority. Use analytics tools like Google Analytics to track performance. Skills Required: Proficiency in SEO tools (Ahrefs, SEMrush, Moz). Understanding of Google’s algorithm updates. Content creation and optimization skills. Data-driven decision-making abilities. Salary Range: $50,000–$85,000/year Where to Find Jobs: Remoters, Working Nomads, We Work Remotely. Content Marketing Manager Content marketing managers create and distribute engaging content to attract and retain audiences, often working closely with SEO and social media teams. Key Responsibilities: Develop content strategies aligned with business goals. Create blog posts, whitepapers, and social media content. Manage content calendars and coordinate with writers. Analyze content performance metrics. Skills Required: Strong writing and editing skills. Knowledge of CMS platforms (WordPress, HubSpot). Familiarity with SEO and social media trends. Project management experience. Salary Range: $70,000–$130,000/year Where to Find Jobs: Remote.co, ProBlogger, Jobgether. Social Media Manager Social media managers craft campaigns to engage audiences and build brand loyalty across platforms like Instagram, Twitter, and LinkedIn. Key Responsibilities: Develop and execute social media strategies. Create and schedule posts, including visuals and copy. Monitor engagement metrics and adjust campaigns. Collaborate with influencers and marketing teams. Skills Required: Expertise in social media platforms and tools (Hootsuite, Buffer). Creative content creation skills (Canva, Adobe Suite). Understanding of analytics and advertising platforms. Strong communication skills. Salary Range: $60,000–$110,000/year Where to Find Jobs: FlexJobs, Remote OK, LinkedIn. Top Full-Time Remote Jobs in Healthcare The healthcare sector is embracing remote work, particularly in telehealth and administrative roles, expanding access to care and expertise. Telehealth Nurse Telehealth nurses provide remote patient care through virtual platforms, addressing the growing demand for accessible healthcare. Key Responsibilities: Conduct virtual patient consultations and assessments. Provide medical advice and follow-up care. Document patient interactions in EHR systems. Collaborate with physicians and healthcare teams. Skills Required: Active RN license and clinical experience. Proficiency with telehealth platforms. Strong communication and empathy skills. Knowledge of HIPAA regulations. Salary Range: $75,000–$120,000/year Where to Find Jobs: Remote.co, USAJOBS, FlexJobs. Medical Coder Medical coders translate healthcare services into standardized codes for billing and insurance purposes, often working remotely. Key Responsibilities: Assign ICD-10, CPT, and HCPCS codes to patient records. Ensure compliance with coding guidelines. Review documentation for accuracy. Communicate with healthcare providers for clarification. Skills Required: Certification (CPC, CCS, or RHIA). Knowledge of medical terminology and coding systems. Attention to detail and organizational skills. Familiarity with EHR software. Salary Range: $50,000–$80,000/year Where to Find Jobs: We Work Remotely, Remote4Me, ZipRecruiter. Top Full-Time Remote Jobs in Education Remote education roles are booming as online learning platforms like Coursera and Khan Academy expand their reach. Online Instructor Online instructors teach courses across subjects, from coding to language skills, connecting with students globally. Key Responsibilities: Develop and deliver course content via virtual platforms. Engage students through interactive lessons and assignments. Provide feedback and assess student progress. Stay updated on educational trends and tools. Skills Required: Subject matter expertise in a specific field. Experience with LMS platforms (Moodle, Blackboard). Strong communication and presentation skills. Ability to adapt to diverse learning styles. Salary Range: $60,000–$100,000/year Where to Find Jobs: Remote.co, Jobspresso, LinkedIn. Instructional Designer Instructional designers create engaging online learning experiences, blending pedagogy with technology. Key Responsibilities: Design e-learning courses and materials. Collaborate with subject matter experts to develop content. Use authoring tools like Articulate or Adobe Captivate. Evaluate course effectiveness through learner feedback. Skills Required: Knowledge of instructional design models (ADDIE, SAM). Proficiency in e-learning software. Strong project management skills. Understanding of adult learning principles. Salary Range: $70,000–$120,000/year Where to Find Jobs: FlexJobs, We Work Remotely, Remote OK. Top Full-Time Remote Jobs in Customer Service Customer service roles are increasingly remote, offering opportunities to support clients from anywhere. Customer Success Manager Customer success managers ensure clients achieve their goals with a company’s products or services, often working remotely for SaaS companies. Key Responsibilities: Onboard and train new clients. Monitor client satisfaction and address concerns. Analyze usage data to improve customer outcomes. Collaborate with sales and product teams. Skills Required: Strong interpersonal and problem-solving skills. Experience with CRM tools (Salesforce, HubSpot). Ability to manage multiple client accounts. Knowledge of the SaaS industry. Salary Range: $80,000–$140,000/year Where to Find Jobs: Jobspresso, Remote.co, LinkedIn. Technical Support Specialist Technical support specialists assist customers with technical issues, often for software or hardware companies. Key Responsibilities: Troubleshoot and resolve technical issues via chat, email, or phone. Document support tickets and escalate complex issues. Provide user training and documentation. Collaborate with engineering teams to address bugs. Skills Required: Knowledge of technical support tools (Zendesk, Freshdesk). Strong troubleshooting and communication skills. Familiarity with software or hardware systems. Patience and a customer-focused mindset. Salary Range: $50,000–$90,000/year Where to Find Jobs: We Work Remotely, Nodesk, ZipRecruiter. Also Read: Remote Pharmacy Technician Jobs: Work From Home Roles You Can Apply For Tips for Landing a Full-Time Remote Job Securing a remote job requires a strategic approach, especially in a competitive market. Here are actionable tips to stand out: Tailor Your Resume and Cover Letter: Highlight remote work experience and digital communication skills. Use keywords from job descriptions to pass ATS filters. Build a Strong Online Presence: Optimize your LinkedIn profile with “remote” in your location and headline. Showcase a portfolio for creative or tech roles (e.g., GitHub for developers, Behance for designers). Leverage Remote Job Boards: Use platforms like FlexJobs, We Work Remotely, and Remote.co for curated listings. Set up job alerts for daily or weekly updates. Network Strategically: Join LinkedIn groups, Slack communities, or forums like Remote Work Hub. Reach out to hiring managers directly via email or LinkedIn. Prepare for Remote Interviews: Test your tech setup (camera, microphone, internet). Demonstrate familiarity with remote tools like Zoom or Trello. Avoid Scams: Research employers thoroughly, checking reviews on Glassdoor or social media. Avoid jobs requiring upfront payments or sharing sensitive information. Where to Find Full-Time Remote Jobs To Streamline Your Job Search, Focus On Platforms Dedicated To Remote Work. Here Are The Top Sites For Finding Full-time Remote Jobs In The USA We Work Remotely: The largest remote work community, featuring jobs from companies like Google and Amazon. FlexJobs: Curated listings for remote and flexible roles, with a focus on quality and legitimacy. Remote.co: Offers jobs in various categories, plus resources like Q&A forums. LinkedIn: Use the “remote” filter to find opportunities from top companies. Jobspresso: Features high-quality remote jobs in tech, marketing, and support. Nodesk: Ideal for digital nomads, with a focus on tech and marketing roles. Remote OK: Transparent listings with salary and location details. ZipRecruiter: Offers a wide range of remote jobs, including SEO and customer service. Conclusion – Full Time Remote Jobs The remote job market in the USA is thriving in 2025, offering diverse opportunities across tech, marketing, healthcare, education, and customer service. From high-paying software engineering roles to flexible customer success positions, there’s a remote job for nearly every skill set. By leveraging specialized job boards, tailoring your application materials, and building a strong online presence, you can land a fulfilling full-time remote role that aligns with your career goals. Start your search today on platforms like We Work Remotely, FlexJobs, or LinkedIn, and take the first step toward a flexible, rewarding career from anywhere in the USA. FAQs – Full-Time Remote Jobs What are the best platforms for finding full-time remote jobs in the USA? Top platforms include We Work Remotely , FlexJobs , and Remote.co , LinkedIn , Jobspresso , Nodesk , Remote OK , and ZipRecruiter . These sites specialize in remote listings and offer filters for full-time roles. What skills are most in demand for remote jobs in 2025? In-demand skills include programming (Python, JavaScript), SEO , content creation , cybersecurity , telehealth expertise , and proficiency with remote tools like Zoom , Slack , and CRM platforms . How can I avoid remote job scams? Research employers on Glassdoor or social media, avoid jobs requiring upfront payments , and verify recruiters through video calls . Never share bank details before being hired. Do remote jobs pay as well as in-office jobs? Many remote jobs offer competitive salaries , especially in tech and marketing . For example, software engineers can earn $100,000–$180,000/year , comparable to or higher than in-office roles. Can I work remotely from any state in the USA? Most remote jobs are location-agnostic , but some require specific time zones or state residency due to tax or legal reasons . Always check job listings for restrictions. What are the benefits of full-time remote work? Benefits include flexibility , no commute , cost savings , and access to global opportunities . Many companies also offer remote allowances or perks like parental leave . How do I stand out in a remote job application? Tailor your resume with relevant keywords , highlight remote work experience , and showcase digital skills . A strong LinkedIn profile and portfolio can also help. Are there remote jobs for entry-level candidates? Yes, roles like customer service , content writing , and data entry are accessible to beginners. Platforms like Pangian and Remote.co list entry-level opportunities. What tools should I learn for remote work? Familiarity with Zoom , Slack , Trello , Google Workspace , CRM tools (e.g., Salesforce, HubSpot), and industry-specific software (e.g., Ahrefs for SEO) is essential. How do I prepare for a remote job interview? Test your tech setup , research the company, and demonstrate familiarity with remote work tools . Highlight your ability to communicate effectively and manage time independently . Related Posts Top 10 Remote Customer Service Jobs You Can Start Today The Pros and Cons of Working Remote Data Entry Jobs How to Land Your First Remote Entry-Level Job: Tips and Tricks How to Thrive in Remote Customer Service Jobs: Tips for Success Best Remote Customer Success Jobs You Can Work From Anywhere Top Remote Front End Developer Jobs Hiring in 2025 Top 10 Work from Home Jobs in Delhi Hiring Now Legit Work From Home Jobs for Stepmoms: Real Opportunities & Flexible Roles in 2025 Show more Show less

