Jobs
Interviews

177 Osint Jobs - Page 2

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 years

0 Lacs

Hyderabad, Telangana, India

Remote

ABOUT FLUTTER ENTERTAINMENT ​ Flutter Entertainment is a global leader in sports betting, gaming, and entertainment, with annual revenues of $11.7 Bn and a customer base of over 12 million players (in 2023) driven by a portfolio of iconic brands, including Paddy Power, Betfair, FanDuel, PokerStars, Junglee Games and Sportsbet.​ Listed on both the New York Stock Exchange (NYSE) a nd the L ondon Stock Exchange (LSE), Flutter was recently included in TIME's 100 Most Influential Companies of 2024 i n the 'Pioneers' section. Our ambition is to transform global gaming and betting to deliver long-term growth and a positive, sustainable future for our sector. ​Working at Flutter is a chance to work with a growing po rtfolio of brands ac ross a range of opportunities. We will support you every step of the way to help you grow. Just like our brands, we ensure our people have everything they need to succeed.​ FLUTTER ENTERTAINMENT INDIA​ Our Hyderabad office, located in one of India’s premier technology parks is the Global Capability Center for Flutter Entertainment. A center of expertise and innovation, this hub is now home to over 780+ employees working across Customer Service Operations, Data and Technology, Finance Operations, HR Operations, Procurement Operations, and other key enabling functions.​ We are committed to crafting impactful solutions for all our brands and divisions to power Flutter's incredible growth and global impact. With the scale of a leader and the mindset of a challenger, we’re dedicated to creating a brighter future for our customers, colleagues, and communities.​ OVERVIEW OF THE ROLE The CRE GSOC is part of the Group Physical Security Team and is based in our office in Hyderabad. The CRE GSOC Analyst is responsible for managing and monitoring our travel safety programme, access control system, remote video surveillance services, incident response and reporting requirements and crisis management support. As a GSOC Analyst you will be responsible for analysing, monitoring and responding to alerts raised by various systems that impact the safety and security of Flutter Entertainment assets, operations & employees as part of an ongoing security monitoring service. To effectively manage and resolve issues, it is imperative that the CRE GSOC Analyst possess the ability to make informed judgment calls regarding when to escalate matters internally within the team and externally across the business. This discernment ensures that appropriate attention and resources are allocated to critical issues. Moreover, clear and consistent communication within the business, adhering to established parameters, is essential to maintain transparency, coordination, and alignment with organisational goals. By balancing timely escalations with structured communication, we can enhance our responsiveness and overall efficiency in addressing challenges. KEY RESPONSIBILITES ​Work alongside and advising a developed team of operators within Flutter Entertainment’s Global Security Operation Centre (GSOC), assuming primary responsibility for 24/7 monitoring of significant global events via a selection of closed and open-source information feeds. Supporting India CRE Safety & Security and GSOC manager in critical delivery and GSOC strategies. Accountable for the achievement of different shift KPIs in collaboration with GSOC operators. Working as Incident Manager while in shifts, analyse and respond to physical security events affecting or threatening Flutter Entertainment’s physical infrastructure, employees, operations and assets globally. Draft and deliver communication of severe events to senior leadership globally, monitoring responses Engage with business leaders to evaluate event communication and learn for future situations. Daily responsibilities include but are not limited to: Responding to and investigating alerts raised on various security systems. Complete International travel threat analysis for Flutter Entertainment employees travelling abroad, utilising information obtained from external platforms. Assess the impact of security incidents, supporting Flutter Entertainment’s Crisis Management team to communicate with and provide appropriate advice to employees at all levels of seniority. Forecast likely threats and pre-emptively reach out to Flutter Entertainment employees, warning them of upcoming events. Conduct ‘defensive’ and ‘offensive’ investigations using open-source intelligence (OSINT) tools. Identify any sensitive information exposed in public domains or accessible online; this could include financial data, intellectual property or other sensitive information that could be exploited by threat actors. Analyse the intent and capability of potential threat actors. Publish accurate, informative and actionable security alerts on developments that meet the internal thresholds for reporting. Work closely alongside the security operations team and provide analytical input to security advice and assistance cases where required. Manage internal communications tools efficiently (email, DM’s, phone). Carryout reasonable tasks as instructed by the Group Lead Physical Security. TO EXCEL IN THIS ROLE, YOU WILL NEED TO HAVE Possess excellent verbal and written English communication skills. Have at least 5-6 years’ experience working in an intelligence, risk, or business continuity environment. Familiarity with social media platforms, social media intelligence and open-source intelligence tools and techniques. Demonstrate good judgment while multi-tasking; following tasks, procedures, and utilise discretion when dealing with sensitive information. Be calm and focused when in high-pressure situations and be comfortable working on a shift system basis. Work independently and be confident in decision-making within Flutter Entertainments defined processes, and during sudden, unanticipated, or unprecedented events or crises. Demonstrate and deploy a sound understanding and application of technology and use a variety of technical platforms and systems in a conjoined way to deliver quick and accurate results. Report into India CRE Safety & Security and GSOC Manager. Ready to work in 24*7 (Day/Afternoon/Night shifts) environment and only national holidays/weekends Desirable skills: A degree or masters (or equivalent) in a related field, such as International Relations, Politics, Terrorism etc. Non-English language skills are desirable but not essential for the role Confident and articulate presenter able to concisely deliver key messages and justify assessments. BENEFITS WE OFFER Access to Learnerbly, Udemy, and a Self-Development Fund for upskilling. Career growth through Internal Mobility Programs. Comprehensive Health Insurance for you and dependents. Well-Being Fund and 24/7 Assistance Program for holistic wellness. Flexible leave policies, including maternity, paternity, and sabbaticals. Free Meals, Cab Allowance, and a Home Office Setup Allowance. Employer PF Contribution, gratuity, Personal Accident & Life Insurance. Sharesave Plan to purchase discounted company shares. Volunteering Leave and Team Events to build connections. Recognition through the Kudos Platform and Referral Rewards. WHY CHOOSE US Flutter is an equal-opportunity employer and values the unique perspectives and experiences that everyone brings. Our message to colleagues and stakeholders is clear: everyone is welcome, and every voice matters. We have ambitious growth plans and goals for the future. Here's an opportunity for you to play a pivotal role in shaping the future of Flutter Entertainment India

Posted 1 week ago

Apply

3.0 years

0 Lacs

India

On-site

About Aristiun: Aristiun is a pioneer in the application of AI to solve the toughest cybersecurity challenges. We combine cutting-edge AI research with deep industry expertise to deliver innovative solutions that are both powerful and practical. Our focus is on automating security tasks, providing actionable insights, and empowering organizations to take control of their security posture. Driven by Ayurak AI, we are committed to shaping the future of cybersecurity, including forward-thinking initiatives like our Security Performance Vision 2026. As we grow, ensuring the integrity and security of our operations, personnel, and intellectual property is paramount. About the Role: Aristiun is seeking a highly skilled and discreet Threat Intelligence Expert for a contract position based in India. We are specifically looking for an individual with a distinguished background in a national intelligence service or as a military officer, who can apply their unique investigative and analytical skills to a corporate environment. This expert will be responsible for conducting sensitive internal investigations, performing in-depth background research and due diligence, and providing actionable intelligence on a range of potential threats, from insider risks and sabotage to the preliminary analysis of cyber-attacks. This role requires applying a strategic intelligence mindset to complex corporate security challenges, operating with the highest level of integrity. Responsibilities: Corporate Investigations: Lead and conduct confidential internal investigations into potential security incidents, including suspected sabotage, intellectual property theft, insider threat activity, and other policy violations. Due Diligence & Research: Perform comprehensive due diligence and enhanced background research on potential partners, key hires, vendors, and other third parties using advanced Open Source Intelligence (OSINT) techniques and other investigative methodologies. Threat Analysis: Analyze and synthesize information from various sources to identify patterns, assess risks, and understand adversarial tactics. You will provide critical context during investigations into hacking and other cyber-related incidents, working alongside our technical teams. Intelligence Reporting: Produce clear, concise, and objective reports detailing investigative findings, threat assessments, and actionable risk mitigation recommendations for senior leadership. Methodology Development: Help develop and document corporate investigation and intelligence-gathering standard operating procedures (SOPs) based on best practices from the intelligence community. Discretion and Confidentiality: Handle highly sensitive and confidential information with the utmost discretion and integrity, ensuring all activities comply with legal and ethical standards. Qualifications: Proven experience (typically 3+ years) in a national intelligence or law enforcement agency (e.g., R&AW, IB), military intelligence (e.g., Directorate General of Military Intelligence), or as an officer in the Indian Armed Forces with a focus on investigations or counter-intelligence. Demonstrated expertise in conducting complex investigations, including evidence collection, interviews, and structured analysis. Expert-level proficiency in Open Source Intelligence (OSINT) gathering techniques and analytical tools. Strong analytical and critical thinking skills, with a proven ability to synthesize disparate information into coherent assessments and reports. Unquestionable personal integrity, ethics, and professional judgment. Ability to operate independently with minimal supervision in a fast-paced environment. Excellent written and verbal communication skills in English are required. Preferred Experience: Prior experience in a corporate security, threat intelligence, or investigations role, demonstrating a successful transition from a government to a commercial environment. Familiarity with foundational cybersecurity concepts, the cyber threat landscape (e.g., common hacking techniques), and principles of digital forensics. Knowledge of Indian laws pertaining to privacy, data protection (e.g., the Digital Personal Data Protection Act, 2023), and corporate investigations. An established professional network within national security and intelligence communities. Contract Details: Engagement Type: This is a contract-based position. Duration: The initial contract duration will be for 6 months, with the possibility of extension based on project needs and performance. Engagement Level: The expected commitment is [e.g., full-time, part-time, project-based].

