Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 8.0 years
5 - 9 Lacs
mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
1.0 - 3.0 years
6 - 10 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 week ago
2.0 - 5.0 years
5 - 8 Lacs
chennai
Work from Office
Roles and Responsibilities Greetings from GRM Technologies!!! Providing support in IT and Cyber Risk Advisory services offered by GRM Technologies to its clients in the following domains- Information regulatory compliance (ISO 27001, PCIDSS, RBI, SEBI, SOC1, SOC2, PCI DSS, HITRUST, GDPR) Information risk management Information security and information assurance Information technology controls for financial and other systems Identifying processes and technologies to maintain and enhance the security architecture Disaster recovery and business continuity management Information privacy Have a fair understanding of Business Continuity Planning and DR Drills Should have conducted Information Life...
Posted 1 week ago
5.0 - 8.0 years
16 - 31 Lacs
bengaluru
Work from Office
Meet the Team Join Dexcom's Product Security R&D department as a Senior Security Engineer specializing in penetration testing. Our team is dedicated to ensuring the security of our mobile and web applications, cloud infrastructure, APIs, and physical medical devices. You'll work closely with the Director of Cybersecurity Engineering to identify and exploit vulnerabilities across various platforms, including mobile and web applications, cloud environments, APIs, hardware, firmware, and wireless networks. If you're a skilled penetration tester eager to tackle security challenges and make a significant impact using cutting-edge technologies, we want to hear from you. Where You Come In You condu...
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
noida, uttar pradesh
On-site
The Network Security L3 role involves advanced troubleshooting, configuration, and maintenance of network security infrastructure. You will need to possess in-depth knowledge of security protocols, network devices, and security best practices. Your primary responsibilities will include incident response, vulnerability management, and ensuring the overall security posture of the network. Your key responsibilities will involve providing expert-level support for Palo Alto firewall and network security incidents and issues, configuring and maintaining firewalls, intrusion detection/prevention systems, and other security appliances. Additionally, you will conduct vulnerability assessments and pen...
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
maharashtra
On-site
The role involves identifying vulnerabilities in systems, networks, and applications through vulnerability assessments and penetration testing (VAPT). You should have hands-on experience with Qualys for scanning and managing vulnerabilities, generating reports, and recommending remediation. Your responsibilities include conducting vulnerability assessments using tools like Qualys, performing penetration testing to exploit vulnerabilities, recommending security improvements, preparing detailed reports of findings, and following up on remediation.,
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
noida, uttar pradesh
On-site
You will be responsible for leading and mentoring a team of security professionals in executing offensive security assessments, penetration testing, and red team exercises. A deep understanding of attack methodologies, vulnerability research, and security best practices, coupled with strong leadership and communication skills, is essential. Your role as the Red Team Leader will be pivotal in enhancing the organization's security posture by identifying weaknesses and offering actionable recommendations. Your key responsibilities will include leading, mentoring, and developing a high-performing red team, planning and executing complex red team exercises and penetration tests, developing and ma...
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
navi mumbai, maharashtra
On-site
You have a strong knowledge and hands-on experience in conducting vulnerability assessments and penetration testing for web applications and devices. You are proficient in using security assessment tools like Nessus, NMAP, OWAPS, NICTO, KALI LINUX, etc. You excel in preparing detailed reports, submitting them, and ensuring follow-up for closure of security issues. Your expertise extends to understanding and working with SIEM, WAF, Firewall, log server, and Cloud Security. You are familiar with File Server, network devices, and Firewall access control lists. Knowledge of ISO27001 requirements will be an added advantage. Possessing certifications such as CEH and LA-ISMS showcases your commitme...
Posted 1 week ago
4.0 - 8.0 years
0 Lacs
maharashtra
On-site
You will be part of a dynamic team as a Cyber Security Analyst, where your primary role will involve enhancing the security of our digital infrastructure. Your responsibilities will include identifying vulnerabilities, conducting comprehensive security assessments, and ensuring adherence to industry standards. Your main duties will consist of carrying out Vulnerability Assessment & Penetration Testing (VAPT), as well as conducting Web, Mobile, and API Application Security Testing. Additionally, you will be responsible for executing Network VAPT and Configuration Audits, and documenting security risks along with actionable remediation steps. To excel in this role, you should possess a solid u...
Posted 1 week ago
5.0 - 11.0 years
7 - 13 Lacs
bengaluru
Work from Office
Prudential s purpose is to be partners for every life and protectors for every future. Our purpose encourages everything we do by creating a culture in which diversity is celebrated and inclusion assured, for our people, customers, and partners. We provide a platform for our people to do their best work and make an impact to the business, and we support our people s career ambitions. We pledge to make Prudential a place where you can Connect, Grow, and Succeed. Role Purpose: Apart from perform penetration testing independently, this position required to manage, mentor, coach a team to perform penetration testing for Prudential globally. Skills required: Good in team leadership Good in both o...
Posted 1 week ago
5.0 - 10.0 years
7 - 12 Lacs
bengaluru
Work from Office
Prudential s purpose is to be partners for every life and protectors for every future. Our purpose encourages everything we do by creating a culture in which diversity is celebrated and inclusion assured, for our people, customers, and partners. We provide a platform for our people to do their best work and make an impact to the business, and we support our people s career ambitions. We pledge to make Prudential a place where you can Connect, Grow, and Succeed. Role Purpose: Apart from perform penetration testing independently, this position required to manage, mentor, coach a team to perform penetration testing for Prudential globally. Skills required: Good in team leadership Good in both o...
Posted 1 week ago
7.0 - 12.0 years
14 - 19 Lacs
bengaluru
Work from Office
About The team As a member of the Device Trust Assurance team, you will have a substantial impact on the security of millions of Cisco devices all around the world. We are looking for people who are passionate about security and eager to learn the ropes of vulnerability management (reporting, triaging and driving remediation). About The Role The Vulnerability Management Engineer plays a critical role in ensuring the security of our systems by managing and mitigating vulnerabilities. Key responsibilities include reviewing vulnerability scanning reports, assessing severity, and triaging vulnerabilities, along with efficiently managing Jira tickets to facilitate timely remediation or mitigation...
Posted 1 week ago
2.0 - 6.0 years
6 - 12 Lacs
mumbai suburban, navi mumbai, mumbai (all areas)
Work from Office
Role & responsibilities : Planning the audit, developing clear and concise risk/control matrices and audit programs, and reporting Demonstrate professionalism, competence and clarity of communication when dealing with the IT stakeholders Demonstrate reasonable knowledge of the industry or sector and be aware of technical issues or audit risks Preferred candidate profile : Experience in conducting Information Systems and Security audits, application control reviews and application functionality reviews - Strong knowledge of regulations and circulars released by regulatory bodies (RBI, SEBI etc.) - Practical experience of audit methodology - Good written and oral communication skills - Good lo...
Posted 1 week ago
5.0 - 10.0 years
17 - 20 Lacs
bengaluru
Work from Office
Educational Requirements Bachelor of Engineering,Master Of Engineering Service Line Cyber Security Responsibilities Approx 5 years' experience as a Security Architect Bachelor's degree in information technology, security, or similar Experience in providing security architecture support to a large development organization Information security credentials such as IGP, CISSP or similar Well versed in cloud security on a generic level as well as AWSSecondary Skills:SAST and DASTSolid diplomatic and communication skills in EnglishThe candidate will primary work with security assessments and as part of that also be able to provide guidance on how to close security gaps The candidate will also be p...
Posted 1 week ago
3.0 - 7.0 years
6 - 10 Lacs
kochi
Work from Office
Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analysing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world. The ability to be a team player, Strong communication collaboration. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Application Securi...
Posted 1 week ago
2.0 - 6.0 years
4 - 8 Lacs
mumbai
Work from Office
Key Responsibilities NAC Implementation & Management : Design, deploy, upgrade and manage HPE Aruba ClearPass Policy Manager for zero-trust security, enforcing role-based access controls across wired, and VPN infrastructures Configure authentication methods (e.g., 802.1X, PEAP, MAC Auth, EAP-TLS) and troubleshoot issues like captive portal redirections or MAC address conflicts. Integrate ClearPass with third-party systems (e.g., SIEM, firewalls, TACACS+, RADIUS for contextual security enforcement. Perform PoC for the different Network vendor devices to check compatibility with Aruba ClearPass NAC. Policy Automation & Threat Response : Creation of policy, profile, cluster and enforcement. Aut...
Posted 1 week ago
5.0 - 10.0 years
12 - 16 Lacs
bengaluru
Work from Office
As a member of our offensive security team, you will be a key member of a team that finds, and helps fix vulnerabilities in our products, services, and enterprise. Also, we will have a substantial impact on the security of millions of Cisco users all around the world. We work individually and in small teams to test several new products each year. At Cisco, teams work on an exciting array of groundbreaking technologies from artificial intelligence & machine learning to desktop agents, to container orchestration in the cloud and within IoT device firmware. We believe on encouraging a positive culture by hiring, mentoring, and empowering smart, effective, low ego people and providing equal oppo...
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
81102 Jobs | Dublin
Wipro
28851 Jobs | Bengaluru
Accenture in India
24265 Jobs | Dublin 2
EY
21926 Jobs | London
Uplers
15950 Jobs | Ahmedabad
IBM
15060 Jobs | Armonk
Bajaj Finserv
14778 Jobs |
Amazon.com
14002 Jobs |
Accenture services Pvt Ltd
13694 Jobs |
Capgemini
13629 Jobs | Paris,France