Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
0 years
0 Lacs
India
On-site
Customer Focus: Understand customer needs and design solutions that solve for their needs-short and long term. Evaluate and recommend security strategies for networks, systems, operations, cloud, people, process and technologies. Through the application of industry standards and security best practices, develop and recommend plans to structure secure architectures. Use a strategic approach to managing customer interactions and data throughout the customer journey with a goal of higher business growth through better customer experiences. Build strong customer relationships to deliver customer-centric solutions End to End Solution Management/Delivery Be the primary lead in cybersecurity delivery engagements for a wide variety of clients in different industry verticals Collaborate with cross-functional teams to ensure the reliability, availability, and efficiency of OT systems. Implement and maintain cybersecurity measures to protect OT assets. Develop and implement best practices for OT system configuration, monitoring, and optimization. Analyze security measures such as access controls, firewalls, and intrusion detection systems to protect OT assets. Apply principles to ensure compliance with relevant regulations (NERC CIP, TSA), and standards (NIST, IEC 62443). Develop, create and write and deliver documentation and technical artifacts (OT architecture, configurations, and procedures) in a professional matter that will be given to Clients and others in a professional manner , Thorough knowledge of the lifecycle, maintenance, and security of ICS, SCADA systems, and other OT infrastructure. Measurable Experience in: Experience with OT systems such as SCADA, PLCs, DCS, and HMI. Proficiency in network protocols and communication technologies used in OT environments (e.g., Modbus, Profibus, OPC). Strong understanding of cybersecurity principles and best practices. Excellent problem-solving and communication skills. Consulting for security consulting firms with example deliverables Overall cyber security technical experience Datacenter administration, including design, implementation, and support Networking expertise, including hands-on roles in supporting routers, switches, and firewalls. Ability to perform concurrent tasks in complex environments under adjusting priorities. Ability to communicate and modify approach, language, and style to different audiences. Professional writing style and experience with demonstrable technical and business-related artifacts is required. Ability to manage conflicting interests and deal with ambiguity. Effective communication skills: capable of supporting presentations to convey concepts and solutions, writing effective emails, and discussing strategy with senior executives. Strong teamwork qualities: able to gain the trust of customers and collaborate effectively within the WWT team. Intellectually curious with a desire to understand constantly evolving technology solutions. Proactive, collaborative, with emotional intelligence, and the capacity to learn and synthesize new information. Adaptable, with the ability to conform to shifting priorities, demands, and timelines through analytical and problem-solving capabilities. Self-directed, with the ability to adapt to change and competing demands.
Posted 1 month ago
15.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
We’re on an exciting journey with our client and we want you to join us. With our client, you will be exposed to the latest technologies and work with some of the brightest minds in the industry. Our client is Big Investment banking org so you will be playing a key role as a Vice President – SOC who can assist with the below: Job Title : Vice President - SOC Experience: 15+ years’ experience in Information Security with at least 5+ years in a SOC Qualification: B.E / B.Tech / MCA / M.Tech Location: Mumbai Role & Responsibilities: We are seeking an experienced and proactive SOC Manager to lead our 24x7 Global SOC team. The ideal candidate will be responsible for managing security analysts, overseeing daily operations, coordinating incident response efforts, and continuously enhancing threat detection, analysis and response capabilities. The SOC Manager will ensure operational excellence, threat coverage, and alignment with enterprise security policies, compliance mandates, and business objectives. The SOC Manager will be expected to: Lead and manage a team of SOC analysts across various shifts, ensuring 24x7 operational coverage. Oversee the monitoring, detection, analysis, and response to cyber threats, incidents and vulnerabilities. Establish, document, and refine SOC processes, playbooks, and workflows for consistent and effective response. Manage Global and Regional stakeholder, Business Units, SOC services Expansion at group level and Manage Compliance to Global and regional regulators DORA, MAS Coordinate with internal IT, legal, compliance risk, and external stakeholders during security incidents and investigations. Drive use case development, detection tuning, and threat hunting initiatives using SIEM, SOAR, and threat Intelligence platforms. Implementation of SOC control objectives and drive continuous improvement to SOC Metrics Ensure SOC performance through KPIs, SLAs, and continuous service improvement initiatives. Perform regular threat modeling, incident simulations (tabletop exercises), and post-incident reviews. Evaluate and recommend new tools, services, capabilities to improve SOC effectiveness. Ensure compliance with relevant security standards (e.g., ISO 27001, NIST, GDPR, etc.). Mentor and develop SOC team members through coaching, training, and career development plans. Support internal and external audit by providing necessary evidences and documentation. Additional Responsibilities Create, develop, and manage tools and scripts/process to assist in the monitoring of cyber risk, intelligence sources, and automation of processes. Develop metrics and reporting programs for senior leadership. Project management of Intelligence Lifecycle, including documentation. Occasional off-hours and weekend work required. All team members will need to perform project management activities (Change the Bank (CTB)), as well as operational activities and support (Run the Bank (RTB)). Requirement (indicate mandatory and/or preferred): Drive SOC Strategy as per the Global Leadership strategy: Strong knowledge of Security log data pipeline solution Understanding of Log sources onboarding covering MITRE ATT&K Framework Ensure parser development for unsupported logs sources Security Data Lake implementation Proven experience on UEBA for Insider Threat detection Usecase management for SOC Monitoring
Posted 1 month ago
15.0 - 20.0 years
12 - 16 Lacs
Mumbai
Work from Office
Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Network Security Implementation Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will be at the forefront of implementing and delivering Security Services projects. Your typical day will involve coordinating with various teams to ensure that projects are executed efficiently, utilizing our global delivery capabilities, including methods, tools, training, and assets. You will engage with stakeholders to align project goals and deliverables, ensuring that security measures are effectively integrated into the overall project framework. Your leadership will guide the team in navigating challenges and achieving project milestones, fostering a collaborative environment that emphasizes security best practices and continuous improvement. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team skills and knowledge in security practices.- Monitor project progress and implement corrective actions as necessary to meet deadlines. Professional & Technical Skills: - Must To Have Skills: Proficiency in Network Security Implementation.- Strong understanding of firewall configurations and management.- Experience with intrusion detection and prevention systems.- Knowledge of security protocols and standards such as ISO 27001 and NIST.- Familiarity with risk assessment methodologies and vulnerability management. Additional Information:- The candidate should have minimum 7.5 years of experience in Network Security Implementation.- This position is based at our Mumbai office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
8.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Hiring Alert!!! We are looking for highly skilled Manager – Cybersecurity Operations for our IT Infrastructure team based out at Chennai Location!!! Only Immediate Joiners preferred!! Job Description Position: Manager – Cybersecurity Operations Exp: 8-10 Years Job location: Chennai Role Overview: The Manager will lead and manage 24x7 cybersecurity and SOC operations, ensuring round-the-clock protection of the organization's critical infrastructure. This role demands deep expertise in network security, threat detection, and incident response , while also managing a team working in rotational shifts. Key Responsibilities: Oversee end-to-end SOC operations , including real-time monitoring, incident triage, and escalation. Lead network security strategy and governance including firewalls, intrusion detection/prevention systems (IDS/IPS) , and VPN infrastructure. Manage and mentor a 24x7 cyber defense team, ensuring effective shift coverage and performance. Drive threat intelligence integration and lead response to advanced persistent threats. Conduct regular audits, vulnerability assessments, and penetration tests. Ensure compliance with relevant cybersecurity regulations and frameworks (e.g., ISO 27001, NIST, HIPAA). Collaborate with IT, Risk, and Compliance teams for coordinated risk mitigation. Requirements: 8+ years in cybersecurity, with 3+ years in a leadership role. Experience running or managing a 24x7 SOC . Strong expertise in SIEM tools , threat detection, and mitigation strategies. Relevant certifications: CISSP, CISM, CEH , or equivalent. Excellent leadership and communication skills. Note: Candidates who can join on immediate basis or max 15 days' notice period can only apply. Interested candidates can share their updated CV with below details at Abhishekkumar.saini@corrohealth.com Total Exp: Current CTC: Expected CTC: Notice Period: Reason for change: Current Location: At CorroHealth, we want to assure all job seekers that we do not require any payment or monetary arrangement as a condition for employment. CorroHealth does not authorize any third party, agency, company, or individual to request money or financial contributions in exchange for a job opportunity. If you receive any request for payment or suspect fraudulent activity related to job applications at Corrohealth, please do not respond. Instead, contact us immed iately at Compliance@corro health.com or report the incident to our Compliance Ho tline via www.lighthouse-services.com/C orroHealth.”
