Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 6.0 years
5 - 12 Lacs
Noida, Gurugram
Hybrid
>> Job Description Experience: 3+ years with at-least 2-3 years in client facing advisory consulting role and managing a medium sized team Preferred Certifications: CEH, ECSA, OSCP, CISSP, CCSK, OCSE, CCSP, AWS Security Desired skill set: 1. Strong understanding of IT security standards and frameworks (OWASP, NIST, CIS) 2. Strong understanding of security risks in networks and application platforms 3. Strong understanding of network security, infrastructure security and application security 4. Strong understanding of OSI, TCP/IP model and network basics 5. Demonstrate technical penetration testing skills on IT infrastructure, web applications, mobile platforms and Red teaming 6. Strong technical skills: Information security, network security, Windows security, UNIX/Linux security, web and mobile application security, Cloud platforms 7. Broad knowledge of security technologies for applications, databases, networks, servers, and desktops 8. Solid technical skills in both information security architecture and penetration testing and ability to assess testing tools and deploy the right ones. 9. Scripting and programming experience is beneficial 10. Ability to perform manual penetration testing 11. Experience in Application Security Testing (Web, Mobile & ERP [SAP]), or related functions Vulnerability Assessment, Penetration testing 12. Perform penetration testing of various thick client software, web applications, and communications infrastructure to assist in hardening the cybersecurity posture against malicious actors 13. Conduct security research on the latest emerging advanced persistent threats (APTs), malware, and other security developments to assist in enterprise security efforts. Apply this security research into assessments. 14. Perform technical writing to communicate the preparation, testing, and recommendation phases for various security tests. Work with stakeholders to remediate system vulnerabilities. 15. Train team members and colleagues on the latest cybersecurity tactics, techniques, and procedures (TTPs) to grow the skill of the firm 16. Understanding of various security technologies including end point security, perimeter security, advanced threat protection, malware defense and security management 17. Expertise in the phases of penetration testing. Familiarity with Kali Linux distribution and the associated penetration testing tools suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag exercises considered a plus. 18. Good Understanding of OWASP top 10 and mitigation techniques 19. Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, Security Misconfiguration, CSRF, authentication/ authorization issues 20. Database testing: MySQL, Oracle, NoSQL 21. Understanding of cyber security management, cyber analytics, security intelligence platforms and threat intelligence frameworks 22. Writing business proposals and response to client RFP/ RFIs 23. Identifying business opportunities and lead delivery and program management for large cyber security programs 24. Delivery team and client relationship management 25. Experience on both commercial, open source tools and frameworks but not limited: Burpsuite, Metasploit, Core-Impact, Kali-Linux, AppScan, WebInspect, SSLScan, Soap UI Pro, SonarQube, Qualys, Nikto, Nessus, nmap, sqlmap, OWASP ZAP .
Posted 2 weeks ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
About the Company : The Cybersecurity Engineer is responsible for creating and maintaining the information security tooling and infrastructure. This individual works as part of a results-oriented, service-delivery team and assists other disciplines within the Information Security team. Additionally, the Cybersecurity Engineering Engineer performs root cause analysis of problems, selects, develops, and implements automation tools, and actively participates in deeply technical discourse. Experience supporting the build, deployment, and management of CrowdStrike and Microsoft environments is highly preferred. About the Role : Team develops and manages next generation solutions, systems and assets that support the business and its subsidiaries. Working in a collaborative, creative and fun environment, we offer technology professionals a wide range of opportunities to utilize and further develop their skills while helping people live healthier lives. Responsibilities : Will need to have fundamental hands-on experience with core infrastructure operating systems, host compliance, file integrity monitoring solutions, and advanced malware defensive technologies. Base knowledge of running Red Hat Enterprise, MAC OSX and Windows Enterprise operating systems. Will have experience with fast paced, incentivized business operations that need to be agile while adhering to diverse regulatory and security framework expectations. The essential functions listed represent the major duties of this role, additional duties may be assigned. Manage system/application environment, configuration, policy and required operational activities on assigned technical security solutions. Monitors, reports on, and enhances performance of assigned technical security solutions. Design, implement, and manage security solutions using the Microsoft Cybersecurity stack, including but not limited to Entra ID, Defender for Identity, MS Defender for Endpoint, MS Defender for Office 365, and Defender for Cloud. Develop and enforce security policies, procedures, and standards in alignment with OWASP and DevSecOps best practices across the organization and development teams. Conduct regular security assessments, vulnerability scans, and penetration tests to identify and mitigate security risks. Monitor and respond to security incidents, providing timely and effective resolution. Collaborate with cross-functional teams to integrate security measures into the software development lifecycle. Provide guidance and training to internal teams on security best practices and emerging threats. Stay up to date with the latest security trends, technologies, and regulatory requirements. Qualifications : Bachelor's degree in computer science, Information Technology, or a related field. Proven experience in cybersecurity, with a focus on the Microsoft Cybersecurity stack. Strong knowledge of MS Entra ID, Identity Access Management, Defender for Identity, Defender for Endpoint, Defender for Office 365, and Defender for Cloud. Familiarity with OWASP and DevSecOps principles. Experience with additional security tools such as CrowdStrike and SonarQube is a plus. Excellent problem-solving skills and the ability to work under pressure. Strong communication and interpersonal skills. Preferred Skills : Certifications such as CISSP, CISM, or Microsoft Certified: Security, Compliance, and Identity Fundamentals. Experience with cloud security and hybrid environments. Knowledge of scripting languages (e.g., PowerShell, Python) for automation. Equal Opportunity Statement : Sonny’s is proud to be an equal opportunity employer and is committed to maintaining a diverse and inclusive work environment. All qualified applicants will receive considerations for employment without regard to race, color, religion, sex, age, disability, marital status, familial status, sexual orientation, pregnancy, genetic information, gender identity, gender expression, national origin, ancestry, citizenship status, veteran status, and any other legally protected status under state, or local anti-discrimination laws.