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

India

Remote

Job Title: Attack Surface Management (ASM) Trainer Location: Remote Employment Type: Full-time Experience Required: 5+ Years in Cybersecurity / Offensive Security About the Role We are looking for an experienced and passionate Attack Surface Management (ASM) Trainer to lead hands-on training sessions for cybersecurity professionals and red teamers. The ideal candidate will have strong technical expertise in external attack surface discovery, vulnerability assessment, and ASM tools, along with a flair for teaching and mentoring. As a trainer, you will be responsible for designing and delivering high-impact training programs that equip learners with practical skills in ASM, OSINT, and vulnerability intelligence. You'll also guide learners in mastering real-world ASM tools and offensive techniques used in red team engagements. Key Responsibilities Design and deliver structured training modules on Attack Surface Management, OSINT, and vulnerability intelligence. Train participants in the use of ASM platforms (e.g., CyCognito, Netlas, Shodan, Censys, RiskIQ, etc.). Conduct hands-on labs covering domain/IP discovery, cloud exposure mapping, asset attribution, and misconfiguration detection. Teach how to analyze and prioritize external threats using frameworks like MITRE ATT&CK and CVSS/EPSS. Stay up to date with the latest ASM trends, tools, and adversary techniques and update course content accordingly. Conduct assessments and evaluations to monitor trainee progress. Mentor learners through real-world simulations and lab-based challenges. Support internal teams by developing knowledge-sharing sessions and upskilling programs. Technical Skills Required Strong experience in ASM, external threat mapping, and internet-wide scanning. Hands-on with tools like CyCognito, Netlas, Shodan, Censys, SecurityTrails, FOFA, ZoomEye, etc. Knowledge of vulnerability intelligence platforms (Tenable, Qualys, AWS Inspector). Deep understanding of OSINT techniques, reconnaissance workflows, and attack surface mapping. Scripting knowledge (Python, Bash, PowerShell) for automation is a plus. Familiarity with networking protocols (TCP/IP, HTTP/S, DNS), cloud services, and web attack vectors. Soft Skills Excellent presentation and public speaking skills. Strong ability to simplify complex concepts and communicate effectively with learners of all levels. Passionate about teaching, mentoring, and continuous learning. Ability to create engaging, hands-on content and real-world simulation environments. Preferred Certifications (Optional but a Plus) OSCP / CRTP / CRTO / CEH CySA+, CompTIA Security+ CVA or equivalent vulnerability-focused certifications Any cloud or OSINT certifications

Posted 2 weeks ago

Apply

3.0 - 4.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

At Bayer we’re visionaries, driven to solve the world’s toughest challenges and striving for a world where ,Health for all, Hunger for none’ is no longer a dream, but a real possibility. We’re doing it with energy, curiosity and sheer dedication, always learning from unique perspectives of those around us, expanding our thinking, growing our capabilities and redefining ‘impossible’. There are so many reasons to join us. If you’re hungry to build a varied and meaningful career in a community of brilliant and diverse minds to make a real difference, there’s only one choice. Cyber Security Analyst POSITION PURPOSE: We are seeking a highly skilled Cyber Threat Intelligence Analyst supporting our efforts in cyber threat intelligence at Bayer. In this position, you will conduct threat analyses and deliver actionable intelligence reporting to enable threat-informed cyber defense across our global organization. As part of our Cyber Defense Center Platform, you'll play a critical role in identifying, analyzing, and mitigating cyber threats to protect Bayer's digital assets and operations. Join our team and help protect one of the world's leading life sciences companies against evolving cyber threats while developing your expertise in a dynamic and challenging environment. YOUR TASKS AND RESPONSIBILITIES: Monitor and analyze global cyber threat landscapes to identify trends relevant to Bayer's industry and operations Perform comprehensive threat analyses to identify and track threat actors, vulnerabilities, and emerging attack vectors Conduct in-depth analysis of security-relevant events and assess Bayer's threat situation in real-time Interface with internal and external partners globally Prepare detailed intelligence reports and deliver presentations of findings to technical and non-technical audiences Collaborate with security engineering teams to implement defensive measures based on intelligence findings Create and maintain process guidelines and documentation for threat intelligence operations WHO YOU ARE: Bachelors (3-4 years of work exp.) or Masters (1-2years of work exp.) in geopolitics, international affairs, computer science, information security, cybersecurity, or a related field First experience in cyber threat intelligence, security operations, or related fields Demonstrated experience with OSINT (Open-Source Intelligence) tools and methodologies Knowledge of the MITRE ATT&CK framework and Cyber Kill Chain methodology are an advantage Exceptional analytical thinking and problem-solving abilities Excellent written and verbal communication skills with ability to translate technical findings for non-technical audiences Languages: Fluent English required; additional languages beneficial Proficiency in report writing, investigational techniques, and presenting to large audiences Self-motivated with strong attention to detail and ability to work independently Team-oriented mindset with excellent collaboration skills Ever feel burnt out by bureaucracy? Us too. That's why we're changing the way we work- for higher productivity, faster innovation, and better results. We call it Dynamic Shared Ownership (DSO). Learn more about what DSO will mean for you in your new role here https://www.bayer.com/enfstrategyfstrategy Bayer does not charge any fees whatsoever for recruitment process. Please do not entertain such demand for payment by any individuals / entities in connection with recruitment with any Bayer Group entity(ies) worldwide under any pretext. Please don’t rely upon any unsolicited email from email addresses not ending with domain name “bayer.com” or job advertisements referring you to an email address that does not end with “bayer.com”. For checking the authenticity of such emails or advertisement you may approach us at HRSUPPORT_INDIA@BAYER.COM. YOUR APPLICATION Bayer is an equal opportunity employer that strongly values fairness and respect at work. We welcome applications from all individuals, regardless of race, religion, gender, age, physical characteristics, disability, sexual orientation etc. We are committed to treating all applicants fairly and avoiding discrimination. Location: India : Karnataka : Bangalore Division: Enabling Functions Reference Code: 849624 Contact Us 022-25311234

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Kozhikode, Kerala, India

On-site

We are hiring Senior Security Consultant -VAPT Specialist for our client located in Kozhikode. Position Summary As a Senior VAPT Specialist, you will be responsible for conducting comprehensive security assessments, managing client relationships, and delivering high-quality penetration testing services. You will also conduct client-side vulnerability checks for your diverse clients. These will include assessing their security postures and offering actionable recommendations to fortify their cybersecurity defenses. As a senior VAPT specialist, you will engage in tasks that include: Client Management & Communication Be the trusted security expert and advisor for your assigned clients in undertaking security assessments. Lead engaging briefings, provide status updates, and prepare effective presentations. Convert complex technical findings into insights that drive decision-making for our clients. Build relationships that not only last, but also ensure client satisfaction, trust, and value for your service-oriented projects. Document findings that guide you to derive solutions. Threat Modeling & Risk Assessment Develop comprehensive threat models for client applications and infrastructure Conduct risk assessments and prioritize security findings based on business impact Design attack scenarios and security test cases based on threat intelligence Collaborate with development teams to integrate security into SDLC processes Red Team Operations Plan and execute red team exercises to simulate real-world attack scenarios Develop custom tools and exploits for specific client environments Conduct social engineering assessments and physical security testing when required Provide post-exercise debriefings and improvement recommendations Documentation & Reporting Contribute to internal knowledge base and best practices documentation Create detailed technical reports documenting vulnerabilities, exploitation methods, and remediation steps Develop executive summaries tailored for C-level audiences Maintain accurate project documentation and testing methodologies Required Qualifications Experience & Background 3-5 years of hands-on experience in vulnerability assessment and penetration testing Proven track record of successful client engagements and project delivery Experience with enterprise-level security assessments across various industries Demonstrated ability to work independently and manage multiple projects simultaneously Technical Expertise Deep understanding of security frameworks and standards: Penetration Testing Execution Standard (PTES) OWASP Top 10 and OWASP Testing Guide SANS Top 25 Most Dangerous Software Errors NIST Cybersecurity Framework CIS Critical Security Controls MITRE ATT & CK Framework Development & Programming Experience Software Development Background: Hands-on experience in application development and an understanding of secure coding practices are highly recommended. Programming and Scripting Languages: If you’re proficient in Python and Bash, that would be an added advantage. Additional experience in PowerShell is highly appreciated. Basic knowledge in at least one compiled language (C/C++, Go, Java, or C#) Custom Tool Development: You can efficiently develop custom security tools, exploits, and automation scripts Security Tools Expertise: You’re the person who can confidently leverage security tools with expert-level proficiency, such as Burp Suite Professional, OWASP ZAP, Nmap, Nessus, OpenVAS, Metasploit, Cobalt Strike, Wireshark, tcpdump, Static analysis tools (SonarQube, Checkmarx, and Veracode), and Custom exploit development tools. Social Engineering & Phishing Expertise Social Engineering Assessments: Design social engineering tests to trigger human response to various threat scenarios. Phishing Simulations: Run phishing simulations ethically. Physical Security Testing: Perform on-site assessments through tailgating, badge cloning, and facility penetration. Awareness Training: Provide security awareness training based on assessment findings OSINT (Open Source Intelligence): Gather and analyze publicly available information for reconnaissance and social engineering preparation. Communication & Language Skills Excellent communication skills (both written and spoken) Effectively communicate complex technical concepts to non-technical stakeholders Strong presentation and public-speaking abilities Can professionally draft technical documentation and reports Professional Attributes Strong analytical and problem-solving abilities Attention to detail with a methodical approach to testing Ability to think like an attacker and anticipate security threats Commitment to ethical hacking principles and professional conduct Continuous learning mindset to stay current with emerging threats and technologies Research-Oriented Mindset: Can deep research in all efficacy to understand emerging vulnerabilities, attack vectors, and security trends. Innovation and Tool Development: Proactive approach to developing custom security tools, scripts, and methodologies for enhancing testing capabilities Creative thinking for developing novel attack scenarios and bypassing security controls Preferred Qualifications Certifications: OSCP (Added Advantage), GPEN, CRTO, and CRT Additional Experience (If any applicable) Experience with DevSecOps practices and CI/CD pipeline security Background in software development or system administration Knowledge of compliance frameworks (PCI DSS, HIPAA, GDPR, SOC2, ISO 27001) Experience with threat intelligence platforms and indicators of compromise Familiarity with containerization security (Docker, Kubernetes) Previous consulting or client-facing experience Location: Govt. Cyberpark, Calicut Experience: 3 – 5 Years Be it undertaking vulnerability assessment or performing in-depth penetration testing, your role as a senior VAPT consultant highly counts when it comes to safeguarding our clients’ critical assets by detecting threats and closing security gaps – proactively and efficiently. Where confidence, knowledge, and aptitude combine to effectively undertake high-profile security tests like ethical hacking, it is these qualities that we expect from you for the concerned role. Contact us if you believe you aptly fit in this role.

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Coimbatore, Tamil Nadu, India

On-site

AI Developer/Lead Position Overview Lead the development and implementation of AI-powered solutions to enhance nonprofit operational efficiency. This role combines technical leadership with hands-on development, driving our aggressive 6-week implementation cycles and multi-modal development approach. Key Responsibilities Technical Leadership Lead technical design and architecture decisions for AI applications across all classification categories Oversee PoC development, bug fixes, iteration, and production builds Implement and maintain open-source AI foundations (Llama, Haystack, LlamaGuard) Design and manage synthetic data pipelines for training and analytics Ensure deployment and go-live support for all AI applications Development Strategy Execution Drive accelerated creation using AI-powered development tools (Replit, Windsurf, Cursor) for rapid prototyping Manage complete development lifecycle: initial AI-assisted development ? manual code refinement ? user feedback integration ? production deployment Deploy applications directly on organizational servers with robust CI/CD processes Collaborate with global contributor network through GitHub Contribute insights back to the nonprofit technology community Integrate OSINT information into research and analytics workflows Application Development Focus Areas Basic automation for meeting reports, eCourts monitoring, administrative workflows Custom data management platforms replacing Excel-based systems Specialized LLM chatbots with domain knowledge across multiple functions ? Multi-modal tracking solutions (image, video, audio, location data) ML/NLP tools for hotspot prediction, translation services, investigative tools Compliance applications with automated DPDP and regulatory adherence Cybersecurity integration with secure communication frameworks Required Qualifications 5+ years experience in AI/ML development and deployment Proficiency in Python, JavaScript, React and modern AI frameworks Experience with LLM integration, fine-tuning, and safety models Hands-on experience with inference engines (like Groq/Cerebras) and API integration Strong background in server deployment and infrastructure management Experience with AI-assisted development tools (Replit, Cursor, Windsurf) Strong background in open-source development and GitHub collaboration Experience transitioning from rapid prototypes to production-ready applications Proven ability to deliver production applications in aggressive timelines Experience working with distributed international teams across multiple time zones Preferred Qualifications Experience with multi-modal AI applications Knowledge of both cloud-based inference services and self-hosted model deployment DevOps experience with server management and deployment automation

Posted 2 weeks ago

Apply

0.0 - 2.0 years

0 Lacs

Bengaluru, Karnataka

On-site

At Bayer we’re visionaries, driven to solve the world’s toughest challenges and striving for a world where ,Health for all, Hunger for none’ is no longer a dream, but a real possibility. We’re doing it with energy, curiosity and sheer dedication, always learning from unique perspectives of those around us, expanding our thinking, growing our capabilities and redefining ‘impossible’. There are so many reasons to join us. If you’re hungry to build a varied and meaningful career in a community of brilliant and diverse minds to make a real difference, there’s only one choice. Cyber Security Analyst POSITION PURPOSE: We are seeking a highly skilled Cyber Threat Intelligence Analyst supporting our efforts in cyber threat intelligence at Bayer. In this position, you will conduct threat analyses and deliver actionable intelligence reporting to enable threat-informed cyber defense across our global organization. As part of our Cyber Defense Center Platform, you'll play a critical role in identifying, analyzing, and mitigating cyber threats to protect Bayer's digital assets and operations. Join our team and help protect one of the world's leading life sciences companies against evolving cyber threats while developing your expertise in a dynamic and challenging environment. YOUR TASKS AND RESPONSIBILITIES: Monitor and analyze global cyber threat landscapes to identify trends relevant to Bayer's industry and operations Perform comprehensive threat analyses to identify and track threat actors, vulnerabilities, and emerging attack vectors Conduct in-depth analysis of security-relevant events and assess Bayer's threat situation in real-time Interface with internal and external partners globally Prepare detailed intelligence reports and deliver presentations of findings to technical and non-technical audiences Collaborate with security engineering teams to implement defensive measures based on intelligence findings Create and maintain process guidelines and documentation for threat intelligence operations WHO YOU ARE: Bachelors (3-4 years of work exp.) or Masters (1-2years of work exp.) in geopolitics, international affairs, computer science, information security, cybersecurity, or a related field First experience in cyber threat intelligence, security operations, or related fields Demonstrated experience with OSINT (Open-Source Intelligence) tools and methodologies Knowledge of the MITRE ATT&CK framework and Cyber Kill Chain methodology are an advantage Exceptional analytical thinking and problem-solving abilities Excellent written and verbal communication skills with ability to translate technical findings for non-technical audiences Languages: Fluent English required; additional languages beneficial Proficiency in report writing, investigational techniques, and presenting to large audiences Self-motivated with strong attention to detail and ability to work independently Team-oriented mindset with excellent collaboration skills Ever feel burnt out by bureaucracy? Us too. That's why we're changing the way we work- for higher productivity, faster innovation, and better results. We call it Dynamic Shared Ownership (DSO). Learn more about what DSO will mean for you in your new role here https://www.bayer.com/enfstrategyfstrategy Bayer does not charge any fees whatsoever for recruitment process. Please do not entertain such demand for payment by any individuals / entities in connection with recruitment with any Bayer Group entity(ies) worldwide under any pretext. Please don’t rely upon any unsolicited email from email addresses not ending with domain name “bayer.com” or job advertisements referring you to an email address that does not end with “bayer.com”. For checking the authenticity of such emails or advertisement you may approach us at HRSUPPORT_INDIA@BAYER.COM. YOUR APPLICATION Bayer is an equal opportunity employer that strongly values fairness and respect at work. We welcome applications from all individuals, regardless of race, religion, gender, age, physical characteristics, disability, sexual orientation etc. We are committed to treating all applicants fairly and avoiding discrimination. Location: India : Karnataka : Bangalore Division: Enabling Functions Reference Code: 849624 Contact Us + 022-25311234

Posted 2 weeks ago

Apply

1.0 - 2.0 years

10 - 20 Lacs

Bengaluru, Karnataka, India

On-site

About Cyble Cyble is revolutionizing the landscape of cybersecurity intelligence. Founded in 2019, Cyble began as a visionary college project and has quickly transformed into a leading force in proactive cyber threat detection and mitigation, that is now globally significant, with people in 20 countries - Headquartered in Alpharetta, Georgia, and with offices in Australia, Malaysia, Singapore, Dubai, Saudi Arabia and India Our mission is clear: to provide visibility, intelligence and cybersecurity protection using cutting-edge advanced technology, giving enterprises a powerful advantage. We democratize real-time intelligence about cyber threats and vulnerabilities, enabling organizations to take proactive measures and maintain robust cybersecurity. We strive to make the digital world a safer place for everyone. At Cyble, artificial intelligence (AI) and innovation are central to all operations, with a commitment to continuous improvement and excellence in both products and business practices. Cyble values inclusivity, offering team members autonomy and flexibility to balance their professional and personal lives. Cyble fosters a culture where employees voices are heard, contributions are recognized, and everyone is encouraged to be part of something extraordinary. About the Role: As part of our growing Threat Research & Intelligence team, we’re looking for a highly motivated Vulnerability Research and Intelligence Analyst to help us track, assess, and report on emerging vulnerabilities and exploitation trends. You’ll play a key role in strengthening our defensive posture by turning threat data into actionable intelligence. What You'll Do At CYBLE Monitor and analyze newly disclosed vulnerabilities (CVEs, KEV, 0-days, PoCs). Develop custom scripts and tooling to automate data enrichment, correlation, and reporting across various vulnerability feeds and threat sources. Track exploitation activity across threat actor groups and malware campaigns. Collaborate with detection, response, and risk teams to drive mitigation efforts. Author technical advisories and executive summaries on high-impact threats. Maintain and enrich internal vulnerability intelligence platforms. What You’ll Need 1-2 years in OSINT, Threat Intel, vulnerability research, or security operations. Strong understanding of CVSS, CWE, CPEs, and vulnerability disclosure ecosystems is a must. Familiarity with MITRE ATT&CK, CISA KEV, NVD, and vendor advisories. Ability to communicate complex technical concepts clearly and concisely. Bonus: experience with CTF, Bug bounty, or automation (e.g., Python).

Posted 2 weeks ago

Apply

1.0 - 2.0 years

0 Lacs

India

On-site

About Cyble: Cyble is revolutionizing the landscape of cybersecurity intelligence. Founded in 2019, Cyble began as a visionary college project and has quickly transformed into a leading force in proactive cyber threat detection and mitigation, that is now globally significant, with people in 20 countries - Headquartered in Alpharetta, Georgia, and with offices in Australia, Malaysia, Singapore, Dubai, Saudi Arabia and India Our mission is clear: to provide visibility, intelligence and cybersecurity protection using cutting-edge advanced technology, giving enterprises a powerful advantage. We democratize real-time intelligence about cyber threats and vulnerabilities, enabling organizations to take proactive measures and maintain robust cybersecurity. We strive to make the digital world a safer place for everyone. At Cyble, artificial intelligence (AI) and innovation are central to all operations, with a commitment to continuous improvement and excellence in both products and business practices. Cyble values inclusivity, offering team members autonomy and flexibility to balance their professional and personal lives. Cyble fosters a culture where employees voices are heard, contributions are recognized, and everyone is encouraged to be part of something extraordinary. About the Role: As part of our growing Threat Research & Intelligence team, we’re looking for a highly motivated Vulnerability Research and Intelligence Analyst to help us track, assess, and report on emerging vulnerabilities and exploitation trends. You’ll play a key role in strengthening our defensive posture by turning threat data into actionable intelligence. What You'll Do At CYBLE: Monitor and analyze newly disclosed vulnerabilities (CVEs, KEV, 0-days, PoCs). Develop custom scripts and tooling to automate data enrichment, correlation, and reporting across various vulnerability feeds and threat sources. Track exploitation activity across threat actor groups and malware campaigns. Collaborate with detection, response, and risk teams to drive mitigation efforts. Author technical advisories and executive summaries on high-impact threats. Maintain and enrich internal vulnerability intelligence platforms. What You’ll Need: 1-2 years in OSINT, Threat Intel, vulnerability research, or security operations. Strong understanding of CVSS, CWE, CPEs, and vulnerability disclosure ecosystems is a must. Familiarity with MITRE ATT&CK, CISA KEV, NVD, and vendor advisories. Ability to communicate complex technical concepts clearly and concisely. Bonus: experience with CTF, Bug bounty, or automation (e.g., Python). If you like working in an inclusive environment, you want to advance your career quickly, and your opinion is valued, look no further than Cyble, Inc. We are young, hungry, and ready to impact the cyber security landscape! Cyble, Inc. takes into consideration an individual’s skillset, experience and location in making final salary determination. For further details, please discuss with the recruiter. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected Veteran status age, or genetics, or any other characteristic protected by law.

Posted 2 weeks ago

Apply

0.0 years

0 Lacs

India

On-site

Job Description Expect more. Connect more. Be more at Diebold Nixdorf. Our teams automate, digitize, and transform the way more than 75 million people around the globe bank and shop in this hyper-connected, consumer-centric world. Join us in connecting people to commerce in this vital, rewarding role. Supports the full cycle of vulnerability management: from discovery / asset identification through risk assessment, remediation, verification and reporting. Works with Information Security, engineering, other technical and product / operational stakeholders to ensure understanding of and commitment to relevant vulnerability standards and practices. Proactively monitors system, network and other changes to ensure their inclusion in vulnerability assessment / remediation activity. Responsibilities Identifies application and infrastructure owners of vulnerable assets for assignment of remediation. Assists in remediation efforts within IT and security environments by: Conducting vulnerability scans, Prioritizing remediation activities through risk ratings of vulnerabilities and assets, Catalyzing technology and business teams' remediation efforts, Validating the impact of remediation efforts. Transforms vulnerability scan data for analysis and posts for future reference. May contribute to web-based vulnerability remediation on public-facing applications and interfaces, cloud-based remediation, and other facilitating duties as assigned. Learns and follows established escalation and communication standards. Learns and applies industry standards (that is, protocol developed by the National Institute of Standards and Technology). Qualifications Required Qualifications Diploma or equivalent work experience. Minimum of 0-2 years of relevant experience or equivalent combination of education and experience in Vulnerability Management. Good business English skills (Written and spoken), good negotiation and persuasion skills. Preferred Qualifications Knowledge of Threat Intelligence collection, dissemination, analysis and delivery. Knowledge of Windows/Linux OS or general application patching, configuration, or upgrade. Knowledge of multiple security and privacy concepts such as: OSINT, HUMINT, SOCMINT, NIST, PCI, GDPR. GCIA, GHIH, CEH, or CISSP Certification. Knowledge of ISO Quality management, ITSM, and/or Risk Management. Knowledge of Security Regulations (SOX, PCI, GLBA) is an advantage. About Us Why should you join Diebold Nixdorf? Brightest minds + technology and innovation + business transformation The people of Diebold Nixdorf are 23,000+ teammates of diverse talents and expertise in more than 130 countries, harnessing future technologies to deliver personalized, secure consumer experiences that connect people to commerce. Our culture is fueled by our values of collaboration, decisiveness, urgency, willingness to change, and accountability. –Diebold Nixdorf is an equal opportunity employer and we value diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, gender identity, age, marital status, veteran status, or disability status. To all recruitment agencies: Diebold Nixdorf does not accept agency resumes. Please do not forward resumes to our jobs alias, Diebold Nixdorf employees or any other organization location. Diebold Nixdorf is not responsible for any fees related to unsolicited resumes** We are a global Company operating in multiple Locations and Entities. As we are keen to find the best solution for our candidates several legal entities might be applicable for a Job offer. A List of our operating entities can be found here - https://www.dieboldnixdorf.com/en-us/about-us/global-locations

Posted 2 weeks ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

On-site

As an Intelligence Analyst at Fortinet, you will join the Cyber Threat Intelligence (CTI) Collections/Analysis team: a group of highly skilled analysts, collectors, and specialists who dedicate themselves to protecting customers and their assets from external threats. With our proprietary hybrid intelligence platforms and methodologies, you will utilize your writing and editing skills to support the production of actionable intelligence for our customer base. Threat intelligence activities include assessing current and emerging threats covering cybercrime and various forms of malicious exploitation. Responsibilities: Monitoring and Analysis of cybersecurity events, incidents, and vulnerability reports from multiple sources Review and analyze data from various sources such as OSINT/Darknet/TECHINT Work closely with Internal Research team to identify customer-specific threats. Create customer-specific analytical reports based upon identified findings. Create regular Security Trend reporting utilizing information from Internal threat repository. Work with customer POC to understand customer threat landscape and tailor customised delivery. Monitor analyze and report cybersecurity events. Analyze information regarding intrusion events, Security incidents and other threat indications and early-warning functions. Follow best practices of operational security to safeguard sources and methods. Qualifications: Strong Information Security fundamentals Good Understanding of Cyber Threat Intelligence Able to create high-quality Security Analysis reports Ability to understand and analyze various threat vectors effectively. Should have knowledge of cyber threats, malware, APTs, exploits etc Familiarity with the DarkNet, DeepWeb, open-source, social media and other sources of cyber-criminal activity. People skills, strong English communications with ability to communicate effectively with various clients with the ability to explain and elaborate on technical details. Must be interested to learn new technologies and skills. Ability to adapt and innovate Experience in SOC environment will be a plus Any experience in Cyber Crime Research will be a plus Certification of CEH, OSCP, and other cybersecurity is plus but not necessary. Programming/scripting knowledge would be add-on Ability to maintain the highest levels of discretion and confidentiality Language Proficiency: English/Hindi/any Other international language such as Arabic, Russian, Japanese, Chinese, German, Italian is plus;

Posted 2 weeks ago

Apply

10.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Job Description Global Solution Center (MGSC) is internal solution partner for METRO, a 31.6 Billion international wholesaler with operations in 32 countries through 625 stores & a team of 93,000 people globally. METRO operates in a further 10 countries with its Food Service Distribution (FSD) business and it is thus active in a total of 34 countries. MGSC, location wise is present in Pune (India), D- sseldorf (Germany) and Szczecin (Poland). We provide IT & Business operations support to 31 countries, speak 24+ languages and process over 18,000 transactions a day. We are setting tomorrows standards for customer focus, digital solutions, and sustainable business models. For over 10 years, we have been providing services and solutions from our two locations in Pune and Szczecin. This has allowed us to gain extensive experience in how we can best serve our internal customers with high quality and passion. We believe that we can add value, drive efficiency, and satisfy our customers. The primary responsibility is to focus on managing and optimizing EDR solutions to enhance endpoint security. This includes designing, implementing, and maintaining EDR systems and technology, investigating incidents, and developing security policies. The Ideal Candidate Will Bring Deep Technical Expertise, Operational Maturity Towards Improving Security Posture By Collaborating With Other Teams And Staying Current With The Latest Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. A Master's degree or relevant certifications (e.g., CISSP, CISM, SANS/GIAC) may be preferred. 7 - 11 years of relevant professional experience in a large multi-national organization or in a known : Develop and execute threat intelligence strategies, focusing on identifying and mitigating cyber threats. Lead activities to gather intelligence on threat actors, including their tactics, techniques, and procedures (TTPs). Conduct in-depth analysis of the threat landscape, focusing on industry-specific and emerging threats. Use Various available Security controls and the telemetry data within to conduct proactive threat hunts using a hypothesis-based approach. Analyse large datasets (logs, packet captures, alerts) to identify anomalies, malicious activity, and Indicators of Compromise (IOCs). Collaborate with SOC analysts, incident responders, and threat intelligence teams to improve detection rules and response strategies. Additionally, take the identified anomalies to a conclusion. Define the metrics, measurements and analytical tools to quantify surface area of risk, business impact and implement mechanisms to track progress on efforts to reduce those risks. Continuously improve hunting methodologies, automation, and use of threat hunting frameworks (e.g., MITRE ATT&CK). Stay current on emerging threats, vulnerabilities, and cyber-attack techniques. Create and present tailored threat intelligence and hunting reports along with mitigation strategies to internal stakeholders, including executives and IT Team to take necessary actions. Prepare monthly reports on threat hunts and able to showcase ROI of the overall threat hunting program. Adapts quickly to changing priorities, seeks new ideas, and re-aligns teams priority/roadmap to maximize business & Soft Skills : In-depth knowledge of security operations center (SOC) operations, Cyber incident response, threat intelligence with extensive experience performing Threat hunting on IT Systems, Network and Endpoints. Proficiency in various SOC technologies and Threat Intel platform. Experience with scripting (Python, PowerShell, etc.) and automating threat detection or hunting tasks. Proficiency with OSINT tools, scripting and automation (e.g., Python, PowerShell), and Darkweb. Strong understanding of security frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain) and current threat landscapes. Knowledge about Advanced persistent threats and treat actors, their TTPs. Ability to recognize attack patterns and corelate them with specific threat actors. Ability to proactively find cybersecurity threats and mitigate them. Ability to obtain as much information on threat behaviour, goals and methods as possible. Knowledge of Analytics platforms for carrying out detailed analytics of obtained telemetry. Strong understanding of Windows, Linux, and network protocols. Excellent communication and interpersonal skills to effectively collaborate with clients, stakeholders, and internal teams. Analytical and problem-solving skills to identify and address security issues and incidents. Ability to adapt to changing security threats and evolving business requirements. (ref:hirist.tech)

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Description: Cyber Threat Intelligence Analyst Position Overview : We are seeking a highly skilled and experienced Senior Cyber Threat Intelligence Analyst to join our cybersecurity team. The ideal candidate will have a strong background in threat intelligence monitoring, report writing, and the use of various threat intelligence platforms. This role requires a proactive individual who can develop and sustain custom threat intelligence feeds, integrate them into SIEMs, and provide in-depth reporting tailored to client needs. The candidate must be comfortable working in the EST timezone (evening shift for overlap with onshore/client team ) and be on-call for high-priority urgent tasks. Key Responsibilities: Monitor and analyze threat intelligence using tools such as ZeroFox, Recorded Future, Digital Shadows, or similar platforms. Write comprehensive and technical cybersecurity reports with strong attention to detail. Utilize OSINT, IOC lookup and validation, Domain Registrar lookups, VirusTotal, and Dark Web search for threat intelligence gathering. Develop, sustain, and enrich custom threat intelligence feeds using platforms like MISP, with scripting in Python, Azure, and Linux. Manage threat intelligence feeds using platforms such as Anomali, ThreatQ, Cyble, Cyware, OpenCTI, and MISP. Integrate threat intelligence feeds into common SIEMs, particularly Microsoft Sentinel. Execute domain and social media account takedowns as necessary. Create custom, in-depth reports specific to client requirements. Apply knowledge of MITRE ATT&CK, D3F3ND frameworks, and the Cyber Kill Chain in threat analysis. Utilize Excel and/or Power BI for data visualization and graph creation. Experience with excel data cleansing, VLookups, Pivot Tables Prepare and deliver PowerPoint presentations and reports to stakeholders. Maintain strong verbal and written communication skills in English. Work independently under pressure and prioritize tasks effectively. Be available for on-call duties for high-priority urgent tasks. Collaborate with Managed Security Service Providers (MSSPs) for backend and client-facing work. Qualifications : Minimum of 2 years of experience with threat intelligence monitoring tools. At least 1 year of experience in threat intelligence report writing. Proficiency with OSINT, IOC lookup and validation, Domain Registrar lookups, VirusTotal, and Dark Web search. Experience with scripting in Python, Azure, and Linux. Familiarity with one or more threat intelligence platforms for feed management. Experience integrating threat intelligence feeds into SIEMs, especially Microsoft Sentinel. Proven experience with domain and social media account takedowns. Strong understanding of MITRE ATT&CK, D3F3ND frameworks, and the Cyber Kill Chain. Excellent English writing skills. Proficiency in Excel and/or Power BI for data visualization. Strong experience with PowerPoint presentations and reporting. Strong verbal English and presentation skills. Cybersecurity certifications (e.g., COMPTIA, SANS GIAC, ISC, EC-Council) are a plus. Certifications specific to cyber threat intelligence are an asset. Ability to work in the EST timezone (evening shift for overlap with onshore/client team ). Strong analytical skills and ability to prioritize tasks effectively. Experience working with MSSPs for backend and client-facing work. Preferred Skills: Experience with additional threat intelligence platforms. Advanced technical writing and reporting skills. Strong analytical and problem-solving abilities. Ability to work independently and as part of a team. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 2 weeks ago

Apply

0 years

0 Lacs

Delhi, India

Remote

The aim of compliance-driven due diligence is to assess our clients' actual or potential counterparties, looking for any issues that might pose a reputational or other risk to them. As part of a dedicated team (VANTAGE), the compliance due diligence researcher role involves media research, working with databases, primary documents and other sources to uncover reputational and criminal issues and ultimate beneficial ownership, as well as making sense of complex corporate structures and identifying possible political and sanctions exposure. Your main task will be to review, coordinate and report the findings of OSINT and HUMINT research concisely within short timeframes. A meticulous eye for detail is a must in this challenging, fast-paced role. The right candidate will be a team player who can maintain a positive attitude under pressure. You will be required to make sense of complex information and have a clear and crisp writing style. What you'll do: Work on a range of due diligence assignments, which include corporate compliance/ABAC/ESG and financial crime/IPO/KYC projects Conduct media and database research using complex search criteria and following a strict methodology Liaise with in-country source networks to obtain relevant compliance-related information not available via OSINT sources. Analyse search results within the context of the project and the country, Distil conclusions and identify indirect connections from research findings Rate findings based on standard or tailored risk assessment methodologies Summarise all relevant findings in a report When required, brief and present findings to internal colleagues Collaborate with team members across the firm to deliver joint projects Requirements Essential Knowledge of research techniques, databases, networks, online registers and archives, and research in the general internet Knowledge of the business, political, and social context of a geographical area Native or equivalent fluency in English and Sinhalese Excellence in research and writing in English and clear communication style Communicate complex topics verbally and in writing effectively Ability to summarise large amounts of information in a clear and concise manner Ability to manage and prioritise multiple tasks to tight deadlines Curiosity, attention to detail and problem-solving skills Ability to work independently and in a team Education to degree level Preferred Demonstrated professional experience Fluency in an additional language such as Hindi Benefits Control Risks offers a competitively positioned compensation and benefits package that is transparent and summarised in the full job offer. We operate a discretionary global bonus scheme that incentivises, and rewards individuals based on company and individual performance. Control Risks supports hybrid working arrangements, wherever possible, that emphasise the value of in-person time together - in the office and with our clients - while continuing to support flexible and remote working. Working with our clients, from day one our people are given direct responsibility, career development and the opportunity to work collaboratively on fascinating projects in a rewarding and inclusive global environment. The Company is committed to further its diversity, inclusion and equity agenda and as an employee you have access to various business resource groups in the Company including the Company's LGBT+ network called MOSAIC, the Women's Network, and Synergy - a people network to celebrate and promote ethnic diversity at Control Risks Control Risks is committed to a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, colour, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age or veteran status. If you require any reasonable adjustments to be made in order to participate fully in the interview process, please let us know and we will be happy to accommodate your needs.

Posted 2 weeks ago

Apply

2.0 - 31.0 years

2 - 13 Lacs

Athwa, Surat

On-site

ales and Marketing Manager – IT Products, Cybersecurity & VAPT Scaninfoga Solutions Private Limited We are seeking a dynamic and results-driven Sales and Marketing Manager to lead our efforts in promoting cutting-edge Information Technology products, Cybersecurity Crime Investigation Tools, and Vulnerability Assessment & Penetration Testing (VAPT) services. The ideal candidate will have a strong background in IT sales, strategic marketing, and a deep understanding of cybersecurity solutions. Key Responsibilities: Develop and execute sales strategies for cybersecurity products and VAPT services. Identify new business opportunities and establish strong client relationships. Lead marketing campaigns (digital, B2B, events) to drive awareness and lead generation. Collaborate with technical teams to align solutions with client needs. Achieve revenue targets and report performance to management. Qualifications: Proven experience in IT or cybersecurity product sales. Strong understanding of OSINT tools, digital forensics, or VAPT services. Excellent communication, negotiation, and leadership skills. Familiarity with the Indian cybersecurity market is a plus.

Posted 2 weeks ago

Apply

0 years

0 Lacs

Coimbatore, Tamil Nadu, India

On-site

Junior AI Engineer/Intern (Position 1) Position Overview: Support the AI development team in building innovative solutions for nonprofit efficiency. Focus on frontend development, user experience, and rapid prototyping using modern AI tools. Key Responsibilities Development Support Deliver measurable PoC components with daily progress commits Provide user testing feedback implementation with documented changes Support UI/UX testing with detailed testing reports and iteration recommendations Ensure deployment readiness with comprehensive documentation and handoff materials Technology Focus Work with AI-powered development tools (Replit, Windsurf, Cursor) for rapid application prototyping Support iterative development workflow: AI-assisted coding ? manual refinement ? user feedback integration Assist with deployment processes on organizational servers Contribute to open-source component development Learning & Growth Areas AI application development fundamentals User experience design for AI-powered tools Deployment and server management basics Inference engine integration (Groq and similar services) Nonprofit sector technology challenges Collaborative development through GitHub Multi-modal application interfaces Required Qualifications Currently pursuing or recently completed degree in Computer Science, AI, or related field Basic proficiency in JavaScript, Python, React or similar programming languages Familiarity with modern web development frameworks Interest in AI/ML applications and social impact technology Good communication skills and ability to work in fast-paced environment Preferred Qualifications Experience with AI/ML projects or coursework Familiarity with AI-assisted development platforms (Replit, Cursor, Windsurf) Previous internship or project experience in nonprofit sector Knowledge of user experience design principles Basic understanding of API integration and inference services Junior AI Engineer/Intern (Position 2) Position Overview: Support AI development team with focus on data pipeline development, backend systems, and machine learning model implementation for nonprofit applications. Key Responsibilities Backend Development Support Deliver functional synthetic data pipeline components with performance metrics Implement and document machine learning model training and validation processes Build compliance and cybersecurity features with security testing reports Develop and maintain API documentation for partner application integrations Technical Learning Areas Open-source AI model integration (Llama, Haystack ecosystem) Inference engine integration and optimization (Groq, self-hosted instances) Data processing and analytics pipeline development ML/NLP implementation for prediction and translation services OSINT data integration and processing Security framework implementation Server deployment and infrastructure basics Required Qualifications Currently pursuing or recently completed degree in Computer Science, Data Science, or related field Basic understanding of machine learning and data processing Proficiency in Python and familiarity with ML libraries (scikit-learn, pandas, numpy) Interest in data ethics and responsible AI development Ability to work independently and as part of distributed team Preferred Qualifications Experience with natural language processing or computer vision projects Familiarity with open-source AI models and frameworks Understanding of data privacy and compliance requirements Previous experience with nonprofit or social impact projects Knowledge of cybersecurity fundamentals Experience with inference APIs and model deployment Basic server administration or DevOps knowledge

Posted 2 weeks ago

Apply

8.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Job Title: Data Operations Manager Location: Chennai, India Industry preference: GCC, Third party technology service, ITeS Skill set: Data governance, Data quality, Team management, Data ownership, Data gathering and improvements Key Responsibilities: Manage a multi-location in-house analyst team tasked with supporting our customers and maintaining maritime data records across multiple areas of expertise, motivate and lead on career development opportunities. Ensure in-house teams are delivering value through measurable OKRs and assessing opportunities to improve processes and efficiency. Monitor inbound analyst queries from internal stakeholders, ensuring they are handled in an efficient and timely manner and escalate challenges or concerns to senior management. Build you your understanding of customer workflows, their requirements in line with our wider business objectives. Monitor data quality and present management with cost-effective opportunities to expand and improve data that deliver customers increasingly timely and comprehensive data. Ensure all key supplier relationships managed by the team are governed by up-to-date agreements that are approved with the Legal team. Work with the product, sales and marketing teams to support on content-led enhancements to the maritime datasets, such as vessel movements, ownership & characteristics, port state control records, sanctions, ports & place Stay on top of market news and proactively inform the team if changes need to be made to geospatial boundaries, certain sectors or companies operating in certain jurisdictions, e.g. in the aftermath of new comprehensive sanctions or new industry regulations Deliver business justifications and project manage all improvements through to completion and implement and drive projects to scheduled timelines once approved. Establish yourself as a thought-leader in the maritime data space, delivering presentations to an external audience, promoting knowledge and data. What we are looking for: At least 8 years’ experience managing a team of data analysts. Managing a team size of 20-25 Culturally sensitive with a proven experience in managing both in-house and outsourced teams, tasked with performing data research and analytics. Proven success in implementing data, research and content improvements. Excellent communication skills with the ability to communicate complex issues to stakeholders at all levels of the business and customer organisations. Team player who brings positive energy and the ability to influence, inspire and motivate cross-functional teams across the organisation. Strong project management skills – being able to articulate business justifications, build timelines, risks and milestones and deliver to set deadlines. A customer-first approach and strong time management skills and ability to produce high quality content and resolve complex customer queries within set deadlines. Highly organised and attentive to detail, with an innovative and dynamic approach to problem-solving. Advanced OSINT research skills, comprehensive understanding of complex company ownership structures and financial and legal transactions in the maritime industry. Proficiency in written and spoken English, with demonstrable presentation skills for internal and external audiences. Experience in working for a global company

Posted 2 weeks ago

Apply

3.0 - 7.0 years

6 - 7 Lacs

Pune

Work from Office

Responsibilities: • Track threats via OSINT tools (Maltego, Shodan) • Monitor SIEM alerts (Wazuh, ELK, Splunk) • Analyze logs & respond to incidents • Detect brand misuse, fake apps/sites • Remote role with growth-based pay

Posted 2 weeks ago

Apply

10.0 years

0 Lacs

Pune, Maharashtra, India

On-site

METRO Global Solution Center (MGSC) is internal solution partner for METRO , a €31.6 Billion international wholesaler with operations in 32 countries through 625 stores & a team of 93,000 people globally. METRO operates in a further 10 countries with its Food Service Distribution (FSD) business and it is thus active in a total of 34 countries. MGSC, location wise is present in Pune (India) , Düsseldorf (Germany) and Szczecin (Poland). We provide IT & Business operations support to 31 countries, speak 24+ languages and process over 18,000 transactions a day. We are setting tomorrow’s standards for customer focus, digital solutions, and sustainable business models. For over 10 years, we have been providing services and solutions from our two locations in Pune and Szczecin. This has allowed us to gain extensive experience in how we can best serve our internal customers with high quality and passion. We believe that we can add value, drive efficiency, and satisfy our customers. Job Description The primary responsibility is to focus on managing and optimizing EDR solutions to enhance endpoint security. This includes designing, implementing, and maintaining EDR systems and technology, investigating incidents, and developing security policies. The ideal candidate will bring deep technical expertise, operational maturity towards improving security posture by collaborating with other teams and staying current with the latest threats. Qualification: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. A Master's degree or relevant certifications (e.g., CISSP, CISM, SANS/GIAC) may be preferred. 7-11 years of relevant professional experience in a large multi-national organization or in a known MSSP. Responsibilities: Develop and execute threat intelligence strategies, focusing on identifying and mitigating cyber threats. Lead activities to gather intelligence on threat actors, including their tactics, techniques, and procedures (TTPs). Conduct in-depth analysis of the threat landscape, focusing on industry-specific and emerging threats. Use Various available Security controls and the telemetry data within to conduct proactive threat hunts using a hypothesis-based approach. Analyse large datasets (logs, packet captures, alerts) to identify anomalies, malicious activity, and Indicators of Compromise (IOCs). Collaborate with SOC analysts, incident responders, and threat intelligence teams to improve detection rules and response strategies. Additionally, take the identified anomalies to a conclusion. Define the metrics, measurements and analytical tools to quantify surface area of risk, business impact and implement mechanisms to track progress on efforts to reduce those risks. Continuously improve hunting methodologies, automation, and use of threat hunting frameworks (e.g., MITRE ATT&CK). Stay current on emerging threats, vulnerabilities, and cyber-attack techniques. Create and present tailored threat intelligence and hunting reports along with mitigation strategies to internal stakeholders, including executives and IT Team to take necessary actions. Prepare monthly reports on threat hunts and able to showcase ROI of the overall threat hunting program. Adapts quickly to changing priorities, seeks new ideas, and re-aligns team’s priority/roadmap to maximize business productivity. Qualifications Technical & Soft Skills: In-depth knowledge of security operations center (SOC) operations, Cyber incident response, threat intelligence with extensive experience performing Threat hunting on IT Systems, Network and Endpoints. Proficiency in various SOC technologies and Threat Intel platform. Experience with scripting (Python, PowerShell, etc.) and automating threat detection or hunting tasks. Proficiency with OSINT tools, scripting and automation (e.g., Python, PowerShell), and Darkweb. Strong understanding of security frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain) and current threat landscapes. Knowledge about Advanced persistent threats and treat actors, their TTPs. Ability to recognize attack patterns and corelate them with specific threat actors. Ability to proactively find cybersecurity threats and mitigate them. Ability to obtain as much information on threat behaviour, goals and methods as possible. Knowledge of Analytics platforms for carrying out detailed analytics of obtained telemetry. Strong understanding of Windows, Linux, and network protocols. Excellent communication and interpersonal skills to effectively collaborate with clients, stakeholders, and internal teams. Analytical and problem-solving skills to identify and address security issues and incidents. Ability to adapt to changing security threats and evolving business requirements.

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Calicut

Remote

Senior Security Consultant (VAPT Specialist) Company Overview We are seeking a highly skilled and experienced Senior VAPT Specialist to join our cybersecurity team. This role is ideal for a security professional who excels in a client-facing environment and possesses in-depth expertise in both offensive and defensive security practices. Position Summary As a Senior VAPT Specialist, you will be responsible for conducting comprehensive security assessments, managing client relationships, and delivering high-quality penetration testing services. You will work with diverse clients to identify vulnerabilities, assess security postures, and provide actionable recommendations to enhance their cybersecurity defenses but not limited to. Key ResponsibilitiesClient Management & Communication Serve as the primary technical point of contact for assigned clients during security assessments Conduct client briefings, status updates, and final presentation meetings Translate complex technical findings into business-relevant insights for stakeholders Maintain professional relationships and ensure client satisfaction throughout project lifecycles Prepare and deliver comprehensive reports with clear remediation guidance Security Testing & Assessment Perform comprehensive vulnerability assessments and penetration testing across multiple domains: Web Application Security Testing : Identify and exploit vulnerabilities in web applications, including but not limited to OWASP Top 10 vulnerabilities Mobile Application Security Testing : Assess the security of iOS and Android applications, including static and dynamic analysis API Security Testing : Evaluate REST, SOAP, and GraphQL APIs for security weaknesses Network Penetration Testing : Conduct internal and external network assessments, including wireless security testing Source Code Review : Perform manual and automated static code analysis to identify security flaws Cloud Security Configuration Review : Assess cloud infrastructure configurations across AWS, Azure, and GCP platforms Threat Modeling & Risk Assessment Develop comprehensive threat models for client applications and infrastructure Conduct risk assessments and prioritize security findings based on business impact Design attack scenarios and security test cases based on threat intelligence Collaborate with development teams to integrate security into SDLC processes Red Team Operations Plan and execute red team exercises to simulate real-world attack scenarios Develop custom tools and exploits for specific client environments Conduct social engineering assessments and physical security testing when required Provide post-exercise debriefings and improvement recommendations Documentation & Reporting Create detailed technical reports documenting vulnerabilities, exploitation methods, and remediation steps Develop executive summaries tailored for C-level audiences Maintain accurate project documentation and testing methodologies Contribute to internal knowledge base and best practices documentation Required QualificationsExperience & Background 3-5 years of hands-on experience in vulnerability assessment and penetration testing Proven track record of successful client engagements and project delivery Experience with enterprise-level security assessments across various industries Demonstrated ability to work independently and manage multiple projects simultaneously Technical Expertise Deep understanding of security frameworks and standards : Penetration Testing Execution Standard (PTES) OWASP Top 10 and OWASP Testing Guide SANS Top 25 Most Dangerous Software Errors NIST Cybersecurity Framework CIS Critical Security Controls MITRE ATT&CK Framework Development & Programming Experience Software Development Background : Hands-on experience in application development and an understanding of secure coding practices are highly recommended. Programming and Scripting Languages : Strong proficiency in Python and Bash as minimum requirements, with additional experience in PowerShell, and at least one compiled language (C/C++, Go, Java, or C#) Custom Tool Development : Ability to develop custom security tools, exploits, and automation scripts Security Tools Expertise : Expert-level proficiency with: Burp Suite Professional, OWASP ZAP Nmap, Nessus, OpenVAS Metasploit, Cobalt Strike Wireshark, tcpdump Static analysis tools (SonarQube, Checkmarx, Veracode) Custom exploit development tools Social Engineering & Phishing Expertise Social Engineering Assessments : Design and execute social engineering campaigns to test human-factor security Phishing Simulations : Develop and conduct sophisticated phishing campaigns, including email, SMS, and voice-based attacks Physical Security Testing : Conduct on-site assessments including tailgating, badge cloning, and facility penetration Awareness Training : Provide security awareness training based on assessment findings OSINT (Open Source Intelligence) : Gather and analyze publicly available information for reconnaissance and social engineering preparation Communication & Language Skills Excellent English communication skills (both written and spoken) Ability to communicate complex technical concepts to non-technical stakeholders Strong presentation and public speaking abilities Professional writing skills for technical documentation and reports Professional Attributes Strong analytical and problem-solving abilities Attention to detail and a methodical approach to testing Ability to think like an attacker and anticipate security threats Commitment to ethical hacking principles and professional conduct Continuous learning mindset to stay current with emerging threats and technologies Research-Oriented Mindset : Conduct deep research activities to understand emerging vulnerabilities, attack vectors, and security trends Innovation and Tool Development : Proactive approach to developing custom security tools, scripts, and methodologies to enhance testing capabilities Creative thinking for developing novel attack scenarios and bypassing security controls Preferred QualificationsCertifications (Added Advantage) OSCP - Highly Preferred GPEN CRTO CRT Additional Experience (Added Advantage) Experience with DevSecOps practices and CI/CD pipeline security Background in software development or system administration Knowledge of compliance frameworks (PCI DSS, HIPAA, GDPR, SOC2, ISO 27001) Experience with threat intelligence platforms and indicators of compromise Familiarity with containerization security (Docker, Kubernetes) Previous consulting or client-facing experience What We OfferProfessional Development Continuous learning opportunities and professional development Support for professional certifications and training Mentorship opportunities and knowledge-sharing sessions Work Environment Collaborative and innovative team environment Flexible work arrangements and remote work options Opportunity to work with diverse clients across various industries Exposure to the latest cybersecurity trends and emerging technologies Compensation & Benefits Competitive salary commensurate with experience Performance-based bonuses and incentives Professional development and certification reimbursement Application Process Qualified candidates should submit: Current resume highlighting relevant experience and certifications Cover letter demonstrating communication skills and explaining interest in the role Professional references from previous clients or employers We are an equal-opportunity employer committed to diversity and inclusion in our workforce. Job Type: Full-time Benefits: Flexible schedule Health insurance Paid time off Provident Fund Schedule: Monday to Friday Work Location: In person

Posted 2 weeks ago

Apply

5.0 years

8 - 12 Lacs

Mahād

On-site

Education Bachelor’s Degree, or a combination of relevant education and specialized experience. Minimum eight 5 years of experience in security program management, conducting investigations / intelligence analysis (criminal, hazard, OSINT), or as a law enforcement supervisor. Work Experience Minimum 5 years required EX Army personnel required Proven experience in security management, with a minimum of five years in a leadership role. preferred Preferred Knowledge, Skills and Abilities Extensive knowledge of security industry regulations, standards, and best practices. Strong project management skills, with proven ability to manage complex projects and multiple tasks simultaneously. Excellent communication and interpersonal skills, with the ability to manage cross-functional teams and work effectively with employees at all levels of the organization. Job Type: Full-time Pay: ₹800,000.00 - ₹1,200,000.00 per year Benefits: Health insurance Provident Fund Schedule: Day shift Application Question(s): Mention Current CTC Work Location: In person Application Deadline: 26/07/2025

Posted 2 weeks ago

Apply

3.0 - 15.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Role Overview: We are looking for an experienced and analytical Cyber Threat Intelligence (CTI) Analyst/Lead to join a dynamic cybersecurity team. This role focuses on identifying, assessing, and analyzing cyber threats, vulnerabilities, and malicious activities that could impact the organization. The position requires working closely with internal threat intelligence, vulnerability, and sandboxing functions. You will be part of a global security operations setup, collaborating with stakeholders in both India and international locations. Key Responsibilities: Collect, analyze, and act on intelligence reports from CTI partners and open-source intelligence. Conduct proactive threat hunting using Indicators of Compromise (IoCs) across security tools (EDR, SIEM, SOAR). Request proactive blocking of IoCs across security layers such as antivirus, proxies, and email protection tools. Assess and communicate vulnerabilities related to the software ecosystem. Maintain and update software inventory as part of the Vulnerability Assessment process. Analyze files and packages in a sandbox environment and deliver well-structured technical reports. Track and communicate monthly KPIs and activity summaries. Provide support in investigating and reporting cyber-attacks and threat actor techniques. Required Qualifications & Skills: Bachelor’s degree in Computer Engineering, Information Technology, or a related field. Proven 3-15 years of experience in cyber threat analysis, open-source intelligence (OSINT), and malware investigations. For Lead role, handling and managing teams is mandatory. Familiarity with tools like SIEM, IDS/IPS, EDR, web proxies, and firewalls. Strong understanding of threat actor tactics, techniques, and procedures (TTPs). Practical knowledge of intelligence-gathering, research methodologies, and analysis techniques. Excellent analytical thinking, prioritization, and decision-making skills. High attention to detail, self-motivation, and ability to work independently. Strong verbal and written communication skills in English — ability to present technical findings to non-technical audiences. Preferred Traits: Team player with the ability to collaborate across security service lines. Comfortable working in a fast-paced, globally distributed SOC environment. Strong initiative and ownership mindset with a structured, result-oriented approach. Location: Andheri, Mumbai, Maharashtra Kindly note: Candidates currently residing in Mumbai should apply.

Posted 3 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

maharashtra

On-site

JOB DESCRIPTION About KPMG in India KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Jaipur, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada. KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment. i. BE/B. TECH/BCA/B.SC/M.SC/MCA/M. Tech-(Computers/Electronics/IT) ii. Minimum one certification such as CEH/OSCP and/or equivalent. iii. Having at least 5+ years of post-qualification relevant work experience including appearance before court of law while presenting the extracted cyber evidence. iv. Experience in all kinds of digital forensic work- Computer, macbook, Mobile, Cloud APIs, CCTV and AV, Database, Network etc including reporting v. Experience in analysis of malware, incident response, email and log analysis, threat modeling and assessments vi. Experience in Ethical Hacking, VAPT, OSINT etc. vii. Experience in handling cyber- crime cases, website defacement, email and VOIP analysis, image and video forensic viii. Dynamic and Static Malware analysis QUALIFICATIONS Graduation from premier institutes is preferred. Proficiency in Marathi language is must. Knowledge of IT Act, DPDP Act, CrPC, IPC, etc, laws is preferred,

Posted 3 weeks ago

Apply

0 years

0 Lacs

India

Remote

Tech Sales & Marketing Intern (Unpaid | 4-Month Internship) About GovAim GovAim is Astraeus Next Gen's flagship AI-native intelligence platform. It empowers organizations with real-time threat detection, deepfake defense, and autonomous AI-led investigations. Our clients include early-stage defense agencies, cybersecurity firms, and enterprise security teams across global markets. What You’ll Do Conduct outreach to enterprise security leads. Pitch GovAim’s value proposition through email, LinkedIn, and Zoom demos. Create and execute targeted marketing campaigns with guidance from our core team. Generate, qualify, and nurture leads through our CRM system. Participate in product positioning, market research, and competitive analysis. Collaborate with product and technical teams to refine messaging based on feedback. What You’ll Gain Real world experience in tech sales, marketing strategy, and growth operations. Exposure to AI, OSINT, deepfake detection, and cybersecurity innovation. Certificate of completion + recommendation letter after 4 months. Commission incentives on closed sales. Ideal Candidate Background in business, marketing, cybersecurity, or tech (students or recent grads welcome). Confident communicator with strong English writing & presentation skills. Entrepreneurial mindset – resourceful, curious, and driven to learn. Passion for the intersection of AI, security, and global impact. Internship Details Duration: 4 months (unpaid) Location: Fully remote Time Commitment: ~10–15 hrs/week Commission: % paid on qualified deals closed during or after internship (Prior Unpaid) Start Date: Immediate openings How to Apply Send your CV to info@astraeusnextgen.com or apply directly via LinkedIn.

Posted 3 weeks ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

On-site

About The Role Grade Level (for internal use): 07 You’ll be part of the Economic and Country Risk - OSINT team responsible for using hybrid machine-human sources to collect and enhance data about global security and political risks and using that to power a range of innovative predictive applications to better understand what is happening and changing in the world. Monitor and collect key political and global security events across assigned countries, ensuring comprehensive coverage of critical developments. Utilize licensed platforms and OSINT methodologies to systematically identify and extract relevant intelligence events on a global scale. Assess and verify the authenticity, credibility, and reliability of sources before integrating events into the intelligence database. Draft and publish well-structured, analytical intelligence summaries that accurately capture key event details. Ensure precise attribution of collected events, maintaining consistency in event categorization and metadata tagging. Conduct quality control checks on all collected information, identifying inconsistencies and ensuring adherence to data accuracy standards. Continuously identify and integrate new sources, with a focus on primary, region-specific, and high-reliability intelligence channels. Collaborate to contextualize terrorism data into wider security risk frameworks and client deliverables. Support research initiatives and provide analytical assistance for special projects as required by the business. Strictly adhere to standard operating procedures (SOPs) for data collection, categorization, and processing, ensuring compliance with organizational guidelines. Maintain and update documentation for assigned countries, ensuring accuracy and completeness in the intelligence collection plan. Support operations across flexible shifts, including on public holidays, any other S&P Global provided holidays, and on weekends (during emergency crises like protests/riots/or any other political violence in the assigned region/country) Education Degree in International Relations, Political Science, or a similar field Competencies Fluent in one or more - French, Spanish, Arabic, Russian, Mandarin, South East Asian language preferred, with excellent written and verbal communication skills. Broad knowledge of geopolitical affairs and global awareness of influences on business goals and strategies Excellent interpersonal skills and ability to work in a collaborative environment Excellent Computer and Analytical skills Excellent attention to detail Excellent command of the English Language (written and spoken) Knowledge and understanding of different cultures and regions What’s In It For You? Our Purpose Progress is not a self-starter. It requires a catalyst to be set in motion. Information, imagination, people, technology–the right combination can unlock possibility and change the world. Our world is in transition and getting more complex by the day. We push past expected observations and seek out new levels of understanding so that we can help companies, governments and individuals make an impact on tomorrow. At S&P Global we transform data into Essential Intelligence®, pinpointing risks and opening possibilities. We Accelerate Progress. Our People We're more than 35,000 strong worldwide—so we're able to understand nuances while having a broad perspective. Our team is driven by curiosity and a shared belief that Essential Intelligence can help build a more prosperous future for us all. From finding new ways to measure sustainability to analyzing energy transition across the supply chain to building workflow solutions that make it easy to tap into insight and apply it. We are changing the way people see things and empowering them to make an impact on the world we live in. We’re committed to a more equitable future and to helping our customers find new, sustainable ways of doing business. We’re constantly seeking new solutions that have progress in mind. Join us and help create the critical insights that truly make a difference. Our Values Integrity, Discovery, Partnership At S&P Global, we focus on Powering Global Markets. Throughout our history, the world's leading organizations have relied on us for the Essential Intelligence they need to make confident decisions about the road ahead. We start with a foundation of integrity in all we do, bring a spirit of discovery to our work, and collaborate in close partnership with each other and our customers to achieve shared goals. Benefits We take care of you, so you can take care of business. We care about our people. That’s why we provide everything you—and your career—need to thrive at S&P Global. Our Benefits Include Health & Wellness: Health care coverage designed for the mind and body. Flexible Downtime: Generous time off helps keep you energized for your time on. Continuous Learning: Access a wealth of resources to grow your career and learn valuable new skills. Invest in Your Future: Secure your financial future through competitive pay, retirement planning, a continuing education program with a company-matched student loan contribution, and financial wellness programs. Family Friendly Perks: It’s not just about you. S&P Global has perks for your partners and little ones, too, with some best-in class benefits for families. Beyond the Basics: From retail discounts to referral incentive awards—small perks can make a big difference. For more information on benefits by country visit: https://spgbenefits.com/benefit-summaries Global Hiring And Opportunity At S&P Global At S&P Global, we are committed to fostering a connected and engaged workplace where all individuals have access to opportunities based on their skills, experience, and contributions. Our hiring practices emphasize fairness, transparency, and merit, ensuring that we attract and retain top talent. By valuing different perspectives and promoting a culture of respect and collaboration, we drive innovation and power global markets. Recruitment Fraud Alert If you receive an email from a spglobalind.com domain or any other regionally based domains, it is a scam and should be reported to reportfraud@spglobal.com. S&P Global never requires any candidate to pay money for job applications, interviews, offer letters, “pre-employment training” or for equipment/delivery of equipment. Stay informed and protect yourself from recruitment fraud by reviewing our guidelines, fraudulent domains, and how to report suspicious activity here. Equal Opportunity Employer S&P Global is an equal opportunity employer and all qualified candidates will receive consideration for employment without regard to race/ethnicity, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, marital status, military veteran status, unemployment status, or any other status protected by law. Only electronic job submissions will be considered for employment. If you need an accommodation during the application process due to a disability, please send an email to: EEO.Compliance@spglobal.com and your request will be forwarded to the appropriate person. US Candidates Only: The EEO is the Law Poster http://www.dol.gov/ofccp/regs/compliance/posters/pdf/eeopost.pdf describes discrimination protections under federal law. Pay Transparency Nondiscrimination Provision - https://www.dol.gov/sites/dolgov/files/ofccp/pdf/pay-transp_%20English_formattedESQA508c.pdf 20 - Professional (EEO-2 Job Categories-United States of America), DTMGOP203 - Entry Professional (EEO Job Group), SWP Priority – Ratings - (Strategic Workforce Planning) Job ID: 317097 Posted On: 2025-07-08 Location: Bangalore, Karnataka, India

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies