Home
Jobs
Companies
Resume

1769 Nist Jobs - Page 50

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 years

0 Lacs

India

On-site

Linkedin logo

Engineering Manager (Hands-On) Our mission is to accelerate adoption of cloud native technologies for enterprises. We believe that software can radically transform the world and are building a solution to help enterprises deliver and operate mission critical software at scale. We are an enterprise-grade multi-cloud Kubernetes platform. Qualifications Education: Bachelor’s, Master’s, or PhD in Computer Science, Engineering, or a related field. Technical Expertise: Enterprise SaaS Development & Architecture: Proven expertise in designing and developing scalable, secure enterprise SaaS products. Container and Cloud Platforms: Strong hands-on experience with container orchestration (Kubernetes, AKS, EKS, GKE, OpenShift) and cloud platforms (AWS, Azure, GCP). Programming & Frameworks: Proficiency in Java and Golang; experience with microservices frameworks like Quarkus or Spring Boot. CNCF Ecosystem: Familiarity with key CNCF tools and technologies, including Prometheus, GitOps, and networking/storage plugins (CNI, CSI). Infrastructure as Code: Practical experience with tools like Terraform and GitLab CI/CD. Security & Compliance: Working knowledge of security standards and experience with compliance frameworks (PCI, SOC 2, ISO 27001, GDPR, HIPAA, NIST). Management Experience : Team Leadership: Minimum of 3 years managing software development teams of 10+ members in a startup or fast-paced environment. Agile Delivery: Expertise in managing product delivery using Agile methodologies, such as Scrum or Kanban. Technical Skills: Programming Languages: Java, Golang Data & Messaging Systems: Experience with databases (MongoDB, PostgreSQL, Cassandra), message queuing/streaming (Kafka, RabbitMQ), and data processing frameworks (Spark, Flink, Storm). Load Balancing & Proxying: Hands-on experience with load balancers like HAProxy, NGINX, or Gateway API. API Definition and Implementation: Proficiency in defining and implementing APIs, including RESTful services, OpenAPI v3, and Swagger, ensuring clear and maintainable interfaces. Authentication: Understanding of security protocols (OAuth2, OpenID Connect, Keycloak, Vault) Monitoring & Logging: Knowledge of monitoring and logging tools (Prometheus, Grafana, ELK stack). AI/ML: Experience with AI and machine learning frameworks, specifically Large Language Models (LLMs) and Retrieval-Augmented Generation (RAG) techniques. Policy engines: Kyverno, OPA Certifications (Preferred): AWS: Certified Solutions Architect CNCF: CKA, CKAD, or CKS Security: CISSP, CCSP, or similar Responsibilities: Technical Leadership and Strategy Drive Product Vision: Work closely with the VP of Engineering, and product team to shape the technical direction, ensuring alignment with the company's vision and market needs. Architecture Oversight: Oversee architectural decisions, especially for complex SaaS solutions, ensuring scalability, reliability, and security. Technical Standards: Establish and enforce coding, architectural, and design standards to maintain quality across the engineering team. Team Management and Development Mentorship and Growth: Mentor engineering managers and individual contributors, fostering a culture of learning, innovation, and continuous improvement. Recruitment and Talent Management: Play an active role in hiring, onboarding, and retaining top talent, aligning team members' strengths with company needs. Performance Management: Conduct performance reviews, set clear objectives, and provide regular feedback to team members. Release and Process Management Release Oversight: Oversee the execution of releases, ensuring they meet timelines, quality standards, and budgets. Agile Practices: Implement and refine Agile or similar methodologies to improve productivity and adapt to changes in product or customer needs. Process Improvement: Continuously improve engineering processes, including CI/CD pipelines, release management, and QA practices. Cross-Functional Collaboration Product and Customer Alignment: Collaborate with product management to translate customer needs into technical requirements, ensuring the engineering team is aligned with customer value. Operations and Infrastructure: Work with the DevOps and infrastructure teams to maintain robust, secure, and efficient cloud environments. Customer Success and Support: Partner with customer-facing teams to ensure engineering efforts address common issues and improve overall customer satisfaction. Resource Planning Resource Allocation: Assess and optimize team resources based on project requirements, balancing between feature development, technical debt reduction, and innovation. Quality, Security, and Compliance QA Strategy & Oversight: Establish a comprehensive QA strategy that integrates both automated and manual testing to ensure a high-quality, reliable product experience across all components. Automation Standards: Implement and oversee robust automation practices, including UI automation, API automation, and unit testing, to drive efficiency and reduce manual testing efforts. Test Coverage Mandates: Enforce high levels of test coverage across the codebase, setting and monitoring standards for unit, integration, and end-to-end tests to ensure product stability and reduce regression risks. Continuous Integration & Automation: Maintain and refine CI/CD pipelines to support automated testing and seamless deployments, ensuring all changes meet defined quality and test coverage thresholds before release. Security Practices: Enforce security best practices and compliance with industry standards relevant to Nirmata’s market, such as SOC 2 and ISO 27001. Incident Management: Oversee incident response and post-mortem processes to learn from system outages or security incidents. Innovation and Technical Advocacy Foster Innovation: Encourage and support R&D initiatives or proof-of-concept projects to keep the company’s technology forward-looking. Evangelize Best Practices: Advocate for industry best practices in areas like Kubernetes, DevOps, and microservices within the team and across the company. External Representation: Represent the engineering team in industry conferences, meetups, or technical discussions with partners and customers. Show more Show less

Posted 3 weeks ago

Apply

18.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

At Medtronic you can begin a life-long career of exploration and innovation, while helping champion healthcare access and equity for all. You’ll lead with purpose, breaking down barriers to innovation in a more connected, compassionate world. A Day in the Life In this critical role you will act as Sr. Manager, Cybersecurity leading a team of IT/Cybersecurity professionals, ensuring the highest security standards across the Enterprise. This role is responsible for assisting the CISO in the implementation of information security governance structure and strategies, priorities, and directives consistent with the vision and in alignment with the mission of the Medtronic Global Cyber & information Security Office (GCISO). This role will be accountable for helping teams achieve their goals, work strategically together, and remain as adaptable as possible in a fun, ever-changing environment. We’re always looking for ways to optimize. We look for leaders who have a clear vision of where we are going and how to get there, bold inclusive thinkers who create new ideas and bring our best solutions forward to benefit our patients, business partners, and customers. Responsibilities may include the following and other duties may be assigned. General: Provide recommendations to the CISO on information security standards and best practices for IT projects. Lead, mentor, and manage the India-based cybersecurity team to ensure high performance, skill development, and efficient collaboration across time zones. Oversee recruitment, training, and development of Global Cyber & Information Security (GCISO) team members. Ensure effective communication and ways of working between the India GCISO team and global stakeholders. Manage the team's workload, prioritize tasks, and ensure timely completion of deliverables. Assist the CISO to oversee and manage the effectiveness of the cybersecurity strategy and roadmap. Work with finance to assess road map and strategy against budget. Assist in the development leadership & board communications on the cyber program. Manage data analytics/dash boarding of metrics reporting. Analyze security metrics and KPIs to assess the performance of the operations team and identify areas for improvement. Collaborate with the global cybersecurity leadership team to align the India operations with the overall cybersecurity strategy and goals. Provide regular reporting on security operations, incident trends, and performance metrics to senior leadership. Contribute to the development of security policies, procedures, and guidelines to ensure consistency and adherence to security standards globally. Align and engage with stakeholders (MDT leadership, various Operating Units, ITLT, Privacy, Product Security, HR, Legal, etc.) on GCISO initiatives as required. Manage staff to continuously improve the organization's security operations, incident management processes, and response times. Utilize security tools and platforms (e.g., SIEM, IDS/IPS, firewalls, threat intelligence) to enhance the effectiveness of security monitoring and analysis. Manage staff to execute on core cyber security business functions (e.g. risk assessments, third party risk assessments, compliance assessments and testing, audit support, contract reviews, tool administration and AI enabled process facilitation and quality assurance. Collaborate with other cybersecurity teams, such as vulnerability management and risk assessment, to drive comprehensive security measures. Manage relationships with third-party vendors providing security tools and services. Evaluate new security technologies and tools to enhance operational capabilities. Collaborate with managed security service providers (MSSPs) as needed for specialized services. Leadership: Ensure that strict standards of confidentiality and high integrity are maintained across the teams, based on the sensitivity of the work being performed. Manage activities of a team with responsibility for results in terms of costs, methods, and employees. Accomplishes results through subordinate managers, supervisors, or exempt specialist employees. Recommends organizational structures of functions and units. Provide leadership, management, and direct reports including performance management, individual development planning, succession planning, employee communications, and positive working environment to ensure high productivity, employee engagement, and performance. Represent the organizational unit as a prime internal and external contact on security related contracts or operations. Work continuously to maintain a very high-level of awareness of new trends, threats, and the constantly changing cyber landscape. Respond quickly and appropriately to these changes with modifications to strategies and approaches in order to protect the company. Conduct briefings and technical meetings for top management and customer representatives. Interacts with senior leadership and equivalent concerning matters of significance to Medtronic. Be responsible for and provide direction to projects and initiatives. Provides guidance to staff to meet schedules or resolve technical or operational problems. Directly participates in establishing and administering many functional projects. Develops and administers budgets, schedules, and performance standards. Influence the development of overall objectives and long-range goals of the organization. Develop, plan, manage, and forecast associated cost center(s), unit costs, employee complement, capital expenditures, and charge back rates. Lead the development of cost center budget and operational plan and manage expenses to plan. Establish appropriate relationships at all levels within the organization to influence and execute strategy/operations. Establish and maintain strong external peer connections in the interest of cyber information sharing and collaboration. Continually benchmark against relevant industries and peer groups to look for continuous improvement opportunities, new techniques and tools, and measure Medtronic against similar functions. Develop business-relevant metrics to measure the effectiveness of the program, facilitate appropriate resource allocation and increase the maturity of the security program. Develop job performance plans for assigned subordinates to communicate responsibilities and expected outcomes of performance in their role. Review and approve future staffing and skill requirements needed for succession planning and talent management purposes. Maintain a strong understanding of security technologies, risks and capabilities. Develop in depth understanding of business processes and business dependencies on supported technologies. Other duties as assigned. MUST HAVE (Minimum Qualifications) Requires a Baccalaureate degree in computer science, Business, or a related field (or for degrees earned outside of the United States, a degree which satisfies the requirements of 8 C.F.R. 214.2(h)( 4)(iii)(A) and Minimum of 18 years of overall and 10+ years of relevant experience with 5+ years of managerial experience. NICE TO HAVE (Preferred Qualifications) Previous experience managing across the NIST domains of cybersecurity across a large company. Advanced degree in applicable business-related field or similar professional IT security certifications. Demonstrated results orientation (driving to deadlines, financial targets, project goals, etc.). Strong business acumen and global orientation. Ability to work collaboratively and partner with employees, peers, leaders, clients, key stakeholders and vendors. Demonstrated ability to provide strong Project Management skills and expertise. Ability to manage the day-to-day information security risk functions across multiple projects and initiatives in Global IT. Personnel Scope – Previous experience managing multiple teams, including matrixed teams containing external resources, service providers, consultants, and partnerships. Employee Development – Previous experience in recruiting and developing talent; proactively lead personnel development activities and mentoring, including a succession plan for managed teams Financial Accountability – Demonstrated ability and experience managing multiple cost centers, programs, and budget accountability. Communication Skills – Demonstrated excellent communication skills at all levels in the organization, strong negotiator, and strong influence & presentation skills. Leadership – Demonstrated leadership skills & high integrity presence; clearly conveys vision & purpose to workforce. Administration – Previous experience in ensuring that functional area complies with administrative requirements including forecasting and budgeting, status reporting, and personnel administration. Proven ability to take down barriers and build highly successful, high-functioning, and accountable organizations. Previous experience managing the integration of IT functions and organizations. Physical Job Requirements The above statements are intended to describe the general nature and level of work being performed by employees assigned to this position, but they are not an exhaustive list of all the required responsibilities and skills of this position. Benefits & Compensation Medtronic offers a competitive Salary and flexible Benefits Package A commitment to our employees lives at the core of our values. We recognize their contributions. They share in the success they help to create. We offer a wide range of benefits, resources, and competitive compensation plans designed to support you at every career and life stage. About Medtronic We lead global healthcare technology and boldly attack the most challenging health problems facing humanity by searching out and finding solutions. Our Mission — to alleviate pain, restore health, and extend life — unites a global team of 95,000+ passionate people. We are engineers at heart— putting ambitious ideas to work to generate real solutions for real people. From the R&D lab, to the factory floor, to the conference room, every one of us experiments, creates, builds, improves and solves. We have the talent, diverse perspectives, and guts to engineer the extraordinary. Learn more about our business, mission, and our commitment to diversity here Show more Show less

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Qualifications and Skills: Essential: Bachelor’s degree in Computer Science, Information Security, or a related field, or equivalent experience. 5+ years of experience in cybersecurity, with at least 2 years in a SOC environment. Proficiency with SIEM tools (CrowdStrike, Google SecOps) and EDR solutions (Carbon Black, CrowdStrike) Strong knowledge of network protocols, operating systems, and attack methodologies. Experience in malware analysis, forensic investigation, and threat hunting. Advanced certifications such as CISSP, GCIH, GCIA, or CEH. Desirable: Experience with cloud security (AWS, Azure, OCI or Google Cloud). Knowledge of scripting languages (Python, PowerShell, etc.). Familiarity with compliance frameworks (ISO 27001, NIST, GDPR, etc.). Strong communication and documentation skills. Regards Shyam J Senior HR Analyst 106-109, Anna Salai, Guindy, Chennai – 600032 M: +91 9840833416 exelatech.com • About EXELA • Instagram • LinkedIn Show more Show less

Posted 3 weeks ago

Apply

0 years

0 Lacs

India

Remote

Linkedin logo

Cybersecurity Analyst Intern Company: INLIGHN TECH Location: Remote (100% Virtual) Duration: 3 Months Stipend for Top Interns: ₹15,000 Certificate Provided | Letter of Recommendation | Full-Time Offer Based on Performance About the Company: INLIGHN TECH empowers students and fresh graduates with real-world experience through hands-on, project-driven internships. The Cybersecurity Analyst Internship is tailored to develop your expertise in identifying and mitigating cyber threats while gaining practical knowledge of modern security tools and frameworks. Role Overview: As a Cybersecurity Analyst Intern, you will work on monitoring networks, analyzing threats, and helping ensure the security of digital infrastructure. This internship will deepen your understanding of incident response, threat intelligence, and proactive defense strategies in a real-world context. Key Responsibilities: Monitor security systems and analyze logs for suspicious activity Conduct vulnerability assessments and recommend remediation steps Assist in security audits and compliance checks Perform malware analysis and track threat actors using threat intelligence platforms Document security incidents and prepare reports on findings Support the implementation of cybersecurity best practices and policies Qualifications: Pursuing or recently completed a degree in Cybersecurity, Information Security, Computer Science, or a related field Strong understanding of network protocols, firewalls, and endpoint protection Familiarity with security tools such as Wireshark, Snort, Nessus, or Splunk Awareness of cybersecurity frameworks (e.g., MITRE ATT&CK, NIST) Good problem-solving and analytical thinking skills Eagerness to learn, investigate, and defend against cyber threats Internship Benefits: Hands-on experience with cybersecurity tools and threat detection methods Certificate of Internship upon successful completion Letter of Recommendation for top performers Build a strong portfolio of cybersecurity analysis and incident response case studies Show more Show less

Posted 3 weeks ago

Apply

0 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Senior Associate Security Technical Architect is a developing subject matter expert, responsible for assisting with designing robust security architectures for our systems, applications, and infrastructure. This role collaborates with cross-functional teams to ensure that technology solutions are secure, compliant, and aligned with industry best practices. Your expertise will be crucial in protecting sensitive data, mitigating risks, and maintaining the confidentiality, integrity, and availability of our systems. What You'll Be Doing Key Responsibilities: Designs and develops comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs. Viewed as a trusted technical advisor to the client. Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle. Provides pre-sales technical support and expertise in analyzing client requirements, in conjunction with the client’s current security capabilities. Provides expertise in secure coding practices, network security, identity and access management, data protection, and other security domains. Supports the evaluation of and selects security technologies, tools, and frameworks to support our security architecture. Ensures technical solutions will accomplish the client's objectives. Defines and implements security policies, standards, and procedures to ensure compliance with industry regulations and best practices. Supports incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team. Develops or produces the technical design document to match the solution design specifications. Working with the relevant internal stakeholders, participate in scope of work determination, product pricing and RFP/RFI responses. Assists with the determination of outsourcing, product pricing and collaborates with others to develop an implementation solution. Responsible for influencing and guiding members of the Sales team and to ensure that they are equipped to close deals and maintain visibility of forecasting and sales pipeline in order to influence potential deals. Manages client proof of concept (POC) initiatives, which will require the involvement of the appropriate resources, and setup and delivery of the POC. On all assigned engagements, owns the proposed solution and transitions the build / implementation to the delivery team. Specifically relating to opportunity pursuit this role will evaluate each opportunity for alignment with organizational capabilities and business policy, prepare the executive summary that outlines all of the information gathered from the client in regards to their needs, as understood, document the proposed technology solution, document the statement of work along with all labor requirements, work with the relevant internal stakeholders to prepare the pricing format that will be supplied to the customer, perform the actual solution design and prepare a parts list outlining equipment to be provided, develop and manage a proof-of-concept as such may be required, engage all technical resources required for an accurate solution design, prepare a network diagram outlining the proposed solution, document all deliverables and what constitutes a successful completion, review the final parts list as supplied and submit all information to the applicable bid team for final assembly, verify the proposal’s accuracy and sign off on the final documents to be presented to the client, assist during the final presentation to the client as appropriate. Knowledge and Attributes: Demonstrates good client engagement skills coupled with technical consulting aptitude. Understanding of the vendor’s products business and technology positioning. Good analytical and problem-solving skills, with the ability to assess risks, analyze complex security issues, and propose effective solutions. Ability to collaborate and communicate effectively with team members, contributing to their success Good product knowledge integrated with technology understanding Good knowledge of security domains, including network security, application security, cloud security, data protection, identity and access management, cryptography, and secure coding practices. Proficiency in enterprise architecture principles, frameworks (such as TOGAF), and architectural patterns for designing secure and scalable systems. Good understanding of security regulations, standards, and frameworks (such as ISO 27001, NIST, PCI DSS) and their practical application Basic understanding of key vendor subscription models such as Cisco EA 3.0. Academic Qualifications and Certifications: Bachelor's degree in information technology, computer science or information systems or related field. Vendor product, sales and technology certifications. Relevant certifications, such as CISSP, CISM, GIAC, or TOGAF, are highly desirable. Required Experience: Moderate level technical experience within a large scale (preferably multi-national) technology services environment. Moderate level experience as a Security Technical Architect or a similar role, designing and implementing security architectures for complex systems and applications. Moderate level experience with security technologies and tools, such as firewalls, intrusion detection/prevention systems, SIEM, vulnerability scanners, and secure coding analysis tools. Experience in project management methodologies. Workplace type: Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today. Show more Show less

Posted 3 weeks ago

Apply

0 years

0 Lacs

India

On-site

Linkedin logo

YOUR ROLE. Responsibilities include but not limited to: Assess technology, cybersecurity, and privacy risks within client environments and the related controls and provide practical remediation plans Conclude on the business impact to the organization as it relates to identified cybersecurity, technology, and/or privacy risks Manage multiple engagements while maintaining company quality standards Work with clients in a broad array of industries including information technology, financial services, retail & consumer products, pharmaceuticals, electronics, manufacturing, media, and government contracting etc. Understand clients’ organizations and provide value-added solutions and best practices Proactively manage client issues and expectations. Understand and appreciate the firm’s model of balancing client needs with profitability Review and evaluate client IT environment including IT systems, processes, and controls to ensure compliance with prevailing regulatory laws and requirements Work with clients to test for compliance with various prevailing regulatory laws, requirements, and standards including but not limited to Sarbanes-Oxley Act of 2002, NYDFS, GDPR, CCPA, PCI DSS, ISO 27001, HIPAA, CMMC, etc. Ensure engagement reporting observations and recommendations are based on a complete understanding of the process, circumstances, and risk Prepare formal written reports providing recommendations for management to strengthen and improve operations in addition to identifying cost or efficiency savings Identify areas for risk transformation and automation to assist clients with reducing the cost of compliance Act as a professional mentor and coach to junior team members, participating in the performance management cycle Participate in business development activities such as professional networking, proposal development, etc. YOUR EXPERIENCE. The successful candidate will have: A minimum of seven (7) years of experience with the following: Working knowledge of Cloud Security Framework, General Data Protection Requirement (GDPR), COBIT 5, PCI DSS, ISO 27001/2, HIPAA, California Consumer Protection Act (CCPA), NIST 800-171/800-53/NIST 800-37 required Background and understanding of the risks and controls in technologies such as web, cloud, client/server, open systems architecture, data warehousing, and imaging Proficient understanding of Cloud security, Identity and Access Management, ERP, Operating Systems, Databases, and Network Infrastructure components Knowledge of risks and controls in emerging technologies based on Blockchain, Internet of Things (IoT), and Artificial Intelligence is a plus Experience managing simple and complex information technology internal audits Experience managing team of various sizes across geographical boundaries Exceptional oral and written communication skills Demonstrated ability to manage client engagements and supervise staff Bachelor’s Degree required, Master’s Degree preferred CISA, CISSP, CCSK, CIPP, or CRISC required Show more Show less

Posted 3 weeks ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Job description: Job Description Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ͏ Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ͏ i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ͏ 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ͏ Deliver No Performance Parameter Measure 1Customer centricityTimely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers.2Support sales team to create wins% of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.¿We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome. Show more Show less

Posted 3 weeks ago

Apply

0 years

0 Lacs

Guindy, Tamil Nadu, India

Remote

Linkedin logo

Req ID: 126237 Remote Position: No Region: Asia Country: India State/Province: Chennai City: Guindy, Chennai General Overview Functional Area: Information Technology (ITM) Career Stream: IT Risk & Compliance (RAC) Role: Associate (AST) Job Title: Associate, Information Security Job Code: AST-ITM-SECR Job Level: Band 6 Direct/Indirect Indicator: Indirect Summary Position Summary: The Cybersecurity Fresher Hire will work alongside experienced cybersecurity professionals to gain practical experience in various aspects of information security. This role will provide hands-on training and mentorship, enabling the successful candidate to develop a strong foundation in cybersecurity principles and practices. The ideal candidate will be eager to learn, possess a strong work ethic, and demonstrate a genuine passion for cybersecurity. Detailed Description Responsibilities Assist in monitoring security systems and logs for potential security incidents. Participate in security assessments and vulnerability scans. Support the implementation and maintenance of security tools and technologies. Contribute to the development and maintenance of security documentation and procedures. Assist in incident response activities, including data collection and analysis. Stay up-to-date on the latest cybersecurity threats and trends. Collaborate with other IT teams to ensure security best practices are followed. Perform1 basic security configuration tasks as directed. Participate in security awareness training and initiatives. Assist in the creation of basic security reports. Knowledge/Skills/Competencies Required Skills And Qualifications Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field (or equivalent2 coursework/certifications). Basic understanding of networking concepts (TCP/IP, DNS, etc.). Familiarity with operating systems (Windows, Linux). Knowledge of cybersecurity principles and concepts (firewalls, intrusion detection, etc.). Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team.3 Strong work ethic and attention4 to detail. Eagerness to learn and adapt to new technologies. Basic scripting knowledge (e.g., Python, Bash) is a plus. Relevant certifications (e.g., CompTIA Security+, Network+) are a plus. Genuine interest in pursuing a career in cybersecurity. Preferred Skills (Optional) Experience with security tools (e.g., Wireshark, Nmap). Knowledge of security frameworks (e.g., NIST, ISO 27001). Understanding of cloud security concepts. Experience in a lab environment dealing with virtual machines. Training And Development On-the-job training and mentorship from experienced cybersecurity professionals. Opportunities to pursue relevant industry certifications. Access to internal and external training resources. Exposure to various cybersecurity domains. Benefits Competitive salary and benefits package. Opportunity to work in a dynamic and growing field. Career advancement opportunities. Supportive and collaborative work environment. To Apply: Please submit your resume, cover letter, and any relevant certifications or projects to [email address/application portal]. Note: This job description is intended to provide a general overview of the responsibilities and qualifications for this position. It is5 not intended to be an exhaustive list of all duties and responsibilities. The company reserves the right to modify this job description as needed. Physical Demands Duties of this position are performed in a normal office environment. Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required. Typical Experience Typical Education Bachelor's Degree or consideration of an equivalent combination of education and experience. Educational Requirements may vary by Geography Notes This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time. Celestica is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law). At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. Special arrangements can be made for candidates who need it throughout the hiring process. Please indicate your needs and we will work with you to meet them. Company Overview Celestica (NYSE, TSX: CLS) enables the world’s best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development – from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers. Celestica would like to thank all applicants, however, only qualified applicants will be contacted. Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services. Show more Show less

Posted 3 weeks ago

Apply

5.0 - 10.0 years

0 Lacs

Noida, Uttar Pradesh, India

Remote

Linkedin logo

Role: Cyber Risk Management Lead Experience: 5 to 10 Years Office location-Sector-125, Noida Required Qualification: Bachelor of Engineering - Bachelor of Technology (B.E./B.Tech.) Additional Information There are 2-3 rounds in the interview process. This is 5 days’ work from office role (No Hybrid/ Remote options available) Final round will be F2F (Mandatory) About role: We are seeking a Cyber Risk Management Lead to identify and remediate or mitigate risks . Candidate should have effective task management skills and the ability to communicate effectively. The individual must be able to rapidly respond to security incidents and should have at least 5 years of relevant experience in Cyber security Risk management. Candidates Should have deeper understanding with some hands-on experience on enterprise IT infra components such as O365 suite, advanced firewalls, IPS/IDS/HIPS, routers/switches, VPN, proxy, AV/EDR, DNS, DHCP, multi factor authentication, virtualization, Email systems/security, Web Proxy, WAF, DLP etc. along with cloud environments like AWS (Must) , Azure etc. Job Description Understanding applicable regulations, guidelines, and industry best practices to manage risk and ensure compliance Developing, maintaining, or auditing security documentation such as policies, standards, and procedures Monitoring security internal control effectiveness for EDR, Email Security, Server security, Cloud security etc Conducting internal security assessments to ensure continued compliance Explaining roles in managing risk to cross team functions and getting buy-in to improve the organizational risk posture Managing SOC 2 Type 2 assessment and provide adequate support for collecting relevant evidence for all relevant controls Should be able to review RFPs (request for proposal) and provide responses for Cyber security related items Manage Risk Governance Implement/govern AWS Cloud and Office 365 Security Manage and support internal and external audits Follow up till closure on audit findings if any Manage dashboards and reports to keep track of priority events for IT and IS Create MOM for Board Meetings Vendor Evaluation for cyber security controls Firewall rules review for On-premises and AWS firewall Security Awareness: Create materials PPT/e-mailers and provide training as needed Incident management and Business continuity CISO dashboard and success reports Meet with business team to understand their business requirements from cyber security perspective Has basic knowledge of audit requirements (SOC2, HIPPA, ISO27001, etc.) Understanding of respective industry best practices (e.g., NIST, ISO, OWASP, ITIL) At least one security certification is strongly preferred, such as Certified Information Security Management (CISM), Certified Risk Information Security Control (CRISC), or Certified Information Systems Security Professional (CISSP) Prior experience of management of technology infrastructure is preferred Skills: multi-factor authentication,dns,security awareness,security documentation,ips/ids/hips,business continuity,switches,task management,auditing,vpn,cyber security risk management,routers,virtualization,audit management,internal security assessments,o365 suite,cyber risk management,soc assesment,aws cloud security,cyber security,dlp,risk assessment,regulatory compliance (soc2, hipaa, iso27001),it infrastructure security,security document auditing,waf,email systems/security,office 365 security,web proxy,av/edr,vendor evaluation,cybersecurity risk management,nist, iso, owasp, itil best practices,aws,azure,risk governance,cloud environments,advanced firewalls,risk management,ciso dashboard management,compliance,security awareness training,email security,firewall rules review,cyber risk management lead,proxy,effective communication,dhcp,enterprise it infrastructure,cloud security,security assessments,o365,routers/switches,incident response,incident management Show more Show less

Posted 3 weeks ago

Apply

3.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Job Description: We are hiring a Cybersecurity Analyst with 2–3 years of experience in monitoring and safeguarding IT infrastructure. The right candidate will be detail-oriented and proactive in managing security systems, identifying vulnerabilities, and responding to threats. Key Responsibilities: Monitor networks and systems for security breaches. Investigate security alerts and respond to incidents. Conduct vulnerability assessments and penetration tests. Document security breaches and measures taken. Ensure compliance with data protection regulations. Requirements: Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or related discipline. Experience with firewalls, SIEM tools, and endpoint protection. Knowledge of security standards (e.g., ISO 27001, NIST). Preferred Skills: Relevant certifications such as CEH, CompTIA Security+, or CISSP. Familiarity with scripting for automation. 4. Cloud Solutions Architect Job Description: We are looking for a Cloud Solutions Architect with 2–3 years of experience in designing scalable, secure, and cost-effective cloud architectures. This role involves working closely with development and DevOps teams to deploy reliable cloud services. Key Responsibilities: Design cloud architecture based on business requirements. Manage cloud infrastructure on AWS, Azure, or GCP. Ensure system security, redundancy, and scalability. Provide support during migration of legacy systems to the cloud. Optimize costs and monitor performance. Requirements: Bachelor’s degree in Computer Science, IT, or related field. Experience with cloud services (e.g., EC2, S3, Lambda, GKE). Familiarity with IaC tools like Terraform or CloudFormation. Preferred Skills: Certification (AWS Solutions Architect, Azure Architect, etc.) Knowledge of CI/CD and containerization (Docker, Kubernetes). Show more Show less

Posted 3 weeks ago

Apply

2.0 years

0 Lacs

Bengaluru East, Karnataka, India

On-site

Linkedin logo

Certifications, Qualification And Experience Bachelor / PG degree with any of the certifications - ISO 27001, CBCP, CISA, CISM, CRISC, CISSP 2 years to 20 years of applied work experience in cyber security programs, audits, assessments, risk, remediation, or cyber security compliance management. Job Description Implements security controls, risk assessment framework (ISO 31000, NIST), and program that align to regulatory requirements, ensuring documented and sustainable compliance that aligns and advances client business objectives. Evaluates risks and develops security standards, procedures, and controls to manage risks. Improves client security positioning through process improvement, policy, automation, and the continuous evolution of capabilities. Implements processes, such as GRC (governance, risk and compliance), to automate and continuously monitor information security controls, exceptions, risks, testing. Develops reporting metrics, dashboards, and evidence artifacts. Defines and documents business process responsibilities and ownership of the controls in GRC tool (e.g. ServiceNow GRC, Archer, OneTrust, SAP GRC). Schedules regular assessments and testing of effectiveness and efficiency of controls and creates GRC reports. Updates security controls and provides support to all stakeholders on security controls covering internal assessments, regulations, protecting Personally Identifying Information (PII) data, and compliance such PCI DSS, SOX, SOC2, HIPAA, RBI Guideline, ISO standards Performs and investigates internal and external information security risk and exceptions assessments. Assess incidents, vulnerability management, scans, patching status, secure baselines, penetration test result, phishing, and social engineering tests and attacks. Documents and reports control failures and gaps to stakeholders. Provides remediation guidance and prepares management reports to track remediation activities. Assists other staff in the management and oversight of security program functions. Trains, guides, and acts as a resource on security assessment functions to other departments within Client sites. Remains current on best practices and technological advancements and acts as the Client’s technical resource for security assessment and regulatory compliance. Performs other related duties as assigned. Show more Show less

Posted 3 weeks ago

Apply

12.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Role Overview: We are seeking a seasoned Cybersecurity GRC Specialist to lead and support the organization’s governance, risk, and compliance (GRC) initiatives across our Offices, Cloud platform and services . The ideal candidate will have deep experience in implementing and maintaining ISO 27001, SOC 2, PCI DSS , and managing Vulnerability Assessment & Penetration Testing (VAPT) processes. Additional hands-on knowledge in network security is highly desirable. Key Responsibilities: Governance, Risk & Compliance (GRC): Design, implement, and manage security compliance programs across our on-premise private cloud infrastructure , aligned with ISO 27001 , SOC 2 , and PCI DSS . Conduct risk assessments , control gap analyses, and develop mitigation and risk treatment plans specific to private cloud environments. Lead internal compliance readiness efforts and manage external audits, ensuring timely closure of findings and non-conformities. Maintain and enhance GRC documentation , including control matrices, risk registers, and compliance reports. Support infrastructure hardening and compliance. Work closely with DevOps, IT, and infrastructure teams to embed GRC requirements into the platform lifecycle , ensure security-by-design , and collect audit-ready evidence . Create or update security policy documents as needed to align with evolving business and compliance requirements. Vulnerability Assessment & Penetration Testing (VAPT): Conduct and coordinate VAPT exercises from the organization's perspective, including hands-on testing of internal applications, systems, and infrastructure. Collaborate with internal teams and third-party vendors for broader or specialised assessments as needed. Analyse and document findings from vulnerability scans and penetration tests across application, system, and network layers. Provide actionable remediation guidance, prioritise risks based on business impact, and work closely with technical teams to drive resolution and secure configurations. Network & Infrastructure Security (Optional but Preferred): Assist in securing network and virtual infrastructure , including Firewalls, WAF, Proxy, VPN, and segmentation strategies. Collaborate with SOC teams for use case development, continuous monitoring, threat detection, and response initiatives. Required Skills & Qualifications: Bachelor’s or Master’s degree in Information Security, Computer Science, or a related field. 8–12 years of relevant experience in cybersecurity, with a minimum of 5 years focused on GRC. Proven track record managing and sustaining compliance with ISO 27001 , SOC 2 , and PCI DSS . Hands-on experience with VAPT , vulnerability management, and remediation tracking. Strong understanding of security control frameworks ( NIST CSF , CIS Controls , ISO ). Effective communicator with experience working across engineering, operations, and executive leadership teams. Preferred Certifications: One or more of the following: CISA , CISM , CRISC , CISSP , ISO 27001 Lead Implementer/Auditor Technical certifications such as CEH , OSCP , or equivalent are a plus Show more Show less

Posted 3 weeks ago

Apply

0 years

0 Lacs

Bengaluru East, Karnataka, India

On-site

Linkedin logo

Key Responsibilities Governance and Policy Development oDevelop and implement governance frameworks, policies, and procedures to ensure alignment with industry standards and organizational objectives. oRegularly review and update GRC policies based on regulatory changes, client requirements, and industry best practices. oCreate and maintain documentation for governance, risk, and compliance initiatives, ensuring accessibility and adherence across the organization. Client Due Diligence and Risk Assessment oManage and respond to client due diligence and security assessments, providing accurate, timely information about the organization's risk management, security posture, and compliance practices. oCoordinate with relevant teams to compile necessary documentation and evidence to address client inquiries regarding data protection, privacy practices, and information security controls. oConduct risk assessments based on client requirements, identifying and addressing potential gaps to ensure continued alignment with client security expectations. Vendor Risk Assessment and Management oConduct thorough vendor risk assessments to evaluate the security posture and compliance of third-party vendors. oCollaborate with the procurement and legal teams to review vendor agreements, ensuring they meet the organization’s GRC and security standards. oMonitor and maintain the vendor risk register, tracking vendor compliance, and conducting periodic reassessments for critical vendors. Risk Assessment and Mitigation oLead and conduct internal risk assessments, identifying and analysing potential risks to the organization’s assets and operations. oDevelop and implement risk treatment plans in collaboration with stakeholders, tracking and reporting on risk mitigation efforts. oMaintain the organizational risk register and work with cross-functional teams to ensure continuous monitoring and timely response to emerging risks. Compliance Management and Regulatory Oversight oEnsure compliance with relevant standards and regulations, such as ISO 27001 (ISMS), ISO 27701 (PIMS), ISO 27017, ISO 27018, ISO 42001 (AI oManagement Framework), CCPA, NIST, GDPR, PCI-DSS, CIS Benchmarks. oSupport internal and external compliance audits, control testing, and regulatory assessments, and coordinate with departments to gather required documentation. oStay updated on regulatory requirements and communicate changes in compliance obligations to relevant stakeholders. Control Implementation and Monitoring oDesign, implement, and assess controls to ensure they align with GRC policies and regulatory requirements. oConduct regular control testing and monitor control effectiveness, identifying and remediating any deficiencies. oCollaborate with teams to improve and strengthen internal controls across the organization. Incident Response and Analysis oSupport the incident response process by providing guidance during incidents and conducting post-incident reviews to ensure alignment with GRC frameworks. oRegularly review and update incident response plans and playbooks, incorporating lessons learned from security incidents to enhance future response efforts. Training, Awareness, and Stakeholder Engagement oDevelop and deliver training sessions on GRC-related topics, increasing organizational awareness of risk, compliance, and security responsibilities. oCollaborate with Legal, IT, HR, and other departments to ensure integrated and effective GRC practices. oCommunicate risk assessment results, policy updates, and compliance requirements to stakeholders and senior management. Documentation, Reporting, and Metrics oMaintain comprehensive documentation for all GRC activities, including client and vendor assessments, internal audits, risk assessments, and compliance reviews. oCreate and present reports, metrics, and dashboards to communicate GRC status, control effectiveness, and compliance progress to senior management. oDocument and track risk assessment outcomes, client inquiries, and remediation actions to ensure transparent and effective risk management practices. Show more Show less

Posted 3 weeks ago

Apply

12.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

J inbox your resume - Monali.h@hyreskills.com Job Overview We are seeking a highly skilled and experienced SOC Manager to lead and manage our Security Operations Center (SOC). The ideal candidate will have a minimum of 12 years of overall experience, with at least 3 years of hands-on experience in managing end-to-end SOC operations. This role requires managing a team of over 20 members and overseeing security operations for more than 15 clients. As a people manager, the SOC Manager will be responsible for driving performance, ensuring operational excellence, and fostering a collaborative team environment. Key Responsibilities 1. Leadership and Team Management: o Lead, mentor, and manage a team of SOC analysts and engineers. o Oversee the daily operations of the SOC, ensuring effective monitoring, detection, and response to security incidents. o Develop and implement training programs to enhance team skills and knowledge. o Conduct regular performance reviews and provide constructive feedback to team members. 2 . SOC Operations Management: o Manage end-to-end SOC operations, including threat monitoring, incident response, and vulnerability management. o Ensure the SOC operates 24/7, maintaining a high level of readiness and responsiveness. o Develop and enforce SOC policies, procedures, and standards to ensure compliance with industry best practices. o Continuously evaluate and improve SOC processes and technologies to enhance efficiency and effectiveness. 3. Client Management: o Oversee security operations for a portfolio of 15+ clients, ensuring their security needs are met. o Serve as the primary point of contact for clients, addressing their concerns and requirements. o Prepare and deliver regular reports to clients on security posture, incidents, and improvements. o Foster strong client relationships and ensure high levels of client satisfaction. 4. Incident Management: o Lead the incident response team in investigating and mitigating security incidents. o Coordinate with internal and external stakeholders to manage and resolve incidents. o Conduct post-incident analysis and develop action plans to prevent future occurrences. o Maintain incident documentation and ensure lessons learned are incorporated into SOC processes. 5. Strategic Planning and Execution: o Develop and execute the SOC strategy in alignment with organizational goals. o Identify and implement new security technologies and solutions to enhance SOC capabilities. o Stay updated with the latest security trends, threats, and technologies to ensure the SOC remains at the forefront of cybersecurity. o Manage the SOC budget, ensuring efficient allocation of resources. 6. Compliance and Risk Management: o Ensure SOC operations comply with relevant regulations, standards, and frameworks (e.g., ISO 27001, NIST, GDPR). o Conduct regular risk assessments and audits to identify and address potential security gaps. o Collaborate with other departments to ensure overall organizational security posture. Qualifications • Bachelor’s degree in Computer Science, Information Security, or a related field. Master’s degree preferred. • Minimum of 12+years of experience in cybersecurity, with at least 3 years in a SOC management role. • Proven experience in managing end-to-end SOC operations and handling security incidents. • Strong leadership and people management skills, with experience leading a team of 20+ members. • Extensive knowledge of security technologies, tools, and processes. • Excellent communication and client management skills. • Relevant certifications such as CISSP, CISM, or CISA are highly desirable. Key Competencies: • Strong analytical and problem-solving skills. • Ability to work under pressure and manage multiple priorities. • Proactive and results-oriented approach. • Excellent interpersonal and communication skills. • High level of integrity and professional ethics. Benefits Offered • Insurance – Group Medical Coverage, Group Personal Accident, • Rewards and Recognition Program, Employee Referral Program, Wellness Program, and CSR Initiatives • Maternity and Paternity Leaves • Company Sponsored Certification Program • Learning/Development Courses, Cross Skill, Mentorship, and Leadership Programs • Quarterly Performance Feedback Sessions • Savings, Investments, and Retirement Benefits • Company Onsite / Fun Events Show more Show less

Posted 3 weeks ago

Apply

0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

Governance and Policy Development oDevelop and implement governance frameworks, policies, and procedures to ensure alignment with industry standards and organizational objectives. oRegularly review and update GRC policies based on regulatory changes, client requirements, and industry best practices. oCreate and maintain documentation for governance, risk, and compliance initiatives, ensuring accessibility and adherence across the organization. Client Due Diligence and Risk Assessment oManage and respond to client due diligence and security assessments, providing accurate, timely information about the organization's risk management, security posture, and compliance practices. oCoordinate with relevant teams to compile necessary documentation and evidence to address client inquiries regarding data protection, privacy practices, and information security controls. oConduct risk assessments based on client requirements, identifying and addressing potential gaps to ensure continued alignment with client security expectations. Vendor Risk Assessment and Management oConduct thorough vendor risk assessments to evaluate the security posture and compliance of third-party vendors. oCollaborate with the procurement and legal teams to review vendor agreements, ensuring they meet the organization’s GRC and security standards. oMonitor and maintain the vendor risk register, tracking vendor compliance, and conducting periodic reassessments for critical vendors. Risk Assessment and Mitigation oLead and conduct internal risk assessments, identifying and analysing potential risks to the organization’s assets and operations. oDevelop and implement risk treatment plans in collaboration with stakeholders, tracking and reporting on risk mitigation efforts. oMaintain the organizational risk register and work with cross-functional teams to ensure continuous monitoring and timely response to emerging risks. Compliance Management and Regulatory Oversight oEnsure compliance with relevant standards and regulations, such as ISO 27001 (ISMS), ISO 27701 (PIMS), ISO 27017, ISO 27018, ISO 42001 (AI oManagement Framework), CCPA, NIST, GDPR, PCI-DSS, CIS Benchmarks. oSupport internal and external compliance audits, control testing, and regulatory assessments, and coordinate with departments to gather required documentation. oStay updated on regulatory requirements and communicate changes in compliance obligations to relevant stakeholders. Control Implementation and Monitoring oDesign, implement, and assess controls to ensure they align with GRC policies and regulatory requirements. oConduct regular control testing and monitor control effectiveness, identifying and remediating any deficiencies. oCollaborate with teams to improve and strengthen internal controls across the organization. Incident Response and Analysis oSupport the incident response process by providing guidance during incidents and conducting post-incident reviews to ensure alignment with GRC frameworks. oRegularly review and update incident response plans and playbooks, incorporating lessons learned from security incidents to enhance future response efforts. Training, Awareness, and Stakeholder Engagement oDevelop and deliver training sessions on GRC-related topics, increasing organizational awareness of risk, compliance, and security responsibilities. oCollaborate with Legal, IT, HR, and other departments to ensure integrated and effective GRC practices. oCommunicate risk assessment results, policy updates, and compliance requirements to stakeholders and senior management. Documentation, Reporting, and Metrics oMaintain comprehensive documentation for all GRC activities, including client and vendor assessments, internal audits, risk assessments, and compliance reviews. oCreate and present reports, metrics, and dashboards to communicate GRC status, control effectiveness, and compliance progress to senior management. oDocument and track risk assessment outcomes, client inquiries, and remediation actions to ensure transparent and effective risk management practices. Show more Show less

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

Why Noventiq? Do you want to contribute directly to successful business outcomes by driving digital transformation for its customers’ businesses, connecting 75k organizations forward in a secure way? Are you motivated to evolve the global best practices within all sectors with hundreds of best-in-class IT vendors, alongside its services and solutions? Noventiq Is a Leading Global Solutions And Services Provider Founded in 1993 Headquartered in London, UK Revenue of $ 2.1 billion Headcount of 6400 employees Partnering with Microsoft, IBM, Oracle, Google, AWS and up to 500 other vendors Operating in roughly 60 countries 16 strategic acquisitions What's in it for you? Here you will collaborate with multi-national teams, ameliorate to a bazillion of innovative projects that deliver the most creative and cutting-edge solutions, and have an opportunity to continuously learn and grow, capable of taking on more significant responsibilities and leadership roles. This can be invaluable in understanding and serving clients from different regions, making the company truly expand its presence in new markets, bringing a profound positive repercussion to the business. Now we are looking for an Identity and Access Management (IAM) Lead , you will be a part of our Global Delivery team. Job Overview: We’re looking for an experienced IAM Lead to architect and manage a comprehensive Identity and Access Management program across the enterprise. You’ll collaborate with cross-functional teams to enforce least privilege, drive zero-trust principles, and ensure compliance with international standards and regulations . Your Impact On The Mission Design and implement an enterprise-wide IAM strategy, policies, and governance framework. Administer user identities, access rights, and privileged accounts across systems, applications, and cloud environments. Define and monitor access review cycles, segregation of duties (SoD), and role-based access controls (RBAC). Conduct IAM-related risk assessments and lead internal/external audits of identity and access systems. Monitor and ensure compliance with GDPR, NIS2, DORA, and customer-specific IAM requirements. Investigate identity-related incidents, misuses, and access anomalies; recommend and drive corrective actions. Work closely with HR, IT, and business stakeholders to maintain accurate identity lifecycle processes (Joiner/Mover/Leaver). What You’ll Bring To The Table – About You 5+ years of experience in IAM, with 2+ years in a leadership or architect-level role. Strong understanding of IAM principles: authentication, authorization, identity lifecycle, directory services. Hands-on experience with IAM technologies such as Azure AD, Okta, SailPoint, CyberArk, or similar. Familiarity with Zero Trust architecture and multi-factor authentication (MFA) design. Preferred Qualifications Certifications like CISSP, GIAC-GIAM, IDPro or Azure Security Engineer Associate. Experience implementing or auditing against standards such as ISO/IEC 27001, NIST, DORA, or CIS Controls. Exposure to IAM integrations with cloud platforms (Azure, AWS), SaaS systems, and hybrid environments. How To Apply If you would like to apply, please click on the button or send an email with your CV attached to the TA Team. If you would like an informal chat before applying, please feel free to contact TA directly on LinkedIn or the same email address. Show more Show less

Posted 3 weeks ago

Apply

7.5 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Threat Hunting Good to have skills : NA Minimum 7.5 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and overseeing the transition to cloud security-managed operations. You will engage in strategic discussions to align security measures with organizational objectives, ensuring a robust security posture in the cloud environment. Roles & Responsibilities: - Expected to be an SME. - Collaborate and manage the team to perform. - Responsible for team decisions. - Engage with multiple teams and contribute on key decisions. - Provide solutions to problems for their immediate team and across multiple teams. - Facilitate training sessions to enhance team knowledge and skills in security practices. - Evaluate emerging security technologies and recommend improvements to existing security frameworks. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Threat Hunting. - Good To Have Skills: Experience with cloud security tools and frameworks. - Strong understanding of risk assessment methodologies and threat modeling. - Familiarity with compliance standards such as ISO 27001, NIST, and GDPR. - Experience in incident response and security operations. Additional Information: - The candidate should have minimum 7.5 years of experience in Security Threat Hunting. - This position is based at our Gurugram office. - A 15 years full time education is required. 15 years full time education Show more Show less

Posted 3 weeks ago

Apply

6.0 years

0 Lacs

Bengaluru, Karnataka

On-site

Indeed logo

About Us Power Bridge is a customer centric AV & IT Infrastructure Solution & Services Provider, pivoting to bridge the Gap between innovative IT products, solutions and Customer needs. With Offices in Bangalore (HQ) and Hyderabad, we boast the capabilities and operational excellence to execute projects for our customers across India. Our Passionate teams across business functions work in tandem with our Industry leading Technology partners to deliver hassle-free technology upgrades projects with time bound SLA’s. Job Description Key Responsibilities: Lead the deployment, configuration, and administration of Endpoint Management solutions such as Microsoft Endpoint Manager (Intune, SCCM), Manage Engine Endpoint Central, for a large and diverse device fleet (Windows, macOS, iOS). Implement and enforce comprehensive security policies using tools like Trend Micro Vision One, BitLocker, and advanced threat protection solutions to safeguard endpoints and data. Develop and implement Zero Trust security models to ensure robust device and identity security alignment. Automate patch management, software deployment, OS deployment (including Windows 10/11 migrations), and compliance policies across distributed environments. Develop and enforce endpoint hardening policies in adherence to industry benchmarks like CIS and NIST security standards. Conduct vulnerability assessments and develop effective remediation strategies to minimize endpoint risks. Provide Tier 2/3 technical support for complex endpoint-related issues and security incidents, ensuring minimal disruption to business operations. Collaborate closely with cross-functional teams to continuously enhance endpoint security posture, mitigate vulnerabilities, and identify and implement IT security enhancements. Create and maintain technical documentation and provide training for IT teams on endpoint security best practices. Requirements Bachelor's degree in Information Technology, Computer Science, or a related field, or equivalent practical experience. 6+ years of experience in endpoint management, IT infrastructure, and security engineering roles. Proven expertise in administering and optimizing Microsoft Endpoint Manager (Manage Engine or Intune or SCCM), including application packaging and OS deployment. Demonstrated experience with Manage Engine Endpoint Central for device management. Strong understanding and practical experience with endpoint security solutions such as Trend Micro Vision One, BitLocker, and advanced threat protection. In-depth knowledge and implementation experience of Zero Trust security models. Proficiency in automating IT processes including patch management, software deployment, and OS deployment. Experience leading Windows 10/11 migration projects. Familiarity with CIS benchmarks and NIST security standards for endpoint hardening. Strong troubleshooting skills for hardware, software, and network-related issues. Experience providing executive-level IT support with a high degree of professionalism and discretion. Familiarity in managing and supporting the Apple Ecosystem (MacBooks, iPhones, iPads) in an enterprise environment. Excellent organizational skills, attention to detail, and ability to manage multiple priorities simultaneously. Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and senior stakeholders. A proactive and positive attitude with a willingness to take on added responsibilities to meet team goals. Benefits Health insurance coverage for Self, Spouse and Kids Long-term benefit savings plan with employer matching contributions Opportunities for professional development and advancement within the organization Date Opened 05/26/2025 Industry IT Services Job Type Full time Work Experience 7+ years City Bangalore South State/Province Karnataka Country India Zip/Postal Code 560102

Posted 3 weeks ago

Apply

2.0 - 5.0 years

0 Lacs

India

Remote

Linkedin logo

About the Company: VISO TRUST is the only SaaS third party cyber risk management platform that delivers the security intelligence needed for modern companies to make critical risk decisions at the speed of business. Assessing the risk of data breach third party relationships pose to their customers is a traditionally complex and labor intensive process that slows business, frustrates stakeholders and leaves security teams branded: the department of “no.” With VISO’s AI-based system, practitioners can instantly and continually assess any number of third parties while achieving on average a 90% boost in operational efficiency. At VISO, we are excited to be enabling customers to reduce risk and accelerate business at the same time. VISO TRUST is a venture-backed startup with a fully remote workforce based in North America. When hiring, we look for signs that a candidate will thrive in our culture, where we put people first and value ownership, curiosity, honesty and humility in the pursuit of excellence. We also value our differences, employing a team rich in diverse perspectives and experiences. We are dedicated to equal employment opportunities regardless of status or membership in a protected class or lack thereof. About the Job As a Third Party Risk Auditor at VISO TRUST, you will be responsible for analyzing security documents, conducting third-party risk assessments, and ensuring the accuracy of our AI-driven platform’s automated due diligence. You’ll collaborate with Product, Engineering, and Machine Learning teams to improve risk assessments and enhance platform efficiency. This role is ideal for someone with strong analytical skills and experience in cybersecurity frameworks, excited to work with AI to streamline third-party risk management. Key Responsibilities Analyzing security program related language and documents, recording text annotations for the training of machine learning models and ensuring quality assurance on the conclusions drawn by automated assessments Conducting domestic and global third party risk assessments including coordinating intake of new third parties and new engagements, third party security reviews, interacting with internal and external stakeholders, reporting on assessment outcomes and tracking remediation efforts Working closely with Product, Engineering, Customer Success and Machine Learning teams to contribute to automation logic and model training and ensure the success of reviews performed on the platform Apply VISO TRUST methodology to to evaluate control presence and determine risk Document assessment procedures for subsequent automation Review business and technical assessments, questionnaires and related documentation Schedule and conduct review calls with third parties: ensure and track questionnaires sent to third parties, track and report on abandoned third parties, receive and review questionnaires responses and finalize reports Coordinate other due diligence that needs to be done in addition to security questionnaire when needed Collaborate with VISO Audit, Product, Engineering and Machine Learning personnel to develop continued program process and platform improvements Report on assessment outcomes, risk levels, and remediation progress Key Skills, Qualifications & Experience Strong analytical/critical thinking skills Excellent written, verbal communication and organizational skills Ability to perform policy and standard gap analyses based on leading security frameworks Knowledge of common control and policy taxonomies and hierarchies and related language Knowledge of common third party assurance related documents, their structure and analysis, such as AICPA SOC reports, PCI DSS ROC, HiTrust, ISO 27001 Statements of Applicability, etc. Deep knowledge and experience with regard to the VISO TRUST technology platform and it’s unique approach to text extraction and automated risk determination Bachelor’s degree with a major in Information Security or equivalent combination of education and experience, ie. CISSP, CISA, CIPP, CRISC, CEH, and/or CISM 2-5 years of experience with third party cyber risk management Have performed IT risk assessments against OWASP, PCI, GLBA, NIST, ISO, SIG/AUP or other standards Strong knowledge base in information security, risk management, privacy, operations, enterprise networking, systems evaluation, and architecture Ability to discern business relevant risk associated with technology control deficiencies, and to identify the corresponding remediation which is required to mitigate the business impact Knowledge of security, risk and privacy regulatory frameworks such as NIST, SOX, PCI, HIPAA, ISO, Safe Harbor, CSA, etc. Self-starter who can function independently with limited direction but work closely with others when necessary. Knowledge of security, risk and privacy regulatory frameworks such as NIST, SOX, PCI, HIPAA, ISO, Safe Harbor, CSA, etc. Self-starter who can function independently with limited direction but work closely with others when necessary Show more Show less

Posted 3 weeks ago

Apply

15.0 - 20.0 years

0 Lacs

Greater Bengaluru Area

On-site

Linkedin logo

Infosec Third Party Risk Senior Manager Designation: Senior Manager Experience: 15 to 20 years (Relevant) Mandatory Skills: TPRM, Supply Chain Risk Assessments, Risk Assessment, ISO 27001, NIST CSF Good to Have: GRC, CISSP, ISO Qualifications Bachelor's degree in Computer Science, Engineering or related field or equivalent work experience CISA, CRISC, CISM, or CISSP certifications (one or more) preferred Demonstrated advanced verbal and written communication skills Excellent organization skills and be a self-motivated learner Hands-on experience building out Information Security third-party risk management program Shifting timings: 2pm to 11PM Mode: WFO Location- Bangalore (Brookefield/ JP Nagar) The Senior Manager, Information Security Third-party Risk Management position will be an integral member of the Information Security and Risk Management team. This role will be responsible for design, development, implementation and monitoring of risk management program. Work in Chief Information Security Officer (CISO) office under Associate Director, Information Security Governance, Risk and Compliance, this role serves as an information security technology professional for Grant Thornton to support the design, implementation, and maintenance of a cohesive information security governance, risk and compliance program. The successful candidate will have a good mix of deep technical knowledge, understanding of industry best practice, frameworks and regulations, and a demonstrated background in information security risk management program. An experienced and motivated risk and compliance individual contributor is needed to work across a matrixed team in place today and growing in the future. The successful candidate has a track record of developing strong relationships, collaborating across teams, coordinating multiple timelines, and managing complex, cross discipline projects. The ideal candidate: is a self-starter, with the ability to drive tasks to completion independently and learn new skills on the job as program requirements evolve. possesses strong business judgment, deep analytical thinking, is comfortable managing multiple responsibilities within a fast-paced environment, and has worked collaboratively with others to develop, implement, and communicate business improvement and innovative strategies. possesses strong verbal and written communication skills, a solution-oriented approach, and relationship-building skills are important attributes to succeed in this role. global view of their business and think in terms of immediate problem solving but also automating, expanding, and scaling solutions broadly. thinks strategically at a global level and effectively develop key processes, procedures and communications that facilitate cross-functional implementation of risk management processes and risk reporting. Responsibilities: Advance the information security third-party risk management framework and develop risk appetite Develop effective strategies for addressing high-risk suppliers. Oversee and perform security risk assessments, business impact analyses, and security control evaluations across third-party vendors in OneTrust. Prepare risk register in OneTrust to monitor and track risks. Provide supply chain security assessment remediation oversight and facilitate development of CUECs to document shared responsibility model. Perform supplier MSA security terms and conditions review and provide feedback to legal team. Ensure compliance with relevant firm security policies. Support iterative review of assessment results, working with appropriate stakeholders across the lines of defense Establish risk reporting and escalation processes Remain up to date with emerging threats, best practices and relevant legislation Work and communicate hand-in-hand with both external and internal stakeholders on critical issues that are directly impacting the business. Contribute to the development of scalable models and tools that speed up both decision making and accuracy for the organization. Meet with stakeholders to gather and integrate feedback and evangelize the program Perform and facilitate the collection, review, and assimilation of risk assessment data and reporting into concise and meaningful reports/dashboards for leadership. Take leading role in drafting and presenting deep-dive documents, including responses to senior executives. Experience Experience with information security risk management framework, assessment, audit and controls based on industry standard frameworks (i.e. NIST; ISO; COSO; HiTrust, FAIR) Experience with regulatory requirements (i.e. PCI; GDPR; HIPPA; Privacy; CCPA; etc.) Experience using GRC tools and technologies in support of the assessment/audit process (OneTrust, Security Scorecard, Bitsight, etc.) Experience gathering information from a range of different sources to help identify weaknesses in security controls Expert with security control design, development, implementation, and monitoring Demonstrated experience across multiple information security domains preferred Show more Show less

Posted 3 weeks ago

Apply

8.0 - 10.0 years

0 Lacs

Bangalore Rural, Karnataka, India

Remote

Linkedin logo

ob Title: Device Management & OS Security Specialist Experience: 8-10 Years Location: Bangalore Prefer: Immediate to 30 days joiners Job Description: We are seeking a highly skilled Device Management & OS Security Specialist with expertise in enterprise device management, OS security, and deployment strategies . The ideal candidate will be responsible for managing mobile, industrial, IoT, and AR/VR devices, overseeing OS updates, and implementing security measures to ensure compliance and optimal performance. Roles & Responsibilities: 1. Device Management & Deployment Manage a diverse range of devices, including mobile, industrial, IoT, and AR/VR devices . Handle device provisioning, configuration, and lifecycle management for enterprise environments. Monitor and maintain global and local device support infrastructure. 2. Device Selection & Logistics Oversee device selection, procurement, and vendor management . Manage logistics for device distribution and support across multiple locations . Coordinate with stakeholders to ensure the right devices meet business needs . 3. Apple Business Manager (ABM) Administration Administer Apple Business Manager (ABM) for seamless iOS and macOS device enrollment and management . Ensure compliance with enterprise security policies and Apple’s deployment best practices . Manage Apple Volume Purchase Program (VPP) and Mobile Device Management (MDM) integrations . 4. OS Management & Updates Oversee N-1 OS management , ensuring timely patching, updates, and compliance . Implement OS security best practices for Windows, macOS, iOS, and Android platforms . Collaborate with IT teams to test and validate OS updates before deployment . 5. Security Management & Compliance Implement device quarantine strategies to isolate non-compliant or vulnerable devices. Develop and enforce security policies to prevent data breaches and unauthorized access . Ensure encryption, remote wipe, and endpoint security are properly configured. 6. Bill Shock Prevention & Cost Optimization Implement measures to prevent bill shocks from excessive roaming and data usage. Optimize cost management for enterprise mobility services . Monitor device usage and apply automated controls to prevent overages . Required Skills: 8-10 years of experience in enterprise device management, OS security, and deployment strategies . Strong expertise in Mobile Device Management (MDM) solutions like Intune, JAMF, AirWatch, or MobileIron . Hands-on experience with Apple Business Manager (ABM) and Volume Purchase Program (VPP) . Expertise in OS lifecycle management , including patching and security hardening . Experience in IoT, AR/VR, and industrial device management . Knowledge of security frameworks (ISO 27001, NIST, Zero Trust Security, etc.) . Strong understanding of bill shock prevention, telecom expense management, and mobile cost control . Preferred Skills: Experience with Windows Autopilot, Apple DEP, and Android Enterprise . Knowledge of network security, endpoint detection & response (EDR), and threat mitigation . Familiarity with enterprise procurement and asset lifecycle management . Show more Show less

Posted 3 weeks ago

Apply

10.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Infosec Client Questionnaire & Audit Manager Designation: Manager Experience: 10+ years (Relevant) Mandatory Skills: Client questionnaires, Security, ISO 27001:2022, Audit Coordination, NIST CSF, Audit programs, Security Analyst or Client Analyst Qualification: Bachelor’s degree in Information Security, Cybersecurity, Communications, Education, Computer Science, Engineering or related field or equivalent work experience CISA, CRISC, CISM, or CISSP certifications (one or more) preferred Targeted Companies: Big 4 Shifting timings: 2pm to 11PM Mode: WFO Location- Bangalore (Brookefield/ JP Nagar) Role Description: The Client Questionnaires & Audit Manager, Information Security position will be an integral member of the Information Security and Risk Management team. This role will be responsible for organizing and managing internal and external audits. Work in Chief Information Security Officer (CISO) office under Director, Information Security Governance, Risk and Compliance. Successful candidate will have a good mix of security knowledge, understanding of industry best practice, and a demonstrated background in information security risk management. The candidate will be responsible for managing and responding to client security questionnaires, audits, and assessments related to the organization’s information security posture. This role involves working closely with internal teams, clients, and external auditors to ensure the company’s security practices align with industry standards and client requirements. The manager will also coordinate audit activities toensure compliance with security frameworks and regulations. The ideal candidate: is a self-starter, with the ability to drive tasks to completion independently and learn new skills on the job as program requirements evolve. possesses strong business judgment, deep analytical thinking, is comfortable managing multiple responsibilities within a fast-paced environment, and has worked collaboratively with others to develop, implement, and communicate business improvement and innovative strategies. possesses strong verbal and written communication skills, a solution-oriented approach, and relationship-building skills are important attributes to succeed in this role. Successful candidate will develop strong relationships, collaborate across teams, coordinate multiple timelines, and manage complex, cross discipline projects. global view of their business and think in terms of immediate problem solving but also automating, expanding, and scaling solutions broadly. Responsibilities: Client Security Questionnaires: Establish a repository of standardized security questionnaire responses and ensure they are updated with the implemented security controls, certifications, and policies. Manage responses to client security questionnaires in a timely and accurate manner. Collaborate with internal teams (e.g., IT, legal, Information Security) to gather necessary documentation and information for client inquiries. Serve as the main point of contact for clients regarding security-related inquiries and responses. Client MSA Security Terms and Conditions Review: Create security terms and conditions for inclusion in contracts. Review security terms and conditions and provide feedback to legal team. Audit Coordination: Lead and coordinate client and internal audits to assess the organization's compliance with security policies, procedures, and regulatory requirements (e.g., ISO 27001, HIPAA). Serve as the liaison between the organization and external auditors or clients performing audits. Prepare and provide evidence for security audits, ensuring all documentation is complete and accurate. Collaborate with internal teams to design and implement mitigation strategies for identified risks. Collaborate with control owners to create corrective action plans to ensure appropriate remediation efforts are implemented and completed in a timely manner. Cyber Insurance Response: Respond to cyber insurance questionnaires based on implemented security controls, certifications, and policies. Process Improvement: Identify opportunities to improve the efficiency and effectiveness of client questionnaire responses and audit processes. Develop and implement templates, and workflows to streamline the completion of client questionnaires. Continuously improve the organization's internal audit and compliance processes to meet client expectations. Stakeholder Engagement: Engage with clients and third-party auditors in discussions around the organization's security posture. Communicate effectively with internal stakeholders, including IT, legal, compliance, and senior leadership, to ensure timely responses to audits and questionnaires. Provide recommendations to management regarding areas of improvement in security practices and compliance. Experience: 10+ years of experience in information security, with a focus on audit management. Experience with responding to security questionnaires and managing client audits. Experience in managing third-party audits and internal audit processes. Familiarity with compliance frameworks such as NIST, ISO 27001, HIPAA, and others. Demonstrated advanced verbal and written communication skills Excellent project management and organizational skills, with the ability to handle multiple audits and client requests simultaneously. Excellent organization skills and be a self-motivated learner Show more Show less

Posted 3 weeks ago

Apply

7.5 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Splunk Security Information and Event Management (SIEM) Good to have skills : NA Minimum 7.5 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and handling end to end SOC operations, all while ensuring compliance with industry standards and best practices. Roles & Responsibilities: - Expected to be an SME on SOC Operations, security monitoring and incident management activities. - Collaborate and manage the team to perform on operations, security stakeholders (Onshore & Client) engagement. - Responsible for team decisions on security incidents and Operational processes and enhancements. - Engage with multiple teams and contribute on key decisions. - Provide solutions to problems for their immediate team and across multiple teams. - Conduct regular assessments of cloud security measures and recommend improvements. - Facilitate training sessions for team members on cloud security best practices. Professional & Technical Skills: - Must To Have Skills: Proficiency in Splunk Security Information and Event Management (SIEM). - Strong understanding of cloud security principles and frameworks. - Experience with incident response and threat detection methodologies. - Familiarity with compliance standards such as ISO 27001, NIST, and GDPR. - Ability to analyze security incidents and provide actionable insights. Additional Information: - The candidate should have minimum 7.5 years of experience in Splunk Security Information and Event Management (SIEM). - This position is based at our Gurugram office. - A 15 years full time education is required. 15 years full time education Show more Show less

Posted 3 weeks ago

Apply

7.5 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Threat Hunting Good to have skills : NA Minimum 7.5 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and transitioning to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. Roles & Responsibilities: - Expected to be an SME. - Collaborate and manage the team to perform. - Responsible for team decisions. - Engage with multiple teams and contribute on key decisions. - Provide solutions to problems for their immediate team and across multiple teams. - Develop and maintain security policies and procedures to ensure compliance with regulatory requirements. - Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Threat Hunting. - Strong understanding of cloud security principles and best practices. - Experience with security incident response and threat intelligence. - Familiarity with security frameworks such as NIST, ISO 27001, and CIS. - Ability to analyze and interpret security logs and alerts. Additional Information: - The candidate should have minimum 7.5 years of experience in Security Threat Hunting. - This position is based at our Gurugram office. - A 15 years full time education is required. 15 years full time education Show more Show less

Posted 3 weeks ago

Apply

3.0 - 6.0 years

7 - 10 Lacs

Pune

Work from Office

Naukri logo

We are looking for a Network Administrator with Cybersecurity expertise to manage, monitor, and secure enterprise networks while ensuring protection against cyber threats. Strong networking skills, cybersecurity knowledge, supporting to US, UK, EU).

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies