Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 8.0 years
4 - 8 Lacs
bengaluru
Work from Office
About The Role Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Ping Identity Good to have skills : Microsoft Active DirectoryMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Project Role :Security Senior Analyst Project Role Description :Access management SME, responsible for overseeing the implementation, operations and delivery of Access Management (SSO and MFA) projects Must have skills :Ping Ide...
Posted 1 month ago
5.0 - 7.0 years
0 Lacs
bengaluru, karnataka, india
On-site
Minimum of 5 years related experience in an information security role, supporting security programs and security engineering/architecture in complex enterprise environments. Hands on experience on endpoint security and logging security. Research and evaluate new security technologies and make recommendations for implementation. Develop and implement security policies and procedures for end-users, including guidelines for password management, email security, and the use of portable devices. Provide training and support to end-users on how to use endpoint security solutions effectively. Respond to security incidents and participate in incident response efforts as required. Stay up to date on t...
Posted 1 month ago
8.0 - 12.0 years
10 - 14 Lacs
pune, chennai, bengaluru
Work from Office
Position Overview: We are seeking a highly skilled and motivated Project Manager to lead the implementation of a password reset system for our Middle East (ME) operations. The ideal candidate will have a strong background in IT project management, cybersecurity, and a deep understanding of password management systems. This role requires excellent organizational skills, the ability to manage cross-functional teams, and a keen eye for detail. Key Responsibilities: Project Planning and Execution: Develop and manage the project plan for the password reset implementation. Define project scope, goals, and deliverables in collaboration with stakeholders. Ensure project milestones and deadlines are ...
Posted 1 month ago
10.0 - 15.0 years
12 - 16 Lacs
pune, chennai, delhi / ncr
Work from Office
Roles and Responsibilities Implement and maintain SailPoint IdentityIQ components including Lifecycle Manager, Compliance Manager, Application On-Boarding Access Request Automated Provisioning, Password Management and Workflows. Collaborate with IT and business teams to develop technical solutions that meet user needs with respect to functionality performance scalability and reliability. Troubleshoot and resolve complex issues related to identity management and governance. Provide detailed monthly reporting and metrics to ensure a continuous improvement process for the IAM Program. Ensure complete technical and business requirements are gathered and use cases developed based upon those. Shou...
Posted 1 month ago
5.0 - 7.0 years
0 Lacs
bengaluru, karnataka, india
Remote
Job Description Who we are looking for: Strong understanding of how to implement concepts such as password less authentication, zero trust model, SASE, etc. Strong technical skills and experience in architecting and implementing at least one or more solutions such as SailPoint IIQ, SailPoint IdentityNow, One Identity, IBM IGI, Saviynt, ForgeRock, Okta, Microsoft Entra ID, Ping Identity, etc. Strong technical skills and experience in architecting and implementing at least one or more PAM solutions such as Beyond Trust PasswordSafe, Beyond Trust Privileged Remote Access, CyberArk, CyberArk Secrets Manager, Delinea, etc. What you will be responsible for: 5+ Years of IT experience with minimum 4...
Posted 1 month ago
5.0 - 8.0 years
7 - 10 Lacs
noida
Work from Office
> Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
8.0 - 10.0 years
12 - 17 Lacs
coimbatore
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
2.0 - 6.0 years
0 Lacs
karnataka
On-site
As a System Administrator, your primary responsibilities will include access and password management, enforcing secure credential policies, and implementing Access Control Management systems to ensure proper authorization and secure access to systems and data. You will also manage Password Management tools and practices to support secure credential lifecycle and compliance. Additionally, you will be the first line of IT support for all internal technical queries related to hardware, software, and network issues. In this role, you will be responsible for configuring, installing, and maintaining laptops, desktops, workstations, printers, and mobile devices. You will provide tech support for sy...
Posted 2 months ago
8.0 - 10.0 years
0 Lacs
hyderabad, telangana, india
On-site
Job Title: Senior Cyber Security Delivery Specialist Job Location: Hyderabad Experience: 8+ years Responsibilities : Implement data classification and labelling to categorise and protect sensitive information using Microsoft Purview Define, design and implement data governance policies using Microsoft Purview Review policies, generate insights and ensure that data governance practices are effective prior to making recommendation for policy enforcement Support training of SecOps, GRC and Pilot users as required Collaborate with cross-functional teams within and outside of technology Provide guidance on data protection, privacy, and security best practices Stay up to date with the latest secur...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
kochi
Work from Office
PAM SME/Admin (B2/B3) 4+ years of experience in PAM Administration Location: Kochi Required skills: 4+ Years of hands on experience in Arcos / Any other OEM PAM administration Must be well trained PAM admin activities Excellent technical skills in Arcos / other OEM PAM troubleshooting Security related certifications in PAM (added advantage) Excellent troubleshooting skills in PAM. Willingness to work from customer site at Cochin Willingness to work in 24/7 mode as per requirements. Excellent communication skills Should be a good team leader and good customer management skills. Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years.
Posted 2 months ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 months ago
3.0 - 7.0 years
0 Lacs
hyderabad, telangana
On-site
You should have experience with Data Transfer tools and methods, including the ability to create and process change requests for new and existing clients. This includes expertise in GlobalScape, NDM (including Secure+), AWS S3/AWS CLI, GCP, Azure Blob, WinSCP/Putty. Additionally, you should have proficiency in certificate management and application license management. Experience with server patching, maintenance, vulnerability remediation, and server monitoring is essential. Familiarity with system diagnostic tools and maintenance reports such as Rapid7 and Brinqa is required. You should also possess expertise in file server management, Active Directory, and DNS management. Extensive knowled...
Posted 2 months ago
3.0 - 7.0 years
0 Lacs
hyderabad, telangana
On-site
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. We're looking for a Consultant in the Cyber Team to work in IAM Operations support. The candidate should have experience with PAM Technologies such as CyberArk, AWS Secrets Manager, Azure Key Vault and possess strong troubleshooting skills. This role requires the candidate to work out of the office for all working days as an in-office require...
Posted 3 months ago
1.0 - 3.0 years
2 - 2 Lacs
Chennai
Work from Office
Responsibilities: * Digital Asset Guardianship * Web & Infrastructure Management * Ensure system security & compliance * Social Media & Online Presence * Subscription & Asset Oversight * Proactive Security & Backups * Manage Digital Assets Health insurance Annual bonus
Posted 3 months ago
1.0 - 3.0 years
3 - 5 Lacs
Hyderabad
Work from Office
Job Description Seeking a motivated and technically skilled First Level Help Desk Technician to provide front-line support for end-users across the organization. The candidate will be responsible for diagnosing and resolving issues related to Windows operating systems, laptops, basic networking, and software installation. The role also includes handling support tickets, remote troubleshooting, and escalating issues as needed. Responsibilities Serve as the first point of contact for end-users seeking technical support via phone, email, or ticketing system. Troubleshoot and resolve hardware and software issues on Windows laptops and desktops. Support software installations, upgrades, and basic...
Posted 3 months ago
3.0 - 7.0 years
0 Lacs
haryana
On-site
As a Security Engineer at Expedia Group, you will be part of the Security Solutions Engineering team responsible for designing and implementing critical security systems and services. Your role will involve working on key initiatives from conceptualization to deployment, requiring a deep understanding of complex technical environments and the ability to develop effective security solutions. Your responsibilities will include: - Implementing Endpoint Detection and Response (EDR) solutions such as Anti-malware Agents and Data Loss Prevention - Managing Web Content Filtering for seamless Internet protection using on-premise and cloud-based web proxies - Overseeing Vulnerability Management for D...
Posted 3 months ago
5.0 - 8.0 years
7 - 10 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do: Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents...
Posted 3 months ago
5.0 - 8.0 years
5 - 9 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 3 months ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 3 months ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
123151 Jobs | Dublin
Wipro
40198 Jobs | Bengaluru
EY
32154 Jobs | London
Accenture in India
29674 Jobs | Dublin 2
Uplers
24333 Jobs | Ahmedabad
Turing
22774 Jobs | San Francisco
IBM
19350 Jobs | Armonk
Amazon.com
18945 Jobs |
Accenture services Pvt Ltd
18931 Jobs |
Capgemini
18788 Jobs | Paris,France