Posted 2 weeks ago
0 years
0 Lacs
Chennai, Tamil Nadu, India
Remote
When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What You’ll Be Doing... You'll be part of the "Verizon Global Infrastructure (VGI), Network & Information Security” group working on security and automation tools to protect against cyber threats within the VGS Technology organization. You will work with a team of cybersecurity engineers with network & infrastructure background, threat intelligence analysts and risk management personnel to align common technologies and practices that fortify our applications, systems, IT network and infrastructure. Some of your daily responsibilities would be the following. Leveraging industry proven tools to identify and reduce Cyber Risks Implementing next generation network security architecture, create advanced policies and controls against future threats Ensuring effectiveness and coverage of security, policies and controls of VGS Network & Infrastructure, prioritizing risk level. Ensuring Security posture of VGS Network & Infrastructure, e.g., access management, vulnerabilities remediation, etc. Developing awareness, training & compliance programs focused on Network & Infrastructure Cyber Security practices. Coordinating activities like network, penetration testing, incident response, data collection etc by partnering with the CISO teams. Assisting in Crisis Management, Ransomware Recovery and Business Continuity planning. Identifying, investigating and resolving global security breaches / incidents Developing and maintaining network and infrastructure security reporting dashboards and scorecards used to measure our Cyber Practice. Identifying opportunities and use cases for automation to remediate vulnerabilities , implement controls, orchestrate between tools and automate security practices. What we’re looking for... You are passionate about network security and automation as a career. You are self-driven and motivated, with good communication and analytical skills. You’re a sought-after team member that thrives in a dynamic work environment. You will be working with multiple partners from the business groups, so networking and managing effective working relationships should be your top most priority. You have an understanding of industry trends in all areas of Information Security. You'll need to have some of the skills listed below. Masters or Bachelor’s degree in Computer Science / Information Technology Engineering Four or more years of relevant work experience in network / information security, risk and compliance management. Understanding of network fundamentals, switching, routing protocols, load balancers, web proxies, firewalls and software defined networking solutions. Understanding of security fundamentals Confidentiality, Integrity, Availability, access control, Authentication, Authorization, Auditing secure design concepts like Experience in design and implementation of network security solutions like firewalls, intrusion detection and prevention systems, VPN , web proxies etc using vendor products like Cisco, Juniper, Checkpoint, Palo Alto etc Experience working in any one of the SIEM / SOAR solutions like Splunk SOAR, Cortex XSOAR by Palo Alto Networks, IBM Security QRadar SOAR, Swimlane etc Experience in managing public cloud infrastructure like AWS, Azure, GCP etc Experience working in a SOC environment handling processes like Incident Management and Triage, Vulnerability Management, Threat Intelligence, Threat Hunting etc Knowledge of common software vulnerabilities like OWASP Top 10 / Sans Top 25 and their relevant controls and safeguards for secure software will be an added advantage. Experience working on IT ticketing systems like JIRA, Service Now and ability to partner and collaborate with other teams in the organization Experience with hosting security awareness campaigns, gamification and bug bounty programs will be an added advantage Strong analytical problem solving, communication and interpersonal skills Passion to stay abreast with emerging technologies, network security trends, tools and techniques. Even better if you have one or more of the following: Industry relevant security certifications Security+, OSCP, CEH, CISSP, GIAC etc Cloud relevant certifications CCSP, CCSK Strong expertise in at least one operating system Window or Linux. Strong Scripting expertise in any one of Python, R, Perl, Javascript, Powershell, bash , VBScript etc Experience in managing server infrastructure Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics.
Posted 2 weeks ago
0 years
0 Lacs
Hyderabad, Telangana, India
Remote
When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What You’ll Be Doing... You'll be part of the "Verizon Global Infrastructure (VGI), Network & Information Security” group working on security and automation tools to protect against cyber threats within the VGS Technology organization. You will work with a team of cybersecurity engineers with network & infrastructure background, threat intelligence analysts and risk management personnel to align common technologies and practices that fortify our applications, systems, IT network and infrastructure. Some of your daily responsibilities would be the following. Leveraging industry proven tools to identify and reduce Cyber Risks Implementing next generation network security architecture, create advanced policies and controls against future threats Ensuring effectiveness and coverage of security, policies and controls of VGS Network & Infrastructure, prioritizing risk level. Ensuring Security posture of VGS Network & Infrastructure, e.g., access management, vulnerabilities remediation, etc. Developing awareness, training & compliance programs focused on Network & Infrastructure Cyber Security practices. Coordinating activities like network, penetration testing, incident response, data collection etc by partnering with the CISO teams. Assisting in Crisis Management, Ransomware Recovery and Business Continuity planning. Identifying, investigating and resolving global security breaches / incidents Developing and maintaining network and infrastructure security reporting dashboards and scorecards used to measure our Cyber Practice. Identifying opportunities and use cases for automation to remediate vulnerabilities , implement controls, orchestrate between tools and automate security practices. What we’re looking for... You are passionate about network security and automation as a career. You are self-driven and motivated, with good communication and analytical skills. You’re a sought-after team member that thrives in a dynamic work environment. You will be working with multiple partners from the business groups, so networking and managing effective working relationships should be your top most priority. You have an understanding of industry trends in all areas of Information Security. You'll need to have some of the skills listed below. Masters or Bachelor’s degree in Computer Science / Information Technology Engineering Four or more years of relevant work experience in network / information security, risk and compliance management. Understanding of network fundamentals, switching, routing protocols, load balancers, web proxies, firewalls and software defined networking solutions. Understanding of security fundamentals Confidentiality, Integrity, Availability, access control, Authentication, Authorization, Auditing secure design concepts like Experience in design and implementation of network security solutions like firewalls, intrusion detection and prevention systems, VPN , web proxies etc using vendor products like Cisco, Juniper, Checkpoint, Palo Alto etc Experience working in any one of the SIEM / SOAR solutions like Splunk SOAR, Cortex XSOAR by Palo Alto Networks, IBM Security QRadar SOAR, Swimlane etc Experience in managing public cloud infrastructure like AWS, Azure, GCP etc Experience working in a SOC environment handling processes like Incident Management and Triage, Vulnerability Management, Threat Intelligence, Threat Hunting etc Knowledge of common software vulnerabilities like OWASP Top 10 / Sans Top 25 and their relevant controls and safeguards for secure software will be an added advantage. Experience working on IT ticketing systems like JIRA, Service Now and ability to partner and collaborate with other teams in the organization Experience with hosting security awareness campaigns, gamification and bug bounty programs will be an added advantage Strong analytical problem solving, communication and interpersonal skills Passion to stay abreast with emerging technologies, network security trends, tools and techniques. Even better if you have one or more of the following: Industry relevant security certifications Security+, OSCP, CEH, CISSP, GIAC etc Cloud relevant certifications CCSP, CCSK Strong expertise in at least one operating system Window or Linux. Strong Scripting expertise in any one of Python, R, Perl, Javascript, Powershell, bash , VBScript etc Experience in managing server infrastructure Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics.
Posted 2 weeks ago
15.0 years
0 Lacs
Kochi, Kerala, India
On-site
Company Description McFadyen Digital is the leading advisor and implementer of eCommerce Marketplace solutions. During 15 years of implementing marketplaces, we’ve built dozens of platforms that cumulatively generate billions of dollars of gross merchandise value (GMV). We’re honored to have supported 10% of the Fortune 500 with their digital marketplace initiatives. Over 250 global brands like ABB, AB InBev, ACCO, Albertsons, American Red Cross, American Eagle Outfitters, US Army, US Agriculture Dept, (and many more) have entrusted their digital transformations to McFadyen. We operate global offices across the US, Brazil, and India. McFadyen Digital has been a trusted employer for 35 years and believes that people are the most important part of our company. We’re proud of our Great Place to Work certification. Learn more about us at our website: www.mcfadyen.com Job Description We are seeking an experienced and dynamic Senior Test Architect who can lead and drive innovation and transformation in QA domain. This person is expected to work hand in hand with the CoE Lead and drive Quality Assurance (QA) transformation initiatives and drive excellence in testing strategies and solutions. The ideal candidate will bring expertise in QA transformation, automation, performance testing, security testing, API testing, mobile application testing, and a deep understanding of modern QA tools, technologies, and AI-driven testing tools (GenAI) . Key Responsibilities Test Architect Leadership Lead, Design and Implement a comprehensive QA transformation roadmap to align testing processes with organizational goals. Drive innovation by introducing industry best practices, frameworks, and emerging QA technologies, including AI-driven testing solutions. Bring in efficiencies in QA processes and implement initiatives to reduce overall QA effort on projects Define and evangelize quality metrics, ensuring consistent measurement and continuous improvement across all QA efforts. Excellent customer management and people management skills Automation & Tooling Architect and implement scalable test automation frameworks for functional, performance, and regression testing. Lead the adoption of modern QA tools for CI/CD pipelines, API testing, mobile testing, security testing, and GenAI-based testing tools. Collaborate with development and DevOps teams to ensure seamless integration of QA tools, AI-driven solutions, and automation pipelines. AI-Driven Testing Leverage GenAI-based tools to optimize test case generation, data creation, and defect prediction. Drive innovation by introducing AI/ML-powered frameworks for smarter and faster test execution. Identify and implement tools that utilize natural language processing (NLP) for test scripting and result interpretation. Performance & Security Testing Define and execute comprehensive performance testing strategies to ensure system reliability and scalability under various conditions. Lead security testing initiatives, including vulnerability assessments and penetration testing, to ensure robust security practices. API & Mobile Application Testing Build and enhance testing strategies for API testing using modern tools like Postman, Swagger, and RestAssured. Design mobile application testing frameworks, ensuring optimal quality for both iOS and Android platforms. Team Collaboration & Mentorship Partner with cross-functional teams to define quality standards and ensure their adoption across the projects. Mentor QA team by providing technical guidance, training, and leadership. Foster a culture of quality-first development through collaboration, knowledge-sharing, and continuous feedback. QA Metrics & Reporting Define and track key performance indicators (KPIs) for testing effectiveness and efficiency. Regularly communicate test results, risks, and recommendations to stakeholders. Qualifications Experience & Expertise 12+ years of QA experience, with at least 5 years in QA leadership role. Proven expertise in QA transformation initiatives and building high-performing QA teams. Hands-on experience with: Automation Tools: Selenium, Appium, Cypress, Playwright, etc. Performance Testing Tools: JMeter, LoadRunner, Gatling, etc. Security Testing: OWASP, Burp Suite, ZAP, etc. API Testing Tools: Postman, Swagger, RestAssured, etc. Mobile Testing: Appium, Espresso, XCTest, etc. AI/GenAI Tools: Experience with Testsigma, Functionize, Testim.io, or similar AI-driven testing tools. Strong knowledge of CI/CD processes and tools (Jenkins, GitLab, etc.). Familiarity with cloud-based testing environments and tools (e.g., AWS, Azure, BrowserStack). Soft Skills Exceptional problem-solving and critical-thinking abilities. Strong communication and stakeholder management skills. Ability to work collaboratively in cross-functional teams and mentor QA team members. Education Bachelor’s/master’s degree in computer science, Information Technology, or related field. Preferred Qualifications Certification in QA domains (e.g., ISTQB Advanced Test Manager, Certified Agile Tester). Experience with Agile/Scrum development methodologies. Hands-on experience with AI/ML-driven QA tools and techniques, including natural language-based test generation and defect analysis. Additional Information What we can offer you A career with thought leaders who literally wrote the book on Marketplace Best Practices. A career in the fast-paced world of retail eCommerce, digital marketplaces and platform businesses. A career with first movers who are deploying new business models and strategies worldwide. A career in a flat management structure without a rigid hierarchy and bureaucracy. A career in a culture that rewards creativity and innovation, risk-taking and teamwork. Core Values: Client Focus, Owning the Outcome, Adaptable, Caring Keywords: Senior Test Architect, QA leadership, QA transformation, test automation, Selenium, Appium, Cypress, Playwright, performance testing, JMeter, LoadRunner, Gatling, security testing, OWASP, Burp Suite, ZAP, API testing, Postman, RestAssured, Swagger, mobile testing, Espresso, XCTest, AI-driven testing, GenAI testing tools, Testsigma, Functionize, Testim.io, CI/CD, Jenkins, GitLab, cloud testing, AWS, Azure, BrowserStack, QA strategy, NLP-based test generation, defect prediction, ISTQB Advanced Test Manager, Certified Agile Tester, Agile, Scrum, QA metrics, quality assurance. eCommerce & Marketplace Platforms: Adobe Commerce (Magento), Salesforce Commerce Cloud (SFCC), SAP Hybris, Mirakl, ChannelAdvisor, IBM WebSphere Commerce, BigCommerce, Shopify Plus, commercetools, Oracle Commerce, Elastic Path, Spryker Technology & Tools: CRM (Salesforce), SaaS Sales, PIM (Product Information Management), CPQ (Configure Price Quote), CMS (Content Management Systems), OMS (Order Management Systems), ERP (Enterprise Resource Planning), BI Tools (Business Intelligence) McFadyen’s goal is to ensure that our clients are able to maximize the return on their technology investment by providing better service to their clients, partners and internal teams. At McFadyen we truly believe our employees are our most valuable asset. Across our locations in the US, Brazil, and India, we offer a world class work culture that enables top notch delivery for some of the world’s most influential companies. McFadyen Digital is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, age, religion, sex, sexual orientation, gender identity / expression, national origin, disability, protected veteran status, or any other characteristic protected under federal, state, or local law, where applicable.
Posted 2 weeks ago
4.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. The candidate would be expected to work in diverse risk consulting engagements and are willing to travel to Middle East countries for project execution atleast 60% of their time. The candidate are expected to have experience / knowledge with respect to the following: Experience with infrastructure penetration testing and vulnerability assessments Good knowledge of OWASP and Secure SDLC standards Should have performed web/mobile/API penetration testing. Good knowledge of encryption technologies & MiTM attacks Experience in performing security code reviews and log analysis. Knowledge of Linux administration, TCP/IP, DNS, Network protocols and OSI model Good understanding of MITRE ATT&CK framework and how to leverage it. Good understanding of AD administration, different authentication mechanisms, trust boundaries etc. Experience in performing security configuration reviews for OS, Databases, Network & Security devices, applications etc. Should have good understanding of the cloud services (AWS, Azure and GCP), its architecture, potential attack vectors and mitigation plans Should have good understanding of the Container services, Kubernetes auditing and LLM security Experience in performing architecture design review for network and applications Experience in performing CS audits/maturity assessments against relevant standards like SAMA CSF, NCA, NIST, NESA, Qatar Cybersecurity Framework etc. Support in conducting technical reviews as part of IT/CS audits Should hold atleast 1 of the certifications or its equivalent : OSCP, GPEN, OSWE, OSWP, CRTP, LPT, ECSA, ISO27001, CEH Hands on experience will security testing tools/frameworks like Burp Suite, Nessus, Qualys etc. Hands on experience with programming using Python/Perl/PowerShell/C# Hands on experience with setting-up phishing and performing social engineering assessments Experience with AV/NAC evasion, obfuscation, bypass windows ASR/device guard, network security controls, emails gateway filtering etc. Experience with Active directory assessments Experience with different stages of cyber kill chain Review operational logs and event console activity to determine cause of security-related events or to identify potential security related events Analysis of the patches released by the vendors Good in report writing and convey the observations to the top management in layman’s language emphasizing on the business risks. Experience with mentoring junior resources or managing stakeholders/client Should be open-minded and ready to take up additional challenges or tasks outside your core domain expertise Skills Network Vulnerability Scanning and Penetration Testing, Web Application Penetration Testing, Mobile Application Penetration Testing, Web service/API Security Assessment, Secure Code review, AD Security Assessments, Social Engineering Assessments, Configuration Audit (Automated and Manual), Wireless Penetration Testing, Threat Modelling Qualification required-MCA/BTech /BSc ( Comp Science/Electronics and communication, or equivalent) Qualification preferred- Minimum 4+ years of IT/cyber risk consulting & penetration testing experience EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 2 weeks ago
4.0 years
0 Lacs
Kanayannur, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. The candidate would be expected to work in diverse risk consulting engagements and are willing to travel to Middle East countries for project execution atleast 60% of their time. The candidate are expected to have experience / knowledge with respect to the following: Experience with infrastructure penetration testing and vulnerability assessments Good knowledge of OWASP and Secure SDLC standards Should have performed web/mobile/API penetration testing. Good knowledge of encryption technologies & MiTM attacks Experience in performing security code reviews and log analysis. Knowledge of Linux administration, TCP/IP, DNS, Network protocols and OSI model Good understanding of MITRE ATT&CK framework and how to leverage it. Good understanding of AD administration, different authentication mechanisms, trust boundaries etc. Experience in performing security configuration reviews for OS, Databases, Network & Security devices, applications etc. Should have good understanding of the cloud services (AWS, Azure and GCP), its architecture, potential attack vectors and mitigation plans Should have good understanding of the Container services, Kubernetes auditing and LLM security Experience in performing architecture design review for network and applications Experience in performing CS audits/maturity assessments against relevant standards like SAMA CSF, NCA, NIST, NESA, Qatar Cybersecurity Framework etc. Support in conducting technical reviews as part of IT/CS audits Should hold atleast 1 of the certifications or its equivalent : OSCP, GPEN, OSWE, OSWP, CRTP, LPT, ECSA, ISO27001, CEH Hands on experience will security testing tools/frameworks like Burp Suite, Nessus, Qualys etc. Hands on experience with programming using Python/Perl/PowerShell/C# Hands on experience with setting-up phishing and performing social engineering assessments Experience with AV/NAC evasion, obfuscation, bypass windows ASR/device guard, network security controls, emails gateway filtering etc. Experience with Active directory assessments Experience with different stages of cyber kill chain Review operational logs and event console activity to determine cause of security-related events or to identify potential security related events Analysis of the patches released by the vendors Good in report writing and convey the observations to the top management in layman’s language emphasizing on the business risks. Experience with mentoring junior resources or managing stakeholders/client Should be open-minded and ready to take up additional challenges or tasks outside your core domain expertise Skills Network Vulnerability Scanning and Penetration Testing, Web Application Penetration Testing, Mobile Application Penetration Testing, Web service/API Security Assessment, Secure Code review, AD Security Assessments, Social Engineering Assessments, Configuration Audit (Automated and Manual), Wireless Penetration Testing, Threat Modelling Qualification required-MCA/BTech /BSc ( Comp Science/Electronics and communication, or equivalent) Qualification preferred- Minimum 4+ years of IT/cyber risk consulting & penetration testing experience EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 2 weeks ago