Posted 1 month ago
15.0 - 20.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Experienced professional with 35 years of expertise in Public Key Infrastructure (PKI) and Hardware Security Module (HSM) technologies at both architectural and engineering levels. Proven ability to manage full PKI lifecycle, key management platforms, and integrate secure identity practices into enterprise and cloud environments.Roles and Responsibilities:Manage end-to-end PKI lifecycle management, including CA hierarchy design, policy enforcement, and certificate automation.Oversee key lifecycle operations using platforms like Thales CipherTrust, including secure key generation, rotation, and storage.Integrate PKI and HSM with enterprise applications for use cases such as TLS/SSL, code signing, and S/MIME.Collaborate with DevOps and security teams to embed identity protection into CI/CD pipelines and cloud-native environments. Technical Experience & Professional Attributes:Strong hands-on experience with:DigiCert CertCentral (API integration, automation)Thales Luna HSM, Entrust nCipher HSMCipherTrust Manager for key lifecycle and policy managementExpertise in symmetric and asymmetric key management best practices.Proficient in automating certificate and key operations using PowerShell.Well-versed in implementing and enforcing modern authentication protocols (OAuth2, OIDC, SAML, MFA).Ensure compliance with industry standards such as X.509, TLS/SSL, and NIST.Education Qualifications:15 years of education mandatory Additional Information:Experienced in certificate lifecycle automation and renewal strategies.Collaborative approach to cross-functional teamwork in security and DevOps domains. Preferred primary work location:Bangalore Qualification 15 years full time education
Posted 1 month ago
3.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NA Minimum 3 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitate the transition to cloud security-managed operations, ensuring that all security measures align with organizational objectives and compliance standards. You will also engage in discussions to refine security strategies and address any emerging challenges in the cloud environment, contributing to a secure and efficient operational landscape. Roles & Responsibilities: - Expected to perform independently and become an SME. - Required active participation/contribution in team discussions. - Contribute in providing solutions to work related problems. - Develop and maintain comprehensive documentation of cloud security architecture and controls. - Evaluate and recommend security technologies and practices to enhance the cloud security posture. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management. - Strong understanding of cloud security principles and best practices. - Experience with identity and access management solutions. - Familiarity with compliance frameworks such as ISO 27001, NIST, or GDPR. - Ability to analyze security incidents and implement corrective actions. Additional Information: - The candidate should have minimum 3 years of experience in CyberArk Privileged Access Management. - This position is based at our Pune office. - A 15 years full time education is required., 15 years full time education
Posted 1 month ago
3.0 years
0 Lacs
Pune, Maharashtra, India
Remote
Entity: Technology Job Family Group: IT&S Group Job Description: You will work with This team is responsible for response and management of cyber incidents, utilizing an intelligence-led approach for identification, mitigation, and rapid response to safeguard bp on a global scale. By applying lessons learned and data analytics, they establish engineering principles and enhance the technology stack to continuously bolster bp's cybersecurity posture. Let me tell you about the role We are looking for an Information Security Engineering Specialist with great knowledge in security fundamentals and is eager to apply them in complex environments. In this role, you will assist in implementing security controls, executing vulnerability assessments, and supporting automation initiatives. This position will have an emphasis in one or more of the following areas – cloud security; infrastructure security; and/or data security. You will have an opportunity to learn and grow under the mentorship of senior engineers, while also contributing to critical security tasks that keep our organization safe. What you will deliver Define security policies that can be used to improve our cloud, infrastructure or data security posture. Integrate our vulnerability assessment tooling into our environments, to provide continuous scans, uncovering vulnerabilities, misconfiguration or potential security gaps. Work with engineering teams to support the remediation and validation of vulnerability mitigations and fixes. Integrate security validations into continuous integration/continuous deliver (CI/CD) pipelines and develop scripts to automate security tasks. Maintain clear, detailed documentation of security procedures and policies, including how to embed and measure security on our cloud, infrastructure or data environments. What you will need to be successful (experience and qualifications) Seasoned security professional with 3+ years delivering security engineering services and/or building security solutions within a complex organization. Practical experience designing, planning, productizing, maintaining and documenting reliable and scalable data, infrastructure, cloud and/or platform solutions in complex environments. Firm foundation of information and cyber security principles and standard processes. Professional and technical security certifications such as CISSP, CISM, GEVA, CEH, OSCP or equivalent are a plus. Development experience in one or more object-oriented programming languages (e.g., Python, Scala, Java, C#) and/or cloud environments (including AWS, Azure, Alibaba, etc.) Exposure/experience with full stack development. Experience with security tooling (vulnerability scanners, CNAPP, Endpoint and/or DLP) and automation and scription for security tasks (e.g., CI/CD integration). Familiarity with basic security frameworks such as NIST CSF, NIST 800-53, ISO 27001, etc. Foundational knowledge of security standards, industry laws, and regulations such as Payment Card Industry Data Security Standards (PCI-DSS), General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA) and Sarbanes-Oxley (SOX) Continuous learning and improvement approach. About Bp bp is a global energy business with a purpose to reimagine energy for people and our planet. We aim to be a very different kind of energy company by 2030, helping the world reach net zero and improving people’s lives. We are committed to creating a diverse and inclusive environment where everyone can thrive. Join bp and become part of the team building our future! We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform crucial job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. Travel Requirement Up to 10% travel should be expected with this role Relocation Assistance: This role is eligible for relocation within country Remote Type: This position is a hybrid of office/remote working Skills: Legal Disclaimer: We are an equal opportunity employer and value diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, sex, gender, gender expression, sexual orientation, age, marital status, socioeconomic status, neurodiversity/neurocognitive functioning, veteran status or disability status. Individuals with an accessibility need may request an adjustment/accommodation related to bp’s recruiting process (e.g., accessing the job application, completing required assessments, participating in telephone screenings or interviews, etc.). If you would like to request an adjustment/accommodation related to the recruitment process, please contact us. If you are selected for a position and depending upon your role, your employment may be contingent upon adherence to local policy. This may include pre-placement drug screening, medical review of physical fitness for the role, and background checks.
Posted 1 month ago
12.0 years
5 - 7 Lacs
Hyderābād
On-site
USI Cyber Security BISO Manager Location: India Job Summary This Manager role operates in the Business Information Security Officer (BISO) function within the Cyber organization while directly supporting the Consulting Service line of business. The role involves close integration with various business leaders, technical and non-technical stakeholders to drive widespread cyber security program adoption. In this role, you will utilize a deep understanding of the business to facilitate specialized information security risk-based discussions. You will drive alignment with Deloitte policies, industry accepted standards, and security best practices. This fast-paced multi-faceted environment requires a highly motivated, self-driven, strong team player who demonstrates an intrinsic desire for continuous personal and professional growth. Key Responsibilities: Contribute to the ongoing development, implementation, and maintenance of information security initiatives. Manage vulnerability assessments, remediation tracking, and reporting for business-critical applications and platforms. Provide expert guidance on risk mitigation, security best practices, and emerging threats. Collaborate with IT and security teams to develop and implement remediation plans. Ensure compliance with relevant regulations, standards, and policies related to vulnerability management. Conduct hands-on security architecture reviews for new and existing systems, enforce adherence to cyber security standards, and manage exceptions as needed. Provide guidance on cloud security controls, guardrails, architecture, and risk management across all major cloud service providers (AWS, Azure, GCP, etc.). Identify solutions that balance business requirements and cyber security requirements. Qualifications Bachelor’s degree in Computer Science/Engineering, Management Information Systems, Cyber Security, or a related field (Master’s preferred). 12+ years of relevant professional experience to include at least 6 years of progressive experience in cyber security with at least 3 years in a leadership or advisory role. Superior communication (written and verbal), problem solving, collaboration, interpersonal, and stakeholder management skills. Experience reviewing security architecture and experience evaluating secure cloud-based solutions in AWS, Azure, and/or GCP. Knowledge of application security, SSDLC, and vulnerability management including experience evaluating the likelihood and impact of application vulnerabilities. Knowledge of cyber security practices and technologies such as identity and access management (IAM), multi-factor authentication, encryption, IDS/IPS, firewalls, end-point protection (AV, EDR), DLP, CASB, vulnerability management, and security information and event management (SIEM). Knowledge of information security regulatory requirements such as General Data Protection Regulation (GDPR), Sarbanes-Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standards. Knowledge of common information security management frameworks, such as ISO/IEC 27001, COBIT, and NIST, including 800-53 and the Cybersecurity Framework. Certifications: Relevant certifications such as CompTIA Security+, CISSP, CISM, CEH, GIAC, or similar are preferred. The team Information Technology Services (ITS) helps power Deloitte’s success. ITS is the engine that helps to drive Deloitte, which serves many of the world’s largest organizations. We develop and deploy cutting-edge internal and go-to-market solutions that help Deloitte operate effectively and lead in the market. Our reputation is built on a tradition of delivering with excellence. The ~2,200 professionals in ITS deliver services internally including: Cyber Security Technology support Technology & Infrastructure Application development and management Relationship management group Strategy Deployment PMO Financials Communications Areas of focus include: Cyber design Risk & Compliance Technology Risk Management Identity & Access Management Data Protection Incident Response and Architecture For more information on ITS, you can visit our dedicated recruitment page at https://usrecruiting.deloitte.com/-its-recruiting-for-experienced-hires. Cyber Security The Cyber Security team is responsible for vigilantly protecting Deloitte and client data. The team is responsible for a strategic cyber risk program that adapts to a rapidly changing threat landscape, changes in business strategies, risks, and vulnerabilities. Using situational awareness, threat intelligence, and building a security culture across the organization, the team helps to protect the Deloitte brand. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Professional development At Deloitte, professionals have the opportunity to work with some of the best and discover what works best for them. Here, we prioritize professional growth, offering diverse learning and networking opportunities to help accelerate careers and enhance leadership skills. Our state-of-the-art DU: The Leadership Center in India, located in Hyderabad, represents a tangible symbol of our commitment to the holistic growth and development of our people. Explore DU: The Leadership Center in India. Benefits to help you thrive At Deloitte, we know that great people make a great organization. Our comprehensive rewards program helps us deliver a distinctly Deloitte experience that helps that empowers our professionals to thrive mentally, physically, and financially—and live their purpose. To support our professionals and their loved ones, we offer a broad range of benefits. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Requisition code: 306538
Posted 1 month ago
0 years
0 Lacs
Hyderābād
On-site
Keyloop bridges the gap between dealers, manufacturers, technology suppliers and car buyers. We empower car dealers and manufacturers to fully embrace digital transformation. How? By creating innovative technology that makes selling cars better for our customers, and buying and owning cars better for theirs. We use cutting-edge technology to link our clients’ systems, departments and sites. We provide an open technology platform that’s shaping the industry for the future. We use data to help clients become more efficient, increase profitability and give more customers an amazing experience. Want to be part of it? As a Information Security Analyst at Keyloop, you will play a key role in supporting customer-facing security initiatives by responding to due diligence requests, security questionnaires, RFPs, and compliance assessments. Working cross-functionally with internal stakeholders, you will help ensure timely, accurate, and consistent delivery of security information aligned with customer and business expectations. This role is central to maintaining trust with our customers, enhancing our security response capabilities, and supporting broader information security governance, risk, and compliance (GRC) efforts. You will also contribute to fostering a strong, risk-aware culture and embedding secure practices across the organisation Role & Responsibilities: Respond to customer security questionnaires, RFPs, compliance assessments, and related documentation requests, ensuring alignment with both internal standards and customer expectations. Collaborate with subject matter experts across the business to collect relevant technical and security information, ensuring responses are accurate and risk-aware. Maintain a strong working knowledge of Keyloop’s products, environments, security roadmap, and system architecture to effectively support customer due diligence activities. Build, maintain and continuously improve Keyloop’s RFP and security questionnaire response repository to enable faster and more consistent responses. Proactively develop, curate, and maintain reusable customer-facing materials, such as knowledge base articles, whitepapers, product security summaries, and FAQs to streamline future engagements. Triage incoming internal and external inquiries and prioritise based on urgency, scope, and impact. Ensure consistent and high-quality responses to all security-related customer requests and inquiries. Support compliance and regulatory documentation requests related to information security. Build and maintain strong relationships with internal stakeholders (e.g., product, legal, engineering, sales) to ensure alignment and efficiency in responding to customer needs. Assist with additional security and compliance initiatives, projects, and documentation as required. Experience : Prior Information Security experience, preferably in a customer assurance, GRC, or client-facing security role. Solid understanding of core IT security principles, controls, and best practices across cloud and enterprise environments. Familiarity with supporting internal or external security assessments. Working knowledge of key security and compliance frameworks such as ISO 27001, SOC2, NIST CSF, and CIS Controls. Experience in a customer-facing role with a focus on clear communication, professionalism, and relationship-building. Ability to work effectively in fast-paced, agile environments - both independently and as part of a global team. Skills & Abilities: Strong written and verbal communication skills, with the ability to clearly and professionally respond to customer security questionnaires, RFPs, and compliance assessments for both technical and non-technical audiences. Passionate about information security, with a genuine interest in learning, promoting best practices, and contributing to a strong security culture. Ability to collaborate effectively with cross-functional teams, including security, legal, engineering, product, and sales, to gather and validate information in a timely and accurate manner. Exceptional attention to detail and a methodical approach to reviewing, compiling, and validating complex security and compliance documentation. Strong organisational skills with the ability to track and prioritise multiple concurrent customer requests while meeting defined SLAs. Proactive mindset with the ability to identify gaps in documentation or processes and contribute to continuous improvement efforts. Ability to manage stakeholder expectations and build trust through reliable delivery, professionalism, and customer-focused communication. Why join us? We’re on a journey to become market leaders in our space – and with that comes some incredible opportunities. Collaborate and learn from industry experts from all over the globe. Work with game-changing products and services. Get the training and support you need to try new things, adapt to quick changes and explore different paths. Join Keyloop and progress your career, your way. An inclusive environment to thrive We’re committed to fostering an inclusive work environment. One that respects all dimensions of diversity. We promote an inclusive culture within our business, and we celebrate different employees and lifestyles – not just on key days, but every day. Be rewarded for your efforts We believe people should be paid based on their performance so our pay and benefits reflect this and are designed to attract the very best talent. We encourage everyone in our organisation to explore opportunities which enable them to grow their career through investment in their development but equally by working in a culture which fosters support and unbridled collaboration. Keyloop doesn’t require academic qualifications for this position. We select based on experience and potential, not credentials. We are also an equal opportunity employer committed to building a diverse and inclusive workforce. We value diversity and encourage candidates of all backgrounds to apply .
Posted 1 month ago
7.0 - 10.0 years
7 - 9 Lacs
Gurgaon
On-site
Date: Jul 16, 2025 Job Requisition Id: 61780 Location: Gurgaon, IN YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation. At YASH, we’re a cluster of the brightest stars working with cutting-edge technologies. Our purpose is anchored in a single truth – bringing real positive changes in an increasingly virtual world and it drives us beyond generational gaps and disruptions of the future. We are looking forward to hire SOC Management Professionals in the following areas : Role Description Position Name: Cyber Security Incident Handler We are seeking an experienced and proactive Senior Cybersecurity Incident Handler to join our SOC/Cyber Defense team. The ideal candidate will have deep expertise in handling complex security incidents, applying advanced detection and response techniques, and guiding enterprise-wide incident response strategies. This role requires a strong understanding of modern threat landscapes, hands-on technical skills, and the ability to coordinate across departments during security events. Key Responsibilities: Lead and manage the end-to-end lifecycle of security incidents, including detection, triage, containment, eradication, recovery, and post-incident analysis, Utilize SIEM, SOAR, EDR, and threat intelligence platforms (e.g., Microsoft Sentinel, Splunk, CrowdStrike Falcon, Palo Alto Cortex XSOAR, MISP) to identify and respond to threats, Conduct forensic analysis of endpoints, networks, and logs using tools like FTK, Volatility, Wireshark, and ELK Stack, Develop, refine, and test incident response plans, playbooks, and tabletop exercises, Collaborate with threat hunters, SOC analysts, vulnerability management, and threat intelligence teams to enhance threat detection and mitigation, Generate detailed reports and provide executive summaries on security incidents. Mentor junior analysts and help develop cybersecurity capabilities across the organization. Required Skills & Qualifications: 7–10 years of hands-on experience in incident response, SOC operations, or related cybersecurity roles, Expertise in: SIEM/SOAR platforms Endpoint Detection and Response (EDR) tools Network forensics and malware analysis MITRE ATT&CK and cyber kill chain frameworks Strong knowledge of network protocols, Windows/Linux internals, and cloud security (AWS/Azure/GCP), Familiarity with compliance and standards: NIST 800-61, ISO 27035, CIS Controls, GDPR, and HIPAA. Certifications (Required/Preferred): Required (at least one): GIAC Certified Incident Handler (GCIH) Certified Incident Handler (ECIH) Certified Information Systems Security Professional (CISSP) Certified SOC Analyst (CSA) Preferred : GIAC Cyber Threat Intelligence (GCTI) GIAC Cloud Security Automation (GCSA) Microsoft Certified: Cybersecurity Architect Expert Google Cybersecurity Professional Certificate Nice to Have: Experience with AI/ML-based threat detection platforms Exposure to zero trust architectures and XDR implementations Understanding of OT/ICS incident response (for industrial environments) At YASH, you are empowered to create a career that will take you to where you want to go while working in an inclusive team environment. We leverage career-oriented skilling models and optimize our collective intelligence aided with technology for continuous learning, unlearning, and relearning at a rapid pace and scale. Our Hyperlearning workplace is grounded upon four principles Flexible work arrangements, Free spirit, and emotional positivity Agile self-determination, trust, transparency, and open collaboration All Support needed for the realization of business goals, Stable employment with a great atmosphere and ethical corporate culture
Posted 1 month ago
180.0 years
0 Lacs
Gurgaon
On-site
Offensive Security Professional Job Req ID: 49030 Posting Date: 15 Jul 2025 Function: Software Engineering Unit: Networks Location: Building No 14 Sector 24 & 25A, Gurugram, India Salary: Competitive Hiring Manager: Abhishar Balodhi Recruiter: Archana SM Location: Gurugram Carrer Level: E Why BT We’ve always been an organisation with a purpose; to use the power of communication to make a better world. You can trace this back to our beginning as pioneers of the world’s firs telecommunications company. At our heart we’re a technology company with research and innovation in our bones and a desire to be personal, simple, and brilliant for our customers - those are the values we live by whilst also creating an inclusive working environment where people from all backgrounds can succeed.Our pursuit of progress over the past 180 years has established BT as a strong, successful brand, with huge scale capable of achieving great things. From supporting emergency services, hospitals, banks and keeping economies around the world online, safe and secure, to delivering large scale technology infrastructure like the creation of BT Sport. Today in this fast-changing, always on, digital world our purpose remains true. Yet the market conditions, regulations and competition we face are tougher than ever before. So, if you have the drive, optimism and resilience to help propel us forward we’ll offer unrivalled personal development, a wealth of opportunities to learn, experience new things and pursue new careers. If that’s you and what you’re looking for, we’d love you to be part of our future. Why this job matters As an experienced Information Security Services provider we will help lead a highly motivated team laser-focused on analyzing, designing, developing and delivering solutions built to stop adversaries and strengthen your operations Our Competent individuals and Skilled leadership will provide you incident response, risk reviews and vulnerability assessments, identifying threats, all of which ladder up to driving secure solutions. What I’ll be doing – your accountabilities Accountable for delivering vulnerability assessments and penetration tests. Responsible for increasing individual technical skill whilst also delivering BAU. Accountable for increasing capability of the penetration testing team through web application, network & mobile skill acquisition. Accountable for support leadership in setting strategy for the team moving forward. Responsible for contributing to the positive research and technical capability of BT security. To support and maintain the BT Business Support – Protect BT ISO27001 certificate for Offensive Security team The skills you need Pentest Skills – Web application pentest (OWASP,NIST framework), Network pentest (Linux,windows),API & Mobile pentest. Networking Skills – TCP/IP packet level understanding,Routing,Switching,firewall understanding. Linux Skills – Linux directory structure & basic command line knowledge from pentest/vulnerability assessment standpoint. Vulnerability management- This requires understanding of vulnerability assessment framework(CVE/CVSS) and Security assessment tools (such as Nmap,Metasploit, Burp Suite, SQLmap, Nessus) Regulatory Understanding - PCI DSS guidelines, GDPR. Experience you would be expected to have Mandatory 2-4 Years experience in the field on pentesting. Mandatory Bachelor's Degree or higher preferred. CEH,OSCP,CREST,LPT certifications are highly preferred. Ability to understand packet level TCP/IP knowledge. Good scripting knowledge (e.g. Python) will be highly preferred. Capable of working successfully with end customers PREFERRED. Our leadership standards Looking in: Leading inclusively and Safely I inspire and build trust through self-awareness, honesty and integrity. Owning outcomes I take the right decisions that benefit the broader organisation. Looking out: Delivering for the customer I execute brilliantly on clear priorities that add value to our customers and the wider business. Commercially savvy I demonstrate strong commercial focus, bringing an external perspective to decision-making. Looking to the future: Growth mindset I experiment and identify opportunities for growth for both myself and the organisation. Building for the future I build diverse future-ready teams where all individuals can be at their best. About us BT is part of BT Group, along with EE, Openreach, and Plusnet. Millions of people rely on us every day to help them live their lives, power their businesses, and keep their public services running. We connect friends to family, clients to colleagues, people to possibilities. We keep the wheels of business spinning, and the emergency services responding. We value diversity and celebrate difference. ‘We embed diversity and inclusion into everything that we do. It’s fundamental to our purpose: we connect for good.’ We all stick to the same values: Personal, Simple, and Brilliant. From day one, you’ll get stuck in to tough challenges, pitch in with ideas, make things happen. But you won’t be alone: we’ll be there with help and support, learning and development. This is your chance to make a real difference to the world: to be part of the digital transformation of countless lives and businesses. Grab it. A FEW POINTS TO NOTE: Although these roles are listed as full-time, if you’re a job share partnership, work reduced hours, or any other way of working flexibly, please still get in touch. We will also offer reasonable adjustments for the selection process if required, so please do not hesitate to inform us. DON'T MEET EVERY SINGLE REQUIREMENT? Studies have shown that women and people who are disabled, LGBTQ+, neurodiverse or from ethnic minority backgrounds are less likely to apply for jobs unless they meet every single qualification and criteria. We're committed to building a diverse, inclusive, and authentic workplace where everyone can be their best, so if you're excited about this role but your past experience doesn't align perfectly with every requirement on the Job Description, please apply anyway - you may just be the right candidate for this or other roles in our wider team.
Posted 1 month ago
10.0 years
6 - 18 Lacs
India
On-site
*Job Summary* The Chief Information Security Officer (CISO) is responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO will work across departments to identify, evaluate, and mitigate cyber security risks, and ensure compliance with security policies and regulations.*Key Responsibilities* Develop and implement a comprehensive information security strategy. Lead security incident response planning and the investigation of security breaches, ensuring timely resolution and proper reporting. Oversee the management of security technologies, including firewalls, intrusion detection systems, endpoint protection, and encryption. Conduct regular security assessments and audits to identify and address vulnerabilities. Maintain compliance with applicable laws, regulations, and standards (e.g., GDPR, HIPAA, ISO 27001, NIST, SOC 2). Collaborate with IT and business units to embed security into the organization’s processes and systems. Deliver regular risk assessments and security reports to executive leadership and the board. Educate and train employees on information security best practices. Manage relationships with external security vendors and partners. Lead and develop a high-performing information security team. *Requirements* Bachelor’s or Master’s degree in Computer Science, Information Security, Cybersecurity, or related field. Minimum 10 years of experience in information security or IT risk management, including 5+ years in a leadership role. Professional certifications such as CISSP, CISM, CISA, or equivalent. Deep understanding of security architecture, governance, risk management, and compliance frameworks. Proven experience with security technologies and tools. Excellent communication and stakeholder management skills. Experience with crisis management and disaster recovery planning. *Preferred Qualifications* Experience in [industry-specific experience, e.g., finance, healthcare, SaaS]. Familiarity with cloud security (AWS, Azure, GCP). Experience working with regulatory agencies or audit committees. Job Types: Full-time, Permanent Pay: ₹50,000.00 - ₹150,000.00 per month Benefits: Food provided Paid sick time Paid time off Provident Fund Schedule: Day shift Monday to Friday Morning shift Night shift Supplemental Pay: Yearly bonus Work Location: In person
Posted 1 month ago
0.0 - 1.0 years
0 Lacs
Khurda
On-site
Job Title:- Penetration Tester We are looking for Penetration Tester to join our security team & who will be responsible for Web & Mobile VAPT. Job Description : Qualysec Technologies is seeking a skilled and highly motivated Penetration Tester to join our fabulous security team in Bhubaneswar. The Penetration Tester will be mainly responsible for performing security testing of Web & Mobile applications including identifying, evaluating, and exploiting vulnerabilities in various systems, networks, and applications. Qualification :- Bachelor's Degree in a related Cybersecurity/IT/Computer Science field. Experience :- 0 to 1 years Location :- Bhubaneswar Job Type :- Full Time Responsibilities Perform vulnerability assessments & penetration testing (VAPT) on Web, APIs and mobile applications Identify and exploit vulnerabilities in products under test prepare reports by documenting identified issues based on internal templates Collaborating with other team members to improve the overall security posture of our clients. Enhance technical skills & knowledge by Staying up-to-date with emerging threats and vulnerabilities Skills Required Knowledge in penetration testing, vulnerability assessment, and ethical hacking. Knowledge in Pentesting of various applications i.e Web, Mobile (Android & iOS), APIs, Cloud (AWS / Azur )etc. Strong knowledge of security assessment tools such as Metasploit, BurpSuite, ZAP, OWASP tools, Kali Linux tools and Fuzzing tools Hands-on experience with manual and automated penetration testing methodologies. Experience in working with Standards such as NIST, OWASP, MITRE CWE etc. Strong understanding of network protocols, operating systems, and web application technologies. Excellent written and verbal communication skills, with the ability to clearly document and communicate findings and recommendations. About Us Qualysec is a leading cybersecurity firm specializing in comprehensive penetration testing and risk assessment services. Our tailored solutions help businesses proactively defend against evolving cyber threats. With over four years of experience, we take pride in having served more than 150 clients across 21 countries—a testament to our commitment to quality and resilience. Our dynamic work environment and employee-focused culture drive our continuous growth and success. Job Type: Full-time Schedule: Day shift Job Types: Full-time, Permanent Work Location: In person
Posted 1 month ago
3.0 - 5.0 years
1 - 4 Lacs
India
On-site
Job Title: Security Expert / Cybersecurity Specialist Location: Ahmedabad Department: IT Infra / InfoSec Type: Full-time Job Summary: We’re hiring a Security Expert to safeguard our IT infrastructure from threats and vulnerabilities. You’ll manage firewalls, perform risk assessments, handle incidents, and ensure compliance with security standards. Key Responsibilities: Implement and monitor security systems, policies, and protocols Manage Fortinet Firewalls, VPNs, Wi-Fi, and Cisco switches Conduct penetration testing, vulnerability assessments, and patch management Monitor threats via SIEM tools and respond to incidents Ensure compliance (SEBI, ISO 27001, NIST, GDPR, etc.) Lead forensic investigations and train employees on best practices Requirements: Bachelor’s/Master’s in Cybersecurity/IT 3–5 years of cybersecurity experience Certifications preferred: CISSP, CEH, NSE, CCNA/CCNP Hands-on with firewalls, SIEM, IDS/IPS, cloud security (O365/AWS/Azure) Strong analytical & communication skills Apply now TA@Kunvarji.com Job Types: Full-time, Permanent Pay: ₹10,000.00 - ₹40,000.00 per month Benefits: Provident Fund Work Location: In person
Posted 1 month ago
4.0 years
5 - 8 Lacs
Noida
On-site
Job Information Date Opened 04/29/2025 Job Type Full time Industry Consulting Work Experience 4-5 years City Noida State/Province Uttar Pradesh Country India Zip/Postal Code 201301 Job Description About Us Tsaaro’s prime focus is on Data Privacy and Security. Our team of specialist data privacy consultants, information security consultants, and penetration testers help and advise our clients to make running a secure business easier, with high efficiency. Everything we do is tailored to the individual organizational requirements, aligned with their budget and resource challenges. We take a pragmatic, risk-based approach to provide our clients with real-world, workable advice, guidance, and support that helps them to deal with a wide range of security and privacy-related challenges. Responsibilities: As a Senior Data Protection Consultant, you will be entrusted with the following key responsibilities: Design and implement data protection and privacy programs that cater to our clients' specific business needs, ensuring their sensitive information is well safeguarded. Evaluate and assess our clients' data protection and privacy practices, offering valuable insights and actionable recommendations for continual improvement. Demonstrate expertise in various standards, such as ISO 27001/2, ISO 22301, ISO 27018, NIST standards on Cyber Security, HITRUST, ISO 27701, etc., to assist clients in compliance and governance. Provide guidance and support to clients in adhering to a complex web of national and international laws and regulations, including the EU General Data Protection Regulation (GDPR) and other privacy laws. Assist in preparing policies, reports, and schedules for clients and relevant stakeholders, ensuring clear communication and alignment with industry best practices. Conduct thorough audits of Privacy controls to monitor program effectiveness and compliance, ensuring data protection is at its optimal level. Utilize online tools to facilitate Incident Management and Data Subject Rights processes, ensuring efficient and timely responses to potential data incidents. Foster and maintain productive working relationships with client personnel, promoting effective collaboration and understanding of their specific needs. Demonstrate a strong commitment to adhering to workplace policies and procedures, maintaining the highest standards of professionalism and confidentiality. Contribute to cybersecurity engagements, developing cybersecurity strategies, governance, risk, and compliance activities, and cybersecurity policies in line with ISO 27001 and ISO 27701. Perform Gap Assessments, Risk Assessments, ISMS Documentation, Internal Audits, and support during Certification Audits to strengthen overall security frameworks. Requirements To be considered for this role, the candidate must meet the following requirements: Possess a sound knowledge of fundamentals of information security systems. Have 4+ years of relevant experience in the field. Demonstrate proficiency in standards such as ISO 27001/2, ISO 22301, ISO 27018, NIST standards on Cyber Security, HITRUST, ISO 27701, etc. Exhibit a good understanding of GDPR, CCPA, or other privacy laws. Display competence in governance and reporting, as well as a strong grasp of cyber and privacy risks. Hold relevant qualifications such as CIPM, CIPT, CIPP/E. Showcase excellent communication skills, both written and verbal. Benefits Competitive salary and performance-based bonuses. Professional development opportunities, including training and certifications. Flexible working hours. Collaborative and inclusive work environment. Opportunity to work with a passionate team dedicated to making a difference in data privacy and security. Join and hustle with the India's fastest privacy and information security consulting company.
Posted 1 month ago
1.0 - 3.0 years
0 Lacs
Noida
On-site
Job Information Date Opened 02/24/2025 Job Type Full time Industry Consulting Work Experience 1-3 years City Noida State/Province Uttar Pradesh Country India Zip/Postal Code 201301 Job Description About Us Tsaaro’s prime focus is on Data Privacy and Security. Our team of specialist data privacy consultants, information security consultants, and penetration testers help and advise our clients to make running a secure business easier, with high efficiency. Everything we do is tailored to the individual organizational requirements, aligned with their budget and resource challenges. We take a pragmatic, risk-based approach to provide our clients with real-world, workable advice, guidance, and support that helps them to deal with a wide range of security and privacy-related challenges. Responsibilities As a Senior Data Privacy Consultant, you will be entrusted with the following key responsibilities: Design and implement data protection and privacy programs that cater to our clients' specific business needs, ensuring their sensitive information is well safeguarded. Evaluate and assess our clients' data protection and privacy practices, offering valuable insights and actionable recommendations for continual improvement. Demonstrate expertise in various standards, such as ISO 27001/2, ISO 22301, ISO 27018, NIST standards on Cyber Security, HITRUST, ISO 27701, etc., to assist clients in compliance and governance. Provide guidance and support to clients in adhering to a complex web of national and international laws and regulations, including the EU General Data Protection Regulation (GDPR) and other privacy laws. Assist in preparing policies, reports, and schedules for clients and relevant stakeholders, ensuring clear communication and alignment with industry best practices. Conduct thorough audits of Privacy controls to monitor program effectiveness and compliance, ensuring data protection is at its optimal level. Utilize online tools to facilitate Incident Management and Data Subject Rights processes, ensuring efficient and timely responses to potential data incidents. Foster and maintain productive working relationships with client personnel, promoting effective collaboration and understanding of their specific needs. Demonstrate a strong commitment to adhering to workplace policies and procedures, maintaining the highest standards of professionalism and confidentiality. Contribute to cybersecurity engagements, developing cybersecurity strategies, governance, risk, and compliance activities, and cybersecurity policies in line with ISO 27001 and ISO 27701. Perform Gap Assessments, Risk Assessments, ISMS Documentation, Internal Audits, and support during Certification Audits to strengthen overall security frameworks. Requirements Possess a sound knowledge of fundamentals of information security systems. Have 2-3 years of relevant experience in the field. Demonstrate proficiency in standards such as ISO 27001/2, ISO 22301, ISO 27018, NIST standards on Cyber Security, HITRUST, ISO 27701, etc. Exhibit a good understanding of GDPR, CCPA, or other privacy laws. Display competence in governance and reporting, as well as a strong grasp of cyber and privacy risks. Hold relevant qualifications such as CIPM, CIPT, CIPP/E. Showcase excellent communication skills, both written and verbal. Benefits Opportunity to work with a dynamic and innovative team. Career growth and development opportunities. Competitive salary and benefits package. A supportive work environment that values creativity and initiative.
Posted 1 month ago
2.0 years
5 - 8 Lacs
Noida
On-site
Job Information Date Opened 02/24/2025 Job Type Full time Industry Consulting City Noida State/Province Uttar Pradesh Country India Zip/Postal Code 201305 Job Description About Us Tsaaro’s prime focus is on Data Privacy and Security. Our team of specialist data privacy consultants, information security consultants, and penetration testers help and advise our clients to make running a secure business easier, with high efficiency. Everything we do is tailored to the individual organizational requirements, aligned with their budget and resource challenges. We take a pragmatic, risk-based approach to provide our clients with real-world, workable advice, guidance, and support that helps them to deal with a wide range of security and privacy-related challenges. We are seeking a talented and dynamic Senior Infosec Consultant to join our team who has a good exposure towards managing the projects relating to Information security domain and privacy protection from scratch. Experience: 2+ years Location: Noida Key Objective and Responsibilities: As an Assistant Manager, you will be entrusted with the following key responsibilities: Experience in leveraging industry standards and frameworks such as ISO 27001/2, ISO 22301, ISO 27018, NIST standards on Cyber Security, HITRUST, ISO 27701, etc., to assist clients in compliance and governance. Design and implement data protection and privacy programs that cater to our clients' specific business needs, ensuring their sensitive information is well safeguarded. Evaluate and assess our clients' data protection and privacy practices, offering valuable insights and actionable recommendations for continual improvement. Provide guidance and support to clients in adhering to a complex web of national and international laws and regulations, including the EU General Data Protection Regulation (GDPR) and other privacy laws. Data Audits and Assessments: Conducting regular data protection impact assessments (DPIAs) and audits to identify and mitigate privacy risks associated with data processing activities. Conduct thorough audits of Privacy controls to monitor program effectiveness and compliance, ensuring data protection is at its optimal level. Foster and maintain productive working relationships with client personnel, promoting effective collaboration and understanding of their specific needs. Assist in preparing policies, reports, and schedules for clients and relevant stakeholders, ensuring clear communication and alignment with industry best practices. Contribute to cybersecurity engagements, developing cybersecurity strategies, governance, risk, and compliance activities, and cybersecurity policies in line with ISO 27001 and ISO 27701. Perform Gap Assessments, Risk Assessments, ISMS Documentation, Internal Audits, and support during Certification Audits to strengthen overall security frameworks. Utilize online tools to facilitate Incident Management and Data Subject Rights processes, ensuring efficient and timely responses to potential data incidents. Demonstrate a strong commitment to adhering to workplace policies and procedures, maintaining the highest standards of professionalism and confidentiality. Requirements To be considered for this role, the candidate must meet the following requirements: Hold relevant qualifications such as CIPP/E, CIPM, FIP, DCPLA, CDPO/IN, CDPO/P, ISO 27001 LA/LI, ISO 27701 LA- preferred. Minimum 2 years of related work experience; or a master’s or MBA degree in business, computer science, information systems, engineering and/or data protection. Possess a sound knowledge of fundamentals of information security systems. Exhibit a good understanding of GDPR, CCPA, or other privacy laws. Display competence in governance and reporting, as well as a strong grasp of cyber and privacy risks. Showcase excellent communication skills, both written and verbal. Proficiency in Microsoft Office Suite (Word, Excel, Power point). Benefits Opportunity to work with a dynamic and innovative team. Career growth and development opportunities. Competitive salary and benefits package. A supportive work environment that values creativity and initiative. Join and hustle with the India's fastest privacy and information security consulting company.
Posted 1 month ago
1.0 years
0 Lacs
Noida
On-site
Job Information Date Opened 06/06/2025 Job Type Full time Industry Consulting Work Experience 1-3 years City Noida State/Province Uttar Pradesh Country India Zip/Postal Code 201301 Job Description About Us: Tsaaro Consulting's prime focus is on Data Privacy and Security. Our team of specialist Data Privacy Consultants, Information Security Consultants, and penetration testers help and advise our Clients to make running a secure business easier with high efficiency. Everything We do is tailored to the individual, and organizational requirements, aligned with their budget and resource challenges. At Tsaaro, we adopt a pragmatic, risk-based strategy to deliver practical and effective advice. By providing real-world guidance, support, and actionable recommendations, we confidently equip our clients to address a broad spectrum of security and privacy challenges. Ready to elevate your career in a high-impact role? Tsaaro Consulting is hiring a Business Continuity Manager with expertise in BCP implementation, risk assessments, and DR testing. Collaborate with business and IT teams to build resilient strategies. Gain hands-on experience in data privacy and security, with guidance from industry experts. Responsibilities: Collaboration and Implementation: Proven ability to work effectively with business and enterprise functions to structure and implement emergency response plans, ensuring coordinated and effective response during disruptions. Comprehensive BCM Expertise: Extensive experience in coordinating, performing, or assisting with BCP implementation and ongoing maintenance, ensuring program effectiveness and alignment with organizational needs. Testing and Improvement: Demonstrated skills in executing BCP/DR exercises and testing, identifying areas for improvement and fostering program effectiveness. Risk and Impact Assessment: Proven ability to conduct comprehensive risk assessments, threat analyses, and Business Impact Analyses (BIA) to understand potential disruptions, their impact on critical business processes, and the associated financial consequences. IT Alignment: Experience in collaborating with technology and digital teams (as specified) to develop and test IT recovery (DR) plans, ensuring seamless integration with overall BCM strategies. Awareness and Engagement: Expertise in conducting BCP awareness training, fostering a culture of preparedness within the organization. Stakeholder Management: Proven track record in maintaining a high level of stakeholder management and business engagement, ensuring buy-in and active participation from all relevant parties. Technical Standards: Familiarity with ISO 22301, NIST, ISO 27001, and other applicable standards (as specified), applying industry best practices for robust BCM implementation. Requirements Possess a sound knowledge of fundamentals of information security systems. Minimum 1 year of relevant experience in the field. Experience in collaborating with technology and digital teams to develop and test IT recovery (DR) plans, ensuring seamless integration with overall BCM strategies. Demonstrate proficiency in standards such as ISO 22301 ,ISO 27701etc. Expertise in conducting BCP awareness training to foster a culture of preparedness within the organization Extensive experience in coordinating, performing, or assisting with Business Continuity Planning (BCP) implementation and ongoing maintenance. Proficiency in Microsoft Office Suite (Word, Excel, Power point). Showcase excellent communication skills, both written and verbal. Benefits Competitive salary and performance-based bonuses. Professional development opportunities, including training and certifications. Flexible working hours. Collaborative and inclusive work environment. Opportunity to work with a passionate team dedicated to making a difference in data privacy and security. Tsaaro is committed to Equal Employment Opportunity. We base all employment decisions, including hiring, promotion, discipline, or discharge, on merit, competence, performance, and business needs. We foster an inclusive work environment and do not discriminate based on race, colour, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, gender, sexual orientation, gender identity or expression, or any other status protected under federal, state, or local law. We welcome and celebrate diversity in the workplace, encouraging individuals who identify as non-binary, gender non-conforming, and LGBTQIA+ community members to apply.
Posted 1 month ago
15.0 - 20.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Exp: 15 to 20 years Location: Chennai/Noida Mandatory Skills: We are seeking an experienced and visionary Cybersecurity General Architect to lead the strategic design and implementation of our cybersecurity architecture Minimum of 18 years of IT experience, with at least 10 years in cybersecurity architecture roles. Deep knowledge of enterprise IT architectures, networking, application security, IAM, data protection, and security operations. Expertise in designing secure architectures for cloud-native, hybrid, and on-prem environments. Strong understanding of Zero Trust, SIEM/SOAR, IAM, SASE, and data classification frameworks. Familiarity with DevSecOps, CI/CD pipelines, and secure software development practices. Experience with regulatory compliance and standards (e.g., ISO 27001, NIST, SOX, GDPR) Preferred Certifications: CISSP, CCSP, CISM, SABSA, TOGAF, AWS/Azure/GCP Security Certifications Other relevant security or architecture certifications
Posted 1 month ago
7.0 - 9.0 years
18 - 20 Lacs
Bengaluru
Hybrid
Hi all, We are hiring for the role Information Security Risk Specialist Experience: 7 - 9 Years Location: Bangalore Notice Period: Immediate - 15 Days Skills: Information Security Risk Specialist Experience: 7 to 9 years Location: Bengaluru Skills and Competencies: • Comprehensive understanding of frameworks such as ISO 27001, NIST Cybersecurity Framework, COSO, and COBIT. • Proven analytical expertise in evaluating and prioritizing risks effectively. • Advanced proficiency in utilizing security tools for risk assessment and mitigation. • Strong preference for candidates with certifications like CISSP, CISM, CRISC, or equivalent. • Exceptional communication and presentation skills, with a proven ability to collaborate effectively across diverse teams. • Demonstrated problem-solving capabilities, including critical thinking and informed decision-making under pressure. • Skilled in leading security initiatives and managing projects across global teams. • A strategic mindset paired with keen attention to detail. • Resourceful and decisive under high-pressure situations. • An effective team player with exceptional interpersonal and collaboration skills. If you are interested drop your resume at mojesh.p@acesoftlabs.com Call: 9701971793
Posted 1 month ago
18.0 - 23.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Experience : 18 to 23 years Location: Chennai & Noida Required Qualifications: Bachelor’s or Master’s degree in Computer Science, Information Security, or a related field. Minimum of 18 years of IT experience, with at least 10 years in cybersecurity architecture roles. Deep knowledge of enterprise IT architectures, networking, application security, IAM, data protection, and security operations. Expertise in designing secure architectures for cloud-native, hybrid, and on-prem environments. Strong understanding of Zero Trust, SIEM/SOAR, IAM, SASE, and data classification frameworks. Familiarity with DevSecOps, CI/CD pipelines, and secure software development practices. Experience with regulatory compliance and standards (e.g., ISO 27001, NIST, SOX, GDPR). Preferred Certifications: CISSP, CCSP, CISM, SABSA, TOGAF, AWS/Azure/GCP Security Certifications Other relevant security or architecture certifications Soft Skills: Strong communication and stakeholder management skills Strategic mindset with hands-on technical expertise Proven leadership in cross-functional environments Ability to influence executive leadership and drive security adoption
Posted 1 month ago
2.0 years
0 Lacs
Pune, Maharashtra, India
On-site
At Securonix, we’re on a mission to secure the world by staying ahead of cyber threats, reinforcing all layers of our platform with AI capabilities. Our Securonix Unified Defense SIEM provides organizations with the first and only AI-Reinforced solution built with a cybersecurity mesh architecture on a highly scalable data cloud. Enhanced by Securonix EON ’s AI capabilities, our innovative cloud-native solution delivers a seamless CyberOps experience, empowering organizations to scale their security operations and keep up with evolving threats. Recognized as a five-time leader in the Gartner Magic Quadrant for SIEM and highly rated on Gartner Peer Insights , our award-winning Unified Defense SIEM provides organizations with 365 days of ‘hot’ data for rapid search and investigation, threat content-as-a-service, proactive defense through continuous peer and partner collaboration, and a fully integrated Threat Detection, Investigation, and Response (TDIR) experience—all within a single platform. Built on a cloud-native architecture, the platform leverages the Snowflake Data Cloud for unparalleled scalability and performance. Securonix is proud to be a cybersecurity unicorn and featured in CRN's 2024 Security 100 list. Backed by Vista Equity Partners , one of the largest private equity firms with over $100 billion in assets under management, we have a unique advantage in driving innovation and growth. With a global footprint, we serve more than 1,000 customers worldwide , including 10% of the Fortune 100. Our network of 150+ partners and Managed Security Service Providers (MSSPs) enables us to deliver unmatched security solutions on a global scale. At Securonix, we are driven by our core values and place our people at the heart of everything we do: Winning as One Team: We work together with universal respect to achieve aligned outcomes Customer Driven Innovation: We innovate to stay ahead of the market and create value for our customers Agility in Action: We embrace change and are unified in our purpose and objectives amidst change Join us as we redefine cybersecurity, innovate fearlessly, and grow together as one team. Summary: The Security Risk and Compliance Analyst I will be responsible for executing control assessments and ensuring that compliance with regulatory and industry mandates that include SOC1, SOC2, PCI, GDPR, ISO 27001, HIPAA, HITRUST, FEDRAMP and others are maintained. Reporting to the Manager of Information Security Compliance, this role will be responsible for executing control self-assessments, creating and maintaining policy documentation, assisting in maintaining the risk register and overall maintenance of the organization’s compliance posture. Essential Functions of the Job: Conduct controls assessments to identify and assess Information Security risks within the Securonix IT environment. Securonix IT General Controls to ensure our continued compliance with our regulatory and industry mandates. Ensure that control self-assessments are conducted in a timely manner ensuring completeness and accuracy Maintain documentation of control assessments and risks in the GRC tool. Ensure that appropriate documentation in the form of policies, standards and procedures is created and managed to support the various security, compliance and audit requirements. Co-ordinate execution of Pen Tests, Vulnerability scans and reporting. Work on remediation actions for identified findings and track them to closure. Work with other teams in the IT org to establish standards and process for maintaining and improving the organization’s security posture Assist in continuous improvement and maturing the Information Security GRC program Additional Job Functions: Maintain the risk register with up-to-date risk details, and track risk response plans(remediation/exceptions) to closure Perform audits and assessments of third parties such as vendors, service providers, consulting organizations etc. as required. Work closely with Technology and Security teams to develop appropriate remediation action plans for identified risks. Knowledge and Skill Requirements: Demonstrated experience in performing risk/control assessments against compliance frameworks such as COSO, COBIT, NIST, ISO 27001, etc. Understanding of IT General Controls in relation to SOC1, SOC2, HIPAA,HITRUST, GDPR, FEDRAMP and other compliance initiatives. Familiarity with IT and Information Security products and technologies such as identity and access management, vulnerability management, encryption and key management, logging and monitoring and application security is desirable. Familiarity with cloud and SaaS-based environments and technologies with associated auditing methodologies is desirable Bachelor’s / Master’s degree in a computer or information management field or similar work experience. Relevant certifications like CISSP, CISA, CRISC, ISO 27001 – Lead Auditor/Lead Implementer desirable, but not mandatory Strong attention to detail, influencing and problem resolution skills. 2+years’ experience in Information Security - IT audit and/or IT Risk & Compliance roles Benefits: As a full-time employee with Securonix, you will be eligible for the following employee benefits: Health Insurance with a total sum insured is INR 7,50,000 Coverage: Self, Spouse, 2 kids, Dependent parents, or parents-in-law Personal Accident with total sum insured is INR 10,00,000 Term Life Insurance with a sum assured for employees is 5 times fixed base pay is covered. Securonix, Inc. provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity, national origin, age, disability, genetic information, marital status, amnesty or status as a covered veteran in accordance with applicable federal, state and local laws. Securonix complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including hiring, placement, promotion, termination, layoff, recall, and transfer, leaves of absence, compensation and training. Securonix expressly prohibits any form of unlawful employee harassment based on race, color, religion, gender, sexual orientation, national origin, age, genetic information, disability or veteran status. Improper interference with the ability of Securonix employees to perform their expected job duties is absolutely not tolerated.
Posted 1 month ago
5.0 years
0 Lacs
Greater Chennai Area
On-site
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you ready to embark on a technical adventure and become a hero to our external and internal users? As Technical Support at Kyndryl, you'll be part of an elite team that provides exceptional technical assistance, enabling our clients to achieve their desired business outcomes. You'll be a troubleshooter extraordinaire, diagnosing and repairing complex equipment, software, and systems with ease. Nothing will be too challenging for you to solve as you respond to escalated issues, report critical design flaws, reliability and maintenance problems, and bugs. You'll be the go-to person for our customers who require assistance with highly technical or sophisticated products, as well as for customer installations and training. With your passion for technology, you'll provide world-class support that exceeds customer expectations. As Technical Support, you'll perform varying degrees of problem determination and resolution of desktop hardware and software issues using your technical expertise and available resources to ensure that our customers' issues are resolved efficiently and effectively. You'll also have the opportunity to perform installs, moves, adds, and changes (IMAC) activities, as well as data backup and restore on certain accounts for clients, ensuring that all related administrative duties are completed within Service Level Agreement objectives. You will develop a deep understanding of the local and regional infrastructure, as well as key contacts in other competencies, which will enable you to ensure that the proper team is aware of – and taking action on the problem. If you're a technical wizard, a customer service superstar, and have an unquenchable thirst for knowledge, we want you to join our team. Your Future at Kyndryl Imagine being part of a dynamic team that values your growth and development. As Technical Support at Kyndryl, you'll receive an extensive and diverse set of technical trainings, including cloud technology, and free certifications to enhance your skills and expertise. You'll have the opportunity to pursue a career in advanced technical roles and beyond – taking your future to the next level. With Kyndryl, the sky's the limit. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. e-identification, aggregation, and differential privacy standards. Collaborate with HR, IT, and business stakeholders to implement best practices and flexible programs that enhance employee experience and organizational resilience. Educate employees and leaders on the use of Viva Insights tools, including daily briefings, focus time scheduling, and wellbeing resources such as Headspace integration. Preferred Technical and Professional Experience: 5+ years of experience in IT operations, with a focus on Microsoft Active Directory and related identity infrastructure. Deep understanding of Active Directory security best practices, including privileged access management, least privilege principles, and attack surface reduction. Strong experience managing and troubleshooting Entra ID, ADFS, and hybrid identity environments. Hands-on experience with backup and recovery procedures, disaster recovery planning, and incident management. Proficiency in PowerShell scripting for automation and configuration management. Familiarity with Quest Change Auditor, Quest Recovery Manager, or similar security auditing and recovery tools. Knowledge of compliance frameworks such as NIST, ISO 27001, or SOC 2. Excellent troubleshooting, problem-solving, and analytical skills. Strong communication, documentation, and interpersonal skills. Ability to work independently and as part of a team in a fast-paced, managed services environment. As an Identity & Directory Services Operations Specialist, you will: Provide Level 2 & Level 3 Operations Support: Monitor, audit, troubleshoot, and resolve incidents and problems across all directory and identity services. Act as a subject matter expert and provide support and consultation to other IT services and projects. Implement business and security settings according to defined processes and requests. Participate in on-call rotations as required to address critical incidents outside of business hours. Preferred Technical and Professional Expertise: Microsoft certifications related to Active Directory, Azure, or security (e.g., MCSA, MCSE, Security+). Experience with other identity and access management (IAM) solutions. Knowledge of DevOps principles and practices. Experience with cloud security tools and technologies. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 1 month ago
10.0 years
20 - 27 Lacs
Mumbai Metropolitan Region
On-site
Role: SOC Manager - L3 Location: Mumbai (Kurla) Notice Period: Immediate to 45 days Job Type: Hybrid Shift Timings: General shift (5 days/week, 2 working Saturdays) Experience: 10 - 15 years Valid-Active CISM/CISSP certification About the Company : A leading global IT services provider, specializing in consulting, application development, systems integration, and managed services for enterprises and governments worldwide. Must-Have Skills 10+ years in SOC 2-3 years as L3 level Team Lead Valid-Active CISM/CISSP certification Expertise in EDR, Incident Response, Threat Hunting Proficiency in Splunk for security monitoring Good-to-Have Skills CEH, OSCP, GIAC certifications Cloud Security expertise in AWS, Azure, or GCP Scripting with Python, PowerShell Familiarity with MITRE ATT&CK Knowledge of ISO 27001, NIST, GDPR, RBI guidelines Digital Forensics & Malware Analysis Strong stakeholder management skills Academic Qualifications Valid-Active CISM/CISSP certification Key Performance Indicators Timely incident resolution Regular metrics and report presentation SIEM efficiency and compliance Integration of SIEM with other solutions Stakeholder collaboration effectiveness Skills: gdpr,scripting (python, powershell),giac,scripting in python,cloud security expertise in aws, azure, or gcp,cissp,incident response,oscp,malware analysis,gcp,powershell,edr, incident response, threat hunting,scripting in powershell,cissp certification,python, powershell,azure,cism certification,python,iso 27001,soc,aws,team lead,digital forensics,rbi guidelines,edr expertise,stakeholder management,soc management,nist,ceh,cism,security monitoring (splunk),splunk for security monitoring,scripting,cloud security,edr,splunk,mitre att&ck,cloud security (aws, azure, gcp),cism/cissp certification,threat hunting
Posted 1 month ago
7.5 years
0 Lacs
Bhubaneswar, Odisha, India
On-site
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Identity and Access Management (IAM) Operations Good to have skills : NA Minimum 7.5 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and overseeing the transition to cloud security-managed operations. You will engage in strategic discussions to align security measures with organizational objectives, ensuring a robust security posture in the cloud environment. Roles & Responsibilities: - Expected to be an SME. - Collaborate and manage the team to perform. - Responsible for team decisions. - Engage with multiple teams and contribute on key decisions. - Provide solutions to problems for their immediate team and across multiple teams. - Facilitate training sessions to enhance team knowledge and skills in security practices. - Evaluate and recommend security tools and technologies to improve operational efficiency. Professional & Technical Skills: - Must To Have Skills: Proficiency in Identity and Access Management (IAM) Operations. - Strong understanding of cloud security principles and best practices. - Experience with security frameworks such as NIST, ISO 27001, or CIS. - Familiarity with identity governance and administration tools. - Knowledge of risk assessment methodologies and compliance requirements. Additional Information: - The candidate should have minimum 7.5 years of experience in Identity and Access Management (IAM) Operations. - This position is based at our Bhubaneswar office. - A 15 years full time education is required.
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
40175 Jobs | Dublin
Wipro
19626 Jobs | Bengaluru
Accenture in India
17497 Jobs | Dublin 2
EY
16057 Jobs | London
Uplers
11768 Jobs | Ahmedabad
Amazon
10704 Jobs | Seattle,WA
Oracle
9513 Jobs | Redwood City
IBM
9439 Jobs | Armonk
Bajaj Finserv
9311 Jobs |
Accenture services Pvt Ltd
8745 Jobs |