Jobs
Interviews

Onzestt Services India Private Limited

65 Job openings at Onzestt Services India Private Limited
Incident Response Analyst hyderabad,telangana,india 5 - 8 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Primary Responsibilities : Incident Monitoring : Monitor and assess security alerts from systems like SIEM, IDS/IPS, and EDR, escalating as needed. Triage and Analysis : Investigate incidents to determine scope, impact, and root causes, documenting findings and actions. Incident Response : Contain, eradicate, and recover from threats in coordination with IT and security teams. Forensics : Perform digital forensics and ensure proper evidence collection for potential legal actions. Documentation and Reporting : Maintain records, create incident reports, and suggest improvements to policies. Collaboration : Work with IT, legal, and compliance teams; provide clear incident updates to stakeholders. Continuous Improvement : Conduct post-incident reviews and refine response procedures and playbooks. Policy Development : Contribute to the creation and update of response playbooks and security training programs. Key Skills & Knowledge : Bachelor's degree in Computer Science, Cybersecurity, or related field. 5+ years of experience in cybersecurity and incident response. Strong analytical skills to handle incidents and recommend remediation. ITIL Foundation certified; experience in regulated environments. Excellent communication and organizational skills. Key Contacts : SOC, IT Operations, Threat Intelligence, and Forensic teams. Legal, Compliance, Risk Management, and external vendors.

SME - Cryptography bengaluru,karnataka,india 3 - 8 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Primary Responsibilities : Product Vision : Define and maintain the vision and roadmap for cryptography-related features, aligned with market needs and trends. Requirements Gathering : Collaborate with stakeholders to specify cryptographic needs like encryption algorithms and compliance mandates. Engineering Collaboration : Work with engineers and architects to ensure technical feasibility and facilitate agile development. Compliance & Security : Ensure adherence to standards (e.g., FIPS, GDPR) and stay updated on evolving regulations. User Experience : Optimize cryptographic features for usability without compromising security. Stakeholder Communication : Serve as the main contact for cryptography features, providing updates on progress, risks, and timelines. Key Skills & Knowledge : Must-Have : Strong understanding of cryptographic concepts (e.g., encryption, PKI, key management). Proven product management experience, including roadmap definition and backlog prioritization. Familiarity with security standards and compliance frameworks. Strong analytical and communication skills for cross-functional collaboration. Good to Have : Background in computer science or cybersecurity. Certifications such as CISSP, CISM, or Agile product management.

Security Consultant Secure Code & Device - LL6 hyderabad,telangana,india 5 - 10 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Key Responsibilities: Vulnerability Management : Identifying and remediating vulnerabilities in code and device configurations. Risk Assessment : Assessing and managing risks to acceptable levels. Collaboration : Working with various teams, including Security Operations and Governance, Risk, and Compliance. DevSecOps : Understanding and implementing DevSecOps processes. Threat Hunting : Promoting and championing threat hunting activities. Essential Skills and Experience: Experience : 5-15 years in a security operations role, with DevSecOps experience. Agile Methodologies : Understanding Agile ways of working. Technical Knowledge : Proficiency in application security, network security, cloud technologies, and security governance. Programming : Experience with languages like Java, C++, Node, BASH, Python. Tools : Familiarity with CI/CD pipelines, security automation, and GitLab. Desirable Qualifications: Certifications : CISA, CISM, ISO27001 lead auditor, or CISSP. Regulatory Knowledge : Understanding of UNECE Regulation No. 155.

DevSecOps Egineer hyderabad,telangana,india 8 - 13 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Key Accountabilities and Responsibilities Ensure products remain free of security vulnerabilities throughout their lifecycle. Configure security tools for product environments and optimize AppSec processes. Drive automation of security tasks to reduce developer workload. Review, configure, and maintain AppSec tools for testing, vulnerability scanning, and monitoring. Build dashboards for application security observability and enhance system visibility. Knowledge, Skills, and Experience Essential : Proficiency in Hashicorp Vault and experience with major cloud platforms (GCP, AWS, or Azure). Strong knowledge of AppSec testing practices, security vulnerabilities, and mitigations. Experience with CI/CD tools, scripting languages (Python, Bash), and version control (Git/GitHub). Familiarity with security tools (static/dynamic analysis, dependency checking, secrets detection). Basic understanding of networking protocols and modern software delivery practices. Personal Profile Passionate about DevSecOps and modern software engineering practices. Customer-focused, collaborative, and results-driven, with resilience under pressure. Constructive challenger who builds credibility through expertise and teamwork. Strong team player with a commitment to high-quality delivery.

DLP Zscaler - SME hyderabad,telangana,india 8 - 13 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Primary Role & Responsibilities: Understand and implement data loss prevention (DLP) policies, procedures, and technologies (Microsoft Purview, Zscaler). Collaborate with business teams to identify and communicate DLP requirements. Analyze user data to define appropriate policies. Assist in DLP technology configuration and deployment, including Zscaler components (web security, DLP, cloud app security, SSL inspection). Establish and maintain a CI/CD pipeline for Zscaler updates. Configure role-based access control for admin privileges. Provide user support and contribute to continuous improvement of DLP processes. Key Skills & Experience (Must-Have): Bachelor's degree in Computer Science, IT, or related field. Strong analytical, problem-solving, and communication skills. Good understanding of information security fundamentals and attention to detail. Key Skills/Knowledge (Good-to-Have): Experience with Zscaler and DLP technologies. Ability to work independently and collaboratively.

SCSA SME hyderabad,telangana,india 5 - 10 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Job Purpose and Key Responsibilities: Manage a variety of projects within their organization, facilitating the planning and prioritization of complex cybersecurity services Primary Role & Responsibilities: Work with Product Owner and Group Product owner to define team development tasks to complete in quarterly iterations MBIs Assist PO and GPO with prioritization activities Delivering against the overall architecture of our supplier security assurance transformation to ensure it meets business requirements and integrates seamlessly with existing systems as set out by the Product Owner Ensure the implementation follows a structured approach with minimal disruption to business operations Creation of training documentation and delivery of end user training Maintain appropriate documentation of any systems/processes included as part of transformational and development work. Conduct analysis on issues identified and implement corrective and preventative actions to resolve. Deliver risk management initiatives to support effective application of the SCSA framework and conduct risk obligations Key Skills, Experience & Knowledge: Understanding of supply chain/supplier/third party security assurance using manual and automated processes coupled with relevant experience in a supply chain security assurance related role. Should have worked in 2LOD & 3LOD with end-to-end knowledge in Third Party Risk Management & its Lifecycle. Knowledge of information security principles and best practices and experience in managing information security risk and controls in a regulatory environment. Significant experience of implementing GRC tooling (ideally with a focus on Supply Chain/Supplier/Third Party Security Assurance) Should have sound knowledge of Vendor On-Boarding process, Due diligence, monitoring, Off boarding etc. Experience in training and creating user manuals/guides Performing Risk Assessments and understanding various tools and applications. Should have completed Risk Certifications ISO 27001 LA/LI, GDPR, CISA, CISP etc. Should have experience in handling Audits, Feedback, customer escalations etc. Jira Confluence Lucid/Visio Excel PowerPoint Key Skills/Knowledge: Personal Profile An individual with a passion for Information & Cyber Security An individual with a passion for process transformation and implementation An individual with a customer first mind-set who is easy to do business with and makes people feel special, driven to deliver experiences that are personalized, transparent and dependable. An individual who is results driven, demonstrates, tenacity, drive and perseverance, with the ability to deliver in a complex, highly demanding environment. An individual who is resilient, energetic and enthusiastic, able to deliver results under pressure, whilst responding constructively to challenging new ideas and inputs An individual who is able to challenge existing thinking in a positive way whilst building credibility and trust through experience and personal style An effective team player, actively supports and collaborates with other team members Resilient and enthusiastic who responds constructively to new ideas and inputs Good communication skills both written and verbal.

HSM Engineer hyderabad,telangana,india 6 - 8 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Job description Must-Have Strong knowledge of cryptographic concepts, HSMs, key management Hands-on experience in implementing and operating Thales Safenet HSMs Hands-on experience in designing and implementing key management solutions for enterprises. Hands-on experience in HSM, Cryptography related fields Knowledge of Networking and Network Security concepts. Strong oral and written communication skills. Good-to-Have Experience working on PKI / key management solutions for connected vehicle systems Programming knowledge in C / C++ (preferred),Java,.NET Experience integrating cryptographic libraries and HSMs with applications. Understanding of Information Security Architecture and ecosystem technologies and concepts required like Firewalls, monitoring tools, encryption, web proxies and Identity & access management.

EPM Analyst hyderabad,telangana,india 5 - 10 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Key Responsibilities Develop and maintain global EPM (Endpoint Privilege Management) policies and procedures for all privileged users. Manage EPM services with software and service partners, ensuring alignment with IAM processes for least privilege access and just-in-time escalation. Improve EPM endpoint rules and processes to enable secure business operations with minimal privileges. Analyze and report key metrics, audit privileged access, and mitigate risks across the business. Raise awareness of EPM policies and provide guidance on best practices to stakeholders. Address alerts and issues related to EPM from internal teams or monitoring systems. Stay updated on information security trends and proactively recommend mitigations. Key Interactions Internal : IAM Head, EPM teams, BAU support teams. External : Product vendors and service partners. Knowledge, Skills, and Experience Essential: Experience in IAM, with strong technical knowledge of privileged access and escalation on Wintel/Linux systems and core infrastructure. Understanding of EPM governance principles, including risk management. Knowledge of IT compliance standards and strong analytical skills for data reporting. Proven ability to work cross-functionally and manage external agencies. Desirable: Familiarity with privileged account management in DevOps, cloud platforms (Google, Azure, AWS), and operational technology. Experience with information security auditing and manufacturing security management. Personal Profile Customer-focused : Builds strong relationships, ensures personalized and transparent experiences. Results-driven : Demonstrates tenacity, resilience, and the ability to deliver in complex environments. Innovative thinker : Challenges conventional approaches while maintaining trust and credibility. Team player : Communicates effectively, supports, and develops team members while leading by example

Lead Security Architect hyderabad,telangana,india 6 - 8 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Key Performance Indicators (KPIs) and Responsibilities Security Alignment and Governance Align JLR L2 logical security capabilities with business and epic team requirements. Contribute to epic journeys, service blueprints, and architecture artifacts with security considerations. Provide security Non-Functional Requirements (NFRs) and support ADA/SPADA approval processes. Collaborate with solution and enterprise architects for security capability reviews and alignments. Define and maintain security architecture artifacts, including principles, policies, standards, and patterns. Risk Management and Threat Mitigation Review risk areas using STRIDE and highlight security considerations in system context diagrams. Assess and mitigate threat vectors for epic artifacts, including customer journeys and supporting processes. Recommend security controls for journey stages and ensure alignment with JLR security architecture. Identify and address information security risks and vulnerabilities across the business and projects. Governance and Security Enhancements Improve governance processes by embedding clear security requirements. Review and enhance current security measures, tools, and practices. Ensure alignment of IT projects with enterprise security policies and central security systems. Provide SME support and documentation for technical security inputs in projects. Tools, Systems, and Incident Management Develop, maintain, and monitor security tools, systems, and protocols. Support security incidents by providing technical input during and after events. Stay updated on security trends, tools, and technologies to enhance the organization's security posture. Collaboration and Advisory Provide security guidance during epic hypothesis reviews and MVP assessments. Advise teams on information security threats, risks, and configurations to mitigate business impacts. Collaborate with broader organizational teams to ensure robust information security measures. Reporting and Continuous Improvement Identify security risks during transitions to target operating models and document mitigation strategies. Ensure proactive monitoring and enhancement of the organization's security and IT environments. Lead the development of secure logical solutions and identify gaps across architectures.

SOC Transformation - Project Manager hyderabad,telangana,india 8 - 13 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Required Technical Skill: Strong understanding of critical PM concepts such as activity plans, milestones, task dependencies, risk and issue tracking, status reporting. Strong understanding of Agile Methodologies and ability for deliver projects using a hybrid Agile-waterfall methodology. Ability to effectively lead an engagement team, making effective and efficient use of project resources, identifying and resolving complex problems/issues related to people, processes, and technology and strategy, both internally (organizational) and externally (client/engagement/project). Strong understanding of, and ability to execute project management methodologies and tools Extensive problem solving and analytical skills Desired Competencies (Technical/Behavioral Competency) Must-Have** (Ideally should not be more than 3-5) Knowledge of Cybersecurity/ IT and sound knowledge of project deliver methodologies. Project management experience or Service Management in IT infrastructure, Clouds, application development with IT infrastructure experience or Cybersecurity projects from conception to closure. Proficiency in Agile methodologies like Scrum or Kanban, and waterfall methodologies along with tools such as MS Project or JIRA Strong critical thinking and analytical skills and ability to think out of the box required. Excellent customer service and communication (oral / written) skills required. Good-to-Have Certified in PMI, PRINCE2 or APM. Certified in CSM, PSM or other Agile professional certification. Experience of working with diverse teams and is a team player Responsibility of / Expectations from the Role Develop comprehensive project plans that integrate both Agile and Waterfall elements, ensuring clear timelines, milestones, and deliverables. Engage with stakeholders to gather requirements, provide updates, and manage expectations throughout the project lifecycle. Defining priorities and requirements and managing the project through planning, design, build, testing, and service transition phases. Ensure that project deliverables meet the required quality standards and specifications. Identifies and facilitates the resolution of any issues that may arise. Managing 3rd party vendors and managing multiple individuals and project aspects running concurrently. Facilitate collaboration between Agile and Waterfall teams, ensuring seamless integration and communication. Monitor project progress using appropriate tools and methodologies, and adjust plans as necessary to stay on track. Generate regular status reports for stakeholders, highlighting progress, issues, and any changes to the project scope or timeline.

Sr Forgerock Developer hyderabad,telangana,india 8 - 13 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Key responsibilities Should be able to provide end to end technical support to all business application users which are underpinned by IAM, ForgeRock application. Should be able to develop the service in line with demand and security objectives. Should ensure IAM system a robust available well maintained and has minimal downtime. Should be able to recommend improvements to the infrastructure and application architecture. Should be able to tune monitoring notifications and enhance integration with appropriate System Support systems such as BMC Remedy for automation and incident tracking and metrics. Should coordinate with team and provide periodic updates and status reports to supervisors and clients. Must assure quality support services during transition, secondary support and primary support phases. Should be able to coach, guide and mentor junior members in the team. Maintain knowledge of the latest security threats and industry standard methodologies Key Skills/Knowledge Understanding of HR systems like SAP, Success factor Familiarity with AD, ADFS, MIM 2016, Azure Active Directory, BMC Remedy, MS SharePoint Experience required Developer experiences working on Programming Language and development platforms including C#, Java to write scripts, codes, DLLs. Good to have skills and experience on Windows PowerShell, Unix/Shell Programming required for development and scripting. Knowledge on SQL Database, SQL reporting Services and SQL operation. Should have basic experience with Implementing, supporting, and maintaining. Should have good knowledge and understanding on ForgeRock Suite, ADFS, and optionally on Azure Active Directory which would be a value add. Should have a basic understanding of Identity and Access Management platform framework and functions Should have a basic understanding of version management

Cyber Risk Analyst hyderabad,telangana,india 5 - 15 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Key Performance Indicators Identify and assess risks through threat assessments and security operations data. Define and ensure timely response to Indicators of Compromise (IoCs) and Indicators of Attack (IoAs). Contribute to reducing Mean Time to Detection (MTTD) and Mean Time to Remediation (MTTR). Reduce JLR information security incidents. Ensure compliance with regulations like UNECE Regulation No. 155 and support the Cyber Security Management System (CSMS). Key Responsibilities Identify and investigate potential threats and attacks. Proactively take remedial action for ongoing threats. Conduct Threat Assessment & Remediation Analysis (TARAs) and prioritize cyber defenses. Monitor network activity, identify anomalies, and collaborate with Security Operations for improvements. Ensure compliance with risk management schedules and measure security risks effectively. Manage KPIs and risk indicators to enhance security outcomes. Provide expertise on supplier assurance and supply chain security risks. Promote threat hunting within the organization. Key Interactions Collaborate across Information Cyber Security, IT functions, Security Operations, Engineering, Governance, Risk & Compliance teams, and senior leadership. Knowledge, Skills, and Experience Essential: 5-15 years in security operations roles with expertise in incident investigations and key performance metrics (MTTD/MTTR). Knowledge of IoCs, IoAs, threat hunting, and network traffic analysis tools. Experience with IT audit, risk management, and regulatory compliance (NIST, ISO standards). Strong communication, analytical, and organizational skills, with the ability to engage stakeholders at all levels. Desirable: Certifications like CISA, CISM, ISO27001 Lead Auditor, or CISSP. Knowledge of UNECE Regulation No. 155 and experience in manufacturing/automation security operations. Global business experience and familiarity with information security risk management. Personal Profile Customer-focused, adaptable, and resilient with a strong can-do attitude. Results-driven, collaborative, and capable of handling complex and demanding environments. Strong problem-solving, communication, and interpersonal skills with the ability to influence stakeholders. Proactive in embracing change and delivering personalized, dependable experiences.

DLP Zscaler Consultant bengaluru,karnataka,india 8 - 13 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Primary Role & Responsibilities: Understand and implement data loss prevention (DLP) policies, procedures, and technologies (Microsoft Purview, Zscaler). Collaborate with business teams to identify and communicate DLP requirements. Analyze user data to define appropriate policies. Assist in DLP technology configuration and deployment, including Zscaler components (web security, DLP, cloud app security, SSL inspection). Establish and maintain a CI/CD pipeline for Zscaler updates. Configure role-based access control for admin privileges. Provide user support and contribute to continuous improvement of DLP processes. Key Skills & Experience (Must-Have): Bachelor's degree in Computer Science, IT, or related field. Strong analytical, problem-solving, and communication skills. Good understanding of information security fundamentals and attention to detail. Key Skills/Knowledge (Good-to-Have): Experience with Zscaler and DLP technologies. Ability to work independently and collaboratively.

Cyber Threat and Risk Analyst hyderabad,telangana,india 5 - 15 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Key Performance Indicators Identify and assess risks through threat assessments and security operations data. Define and ensure timely response to Indicators of Compromise (IoCs) and Indicators of Attack (IoAs). Contribute to reducing Mean Time to Detection (MTTD) and Mean Time to Remediation (MTTR). Reduce JLR information security incidents. Ensure compliance with regulations like UNECE Regulation No. 155 and support the Cyber Security Management System (CSMS). Key Responsibilities Identify and investigate potential threats and attacks. Proactively take remedial action for ongoing threats. Conduct Threat Assessment & Remediation Analysis (TARAs) and prioritize cyber defenses. Monitor network activity, identify anomalies, and collaborate with Security Operations for improvements. Ensure compliance with risk management schedules and measure security risks effectively. Manage KPIs and risk indicators to enhance security outcomes. Provide expertise on supplier assurance and supply chain security risks. Promote threat hunting within the organization. Key Interactions Collaborate across Information Cyber Security, IT functions, Security Operations, Engineering, Governance, Risk & Compliance teams, and senior leadership. Knowledge, Skills, and Experience Essential: 5-15 years in security operations roles with expertise in incident investigations and key performance metrics (MTTD/MTTR). Knowledge of IoCs, IoAs, threat hunting, and network traffic analysis tools. Experience with IT audit, risk management, and regulatory compliance (NIST, ISO standards). Strong communication, analytical, and organizational skills, with the ability to engage stakeholders at all levels. Desirable: Certifications like CISA, CISM, ISO27001 Lead Auditor, or CISSP. Knowledge of UNECE Regulation No. 155 and experience in manufacturing/automation security operations. Global business experience and familiarity with information security risk management. Personal Profile Customer-focused, adaptable, and resilient with a strong can-do attitude. Results-driven, collaborative, and capable of handling complex and demanding environments. Strong problem-solving, communication, and interpersonal skills with the ability to influence stakeholders. Proactive in embracing change and delivering personalized, dependable experiences.

SOC Analyst ( Tier 3 ) hyderabad,telangana,india 8 - 13 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

The Opportunity As the SOC Analyst Tier 2 you will be responsible for monitoring, detecting, containing, and remediating security incidents utilizing a suite of security software tools. This critical role supports the internal JLR SOC and directing an outsourced tier 1 2 SOC MSSP to deliver robust security operations. Key Performance Indicators Number of identified vulnerabilities Number of vulnerabilities contained Number of vulnerabilities mitigated Time to detect Time to respond Time to mitigate Key Responsibilities: Manage a suite of Security Products. Evaluates incidents identified by tier 1 analysts Uses threat intelligence such as updated rules and Indicators of Compromise (IOCs) to pinpoint affected systems and the extent of the attack. Consolidating data from alert triage to provide context necessary to initiate Tier-3 work Conduct security research and intelligence gathering on emerging threats Can offer SME advice to security driven projects. Ability to provide technical and service leadership to T1 analysts Good understanding of ITIL processes, including Change Management, Incident Management and Problem Management. Contribute to Incident Response investigations working with the Incident Response team. Continual development of analysis playbooks and tradecraft Proactively contribute to SOC strategy by refining standards, processes and procedures. Handle incidents across Windows, Mac, and Linux platforms. Develop and improve processes for incident detection and the execution of countermeasures. Actively maintains awareness of developments in the intrusion analysis, incident response and information security fields. Maintaining SecOps documentation. Conduct proactive threat research Key Interactions External Security Operations Centre (currently TCS) Manufacturing Engineering Data Protection Officer / Legal Business Protection Other IT functions GDPR Knowledge, Skills and Experience Essential : Experience working within a SOC / NOC environment Experience in handling incident response for large organizations Experience in NextGen EPP and EDR such as SentinelOne Background in Vulnerability Management such as Qualys Customer-oriented, flexible and demonstrated tendency to go above and beyond Ability to communicate efficiently with clients and internal team members at all levels and across functional and organizational boundaries. Comfortable working against deadlines in a fast-paced environment. TCP/IP Networking Familiarity with common IDS/IPS and Firewalls Incident handling/response. Some out of hours work may be required to support incidents and investigations Problem solving skills and ability to work under pressure Engineering experience supporting the following technologies: Tibco logging management. SIEM technologies (Exabeam & LogRhythm) McAtee ePO Desirable : Qualifications: CEH CompTIA CySA+ GSEC SSCP CISSP ITIL Experience of network-based User Behaviour Analytics (DarkTrace, ArcSight User Behaviour Analytics etc) Experience of security assessment and penetration testing tools Experience of packet-capture tools and analysis of packet flows Personal Profile Essential: An individual with a customer first mindset who is easy to do business with and makes people feel special, driven to deliver experiences that are personalised, transparent and dependable. An individual who is results driven, demonstrates, tenacity, drive and perseverance, with the ability to deliver in a complex, highly demanding environment. An individual with the ability to combine a short term, pragmatic focus with longer term planning An individual who is resilient, energetic and enthusiastic, able to deliver results under pressure, whilst responding constructively to challenging new ideas and inputs An individual who can challenge existing thinking in a positive way whilst building credibility and trust through experience and personal style A good communicator who can communicate complex ideas An effective team player, actively leads, develops and supports team members Desirable : An individual who enables speed in decision making through establishing alignment, clarity, appropriate resources and sense of urgency whilst bringing others along.

PAM Analyst hyderabad,telangana,india 5 - 10 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Key Responsibilities Develop and maintain global PAM (Privileged Access Management) policies and procedures for all privileged users. Manage PAM services with software and service partners, ensuring alignment with IAM processes for least privilege access and just-in-time escalation. Analyze and report key metrics, audit privileged access, and mitigate risks across the business. Raise awareness of PAM policies and provide guidance on best practices to stakeholders. Address alerts and issues related to PAM from internal teams or monitoring systems. Stay updated on information security trends and proactively recommend mitigations. Key Interactions Internal : IAM Head, PAM teams, BAU support teams. External : Product vendors and service partners. Knowledge, Skills, and Experience Essential: Experience in IAM, with strong technical knowledge of privileged access and escalation on Wintel/Linux systems and core infrastructure. Understanding of PAM governance principles, including risk management. Knowledge of IT compliance standards and strong analytical skills for data reporting. Proven ability to work cross-functionally and manage external agencies. Desirable: Familiarity with privileged account management in DevOps, cloud platforms (Google, Azure, AWS), and operational technology. Experience with information security auditing and manufacturing security management. Personal Profile Customer-focused : Builds strong relationships, ensures personalized and transparent experiences. Results-driven : Demonstrates tenacity, resilience, and the ability to deliver in complex environments. Innovative thinker : Challenges conventional approaches while maintaining trust and credibility. Team player : Communicates effectively, supports, and develops team members while leading by example

Senior Security Analyst hyderabad,telangana,india 8 - 13 years INR 8.0 - 10.0 Lacs P.A. On-site Full Time

Key Responsibilities Collaborate with Lead Security Architects to maintain and evolve JLR's contextual-to-component security architecture. Align security architecture with IT domains and other areas, such as connected car initiatives. Define and maintain security principles, policies, standards, and frameworks for cloud environments in collaboration with Enterprise Architecture teams. Provide security expertise and documentation for projects, ensuring alignment with enterprise architecture and governance processes. Identify, assess, and mitigate information security risks across the business. Review and enhance existing security measures, ensuring the integration of security tools into JLR IT projects. Support security incidents, including technical analysis during and after events. Stay updated on emerging security systems, protocols, and industry trends. Key Interactions Internal Teams : CISO, Security Architecture, Identity & Access Management, Enterprise Architects, Vehicle Security, and IT Delivery teams. Business Areas : Engineering, Manufacturing, Commercial, and Connected Car teams. Knowledge, Skills, and Experience Essential: Understanding of private and public cloud environments, tools, and implementation frameworks (e.g., NIST, NCSC). Strong knowledge of information security principles, risk management, and IT compliance standards. Experience in designing secure IT solutions and mitigating security risks. Degree in a related field or equivalent experience. Desirable: Advanced IT security certifications (e.g., CISSP). Familiarity with security auditing techniques and best practices.

OT Security Engineer hyderabad,telangana,india 8 - 16 years INR 5.0 - 8.0 Lacs P.A. On-site Full Time

Key Accountabilities and Responsibilities: Overall responsibility to represent the policy and views of the ICS team within the wider business acting as a consultant to product teams Identify information security risks and proactively work to ensure that Information risks are identified, assessed and mitigated across the business. Work within the established governance processes to ensure that new IT solutions are delivered to a high standard of security. Collaboration with the wider Information Technology Management community to provide information security advice and ensure that the appropriate technologies in place to protect the information of the business. Work with the business to identify and understand future Information security risks and provide appropriate input to ensure that such risks are minimised ahead if time. Identify information security threats and vulnerabilities within projects and programmes, assess information security risks and advise the relevant team on appropriate methods and security configurations to protect and prevent impact to business systems. Maintain a view of key stakeholders within the business and proactively manage their attitude to security Monitor trends in information security and incorporate into departmental strategy What Youll Need Excellent people skills, able to positively influence up to board level. Previous experience and background in Information Security at a management level Proven good working knowledge of industry IT compliance standards, particularly in design and implementation Knowledge of information security principles and best practices and experience in managing information security risk Background and previous experience of IT security controls Significant experience of working and influencing cross-functionally and managing external agencies Experience of relationship management of senior stakeholders Strong IT skills, able to analyse data for reporting purposes and follow work instruction Relevant degree or equivalent experience preferred Expectations / Advantages: Knowledge and experience in Information Security Auditing Techniques Advanced IT security certifications such as CISSP. Experience in manufacturing Industries and OT Experience in IoT technologies & connected car Agile code development toolsets Specialist skillsets in Network Security Specialist skillset in Cloud Security Specialist security skillset in Collaborative tools / email Specialist security skillset in Application development and code implementation Exp.-8-16yrs

IOT Security Engineer hyderabad,telangana,india 8 - 13 years INR 5.0 - 8.0 Lacs P.A. On-site Full Time

Responsibilities Develop an OT/Enterprise IoT threat analysis and risk assessment framework and methodology to ensure proactive identification of threats and attack vectors and objective assessment of their risk on the safety of the system operation Review, Analyse and assess the low-level and high-level design for OT/IoT environments in line with industry best practice and standards, working closely with architecture, engineering and product teams. Review and Analyse conventional OT/IoT cyber security solutions and identify potential risks and attack vectors that compromise the safety and security of the system and suggest risk mitigation controls and recommendations Monitor, research and Analyse current and emerging threats and investigate these to develop appropriate security responses Maintain familiarity with relevant Cyber security and privacy standards and regulations for OT/ Enterprise IoT systems. Qualifications Demonstrable experience in conducting cyber security assessments and implementing risk mitigation controls for OT/Enterprise IoT systems Strong knowledge of cyber security best practices and standards for SCADA and cyber- physical systems in Industrial Systems, Connected and Autonomous Mobility and Manufacturing Good knowledge and understanding of threat modelling and analysis for IoT systems Strong knowledge of different threat modelling and risk assessment frameworks, like MITRE & Attack, STRIDE, etc. Good understanding and working knowledge of IoT communication protocols like CANbus, IP, 802.11, Bluetooth, Thread, Zigbee, etc. Professional certifications such as CEH or GPEN, CySA+ or ECSA, ICS/SCADA Cybersecurity, GICSP and GCIP would be a bonus Proven ability to rapidly interpret technical and business requirements and understand complex trade-offs in drawing conclusions and recommendations Proficiency in Agile framework and working as part of a squad with effective time management, task prioritization, and seamless task switching. Thrive in a dynamic environment where agility is key. Team Player with a Proactive Approach: A self-motivated team player who can work independently (minimal supervision) as well as being part of the team, learns new skills as required, has attention to detail, with strong organizational skills.

Security Solutions Architect - Cyber Operations hyderabad,telangana,india 8 - 16 years INR 5.0 - 8.0 Lacs P.A. On-site Full Time

Primary Role & Responsibilities: Work closely with other IT and security teams, as well as external vendors, to ensure successful implementation and operation of security solutions. Architect and design security solutions that integrate seamlessly with existing systems and processes, enhancing the SOCs capabilities. Assess and recommend security technologies and tools that will improve the SOCs effectiveness and efficiency. Support and drive projects through the Enterprise Architecture design authority governance process. Tailor security solutions to meet the specific needs of the organization, considering unique threats and operational requirements. Ensure that security measures align with industry best practices, organisational security patterns and reference architectures. Gather and understand client needs, identifying key areas where technology can improve business processes. Define architectural approaches and lead proof of concept assessments. Coordinate across stakeholders to agree solution requirements Identify potential security risks and develop mitigation strategies to address them proactively. Key Skills, Experience & Knowledge: Essential: Demonstrable experience in developing effective solution for cyber security services. Experience creating high level design document to communicate their vision. Experience of threat modelling, using frameworks such as STRIDE. Knowledge of architecture frameworks such a TOGAF, SABSA. Familiar with Information Security Frameworks, such as, NIST CSF, Mitre Attack, Secure Controls Framework. Familiar with Risk Management Frameworks, such as, NIST 800-37. Desirable: Relevant certification, such as, CISSP, SABSA, CRISC, TOGAF. Experience working within a SOC, IRT or Vulnerability management team. Experience with OT or IoT technologies. Knowledge of IaaS fundamentals from AWS, GCP, or Azure. Knowledge of protecting SaaS services.