8.0 years
22 - 28 Lacs
Pune, Maharashtra, India
On-site
Senior Software Engineer – Java (27205) Location: Pune (Hybrid – 3 days/week) Notice Period: Immediate joiners only Role Overview As a Senior Java Engineer, you will collaborate with leads and senior engineers to design and develop scalable, robust Java applications. You’ll be involved in architecting solutions, developing microservices, improving CI/CD pipelines, and mentoring junior engineers. Key Responsibilities Architect and implement scalable end-to-end web applications. Work in a high-velocity Scrum team environment. Collaborate with clients to solve real-world problems. Facilitate development processes alongside team leads. Provide accurate estimates and milestones for features/stories. Mentor junior engineers and contribute to team growth. Participate in interviewing and architectural planning. Mandatory Skills & Experience 8+ years professional experience in Java development within enterprise domains. Java 8 or 11 features proficiency (lambdas, Stream API, CompletableFuture). 4+ years hands-on experience with Microservices, Spring Boot, Hibernate. 3+ years experience developing RESTful APIs. At least 2 years working with Kafka. 1.5+ years experience with cloud computing (AWS preferred). Proficient with SQL databases. Understanding of CI/CD pipelines and deployment. Experience in FinTech domain projects. Immediate availability and no employment gaps/job hopping. Local candidates from Pune only (hybrid working model). Nice-to-Have Skills Knowledge of network protocols (gRPC, HTTP/2). Familiarity with security frameworks (OWASP, OAuth, encryption). Experience with Agile methodologies. Strong verbal and written communication skills. Interview Process 4 rounds (2 internal + 2 client rounds), virtual. Additional Notes Shift: 9 AM to 5 PM Skills: microservices,hibernate,restful apis,pipelines,engineers,features,spring boot,software,ci/cd,sql,skills,java,cd,api,aws,ci,kafka
Posted 2 weeks ago
5.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Job Title: Java Developer – Web Application Security Location: Chennai (Onsite) Experience: 5+ Years Notice Period: Immediate Joiners or Candidates Serving Notice Preferred Job Summary: We’re hiring a skilled Java Developer to join our team focused on remediating security vulnerabilities in legacy web applications. This is a hands-on role for professionals strong in JSP, Servlets , and secure coding practices. Key Responsibilities: Fix vulnerabilities identified via tools like Checkmarx/Snyk Upgrade outdated Java libraries (e.g., Spring, commons-fileupload) Implement secure coding techniques to address XSS and OWASP Top 10 issues Collaborate using Git , conduct code reviews, and manage dependencies with Maven/Gradle Requirements: 5+ years in Java web development Strong experience with JSP, Servlets , and legacy frameworks Proficient in Git, Maven/Gradle , and Eclipse IDE Knowledge of secure coding and web application security fundamentals
Posted 2 weeks ago
4.0 - 9.0 years
6 - 11 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
Would you enjoy working with cutting-edge web security systems? Do you seek hands-on learning experiences on Web Security with a growing global team? Join our highly skilled Professional Services team Our Professional Services team partners with leading organizations to seamlessly integrate their websites onto our platform. We collaborate on security and enterprise products, delivering consultative services and designing optimal solutions as one team. Make an impact on the future of Internet Security You will work directly with clients to deliver Akamais solutions. You will be involved with projects from design through implementation, testing and customer sign-off. As a Security Architect II, you will be responsible for: Owning the technical aspects of integration (configuration, debugging, documentation, testing, go-live) of our Security Solutions Analyzing customer traffic as well as systems and customizing Akamai security solutions to answer customers security issues Managing and documenting technical issues, responses and requests to ensure information is recorded and updated Being a proactive technical consultant for our customers delivering value with every engagement Collaborating with cross-functional project team to scope, set timelines, create technical solutions, and support the ongoing implementation Do what you love To be successful in this role you will: Have a Bachelors degree with 4 years of experience in general security technologies, processes, and concepts. Be well versed in internet fundamentals, DNS and routing, communication protocols such as HTTP or TCP Have experience as an Application Security Engineer or Network Security Engineer Have ability to engage, influence, and build trusted relationships with customers in difficult environments. Be able to analyze customer traffic &systems and customize Akamai security solutions to answer customers security issues. Demonstrate the ability to work proactively, quickly, with a desire to learn and problem solving. Have knowledge of OWASP, network security products, network/application firewalls, server and client-side application architecture Demonstrate excellent communication and presentation skills to articulate highly technical information in a concise manner. Build your career at Akamai Our ability to shape digital life today relies on developing exceptional people like you. The kind that can turn impossible into possible. We re doing everything we can to make Akamai a great place to work. A place where you can learn, grow and have a meaningful impact. With our company moving so fast, it s important that you re able to build new skills, explore new roles, and try out different opportunities. There are so many different ways to build your career at Akamai, and we want to support you as much as possible. We have all kinds of development opportunities available, from programs such as GROW and Mentoring, to internal events like the APEX Expo and tools such as Linkedin Learning, all to help you expand your knowledge and experience here. Learn more Not sure if this job is the right match for you or want to learn more about the job before you apply? Schedule a 15-minute exploratory call with the Recruiter and they would be happy to share more details.
Posted 2 weeks ago
1.0 - 2.0 years
3 - 4 Lacs
Panchkula
Work from Office
Cyber Security Analyst I Role | Grazitti Panchkula By continuing to use our website, you consent to the use of cookies. Please refer our Join Our Clan Cyber Security Analyst I Description Job Description We re looking for a proactive and detail-oriented Cyber Security Analyst I to join our Information Security Group (ISG) at Grazitti Interactive. In this entry-level role, you ll be responsible for monitoring security alerts, supporting incident investigations, and assisting in vulnerability management. If you re passionate about cybersecurity, eager to grow in a dynamic environment, and want to make a tangible impact on enterprise security, this is your chance. Skills Key Skills 1 2 years of experience in cybersecurity or a related technical role Basic understanding of network security, firewalls, and SIEM tools Familiarity with OWASP Top 10 and SANS Top 25 Solid knowledge of cybersecurity principles and practices Strong analytical and problem-solving skills Excellent verbal and written communication Ability to work collaboratively with cross-functional teams Awareness of security compliance frameworks and risk management concepts Exposure to vulnerability management tools and incident response workflows Proficiency in MS Office (Word, Excel, PowerPoint) Responsibilities Roles and Responsibilities Monitor and triage security events using SIEM tools Assist in initial investigation and categorization of incidents Support vulnerability assessments and remediation efforts Maintain accurate documentation of incidents and responses Collaborate with IT and cross-functional teams to resolve security issues Contribute to security training and knowledge-sharing sessions Assist in improving overall security posture by participating in internal reviews Communicate updates and risks to internal stakeholders regularly Position: Cyber Security Analyst I Thank you for submitting your application. We will contact you shortly! Stay updated with us Life at Grazitti Share Your Profile We are always looking for the best talent to join our team * Skills Upload Your CV Thank you for sharing your profile with us. If it aligns with our requirements, we will reach out to you for the next steps in the process. Marketo Forms 2 Cross Domain request proxy frame This page is used by Marketo Forms 2 to proxy cross domain AJAX requests.
Posted 2 weeks ago
2.0 - 6.0 years
4 - 8 Lacs
Hyderabad
Work from Office
About the Role: Join the Product Security Testing team at ServiceNow, where we help secure the applications our customers rely on. As a new graduate, you ll work alongside experienced engineers to identify and fix security issues in our products. You ll learn how to find vulnerabilities in Java and JavaScript code, understand the security implications of AI-enabled applications, and contribute to building tools that make security testing more efficient. We re looking for someone with a strong engineering mindset, curiosity to learn, and a passion for solving real-world security problems. What You ll Do: Perform security testing on new product features. Review code written in Java, JavaScript, and other languages to identify vulnerabilities. Understand and apply secure development practices throughout the software development lifecycle (SDLC). Collaborate with developers to fix security issues and improve product security. Explore and assess security risks in AI-enabled applications. Contribute to the development of internal tools and automation to support security testing. Stay up to date with the latest trends in application and AI security. What We re Looking For: Passion for security 2024 - 25 Mtech / Ms in computer science or a related field only , with a focus on AI/ML or Cybersecurity Strong problem-solving and analytical skills. Basic understanding of application security concepts (e.g., OWASP Top 10). Familiarity with programming languages like Java, JavaScript, and other scripting languages. Interest in AI technologies and their impact on application security. Willingness to learn about the ServiceNow platform. Good communication skills and a collaborative mindset.
Posted 2 weeks ago
2.0 - 6.0 years
5 - 9 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails
Posted 2 weeks ago
1.0 - 4.0 years
3 - 6 Lacs
Mumbai, Bengaluru
Work from Office
The CoinDCX Journey: Building Tomorrow, todayAt CoinDCX, we believe CHANGE STARTS TOGETHER . You are the driving force that will help us make Web3 accessible to all.In the last six years, we have skyrocketed from being India s first crypto unicorn to carrying a community of over 125 million with us. To continue maximising the adoption and acceleration of Web3, we are now focused on developing cutting-edge products, addressing accessibility and security challenges, and bridging the gap between people and Web3 technologies. While we go ahead and keep dominating the Web3 world, we would like to HODL you on our team! Join our team of passionate innovators who are breaking barriers and building the future of Web3. Together, we will make the complex simple, the inaccessible accessible, and the impossible possible. Boost your innovation to an ALL TIME HIGH with us! You need to be a HODLer of these Minimum 1 to 4 years of experience Web and Mobile Security Assessments Must-Have core-technical Skills for: Web and Mobile Penetration Testing Competence with OWASP Standards (Both Web and Mobile) Familiarity with tools like MobSF, Frida, Burp Suite. At least 2 year in API Sec Assessment Good to have - Knowledge of Cloud Security Good to have (Any one or more of the following certs) - OSCP, GPEN, CPENT, PNPT, CRTOPYou will be mining through these tasks Proactively identify and reduce security threats, vulnerabilities and risks Identify & remediate outdated, vulnerable code and code libraries Provide subject matter expertise on architecture, authentication, and system security Develop security training and guidance to internal development teams Participate in the development of CoinDCX platforms by collaborating with the engineering team Consult with other Developers and Product Managers to analyze and propose application security standards, methods, and architectures Create and maintain artifacts in a protected repository established as a single source of truth Assess security tools and integrate tools as needed, particularly open-source tools Assist with recruiting activities and administrative work Professionally Handle communications with independent vulnerability researchers and design appropriate mitigation strategies for reported vulnerabilities Communicate clearly on technical issuesAre you the one? Our missing block You are knowledge-hungry when it comes to VDA and Web3, always eager to dive deeper and stay ahead in this evolving space. The world of Web3 and VDA excites you, fueling your curiosity and driving you to explore new opportunities within this dynamic landscape. You act like an owner, constantly striving for excellence, impact, and tangible results in everything you do. You embrace a We over Me mindset, growing individually while fostering the growth of those around you. Change is your catalyst, igniting your passion to build and innovate. You think outside the box, unbound by limitations or doubt, always pushing the boundaries of what s possible.Perks That Empower YouOur benefits are designed to make a lasting impact on your life, giving you the freedom to create a work-life balance that truly suits you. Design Your Own Benefit: Tailor your perk package to fit your unique needs. Whether you re eyeing a new gadget or welcoming a furry friend into your life, our flexible benefits ensure that you can prioritize what matters most to you. Unlimited Wellness Leaves: We believe in the power of well-being. Take the time you need to recharge, knowing that your health is our priority. With unlimited wellness leaves, you can return refreshed, ready to build and grow. Mental Wellness Support: Your mental health is as important as your professional growth. Benefit from access to health experts, free counseling sessions, monthly wellness workshops, and regular team outings, all designed to help you stay balanced and connected. Bi-Weekly Learning Sessions: These sessions are more than just updates they re opportunities to fuel your growth. Stay ahead with the latest industry knowledge, sharpen your skills, and accelerate your career in an ever-evolving landscape.
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Archer. Experience: 5-8 Years.
Posted 2 weeks ago
4.0 - 9.0 years
7 - 17 Lacs
Bengaluru
Work from Office
About this Role: Wells Fargo is seeking a Senior Information Security Analyst. Responsibilities : This position is a Senior Information Security Analyst performing the role of an Application Security Champion who will be responsible for reviewing security requirements and security design submissions by application teams. Reviewing security requirements and security design submissions by application teams. Submissions will either be approved or rejected based on evaluation and comparison to systems of record. Provide information security consultation to improve awareness and compliance with Enterprise Application Security Program (EASP) policy, processes, and standards. Perform remediation of security assessment review issues and reporting to support EASP risk management. Provide guidance and direction in reviewing assessment findings and mitigating controls to optimize application security. Validate SAST, DAST and SCA scans and recommend the fix for application teams. Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals. Interact with teammates across all Lines of Business. Required Qualifications: 4+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education Desired Skills: 2+ years of experience as application security champion 2+ years of experience in at least one of the following practices like Security Requirements, Application Threat Modeling, Static Analysis, Application Security Risk Assessments, Security Design requirements. Knowledge and experience in identifying and suggesting mitigations to OWASP top 10, CWE/SANS top 25 to development teams. Ability to manage multiple priorities in a fast-paced dynamic environment. Advanced problem solving skills, ability to develop effective long-term solutions to problems. Excellent verbal and written communication skills Excellent inter-personal skills contributing to cordial team environment Knowledge and understanding of secure SDLC (System Development Life Cycle) methodologies. Experience in drafting application security coding standards. Ability to manage highly complex issues and negotiate solutions. Knowledge and understanding of Application security threat management and mitigation domain. Application security experience with banking/financial services applications. Certified in Industry renowned certifications like CISSP, CSSLP, CEH etc. Job Expectations: This position will also be responsible to work with software development partners, business system consultants and LOB leads to perform security assessments on variety of applications to identify security defects and provide remediation recommendation by following the processes and policies. Submissions will either be approved or rejected based on evaluation and comparison to systems of record.
Posted 2 weeks ago
4.0 - 9.0 years
7 - 10 Lacs
Bengaluru
Work from Office
Hands-on experience with testing frameworks in line with Web App, Mobile, Web Services/APIs, Network blockchain. Experience in both commercial and open source tools like: Burp Professional, Nmap, Kali, Metasploit, etc. Experience with Open Web Application Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM) methodologies and tools. Experience in preparing a security threat model and associated test plans. Experience in translating the complex security threats to simpler procedures for web application developers, systems administrators, and management to understand security testing results. In-depth knowledge of application development processes and at least one programing or scripting language (e.g., Java, Scala, C#, Ruby, Perl, Python, PowerShell) is preferred. Knowledge of current information security threats Open Source, Penetration Testing, Web App
Posted 2 weeks ago
3.0 - 5.0 years
5 - 7 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Mgmt and Governance Experience : 3-5 Years.
Posted 2 weeks ago
3.0 - 5.0 years
5 - 7 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Mgmt and Governance Experience : 3-5 Years.
Posted 2 weeks ago
2.0 - 6.0 years
4 - 8 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do: Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails
Posted 2 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do: Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk Experience : 5-8 Years.
Posted 2 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do: Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management Experience : 5-8 Years.
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PingFederate.: Experience: 5-8 Years.
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management.: Experience: 5-8 Years.
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.: Experience: 5-8 Years.
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39817 Jobs | Dublin
Wipro
19388 Jobs | Bengaluru
Accenture in India
15458 Jobs | Dublin 2
EY
14907 Jobs | London
Uplers
11185 Jobs | Ahmedabad
Amazon
10459 Jobs | Seattle,WA
IBM
9256 Jobs | Armonk
Oracle
9226 Jobs | Redwood City
Accenture services Pvt Ltd
7971 Jobs |
Capgemini
7704 Jobs | Paris,France