Posted 2 days ago

Apply

0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Senior Associate Information Security Analyst is a developing subject matter expert, responsible for designing and implementing security systems to protect the organization's computer networks from cyber-attacks, and to help set and maintain security standards. This role is required to monitor the organization's computer networks for security issues, install security software, and document any security issues or breaches found. The Senior Associate Information Security Analyst is responsible for assisting in the planning, implementation, and management of information security measures to safeguard the organization's digital assets and systems and contributes to maintaining a secure and compliant environment. What You'll Be Doing Key Responsibilities: Monitors security alerts and events from various sources, investigates potential threats, and escalates incidents as necessary. Assists in the implementation and monitoring of security controls, including firewalls, intrusion detection systems, and access controls. Performs regular vulnerability assessments, analyses scan results, and assists in prioritizing and remediating identified vulnerabilities. Supports the incident response team in investigating security incidents, documenting findings, and participating in remediation efforts. Assists in ensuring compliance with industry standards (for example, GDPR, ISO 27001) by conducting assessments and implementing necessary controls. Installs security measures and operates software to protect systems and information infrastructure, including firewalls and data encryption programs. Documents security breaches and assess the damage they cause. Works with the security team to perform tests and uncover network vulnerabilities. Fixes detected vulnerabilities to maintain a high-security standard. Develops organizational best practices for IT security. Performs penetration testing and upgrades systems to unable security software. Installs and upgrades antivirus software and tests and evaluates new technology. Assists with the installation of security software and understands information security management. Researches security enhancements and makes recommendations to management. Stays abreast of information technology trends and security standards. Contributes to security awareness initiatives by creating training materials, conducting workshops, and educating employees about best security practices. Maintains accurate records of security incidents, assessments, and actions taken for reporting and audit purposes. Assists in the management and maintenance of security tools, including antivirus software, encryption tools, and security information and event management (SIEM) systems. Participates in risk assessments to identify potential security threats, vulnerabilities, and associated risks to the organization. Collaborates with cross-functional teams, IT, and other teams to ensure security measures are integrated into the organization's processes and projects. Performs any other related task as required. Knowledge and Attributes: Good communication skills to effectively convey technical information to non-technical stakeholders. Good analytical thinking and problem-solving skills to prevent hacking on a network. Ability to identify and evaluate potential risks and to develop solutions. Ability to identify and mitigate network vulnerabilities and explain how to avoid them. Understands firewalls, proxies, SIEM, antivirus, and IDPS concepts. Understands patch management with the ability to deploy patches in a timely manner whilst understanding business impact. Developing proficiency with MAC and OS. Familiarity with security frameworks, standards, and regulations (for example, NIST, CIS, GDPR). Basic understanding of network and system architecture, protocols, and security controls. Ability to analyze security incidents and assess potential risks. Ability to work both independently and collaboratively in a fast-paced environment. Academic Qualifications and Certifications: Bachelor's degree or equivalent in information security, cybersecurity, computer science, or related. Security certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM) are advantageous. Required Experience: Moderate level of demonstrated experience in information security or cybersecurity, or related roles. Moderate level of demonstrated experience working in a global IT organization. Moderate level of demonstrated experience with computer network penetration testing and techniques. Moderate level of demonstrated experience with security assessment and vulnerability scanning tools. Workplace type: On-site Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today. Show more Show less

Posted 2 days ago

Apply

8.0 - 10.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Introduction Welcome to Gallagher - a global leader in insurance, risk management, and consulting services. With a growing team of more than 52,000 professionals worldwide, we empower businesses, communities, and individuals to thrive. At Gallagher, you can build a career whether it’s with our brokerage division, our benefits and HR consulting division, or our corporate team. Experience The Gallagher Way, a culture fueled by shared values and a collective passion for excellence. Join one of our dynamic teams, where you'll play a pivotal role in shaping Gallagher's future and unlocking unparalleled opportunities for both clients and yourself. We believe that every candidate brings something special to the table, including you! So, even if you feel that you’re close but not an exact match, we encourage you to apply. Overview The Business Information Security Officer (BISO) - India is responsible for managing the Gallagher Cyber Information Security (GCIS) program of works for the Indian region. This includes identifying, evaluating, and reporting on information security risks across all Gallagher divisions in India, in a manner that meets compliance and regulatory requirements, as well as aligning with the company's risk appetite. In addition to reporting on a regular basis to the UK - based EMEA BISO, this role will work closely with: IT Directors of India and Local CTO for Gallagher India and Gallagher Centre of Excellence The India Senior Business Leaders for IT and QA & Transition GCIS Colleagues globally who have global remits (application security, identity management etc) The India division’s ISMS manager in maintaining their ISO27001 certification GCIS Project Managers delivering both new and enhanced capabilities. This is a hybrid role, in office 2-3 days per week, and can be based out of either our Pune or Bangalore offices, with some travel between the two expected. How You'll Make An Impact Continue to develop and prioritise the information security strategy and roadmap for India that aligns with the GCIS security strategy. Monitor and manage security incidents, vulnerabilities, and threats that affect the various Indian divisions, and work with Gallagher’s global security teams to ensure effective response and remediation. Ensure compliance with applicable laws, regulations, and contractual requirements related to information security throughout India. Work with the Global SOC in the co-ordination and escalation of security incidents to the appropriate Indian authorities when appropriate. Develop and maintain relationships with key stakeholders across India, including business leaders, IT teams, and external partners to ensure effective communication and collaboration on information security matters. Conduct periodic security risk assessments and audits of information systems, networks, applications and suppliers in India to identify and mitigate potential security risks. Lead and coordinate the implementation of security policies, standards, and procedures in India. Ensure security awareness and training programs are in place and effective in India. Manage the security budget for India, ensuring efficient and effective use of resources. Represent India in the appropriate security governance forums and ensure alignment with the region security strategy. Brokerage clients will have time-sensitive due diligence security audits and questionnaires that will need to be managed and responded to. Business suppliers and IT supply chain vendors must be managed to ensure they do not introduce risk to Gallagher. Confidential participation in the Merger and Acquisition process with external companies, lawyers and security consultant About You Bachelor's degree in computer science, information systems, or a related field. A master's degree is preferred. At least 8-10 years of experience in information security, with a minimum of 5 years in a leadership role. Strong knowledge of security frameworks and standards such as ISO 27001, NIST, PCI-DSS, and GDPR. Demonstrated experience in the management of staff and small teams. Experience in managing security incidents and crises. Excellent communication and stakeholder management skills are required. Familiarity with security technologies such as firewalls, intrusion detection systems, and SIEMs. Knowledge of cloud security and Insurance practices is a plus. Relevant certifications such as CISSP, CISM, or CRISC are preferred. Lead auditor experience in ISO27001 is preferred. Additional Information We value inclusion and diversity Inclusion and diversity (I&D) is a core part of our business, and it’s embedded into the fabric of our organization. For more than 95 years, Gallagher has led with a commitment to sustainability and to support the communities where we live and work. Gallagher embraces our employees’ diverse identities, experiences and talents, allowing us to better serve our clients and communities. We see inclusion as a conscious commitment and diversity as a vital strength. By embracing diversity in all its forms, we live out The Gallagher Way to its fullest. Gallagher believes that all persons are entitled to equal employment opportunity and prohibits any form of discrimination by its managers, employees, vendors or customers based on race, color, religion, creed, gender (including pregnancy status), sexual orientation, gender identity (which includes transgender and other gender non-conforming individuals), gender expression, hair expression, marital status, parental status, age, national origin, ancestry, disability, medical condition, genetic information, veteran or military status, citizenship status, or any other characteristic protected (herein referred to as “protected characteristics”) by applicable federal, state, or local laws. Equal employment opportunity will be extended in all aspects of the employer-employee relationship, including, but not limited to, recruitment, hiring, training, promotion, transfer, demotion, compensation, benefits, layoff, and termination. In addition, Gallagher will make reasonable accommodations to known physical or mental limitations of an otherwise qualified person with a disability, unless the accommodation would impose an undue hardship on the operation of our business. Show more Show less

Posted 2 days ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies