Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
0 years
0 Lacs
New Delhi, Delhi, India
Remote
About Tide At Tide, we are building a business management platform designed to save small businesses time and money. We provide our members with business accounts and related banking services, but also a comprehensive set of connected administrative solutions from invoicing to accounting. Launched in 2017, Tide is now used by over 1 million small businesses across the world and is available to UK, Indian and German SMEs. Headquartered in central London, with offices in Sofia, Hyderabad, Delhi, Berlin and Belgrade, Tide employs over 2,000 employees. Tide is rapidly growing, expanding into new products and markets and always looking for passionate and driven people. Join us in our mission to empower small businesses and help them save time and money. About The Team The Tide Security Engineering team is made up of three core areas: Product Security, Identity, Threat Detection & Response Product Security consists of application and cloud security experts. Their mission is to protect the products we build, covering everything from secure design reviews to threat modelling and penetration testing, ensuring security is embedded from the ground up. Threat Detection & Response focuses on protecting the company by building a robust detection and automation platform. We’re proactive in our defence, constantly hacking ourselves to improve our security posture and staying ahead of emerging threats. Our goal is to make Tide resilient against the ever-evolving threat landscape. Identity (this role!) is responsible for Identity across Tide. Everything from managing Okta to provisioning modern access control patterns for newly deployed applications is within scope of this team. The team uses strategies like zero trust, Just-in-Time access, and granular access controls to safeguard our internal operations. While each area has its own focus, collaboration is key – it's why we share the same Slack channel and hold our standups together as one cohesive team, ensuring alignment and seamless communication across all security functions. About The Role As a Staff Identity Engineer, team you’ll be: Championing Identity across Tide; from integrating new applications with Okta to creating Just-in-Time access rules for existing applications Collaborating very closely with business and technology teams to define and implement least-privilege, modern access controls and patterns Ensuring our Identity estate (Okta and beyond) adheres to best practices. Today it may mean deploying phishing-resistant MFA; tomorrow, it could involve adopting innovative access technologies Automating manual, inefficient processes to streamline identity management workflows What We Are Looking For Strong expertise with modern Identity Providers such as Okta or similar platforms Deep understanding of authentication protocols such as OAuth 2.0, SAML and OIDC Strong hands-on experience writing Terraform Experience in scripting and automation to solve complex identity challenges; bonus points if you have a repository showcasing your work A passion for mentoring and sharing knowledge with your team Hands-on attitude and the ability to drive solutions to completion Excellent spoken and written communication skills What You’ll Get In Return Our location-specific employee benefits are designed to cater to the unique needs of Tideans: Self & Family Health Insurance Term & Life Insurance OPD Benefits Mental wellbeing through Plumm Learning & Development Budget WFH Setup allowance 15 days of Privilege leaves 12 days of Casual leaves 12 days of Sick leaves 3 paid days off for volunteering or L&D activities Stock Options TIDEAN WAYS OF WORKING At Tide, we champion a flexible workplace model that supports both in-person and remote work to cater to the specific needs of our different teams. While remote work is supported, we believe in the power of face-to-face interactions to foster team spirit and collaboration. Our offices are designed as hubs for innovation and team-building, where we encourage regular in-person gatherings to foster a strong sense of community. TIDE IS A PLACE FOR EVERYONE At Tide, we believe that we can only succeed if we let our differences enrich our culture. Our Tideans come from a variety of backgrounds and experience levels. We consider everyone irrespective of their ethnicity, religion, sexual orientation, gender identity, family or parental status, national origin, veteran, neurodiversity or differently-abled status. We celebrate diversity in our workforce as a cornerstone of our success. Our commitment to a broad spectrum of ideas and backgrounds is what enables us to build products that resonate with our members’ diverse needs and lives. We are One Team and foster a transparent and inclusive environment, where everyone’s voice is heard. At Tide, we thrive on diversity, embracing various backgrounds and experiences. We welcome all individuals regardless of ethnicity, religion, sexual orientation, gender identity, or disability. Our inclusive culture is key to our success, helping us build products that meet our members' diverse needs. We are One Team, committed to transparency and ensuring everyone’s voice is heard. You personal data will be processed by Tide for recruitment purposes and in accordance with Tide's Recruitment Privacy Notice.
Posted 18 hours ago
0 years
0 Lacs
Hyderabad, Telangana, India
Remote
About Tide At Tide, we are building a business management platform designed to save small businesses time and money. We provide our members with business accounts and related banking services, but also a comprehensive set of connected administrative solutions from invoicing to accounting. Launched in 2017, Tide is now used by over 1 million small businesses across the world and is available to UK, Indian and German SMEs. Headquartered in central London, with offices in Sofia, Hyderabad, Delhi, Berlin and Belgrade, Tide employs over 2,000 employees. Tide is rapidly growing, expanding into new products and markets and always looking for passionate and driven people. Join us in our mission to empower small businesses and help them save time and money. About The Team The Tide Security Engineering team is made up of three core areas: Product Security, Identity, Threat Detection & Response Product Security consists of application and cloud security experts. Their mission is to protect the products we build, covering everything from secure design reviews to threat modelling and penetration testing, ensuring security is embedded from the ground up. Threat Detection & Response focuses on protecting the company by building a robust detection and automation platform. We’re proactive in our defence, constantly hacking ourselves to improve our security posture and staying ahead of emerging threats. Our goal is to make Tide resilient against the ever-evolving threat landscape. Identity (this role!) is responsible for Identity across Tide. Everything from managing Okta to provisioning modern access control patterns for newly deployed applications is within scope of this team. The team uses strategies like zero trust, Just-in-Time access, and granular access controls to safeguard our internal operations. While each area has its own focus, collaboration is key – it's why we share the same Slack channel and hold our standups together as one cohesive team, ensuring alignment and seamless communication across all security functions. About The Role As a Staff Identity Engineer, team you’ll be: Championing Identity across Tide; from integrating new applications with Okta to creating Just-in-Time access rules for existing applications Collaborating very closely with business and technology teams to define and implement least-privilege, modern access controls and patterns Ensuring our Identity estate (Okta and beyond) adheres to best practices. Today it may mean deploying phishing-resistant MFA; tomorrow, it could involve adopting innovative access technologies Automating manual, inefficient processes to streamline identity management workflows What We Are Looking For Strong expertise with modern Identity Providers such as Okta or similar platforms Deep understanding of authentication protocols such as OAuth 2.0, SAML and OIDC Strong hands-on experience writing Terraform Experience in scripting and automation to solve complex identity challenges; bonus points if you have a repository showcasing your work A passion for mentoring and sharing knowledge with your team Hands-on attitude and the ability to drive solutions to completion Excellent spoken and written communication skills What You’ll Get In Return Our location-specific employee benefits are designed to cater to the unique needs of Tideans: Self & Family Health Insurance Term & Life Insurance OPD Benefits Mental wellbeing through Plumm Learning & Development Budget WFH Setup allowance 15 days of Privilege leaves 12 days of Casual leaves 12 days of Sick leaves 3 paid days off for volunteering or L&D activities Stock Options TIDEAN WAYS OF WORKING At Tide, we champion a flexible workplace model that supports both in-person and remote work to cater to the specific needs of our different teams. While remote work is supported, we believe in the power of face-to-face interactions to foster team spirit and collaboration. Our offices are designed as hubs for innovation and team-building, where we encourage regular in-person gatherings to foster a strong sense of community. TIDE IS A PLACE FOR EVERYONE At Tide, we believe that we can only succeed if we let our differences enrich our culture. Our Tideans come from a variety of backgrounds and experience levels. We consider everyone irrespective of their ethnicity, religion, sexual orientation, gender identity, family or parental status, national origin, veteran, neurodiversity or differently-abled status. We celebrate diversity in our workforce as a cornerstone of our success. Our commitment to a broad spectrum of ideas and backgrounds is what enables us to build products that resonate with our members’ diverse needs and lives. We are One Team and foster a transparent and inclusive environment, where everyone’s voice is heard. At Tide, we thrive on diversity, embracing various backgrounds and experiences. We welcome all individuals regardless of ethnicity, religion, sexual orientation, gender identity, or disability. Our inclusive culture is key to our success, helping us build products that meet our members' diverse needs. We are One Team, committed to transparency and ensuring everyone’s voice is heard. You personal data will be processed by Tide for recruitment purposes and in accordance with Tide's Recruitment Privacy Notice.
Posted 18 hours ago
0 years
1 - 1 Lacs
Hyderābād
Remote
ABOUT TIDE At Tide, we are building a business management platform designed to save small businesses time and money. We provide our members with business accounts and related banking services, but also a comprehensive set of connected administrative solutions from invoicing to accounting. Launched in 2017, Tide is now used by over 1 million small businesses across the world and is available to UK, Indian and German SMEs. Headquartered in central London, with offices in Sofia, Hyderabad, Delhi, Berlin and Belgrade, Tide employs over 2,000 employees. Tide is rapidly growing, expanding into new products and markets and always looking for passionate and driven people. Join us in our mission to empower small businesses and help them save time and money. ABOUT THE TEAM The Tide Security Engineering team is made up of three core areas: Product Security, Identity, Threat Detection & Response Product Security consists of application and cloud security experts. Their mission is to protect the products we build, covering everything from secure design reviews to threat modelling and penetration testing, ensuring security is embedded from the ground up. Threat Detection & Response focuses on protecting the company by building a robust detection and automation platform. We're proactive in our defence, constantly hacking ourselves to improve our security posture and staying ahead of emerging threats. Our goal is to make Tide resilient against the ever-evolving threat landscape. Identity (this role!) is responsible for Identity across Tide. Everything from managing Okta to provisioning modern access control patterns for newly deployed applications is within scope of this team. The team uses strategies like zero trust, Just-in-Time access, and granular access controls to safeguard our internal operations. While each area has its own focus, collaboration is key – it's why we share the same Slack channel and hold our standups together as one cohesive team, ensuring alignment and seamless communication across all security functions. ABOUT THE ROLE As a Staff Identity Engineer, team you'll be: Championing Identity across Tide; from integrating new applications with Okta to creating Just-in-Time access rules for existing applications Collaborating very closely with business and technology teams to define and implement least-privilege, modern access controls and patterns Ensuring our Identity estate (Okta and beyond) adheres to best practices. Today it may mean deploying phishing-resistant MFA; tomorrow, it could involve adopting innovative access technologies Automating manual, inefficient processes to streamline identity management workflows WHAT WE ARE LOOKING FOR Strong expertise with modern Identity Providers such as Okta or similar platforms Deep understanding of authentication protocols such as OAuth 2.0, SAML and OIDC Strong hands-on experience writing Terraform Experience in scripting and automation to solve complex identity challenges; bonus points if you have a repository showcasing your work A passion for mentoring and sharing knowledge with your team Hands-on attitude and the ability to drive solutions to completion Excellent spoken and written communication skills WHAT YOU'LL GET IN RETURN Our location-specific employee benefits are designed to cater to the unique needs of Tideans: Self & Family Health Insurance Term & Life Insurance OPD Benefits Mental wellbeing through Plumm Learning & Development Budget WFH Setup allowance 15 days of Privilege leaves 12 days of Casual leaves 12 days of Sick leaves 3 paid days off for volunteering or L&D activities Stock Options TIDEAN WAYS OF WORKING At Tide, we champion a flexible workplace model that supports both in-person and remote work to cater to the specific needs of our different teams. While remote work is supported, we believe in the power of face-to-face interactions to foster team spirit and collaboration. Our offices are designed as hubs for innovation and team-building, where we encourage regular in-person gatherings to foster a strong sense of community. #LI-AC1 #LI-Remote TIDE IS A PLACE FOR EVERYONE At Tide, we believe that we can only succeed if we let our differences enrich our culture. Our Tideans come from a variety of backgrounds and experience levels. We consider everyone irrespective of their ethnicity, religion, sexual orientation, gender identity, family or parental status, national origin, veteran, neurodiversity or differently-abled status. We celebrate diversity in our workforce as a cornerstone of our success. Our commitment to a broad spectrum of ideas and backgrounds is what enables us to build products that resonate with our members' diverse needs and lives. We are One Team and foster a transparent and inclusive environment, where everyone's voice is heard. At Tide, we thrive on diversity, embracing various backgrounds and experiences. We welcome all individuals regardless of ethnicity, religion, sexual orientation, gender identity, or disability. Our inclusive culture is key to our success, helping us build products that meet our members' diverse needs. We are One Team, committed to transparency and ensuring everyone's voice is heard. You personal data will be processed by Tide for recruitment purposes and in accordance with Tide's Recruitment Privacy Notice .
Posted 19 hours ago
0 years
1 - 1 Lacs
Gurgaon
Remote
ABOUT TIDE At Tide, we are building a business management platform designed to save small businesses time and money. We provide our members with business accounts and related banking services, but also a comprehensive set of connected administrative solutions from invoicing to accounting. Launched in 2017, Tide is now used by over 1 million small businesses across the world and is available to UK, Indian and German SMEs. Headquartered in central London, with offices in Sofia, Hyderabad, Delhi, Berlin and Belgrade, Tide employs over 2,000 employees. Tide is rapidly growing, expanding into new products and markets and always looking for passionate and driven people. Join us in our mission to empower small businesses and help them save time and money. ABOUT THE TEAM The Tide Security Engineering team is made up of three core areas: Product Security, Identity, Threat Detection & Response Product Security consists of application and cloud security experts. Their mission is to protect the products we build, covering everything from secure design reviews to threat modelling and penetration testing, ensuring security is embedded from the ground up. Threat Detection & Response focuses on protecting the company by building a robust detection and automation platform. We're proactive in our defence, constantly hacking ourselves to improve our security posture and staying ahead of emerging threats. Our goal is to make Tide resilient against the ever-evolving threat landscape. Identity (this role!) is responsible for Identity across Tide. Everything from managing Okta to provisioning modern access control patterns for newly deployed applications is within scope of this team. The team uses strategies like zero trust, Just-in-Time access, and granular access controls to safeguard our internal operations. While each area has its own focus, collaboration is key – it's why we share the same Slack channel and hold our standups together as one cohesive team, ensuring alignment and seamless communication across all security functions. ABOUT THE ROLE As a Staff Identity Engineer, team you'll be: Championing Identity across Tide; from integrating new applications with Okta to creating Just-in-Time access rules for existing applications Collaborating very closely with business and technology teams to define and implement least-privilege, modern access controls and patterns Ensuring our Identity estate (Okta and beyond) adheres to best practices. Today it may mean deploying phishing-resistant MFA; tomorrow, it could involve adopting innovative access technologies Automating manual, inefficient processes to streamline identity management workflows WHAT WE ARE LOOKING FOR Strong expertise with modern Identity Providers such as Okta or similar platforms Deep understanding of authentication protocols such as OAuth 2.0, SAML and OIDC Strong hands-on experience writing Terraform Experience in scripting and automation to solve complex identity challenges; bonus points if you have a repository showcasing your work A passion for mentoring and sharing knowledge with your team Hands-on attitude and the ability to drive solutions to completion Excellent spoken and written communication skills WHAT YOU'LL GET IN RETURN Our location-specific employee benefits are designed to cater to the unique needs of Tideans: Self & Family Health Insurance Term & Life Insurance OPD Benefits Mental wellbeing through Plumm Learning & Development Budget WFH Setup allowance 15 days of Privilege leaves 12 days of Casual leaves 12 days of Sick leaves 3 paid days off for volunteering or L&D activities Stock Options TIDEAN WAYS OF WORKING At Tide, we champion a flexible workplace model that supports both in-person and remote work to cater to the specific needs of our different teams. While remote work is supported, we believe in the power of face-to-face interactions to foster team spirit and collaboration. Our offices are designed as hubs for innovation and team-building, where we encourage regular in-person gatherings to foster a strong sense of community. #LI-AC1 #LI-Remote TIDE IS A PLACE FOR EVERYONE At Tide, we believe that we can only succeed if we let our differences enrich our culture. Our Tideans come from a variety of backgrounds and experience levels. We consider everyone irrespective of their ethnicity, religion, sexual orientation, gender identity, family or parental status, national origin, veteran, neurodiversity or differently-abled status. We celebrate diversity in our workforce as a cornerstone of our success. Our commitment to a broad spectrum of ideas and backgrounds is what enables us to build products that resonate with our members' diverse needs and lives. We are One Team and foster a transparent and inclusive environment, where everyone's voice is heard. At Tide, we thrive on diversity, embracing various backgrounds and experiences. We welcome all individuals regardless of ethnicity, religion, sexual orientation, gender identity, or disability. Our inclusive culture is key to our success, helping us build products that meet our members' diverse needs. We are One Team, committed to transparency and ensuring everyone's voice is heard. You personal data will be processed by Tide for recruitment purposes and in accordance with Tide's Recruitment Privacy Notice .
Posted 19 hours ago
10.0 years
0 Lacs
India
On-site
JOB DESCRIPTION Job Purpose The Cyber Security Awareness Specialist plays a critical role in maturing Mashreq Bank’s cyber security awareness program. The specialist is responsible for fostering a culture where Cybersecurity is embedded in their roles in protecting the Bank’s assets and information and integrating cybersecurity awareness into the bank's broader security strategy, ensuring a proactive and informed workforce that upholds the bank’s commitment to data protection and risk management. Key Responsibilities include: Develop and deliver a Cybersecurity Training program. Plan and execute Cybersecurity Awareness Campaigns to promote cybersecurity. Advocate for cybersecurity policies and best practices. Monitor training effectiveness and report on progress Collaborate with stakeholders to foster a cybersecurity-conscious culture. Training Development and Delivery Develop, implement, and maintain cybersecurity awareness training programs tailored to the bank's needs. Create engaging and innovative content, including e-learning modules, videos, infographics, and interactive sessions. Deliver in-person or virtual workshops and presentations to educate employees on cybersecurity risks and best practices. Design and implement methods to measure the impact and effectiveness of training programs, ensuring continuous improvement. Awareness Campaigns Plan and execute cybersecurity awareness campaigns aligned with the bank goals and global cybersecurity events (e.g., Cybersecurity Awareness Month). Develop and distribute communication materials such as newsletters, posters, and email alerts to promote awareness. Collaborate with marketing and HR teams to ensure consistent and aligned messaging across the bank. Phishing Simulations and Assessments Conduct phishing simulation exercises to assess employees' awareness levels and identify areas for improvement. Analyze simulation results and provide targeted recommendations and additional training where needed. Assist in developing risk mitigation strategies based on identified vulnerabilities. Policy and Best Practice Advocacy Promote adherence to cybersecurity policies and procedures across the bank. Act as a liaison between the IT/security team and employees, ensuring clear guidance on security policies and fostering two-way communication to address concerns and feedback. Monitoring and Reporting Track and analyze the effectiveness of training programs and campaigns using metrics and feedback, and incident data to identify trends and opportunities for improvement. Provide regular reports to management, detailing progress, successes, and areas for improvement. Stay updated on emerging cybersecurity threats and trends to enhance training content. Collaboration and Leadership Work closely with key stakeholders and leadership teams to align awareness programs with the bank goals. Act as a cybersecurity ambassador, fostering a proactive and security-conscious culture. Continuous Improvement: Actively participate in security improvement initiatives and providing feedback to enhance security processes, controls, and awareness efforts across the bank. Operating Environment, Framework and Boundaries, Working Relationships Operating environment: All Mashreq Bank locations Frameworks: Information security policy manual, CBUAE and local Regulations, industry best practices and contractual requirements. Working Relationship: All Business, Governance, Enabling and Control groups. Problem Solving Ability to assess IS Governance, Policy and Procedure Standards for banking environment Ability to assess applicability of IS regulatory requirements Ability to consult and provide solutions to business and technology that mitigates IS risks Collaborate with cross-functional teams to develop solutions addressing systemic risks and ensuring a cohesive defense-in-depth approach. Ability to derive residual risk and control based on defense – in depth strategy and systemic risk while taking risk and control decisions. Decision Making Authority & Responsibility Influences policy adherence, regulation applicability, scoping and control decision. Consult and provide recommendations to mitigate the risk to a level aligned with the risk appetite of the bank. Assure compliance to regulatory expectation and avoid regulatory penalty. Confirm adequacy of the controls against internal information security policy, standards and applicable regulatory requirements. Knowledge, Skills, and Experience Essential knowledge Have a minimum of 10 years of experience in cybersecurity awareness, training, or related roles preferably within the banking or financial services industry. Strong knowledge of cybersecurity principles, threats, and best practices. Excellent communication, presentation, and interpersonal skills. Proficiency in using tools for creating digital training materials (e.g., e-learning platforms, video editing software). Familiarity with phishing simulation tools, wargaming tools (e.g., Defender, Conductrr etc.) and methodologies. Experience managing relationships with senior and executives. Familiarity with information security technologies, risk, threat and vulnerability assessments, and security measures. Knowledge of information security regulatory and compliance requirements. Skills and Application Support in the development and implementation of comprehensive information security awareness program in alignment with the Information Security Group strategy. Oversees awareness program and ensuring key metrics are managed within risk appetite level. Strategic Insight Cultivates an organizational culture inside that prioritizes and encourages proactive information security practices and continuous improvement across all departments. Integrate information security considerations into ISG strategies, recognizing the importance of information security in achieving ISG objectives and competitive advantage. Communicates the strategic value of Information Security and Data to executive leadership and key stakeholders, advocating for resources and support to strengthen the bank's capabilities. Key Competencies Creativity and ability to craft engaging, informative materials for diverse audiences. Analytical skills to assess training effectiveness and identify risks. Strong organizational and project management skills. A proactive mindset and enthusiasm for fostering a culture of cybersecurity awareness. Professional certifications: CISA, CISM, CISSP, CRISC, ISO27001 LA/LI etc.
Posted 19 hours ago
3.0 - 5.0 years
0 Lacs
Indore, Madhya Pradesh, India
Remote
Job Description: We are looking for a skilled and proactive IT Engineer to manage and maintain our organization's IT infrastructure. The ideal candidate will be responsible for managing networks, local servers, data sharing systems, and ensuring robust cybersecurity across the organization. Key Responsibilities: Network Management: Configure, manage, and troubleshoot LAN, WAN, and wireless networks. Monitor network performance and implement upgrades as needed. Handle IP addressing, DHCP, DNS, and routing protocols. Server Management: Install, configure, and maintain local servers (Windows/Linux). Manage file, application, and backup servers. Schedule and monitor regular backups and system restore plans. Local Network Sharing: Set up shared drives and printers across the organization. Ensure access permissions and data integrity for all shared resources. Implement access control policies based on user roles. Cybersecurity: Ensure firewall, antivirus, and endpoint security is up to date. Conduct regular security audits and vulnerability assessments. Educate staff on safe computing practices and phishing awareness. Hardware and Software Maintenance: Install, troubleshoot, and repair desktops, laptops, and peripherals. Manage software licensing and update systems. Coordinate with vendors for hardware/software procurement and AMC. User Support: Provide timely technical support to employees (onsite and remote). Maintain a ticketing system for tracking and resolving issues. Create user guides or training sessions for basic IT operations. Documentation & Compliance: Maintain network diagrams, asset registers, and IT documentation. Ensure compliance with data privacy and security policies (ISO/ITIL if applicable). Other Preferred Skills (optional but useful): Experience with cloud systems (e.g., AWS, Google Workspace, Office 365). Familiarity with virtualization tools (VMware, Hyper-V). Knowledge of VoIP setup and maintenance. Scripting/automation knowledge (PowerShell, Bash). Experience: 3-5 Years Location: Indore Experience: 2-5 Years Location: Indore
Posted 20 hours ago
0 years
0 Lacs
India
Remote
About Us Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos’ complete portfolio includes industry-leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com. Role Summary As a Renewal Specialist, you will play a critical role in affecting and operating the renewal process for our existing customer base. You will collaborate with cross-functional teams, such as sales, finance, and customer success, to ensure the successful renewal of customer contracts and maximize revenue opportunities. Ideally, you possess strong people skills, excellent attention to detail, and an understanding of business processes related to customer renewals. Shift timings - 2PM -11PM What you will do Customer Analysis: Analyze Customer Contracts and Product selection related to customer renewals to determine the best renewal path options for customers Customer Engagement: Foster and maintain positive relationships with assigned customers, addressing their inquiries, concerns, and escalations throughout the renewal process. Effectively communicate Sophos renewal offerings Partner Relationship Management: Maintain positive relationships with our top partners, addressing their inquiries, concerns, and escalations throughout the renewal process. Proactively identify and resolve potential roadblocks to the renewal process Revenue Optimization: Drive the process of identifying opportunities for upselling, cross-selling, and expanding customer contracts during the renewal journey. Work closely with the sales team to drive revenue growth from existing customers Process Improvement: Continuously evaluate and refine the renewal process to streamline operations, enhance efficiency, and improve customer experience. Identify automation opportunities and leverage technology tools to optimize workflows Collaboration and Communication: Collaborate effectively with cross-functional teams, including sales, finance, customer success, and product management, to ensure alignment and coordination throughout the renewal process. Clearly communicate renewal status, risks, and opportunities to relevant stakeholders What you will bring Fluent English Language Skills Bachelor’s degree in business administration, Communications, or Marketing preferred; or proven relevant experience in previous roles Experience in Sales, Customer Success, Channel Partners, or Renewal Management preferred Familiarity with Salesforce tools such as Lightning and CPQ, as well as additional tools like Outreach, Microsoft Excel, Microsoft Power BI, and Microsoft Outlook Excellent attention to detail and organizational skills, ensuring accuracy in contract management and communications Excellent communication and interpersonal skills, with the ability to effectively collaborate with cross-functional teams and build relationships with customers A self-motivated and proactive approach to a set of tasks, with the ability to work independently and prioritize tasks effectively Experience in the technology industry or a SaaS-based organization is highly desirable Familiarity with contract management processes and legal terminology is a plus #B1 Ready to Join Us? At Sophos, we believe in the power of diverse perspectives to fuel innovation. Research shows that candidates sometimes hesitate to apply if they don't check every box in a job description. We challenge that notion. Your unique experiences and skills might be exactly what we need to enhance our team. Don't let a checklist hold you back – we encourage you to apply. What's Great About Sophos? · Sophos operates a remote-first working model, making remote work the primary option for most employees. However, some roles may necessitate a hybrid approach. Please refer to the location details in our job postings for further information. · Our people – we innovate and create, all of which are accompanied by a great sense of fun and team spirit · Employee-led diversity and inclusion networks that build community and provide education and advocacy · Annual charity and fundraising initiatives and volunteer days for employees to support local communities · Global employee sustainability initiatives to reduce our environmental footprint · Global fitness and trivia competitions to keep our bodies and minds sharp · Global wellbeing days for employees to relax and recharge · Monthly wellbeing webinars and training to support employee health and wellbeing Our Commitment To You We’re proud of the diverse and inclusive environment we have at Sophos, and we’re committed to ensuring equality of opportunity. We believe that diversity, combined with excellence, builds a better Sophos, so we encourage applicants who can contribute to the diversity of our team. All applicants will be treated in a fair and equal manner and in accordance with the law regardless of gender, sex, gender reassignment, marital status, race, religion or belief, color, age, military veteran status, disability, pregnancy, maternity or sexual orientation. We want to give you every opportunity to show us your best self, so if there are any adjustments we could make to the recruitment and selection process to support you, please let us know. Data Protection If you choose to explore an opportunity, and subsequently share your CV or other personal details with Sophos, these details will be held by Sophos for 12 months in accordance with our Privacy Policy and used by our recruitment team to contact you regarding this or other relevant opportunities at Sophos. If you would like Sophos to delete or update your details at any time, please follow the steps set out in the Privacy Policy describing your individual rights. For more information on Sophos’ data protection practices, please consult our Privacy Policy Cybersecurity as a Service Delivered | Sophos
Posted 23 hours ago
2.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Job Title : Cybersecurity Analyst Location : Gurgaon Experience : 2- 5 Years Job Type : Full-Time Job Description We are seeking a detail-oriented and analytical Cybersecurity Analyst to join our team in Gurgaon. The ideal candidate will have strong technical and analytical skills, along with hands-on experience in using tools like Excel, SQL, Power BI, Tableau, and Python to monitor, detect, analyze, and respond to cyber threats. You will play a vital role in safeguarding our organizations digital assets and ensuring the integrity, confidentiality, and availability of our information systems. Roles And Responsibilities Monitor network traffic, system logs, and security alerts to identify and respond to security incidents in real time. Perform threat analysis, vulnerability assessments, and risk evaluations using SQL queries and Python scripting. Utilize Power BI and Tableau to visualize and report on cybersecurity metrics and trends for stakeholders. Analyze data from various sources (firewalls, IDS/IPS, endpoint security, etc.) to detect anomalies and potential threats. Develop and maintain cybersecurity dashboards and reporting tools using Excel, Power BI, or Tableau. Assist in creating and enforcing security policies, procedures, and protocols. Investigate and respond to security breaches, malware infections, phishing attempts, and other cyber incidents. Collaborate with IT teams to ensure secure architecture and secure coding practices across systems. Support compliance and audit efforts related to information security frameworks (ISO 27001, GDPR, etc.). Continuously research and stay up to date with the latest cybersecurity threats, tools, and trends. Key Skills Required Strong understanding of cybersecurity concepts, practices, and frameworks. Proficiency in Excel for data manipulation and reporting. Expertise in SQL for querying security logs and database analysis. Experience with Power BI and Tableau for data visualization and reporting. Working knowledge of Python for scripting and automating security processes. Familiarity with SIEM tools, firewalls, antivirus solutions, and other security technologies. Excellent analytical, problem-solving, and communication skills. Preferred Qualifications Bachelors degree in Computer Science, Information Security, or a related field. Certifications such as CEH, CompTIA Security+, or CISSP (preferred but not mandatory). Experience working in mid to large-scale enterprise environments. (ref:hirist.tech)
Posted 1 day ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
About ACA: ACA Group is the leading governance, risk, and compliance (GRC) advisor in financial services. We empower our clients to reimagine GRC and protect and grow their business. Our innovative approach integrates consulting, managed services, and our ComplianceAlpha® technology platform with the specialized expertise of former regulators and practitioners and our deep understanding of the global regulatory landscape. Position Summary The IT Security Systems Administrator is responsible for the implementation and ongoing management of the security related technology systems utilized by ACA Group (“ACA”). This position needs to understand the IT vision and work towards realizing it. Individual would be responsible for finding ways to apply departmental new ideas into their daily work. This position needs a self-starter who works to improve their own effectiveness as well as provides ad-hoc suggestions for broader improvements for IT Security Systems. Execution of assigned tasks on time and on quality with some oversight and assistance from others. Job Duties Identify gaps, vulnerabilities, exploits, and patches in IT controls in order to generate issue lists and mitigation recommendations Execute ongoing testing and gap analysis of information security-related policies, practices, and procedures, and perform tasks related to monitoring IT infrastructure according to established guidelines Handle and delegate as necessary the tracking of periodic reviews, audits, and updates Assist with maintenance of back-end technology systems such as Server Hosts, Backup Software, Networking, and Security Systems 5. Assist with conducting technical reviews of ACA’s IT systems and audit security controls. Analyze IT audit submissions and related documentation, and align responses with various risk frameworks (e.g., COBIT, NIST, SANS) Assist with the research, review, development, and/or enhancement of information security policies and technical risk documentation, as well as white paper content and/or training programs Assist with creating content for cybersecurity and IT-risk related email alerts Assist with the design and production of phishing campaign email templates Assist with content generation for end user information security training Handle escalations from the 1st/2nd line support Identify, map, and diagram data flow and processes Perform ad-hoc work/special projects as necessary to support ACA on various client and internal initiatives Preferred Education And Experience Relevant cybersecurity professional certification (e.g., ISC(2), SANS GSEC/GICSP, ISACA, Offensive Security OSCP/OSCE) 4-7yrs of an experience is required Required Skills And Attributes Demonstrated professional integrity Dependable, flexible, and adaptable to new ACA initiatives and changing client needs Ability to work well in a fast-paced, small-team environment Ability to work independently, multi-task and prioritize effectively Ability to establish and maintain effective working relationships with colleagues and clients Highly motivated and goal oriented; proactive in one’s own education and career progression; volunteers for and shows initiative on both internal and external projects and tasks Dedicated to upholding ACA’s high-quality standards and customer service focus Strong organizational and problem-solving skills with attention to detail Strong oral and written communication skills What working at ACA offers: We offer a competitive compensation package where you’ll be rewarded based on your performance and recognized for the value you bring to our business. Our Total Rewards package includes medical coverage fully funded by ACA for employees and their family as well as access to Maternity & Fertility and Wellness programs. ACA also provides Personal Accident Insurance, Group Term Life Insurance, Employee Discount programs and Employee Resource Groups. You’ll be granted time off for designated ACA Paid Holidays, Privilege Leave, Casual/Sick Leave, and other leaves of absence to support your physical, financial and emotional well-being. About ACA: ACA Group is the leading governance, risk, and compliance (GRC) advisor in financial services. We empower our clients to reimagine GRC and protect and grow their business. Our innovative approach integrates consulting, managed services, and our ComplianceAlpha® technology platform with the specialized expertise of former regulators and practitioners and our deep understanding of the global regulatory landscape. What we commit to: ACA is firmly committed to a policy of nondiscrimination, which applies to recruiting, hiring, placement, promotions, training, discipline, terminations, layoffs, transfers, leaves of absence, compensation and all other terms and conditions of employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected status.
Posted 1 day ago
5.0 - 9.0 years
0 Lacs
kochi, kerala
On-site
As the Anti-Phishing Specialist, you will be leading the organization's efforts to detect, prevent, and respond to phishing attacks and other email-based threats. Your role is crucial in developing strong anti-phishing strategies, managing email security technologies, responding to incidents, and educating users to enhance organizational resilience against cyber threats. Your key responsibilities will include identifying and facilitating takedown of phishing websites and rogue applications, proactively addressing a broad spectrum of cyber threats such as DDoS, ransomware, BEC, spear phishing, whaling, vishing, and other social engineering attacks. You will also be responsible for monitoring and analyzing inbound emails to detect malicious content, recommending rule adjustments to reduce email-borne threats, designing, implementing, and maintaining anti-phishing strategies, policies, and procedures, managing and optimizing anti-phishing tools and platforms like DMARC, DKIM, SPF, and secure email gateways, developing advanced detection rules and filters to counter evolving phishing tactics, leading phishing-related incident response efforts including containment, eradication, recovery, and post-incident review, delivering regular employee training and awareness programs on phishing prevention, collaborating with security teams to provide guidance on email security best practices, evaluating emerging anti-phishing technologies, recommending improvements, staying abreast of current phishing trends, attack methods, and mitigation techniques, and producing detailed reports on phishing incidents, metrics, and defensive performance. To qualify for this role, you should have a Bachelor's degree in Computer Science, Information Security, or a related field, along with 5+ years of hands-on experience in anti-phishing, email security, or a similar domain. You should possess strong expertise in email protocols (SMTP, etc.) and security standards (DMARC, DKIM, SPF), proven experience with enterprise email security solutions like Proofpoint, Mimecast, Ironscales, a deep understanding of phishing tactics, social engineering, and email-based threat vectors, strong analytical, problem-solving, and communication skills, demonstrated leadership in mentoring or guiding security teams, and preferred certifications such as CISSP, Certified Email Security Manager (CESM), or equivalent. Your skills should include SOC L2, Cyber Security, and Phishing.,
Posted 1 day ago
2.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NA Minimum 2 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As an L1 SOC Analyst you are the first line of defense in monitoring and triaging security alerts. You will work primarily with Splunk SIEM and Sentinal One EDR to identify potential security incidents, validate alerts, and escalate them according to the defined SOPs. You will ensure real-time visibility and log health while flagging suspicious activity promptly. This role is essential to ensuring timely detection and reduce noise from false positives. Roles & Responsibilities: --Basic Security Knowledge: Understanding of key concepts (malware, phishing, brute force, etc.) -SIEM Familiarity: Exposure to Splunk UI and understanding how to read/query logs -Exposure to CrowdStrike Falcon Console: Ability to view and interpret endpoint alerts -Alert Triage: Ability to differentiate between false positives and real threats -Alert Triage & Investigation: Experience investigating escalated alerts using SIEM or EDR -Hands-on experience with CrowdStrike EDR investigations -Ticketing Systems: Familiarity with platforms like JIRA, ServiceNow, or similar -Basic understanding of cybersecurity fundamentals -Good analytical and triage skills -Basic Scripting: Awareness of PowerShell or Python for log parsing -SOAR Exposure: Familiarity with automated triage workflows -Security Certifications: Security+, Microsoft SC-900, or similar certification -Operating System Basics: Windows and Linux process and file system awareness -Monitor real-time alerts and dashboards in Splunk SIEM -Perform initial triage on alerts and determine severity/priority -Escalate validated security incidents to L2 analysts per defined SOPs -Follow pre-defined SOAR playbooks to document or assist in response -Ensure alert enrichment fields are populated (host info, user details, etc.) -Conduct basic log searches to support alert analysis -Perform daily health checks on log sources and ingestion pipelines -Maintain accurate ticket documentation for each alert handled -Participate in shift handovers and team sync-ups for awareness Professional & Technical Skills: -SIEM: Basic log searching, correlation rule awareness -SOAR: Familiarity with playbook execution- -Security Concepts: Basic understanding of malware, phishing, brute force -Tools: Sentinal One EDR, Splunk SIEM Additional Information: - The candidate should have minimum 2 years of experience in Security Information and Event Management (SIEM). - This position is based at our Gurugram office. - A 15 years full time education is required.
Posted 1 day ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
Reporting To: Global CISO Role Overview We are seeking a dynamic and ambitious female cybersecurity professional to join our team as an Assistant CISO . This is a fast-track leadership role designed for someone with deep expertise in information security and a passion for customer engagement, who is ready to evolve into a full-fledged CISO within the next 6 months. Key Responsibilities Security Strategy & Governance Assist in defining and executing the enterprise-wide information security strategy. Develop and maintain security policies, standards, and procedures aligned with industry best practices. Support the creation of a security roadmap and maturity model for continuous improvement. Risk Management & Compliance Conduct regular risk assessments and recommend mitigation strategies. Ensure compliance with regulatory requirements (e.g., ISO 27001, GDPR, HIPAA, RBI). Manage third-party/vendor risk assessments and security due diligence. Security Operations & Incident Response Oversee day-to-day security operations, including monitoring, threat detection, and response. Lead or support incident response efforts, including root cause analysis and post-incident reviews. Coordinate with SOC teams and external partners for threat intelligence and response. Cloud & Infrastructure Security Ensure secure architecture and configurations across cloud platforms (Azure, AWS, GCP). Collaborate with IT and DevOps teams to embed security into infrastructure and CI/CD pipelines. Identity & Access Management (IAM) Oversee IAM policies and technologies to ensure least privilege and secure access control. Support implementation of MFA, SSO, and privileged access management solutions. Security Awareness & Training Drive internal security awareness programs and phishing simulations. Conduct training sessions for technical and non-technical staff. Customer & Stakeholder Engagement Represent the security function in customer meetings, audits, and RFP responses. Deliver compelling security presentations to clients, partners, and internal leadership. Act as a trusted advisor to business units on security-related matters. Engage directly with our Clients' customers to communicate and advocate for security measures. Maintain ongoing engagement with our Clients' customers, keeping them informed of security initiatives and improvements. Build trust and confidence by demonstrating how our Clients' security practices benefit customer operations and data protection. Leadership & Mentorship Mentor junior security team members and foster a culture of continuous learning. Take ownership of key security initiatives and lead cross-functional project teams. Prepare for succession into the CISO role by shadowing and supporting executive-level decisions. Drive internal security initiatives and programs. Coordinate closely with delivery and platform teams to ensure alignment and execution of security strategies. Required Skills & Certifications Proven experience in information security across multiple domains. Exceptional customer interaction and presentation skills. Strong leadership potential and strategic thinking. Ability to work independently and take ownership of security initiatives. Excellent communication skills in English (verbal and written). Preferred Certifications CISSP – Certified Information Systems Security Professional CISM – Certified Information Security Manager CCSP – Certified Cloud Security Professional ISO 27001 Lead Implementer or Auditor CEH – Certified Ethical Hacker (optional but valued)
Posted 1 day ago
3.0 years
0 Lacs
Pune, Maharashtra, India
Remote
Who We Are Addepar is a global technology and data company that helps investment professionals provide the most informed, precise guidance for their clients. Hundreds of thousands of users have entrusted Addepar to empower smarter investment decisions and better advice over the last decade. With client presence in more than 50 countries, Addepar’s platform aggregates portfolio, market and client data for over $7 trillion in assets. Addepar’s open platform integrates with more than 100 software, data and services partners to deliver a complete solution for a wide range of firms and use cases. Addepar embraces a global flexible workforce model with offices in New York City, Salt Lake City, Chicago, London, Edinburgh, Pune, and Dubai. The Role We are currently seeking a Security Analyst to join our Information Security & Risk team as part of the expanding team within our Pune, India location . The successful candidate will have the opportunity to help take Addepar’s Security and Risk Program to the next level. In this role, this person will work as part of the Identity & Access Management (IAM), Security Operations and Governance & Controls functions to increase the overall security posture of the organization. We are looking for someone who is hungry to expand their Information Security knowledge and experience and become involved with many facets of our program. What You’ll Do Assist in the development, maintenance and enhancements with our Identity Governance & Administration platform and overall, IAM program. Assisting with general Information Security inquiries and coordinating efforts to achieve resolution. Conducting User Entitlement Access Reviews and IAM compliance such as non-human identity governance. Assisting with SOC2 certification efforts such as collection of evidence and preparing deliverables. Producing Information Security metrics for senior leadership. Maintaining our Security Awareness program compliance. Assist with triaging vulnerability remediation efforts. Who You Are Minimum 3+ years of general Information Security experience. Bachelor’s degree/equivalent or higher. Computer Science or Engineering related education preferred. Experience with Identity & Access Management tools. Familiar with IT Governance and Compliance functions, including SOC2 and Security awareness programs. Familiar with Security Operations Center(SOC) and Vulnerability management functions. Attention to details and analytical skills. Ability to build strong relationships and work collaboratively with internal and external partners. Excellent verbal and written communication and organisational skills, along with the ability to deliver to time-sensitive guidelines. Curious, always learning and deeply interested in Information Security. Experience with Okta, Saviynt highly preferred. Desired Technical Skills: IAM tools such as IGA and SSO/IDP platform. Basic understanding of SQL database querying and leveraging API’s Basic proficiency in scripting and programming using Python or Java Hands-on experience with Amazon Web Services (AWS) or similar cloud platform Experience administrating a Google Workspace environment Important Note: This role requires working from our Pune office 3 days a week (hybrid work model) Our Values Act Like an Owner - Think and operate with intention, purpose and care. Own outcomes. Build Together - Collaborate to unlock the best solutions. Deliver lasting value. Champion Our Clients - Exceed client expectations. Our clients’ success is our success. Drive Innovation - Be bold and unconstrained in problem solving. Transform the industry. Embrace Learning - Engage our community to broaden our perspective. Bring a growth mindset. In addition to our core values, Addepar is proud to be an equal opportunity employer. We seek to bring together diverse ideas, experiences, skill sets, perspectives, backgrounds and identities to drive innovative solutions. We commit to promoting a welcoming environment where inclusion and belonging are held as a shared responsibility. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. PHISHING SCAM WARNING: Addepar is among several companies recently made aware of a phishing scam involving con artists posing as hiring managers recruiting via email, text and social media. The imposters are creating misleading email accounts, conducting remote “interviews,” and making fake job offers in order to collect personal and financial information from unsuspecting individuals. Please be aware that no job offers will be made from Addepar without a formal interview process. Additionally, Addepar will not ask you to purchase equipment or supplies as part of your onboarding process. If you have any questions, please reach out to TAinfo@addepar.com.
Posted 1 day ago
5.0 - 7.0 years
4 - 5 Lacs
Thiruvananthapuram
On-site
5 - 7 Years 1 Opening Trivandrum Role description We are seeking an experienced and proactive SOC Lead to drive the operations of our Security Operations Center. The ideal candidate will have strong expertise in cybersecurity monitoring, incident response, threat hunting, and stakeholder communication. This role involves leading a global 24x7 SOC team, coordinating with cross-functional teams, and enhancing our threat detection and response capabilities. You will act as the escalation point for complex incidents and play a key role in process improvement, automation, and mentoring the SOC team. Key Responsibilities: Lead and coordinate the 24x7 SOC operations, managing a distributed team of L1 and L2 analysts. Provide advanced triage and investigation of escalated security s and incidents from L1 analysts. Act as the primary escalation contact for high-priority incidents and security breaches. Ensure timely incident response and resolution within SLA while maintaining high-quality ticket documentation. Conduct Root Cause Analysis (RCA) and create detailed incident reports for high-severity cases. Continuously review and fine-tune security s, rules, and thresholds across SIEM and other monitoring tools. Design and propose new security use cases and playbooks to improve detection and response automation. Conduct training sessions for the team on new tools, updated processes, and emerging threats. Organize and lead governance meetings (weekly/biweekly/monthly) with internal stakeholders and clients. Stay informed on the latest threat intelligence, vulnerabilities, and security technologies to proactively enhance SOC capabilities. Maintain and enhance SOC documentation, including SOPs, incident runbooks, and knowledge bases. Collaborate with engineering, infrastructure, and compliance teams to align incident response with organizational risk management practices. Required Skills & Experience: Minimum 4 years of hands-on experience in a Security Operations Center, focusing on incident response, security analysis, and threat hunting. Deep technical expertise in: Email Security (Mimecast) EDR Tools (e.g., Threat Down / Malwarebytes) Secure Web Gateway (Netskope SWG) Cloud Security (Microsoft Azure, Microsoft Defender) SIEM Platforms (Azure Sentinel preferred) Threat analysis and phishing investigation Sound understanding of cybersecurity frameworks (MITRE ATT&CK, NIST, etc.) and incident response lifecycle. Working knowledge of enterprise infrastructure: networking, firewalls, operating systems (Windows/Linux), databases, and web applications. Excellent written and verbal communication skills; able to convey technical details to non-technical stakeholders. Strong organizational and prioritization skills; experience handling multiple concurrent incidents and tasks in high-pressure environments Preferred Certifications: Relevant security certifications such as: CEH (Certified Ethical Hacker) Microsoft SC-200 (Security Operations Analyst) AZ-500 (Azure Security Engineer Associate) CISSP, GCIH, or similar. Proficiency with Security Tools: Mimecast Email Security Threat Down (Malwarebytes) Microsoft Azure, Microsoft Defender for O365 Netskope SWG Azure Sentinel (SIEM) Open-source tools for phishing analysis Skills Email Security, EDR, Threat hunting, SIEM About UST UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.
Posted 1 day ago
2.0 - 5.0 years
0 Lacs
Indore, Madhya Pradesh, India
Remote
Job Description: We are looking for a skilled and proactive IT Engineer to manage and maintain our organization's IT infrastructure. The ideal candidate will be responsible for managing networks, local servers, data sharing systems, and ensuring robust cybersecurity across the organization. Key Responsibilities: Network Management: Configure, manage, and troubleshoot LAN, WAN, and wireless networks. Monitor network performance and implement upgrades as needed. Handle IP addressing, DHCP, DNS, and routing protocols. Server Management: Install, configure, and maintain local servers (Windows/Linux). Manage file, application, and backup servers. Schedule and monitor regular backups and system restore plans. Local Network Sharing: Set up shared drives and printers across the organization. Ensure access permissions and data integrity for all shared resources. Implement access control policies based on user roles. Cybersecurity: Ensure firewall, antivirus, and endpoint security is up to date. Conduct regular security audits and vulnerability assessments. Educate staff on safe computing practices and phishing awareness. Hardware and Software Maintenance: Install, troubleshoot, and repair desktops, laptops, and peripherals. Manage software licensing and update systems. Coordinate with vendors for hardware/software procurement and AMC. User Support: Provide timely technical support to employees (onsite and remote). Maintain a ticketing system for tracking and resolving issues. Create user guides or training sessions for basic IT operations. Documentation & Compliance: Maintain network diagrams, asset registers, and IT documentation. Ensure compliance with data privacy and security policies (ISO/ITIL if applicable). Other Preferred Skills (optional but useful): Experience with cloud systems (e.g., AWS, Google Workspace, Office 365). Familiarity with virtualization tools (VMware, Hyper-V). Knowledge of VoIP setup and maintenance. Scripting/automation knowledge (PowerShell, Bash). Experience: 2-5 Years Location: Indore
Posted 1 day ago
1.0 years
2 - 5 Lacs
Ahmedabad
On-site
JD - SOC Analyst We are looking for 1-3 years of SOC Analyst Essential Responsibilities: Splunk Deployment Splunk implementation and configuration Correlation rules Performance Optimization / Performance Tuning Monitors alerting tools and also handles escalated incidents from the Helpdesk, Physical Security, Network Team, and Customers. Triages alerts as they come in and act appropriately. Respond to common alerts in a consistent and repeatable manner from multiple alerting sources. Responsible for triage of a variety of alerts stemming from C2 beaconing, malware, or phishing attempts. Provide escalations of unknown threats to Level 2. Identify abnormal security events and trigger the call list/distribution list. Qualifications/Requirements: Minimum IT Diploma Holder or equivalent. Ability to work in rotating shifts and also be on-call outside of shift hours on a regular and recurring basis. Possess personal and professional integrity. Individuals will be required to submit to a background examination. Good oral and written communication skills. Possess a desire to solve problems logically. Desired Characteristics: Ability to perform logical problem-solving. Possess a basic understanding of enterprise-grade technologies including operating systems, databases, and web applications. Ability to read and understand primary system data including security event logs, system logs, application logs, and network traffic. Demonstrate understanding of basic internet traffic concepts (e.g. DNS, HTTPS, HTTP). Network infrastructure knowledge (e.g. router, switch, firewall). Security best practices for operating systems such as Microsoft Windows or Redhat. Experience working in high-performing teams and understanding the dynamics of teamwork in a SOC environment. Desired Characteristics: Ability to perform logical problem-solving. Possess basic understanding of enterprise grade technologies including operating systems, databases and web applications. Ability to read and understand basic system data including security event logs, system logs, application logs, and network traffic. Demonstrate understanding for basic internet traffic concepts (e.g. DNS, HTTPS, HTTP). Network infrastructure knowledge (e.g. router, switch, firewall). Security best practices for operating systems such as Microsofot WIndows or Redhat. Experience of working in high performing teams and understand the dynamics of teamwork in a SOC environment. About TechDefence. Techdefence Labs is Information Security Consulting Company based out of Ahmedabad with 200+ Customers on Board. We master into Cyber Security Assurance & compliance program, Threat and vulnerability Management and Security Operation Center Services.
Posted 1 day ago
0 years
0 Lacs
Hyderabad, Telangana, India
Remote
We are united in our mission to make a positive impact on healthcare. Join Us! South Florida Business Journal, Best Places to Work 2024 Inc. 5000 Fastest-Growing Private Companies in America 2024 2024 Black Book Awards, ranked #1 EHR in 11 Specialties 2024 Spring Digital Health Awards, “Web-based Digital Health” category for EMA Health Records (Gold) 2024 Stevie American Business Award (Silver), New Product and Service: Health Technology Solution (Klara) Who We Are We Are Modernizing Medicine (WAMM)! We’re a team of bright, passionate, and positive problem-solvers on a mission to place doctors and patients at the center of care through an intelligent, specialty-specific cloud platform. Our vision is a world where the software we build increases medical practice success and improves patient outcomes. Founded in 2010 by Daniel Cane and Dr. Michael Sherling, we have grown to over 3400 combined direct and contingent team members serving eleven specialties, and we are just getting started! ModMed's global headquarters is based in Boca Raton, FL, with a growing office in Hyderabad, India, and a robust remote workforce across the US, Chile, and Germany. ModMed is hiring a driven [EXTERNAL JOB TITLE] to join our positive, passionate, and high-performing [TEAM NAME] team focused on [HIGH-LEVEL DESCRIPTION OF THE ROLE OR TEAM’S IMPACT]. This is an exciting opportunity to [SHORT PHRASE TO DESCRIBE OPPORTUNITY] within a fast-paced Healthcare IT company that is truly Modernizing Medicine! Your Role Skills & Requirements: ModMed Benefits Highlight: At ModMed, we believe it’s important to offer a competitive benefits package designed to meet the diverse needs of our growing workforce. Eligible Modernizers can enroll in a wide range of benefits: India Meals & Snacks: Enjoy complimentary office lunches & dinners on select days and healthy snacks delivered to your desk, Insurance Coverage: Comprehensive health, accidental, and life insurance plans, including coverage for family members, all at no cost to employees, Allowances: Annual wellness allowance to support your well-being and productivity, Earned, casual, and sick leaves to maintain a healthy work-life balance, Bereavement leave for difficult times and extended medical leave options, Paid parental leaves, including maternity, paternity, adoption, surrogacy, and abortion leave, Celebration leave to make your special day even more memorable, and company-paid holidays to recharge and unwind. United States Comprehensive medical, dental, and vision benefits, including a company Health Savings Account contribution, 401(k): ModMed provides a matching contribution each payday of 50% of your contribution deferred on up to 6% of your compensation. After one year of employment with ModMed, 100% of any matching contribution you receive is yours to keep. Generous Paid Time Off and Paid Parental Leave programs, Company paid Life and Disability benefits, Flexible Spending Account, and Employee Assistance Programs, Company-sponsored Business Resource & Special Interest Groups that provide engaged and supportive communities within ModMed, Professional development opportunities, including tuition reimbursement programs and unlimited access to LinkedIn Learning, Global presence and in-person collaboration opportunities; dog-friendly HQ (US), Hybrid office-based roles and remote availability for some roles, Weekly catered breakfast and lunch, treadmill workstations, Zen, and wellness rooms within our BRIC headquarters. PHISHING SCAM WARNING: ModMed is among several companies recently made aware of a phishing scam involving imposters posing as hiring managers recruiting via email, text and social media. The imposters are creating misleading email accounts, conducting remote "interviews," and making fake job offers in order to collect personal and financial information from unsuspecting individuals. Please be aware that no job offers will be made from ModMed without a formal interview process, and valid communications from our hiring team will come from our employees with a ModMed email address (first.lastname@modmed.com). Please check senders’ email addresses carefully. Additionally, ModMed will not ask you to purchase equipment or supplies as part of your onboarding process. If you are receiving communications as described above, please report them to the FTC website.
Posted 1 day ago
0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Essential Services : Role & Location fungibility At ICICI Bank, we believe in serving our customers beyond our role definition, product boundaries, and domain limitations through our philosophy of customer 360-degree. In essence, this captures our belief in serving the entire banking needs of our customers as One Bank, One Team . To achieve this, employees at ICICI Bank are expected to be role and location-fungible with the understanding that Banking is an essential service . The role descriptions give you an overview of the responsibilities, it is only directional and guiding in nature. About the role As an Information Security Manager in ICICI Bank you will be responsible for leading and managing the organization’s information security program to ensure the confidentiality, integrity, and availability of data, systems, and networks. This role involves developing, implementing, and maintaining security policies, standards, and procedures, overseeing compliance efforts, and responding to evolving cyber threats. The Information Security Manager works closely with technical teams, business leaders, and external stakeholders to foster a culture of security and effectively mitigate risks. Key Responsibilities Develop and Maintain Security Policies: Create, implement, and regularly update information security policies, procedures, and guidelines aligned with organizational objectives and regulatory requirements. Collaborate: Conduct regular risk assessments and vulnerability analyses to identify, evaluate, and mitigate security risks to the organization’s assets. Monitor emerging threats, security trends, and technologies, regularly recommending adjustments and enhancements to the security program to maintain robust protection. Incident Response: Lead the investigation and response to actual and suspected security incidents, ensuring effective containment, analysis, and communication of findings. Compliance Oversight: Ensure ongoing compliance with all applicable laws, industry standards (e.g., GDPR, PCI DSS, ISO 27001), and internal policies. Coordinate audits and manage remediation of non-compliant areas. Systems & Technology Oversight: Oversee the deployment, configuration, maintenance, and monitoring of security tools such as firewalls, encryption solutions, intrusion detection systems, and access controls. Collaboration: Work with other departments to integrate security into business processes and projects. Communicate risks and security postures to stakeholders and senior management. Vendor and Third-Party Management: Ensure that third-party vendors and partners adhere to organizational security standards and participate in risk assessments as needed. Reporting: Produce detailed reports on the status of information security, audit findings, incidents, and compliance for senior management and governance boards. Qualifications & Skills Educational Qualification: Engineering Graduate in CS, IT, EC or InfoSec, CyberSec or MCA equivalent. Certifications: Certification(s) such as CISSP, CISM, or equivalent are preferred. Compliance: Great Awareness of cyber security trends & hacking techniques. About the Business Group Information Security Group of ICICI Bank believes in providing services to its customers in the safest and secured manner, keeping in mind that data protection for its customers is as important as providing quality banking services across the spectrum. The CIA triad of Confidentiality, Integrity, and Availability is built on the vision of creating a comprehensive information security framework. The Bank also lays emphasis on customer elements like protection from phishing, adaptive authentication, awareness initiatives, and provide easy to use protection and risk configuration ability in the hands of customers. With this core responsibly, ICICI administer and promotes on going campaigns to create awareness among customers on security aspects while banking through digital channels.
Posted 1 day ago
3.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Level Up Your Career with Zynga! At Zynga, we bring people together through the power of play. As a global leader in interactive entertainment and a proud label of Take-Two Interactive, our games have been downloaded over 6 billion times—connecting players in 175+ countries through fun, strategy, and a little friendly competition. From thrilling casino spins to epic strategy battles, mind-bending puzzles, and social word challenges, our diverse game portfolio has something for everyone. Fan-favorites and latest hits include FarmVille™, Words With Friends™, Zynga Poker™, Game of Thrones Slots Casino™, Wizard of Oz Slots™, Hit it Rich! Slots™, Wonka Slots™, Top Eleven™, Toon Blast™, Empires & Puzzles™, Merge Dragons!™, CSR Racing™, Harry Potter: Puzzles & Spells™, Match Factory™, and Color Block Jam™—plus many more! Founded in 2007 and headquartered in California, our teams span North America, Europe, and Asia, working together to craft unforgettable gaming experiences. Whether you're spinning, strategizing, matching, or competing, Zynga is where fun meets innovation—and where you can take your career to the next level. Join us and be part of the play! What You'll Do Develop new and innovative features played by millions of players using Java, C#, C++, Python, javascript. Follow engineering best practices towards ensuring performance, reliability, and measurability Work on large problems and break it up for others to implement. Strong Analytical, programming and debugging skills Perform Design and Code reviews. Be responsible for the Live game health Closely work with other functions like PM, UI/UX, Art, QA Mentor Junior Engineers. Constantly look for opportunities to improve the game performance. Take a hands-on approach in the development of prototypes quickly What You Bring Masters or Bachelor’s Degree in Computer Science, Engineering or equivalent 3+ years professional experience working in C#, C++, Javascript, Android, IOS, React, Java Solid fundamental programming skills (algorithms, data structures, OOP, OS, Networking, AWS Cloud) Experience with source control management and giving code reviews Good Communication skills and Collaborate with multidisciplinary teams (UX, game design, PM) in an agile environment What We Offer You Zynga offers a world-class benefits package that helps support and balance the needs of our teams. To find out more about our benefits, visit the Zynga Benefits We are proud to be an equal opportunity employer, which means we are committed to creating and celebrating diverse thoughts, cultures, and backgrounds throughout our organization. Employment with us is based on substantive ability, objective qualifications, and work ethic – not an individual’s race, creed, color, religion, sex or gender, gender identity or expression, sexual orientation, national origin or ancestry, alienage or citizenship status, physical or mental disability, pregnancy, age, genetic information, veteran status, marital status, status as a victim of domestic violence or sex offenses, reproductive health decision, or any other characteristics protected by applicable law. As an equal opportunity employer, we are committed to providing the necessary support and accommodation to qualified individuals with disabilities, health conditions, or impairments (subject to any local qualifying requirements) to ensure their full participation in the job application or interview process. Please contact us at accommodationrequest@zynga.com to request any accommodations or for support related to your application for an open position. Please be aware that Zynga does not conduct job interviews or make job offers over third-party messaging apps such as Telegram, WhatsApp, or others. Zynga also does not engage in any financial exchanges during the recruitment or onboarding process, and will never ask a candidate for their personal or financial information over an app or other unofficial chat channel. Any attempt to do so may be the result of a scamp or phishing attack, and you should not engage. Zynga’s in-house recruitment team will only contact individuals through their official Company email addresses (i.e., via a zynga.com, naturalmotion.com, smallgiantgames.com, themavens.com, gram.gs email domain).
Posted 2 days ago
0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
About Titan: At Titan, we’re redefining email for entrepreneurs, innovators, and creators—transforming it into a powerful tool for business growth. Built by a team that deeply cares about helping businesses succeed, Titan is more than just an email platform. Founded by Bhavin Turakhia, who also founded Directi, Radix, and Zeta, with a combined enterprise value exceeding $2 billion—Titan is backed by a strong legacy of innovation. Today, Titan powers millions of conversations, with 2.4 million emails sent and received every week. In 2021, Automattic (the parent company of WordPress) invested $30M in Titan, valuing the company at $300M. This partnership fuels our mission to revolutionize email and build the future of digital communication. At Titan, you’ll be part of a fast-growing business, solving meaningful problems and shaping a product that empowers millions. Join us to make a real impact. Roles and responsibilities: Communicate with customers in a friendly and professional manner and help them resolve any problems faced when using the product Provide Omnichannel support over chat, email, phone and social media Help fix any bugs that crop up in the product and contribute to the feature documentation Work with our development team and suggest updates and features to continuously improve the customer experience Ensuring speedy resolution of customer issues while maintaining high customer satisfaction Participate in the product planning process to ensure that features requested by customers are prioritized and implemented Strive to deliver a WOW! effect for our customers, to further enhance their perception of our product and company Flexibility of working in shifts Skills and Qualifications: B.Tech / BE Graduates only. You are extremely passionate about technology - and can't live without your smartphone! Strong understanding of email protocols (SMTP, IMAP, POP3) and experience with configuring and troubleshooting email systems, including managing DNS records such as SPF, DKIM, and DMARC to ensure secure and reliable email delivery. Hands-on experience with email security practices, including spam filtering, phishing prevention, email encryption, and familiarity with various email platforms to safeguard communication. Proficient in email server configuration and troubleshooting, working with mail clients using IMAP/POP/SMTP protocols, and resolving issues related to server-side scripts, domain names, and basic networking and DNS configurations You are well-versed with, and highly interested in, Internet and mobile communication A natural inclination to being curious, someone who is Research-driven and good researching skills on the internet Good to have front end coding skills (Javascript) for customizing our Help Center and an understanding APIs and webhooks You have excellent written skills, and can explain concepts through clear and accurate writing You have a way with people, and particularly good explanation skills You think the Team’s victory is worth more than individual heroics Ability to complete large volumes of work quickly and independently with a high level of drive, initiative and self-motivation Most of all, you enjoy working in a fast paced and dynamic environment full of young, overachieving tech enthusiasts Flexible working in shifts including Night shifts
Posted 2 days ago
4.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
Role Description We are seeking an experienced and proactive SOC Lead to drive the operations of our Security Operations Center. The ideal candidate will have strong expertise in cybersecurity monitoring, incident response, threat hunting, and stakeholder communication. This role involves leading a global 24x7 SOC team, coordinating with cross-functional teams, and enhancing our threat detection and response capabilities. You will act as the escalation point for complex incidents and play a key role in process improvement, automation, and mentoring the SOC team. Key Responsibilities Lead and coordinate the 24x7 SOC operations, managing a distributed team of L1 and L2 analysts. Provide advanced triage and investigation of escalated security s and incidents from L1 analysts. Act as the primary escalation contact for high-priority incidents and security breaches. Ensure timely incident response and resolution within SLA while maintaining high-quality ticket documentation. Conduct Root Cause Analysis (RCA) and create detailed incident reports for high-severity cases. Continuously review and fine-tune security s, rules, and thresholds across SIEM and other monitoring tools. Design and propose new security use cases and playbooks to improve detection and response automation. Conduct training sessions for the team on new tools, updated processes, and emerging threats. Organize and lead governance meetings (weekly/biweekly/monthly) with internal stakeholders and clients. Stay informed on the latest threat intelligence, vulnerabilities, and security technologies to proactively enhance SOC capabilities. Maintain and enhance SOC documentation, including SOPs, incident runbooks, and knowledge bases. Collaborate with engineering, infrastructure, and compliance teams to align incident response with organizational risk management practices. Required Skills & Experience Minimum 4 years of hands-on experience in a Security Operations Center, focusing on incident response, security analysis, and threat hunting. Deep Technical Expertise In Email Security (Mimecast) EDR Tools (e.g., Threat Down / Malwarebytes) Secure Web Gateway (Netskope SWG) Cloud Security (Microsoft Azure, Microsoft Defender) SIEM Platforms (Azure Sentinel preferred) Threat analysis and phishing investigation Sound understanding of cybersecurity frameworks (MITRE ATT&CK, NIST, etc.) and incident response lifecycle. Working knowledge of enterprise infrastructure: networking, firewalls, operating systems (Windows/Linux), databases, and web applications. Excellent written and verbal communication skills; able to convey technical details to non-technical stakeholders. Strong organizational and prioritization skills; experience handling multiple concurrent incidents and tasks in high-pressure environments Preferred Certifications Relevant security certifications such as: CEH (Certified Ethical Hacker) Microsoft SC-200 (Security Operations Analyst) AZ-500 (Azure Security Engineer Associate) CISSP, GCIH, or similar. Proficiency with Security Tools: Mimecast Email Security Threat Down (Malwarebytes) Microsoft Azure, Microsoft Defender for O365 Netskope SWG Azure Sentinel (SIEM) Open-source tools for phishing analysis Skills Email Security, EDR, Threat hunting, SIEM
Posted 2 days ago
4.0 years
0 Lacs
Ahmedabad, Gujarat, India
On-site
Position Overview: Adani Group is seeking an experienced Red Teaming Cybersecurity Expert to design and execute red teaming exercises aimed at testing and enhancing the security posture of Adani Group’s diverse entities. This includes critical infrastructure sectors such as Ports, Airports, Power, and Digital. The Red Teaming Expert will identify vulnerabilities, simulate advanced cyberattacks, and work closely with internal teams to improve detection and defense mechanisms. Key Responsibilities: 1. Strategic Red Teaming and Penetration Testing Execute sophisticated red teaming engagements to simulate real-world attack scenarios. Develop and implement long-term offensive security strategies to proactively identify and address vulnerabilities across diverse environments. Conduct comprehensive penetration testing on internal networks, cloud environments, and applications. Execute social engineering attacks, phishing campaigns, and physical intrusions as part of full-spectrum red team operations. 2. Adversarial Threat Simulation & Attack Path Mapping Develop and refine threat emulation plans, leveraging TTPs (tactics, techniques, and procedures) used by nation-state actors and other adversaries. Model various attack paths from an adversary’s perspective to test the resilience of existing security measures. Simulate attacks against IT, OT (Operational Technology), and ICS (Industrial Control Systems) environments, ensuring critical infrastructure protection. 3. Collaborative Defense & Response Enhancement Collaborate with Blue Teams, incident response teams, and the Security Operations Center (SOC) to enhance detection, response times, and mitigation strategies. Provide detailed feedback on the effectiveness of security controls, detection mechanisms, and incident response processes. Develop and conduct collaborative red-blue team exercises (purple teaming) to continuously improve organizational defense mechanisms. 4. Vulnerability Research & Exploit Development Conduct research on emerging cybersecurity threats and stay current with evolving vulnerabilities, zero-day exploits, and new attack techniques. Develop or customize proof-of-concept exploits to demonstrate the impact of vulnerabilities in real-world scenarios. Perform threat intelligence analysis to determine the most relevant and high-risk attack vectors for Adani’s business environment. 5. Reporting & Risk Communication Produce comprehensive technical reports and executive-level summaries detailing vulnerabilities, successful attack simulations, and recommendations for improvement. Translate complex security vulnerabilities into business risk language for presentation to senior management and business stakeholders. Present red team findings in a clear and concise manner to leadership teams and board members, offering strategic insights for enhancing the overall cybersecurity posture. 6. Training, Mentoring, and Knowledge Sharing Provide mentorship and training to junior red team members and internal security teams, fostering a culture of proactive security and continuous improvement. Conduct workshops and tabletop exercises with business units to raise awareness about red teaming methodologies and the importance of cybersecurity. 7. Tool Development & Automation Develop, customize, or extend red teaming tools, scripts, and automation frameworks to simulate various attack vectors. Continuously assess and introduce new red teaming tools to improve the efficacy and realism of adversary simulations. 8. People Management Foster an environment of learning, excellence, and innovation within the team and across teams. Provide mentorship and guidance to junior team members. Conduct performance reviews and provide constructive feedback. Ensure continuous professional development of team members. Qualifications & Skills: Education: Bachelor’s or master’s degree in computer science, Cybersecurity, Information Security, or a related technical field. Relevant professional certifications in cybersecurity. Experience: 4+ years of experience in cybersecurity, with a minimum of 2+ years in red teaming, offensive security, ethical hacking, or penetration testing. Proven track record of executing large-scale red teaming exercises in complex environments, including experience with critical infrastructure (Ports, Airports, Energy, etc.). Extensive experience in simulating advanced cyberattacks, particularly in industrial environments, OT, and ICS. Certifications: CRTP, OSCP, OSCE, CREST certifications or equivalent in red teaming and penetration testing. Other cybersecurity certifications such as CISSP, CEH, GIAC, GCIH, GPEN are CRTP advantageous. Technical Skills: Expert knowledge of offensive security tools (e.g., Metasploit, Cobalt Strike, Burp Suite, Empire, etc.) and threat simulation frameworks. Strong understanding of TTPs used by cybercriminals and APT groups (MITRE ATT&CK framework knowledge preferred). Deep expertise in network protocols, firewalls, intrusion detection systems, and secure configurations. Proficient in various operating systems (Windows, Linux, macOS) and cloud environments (AWS, Azure, GCP). Knowledge of Operational Technology (OT) and Industrial Control Systems (ICS) security challenges and attack methodologies. Experience with exploit development and custom tool creation for red teaming operations. Soft Skills: Communication: Excellent written and verbal communication skills, with the ability to convey complex technical information to non-technical stakeholders. Problem-Solving: Strong problem-solving skills, strategic thinking, and analytical ability to assess risks and prioritize mitigation. Leadership: Effective leadership and mentoring abilities for team members. Collaboration: Ability to work collaboratively with cross-functional teams and foster a culture of proactive security. Adaptability: Ability to work in high-pressure environments and handle multiple concurrent assignments with minimal oversight. Ethical Mindset: Commitment to ethical hacking principles and maintaining the highest standards of integrity. Continuous Learning: Dedication to staying ahead of cybersecurity threats through ongoing research and professional development. Key Competencies: Adverserial Mindset: Ability to think like an adversary and develop innovative ways to bypass security controls. Collaborative Spirit: Strong emphasis on working closely with blue teams and cross-functional teams. Continuous Learning: Commitment to staying ahead of cybersecurity threats by engaging in ongoing research and professional development.
Posted 2 days ago
2.0 - 5.0 years
4 - 7 Lacs
Gurugram
Work from Office
Role & responsibilities Design, implement, and maintain enterprise-grade email security solutions. Configure, manage, and troubleshoot Trend Micro CAS (Cloud App Security) for protection across email platforms (Microsoft 365, G Suite, etc.). Maintain and optimize Cisco Umbrella (DNS Security) policies and deployments to protect against phishing, malware, and other email-borne threats. Monitor, investigate, and respond to security incidents related to email and DNS. Collaborate with cross-functional teams to assess and mitigate email and web-based threats. Maintain and update threat detection and prevention rulesets, policies, and standards. Stay up to date with the latest trends and best practices in email and DNS security. Perform root cause analysis for incidents and implement preventive measures. Maintain documentation and provide regular reports and dashboards related to security incidents and threat activity.
Posted 2 days ago
5.0 years
4 - 5 Lacs
Thiruvananthapuram
On-site
5 - 7 Years 1 Opening Kochi, Trivandrum Role description Role Overview The Anti-Phishing Specialist leads the organization’s efforts to detect, prevent, and respond to phishing attacks and other email-based threats. This role is pivotal in developing robust anti-phishing strategies, managing email security technologies, responding to incidents, and educating users to enhance organizational resilience against cyber threats. Key Responsibilities Identify and facilitate takedown of phishing websites and rogue applications. Proactively address a broad spectrum of cyber threats including DDoS, ransomware, business email compromise (BEC), spear phishing, whaling, vishing, and other social engineering attacks. Monitor and analyze inbound emails to detect malicious content and recommend rule adjustments to reduce email-borne threats. Design, implement, and maintain anti-phishing strategies, policies, and procedures. Manage and optimize anti-phishing tools and platforms, including DMARC, DKIM, SPF, and secure email gateways. Develop advanced detection rules and filters to counter evolving phishing tactics. Lead phishing-related incident response efforts—containment, eradication, recovery, and post-incident review. Deliver regular employee training and awareness programs on phishing prevention. Collaborate with security teams to provide guidance on email security best practices. Evaluate emerging anti-phishing technologies and recommend improvements. Stay abreast of current phishing trends, attack methods, and mitigation techniques. Produce detailed reports on phishing incidents, metrics, and defensive performance. Qualifications Bachelor’s degree in Computer Science, Information Security, or a related field. 5+ years of hands-on experience in anti-phishing, email security, or a similar domain. Strong expertise in email protocols (SMTP, etc.) and security standards (DMARC, DKIM, SPF). Proven experience with enterprise email security solutions (e.g., Proofpoint, Mimecast, Ironscales). Deep understanding of phishing tactics, social engineering, and email-based threat vectors. Strong analytical, problem-solving, and communication skills. Demonstrated leadership in mentoring or guiding security teams. Preferred certifications: CISSP, Certified Email Security Manager (CESM), or equivalent. Skills SOC L2, Cyber Security, Phishing About UST UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.
Posted 2 days ago
3.0 years
3 - 9 Lacs
Visakhapatnam
On-site
Role – Trust and Online Safety - Analyst Key Responsibilities: Monitor domain registrations and related DNS activities to detect abusive behavior including phishing, malware distribution, spam, and other violations. Analyze abuse trends and proactively implement detection and response strategies. Enforce domain abuse policies in alignment with ICANN and regulatory frameworks. Coordinate with registrars and third-party security agencies to investigate and mitigate domain abuse cases. Prepare incident reports, metrics dashboards, and executive summaries on abuse handling and mitigation efforts. Work closely with legal, compliance, and security teams to ensure enforcement actions meet regulatory and contractual obligations. Stay informed about the latest developments in domain abuse, DNS security, and Internet governance. Contribute to the continuous improvement of abuse detection and incident response systems and workflows. Qualifications: 3–4 years of hands-on experience in domain abuse investigation and mitigation. Strong understanding of domain name systems (DNS), domain registration workflows, and Internet governance policies. Experience with cybersecurity tools, abuse monitoring platforms, and incident response best practices. Excellent analytical and forensic investigation skills. Strong communication skills, with the ability to clearly articulate technical issues to internal and external stakeholders. Bachelor’s degree in computer science, Information Security, or a related field. Highly Preferred Skills & Qualities: Proficiency in programming languages and frameworks (e.g., Python, PHP, MySQL, etc). Experience with API development and microservices architecture for abuse detection automation. Familiarity with frontend development for internal tools and dashboards (e.g., JS/CSS). Strong foundation in testing and quality assurance practices. Knowledge of system design and scalable architecture, especially in abuse mitigation systems. Nice to have: Data analytics and visualization experience, with tools like Tableau. Ability to work in ambiguous environments and drive clarity through structured thinking. Adaptability and commitment to continuous learning, especially in fast-changing tech and regulatory landscapes. Creative problem-solving and a willingness to challenge assumptions or think outside the box. Salary : Upto 9LPA Location: Visakhapatnam Interested candidates can Contact: 9392823577 Job Types: Full-time, Permanent Pay: ₹300,000.00 - ₹900,000.00 per year Schedule: Day shift Work Location: In person Speak with the employer +91 9392823577
Posted 2 days ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Phishing jobs in India are on the rise as organizations continue to strengthen their cybersecurity measures against phishing attacks. With the increasing demand for professionals skilled in identifying and preventing phishing attempts, job seekers in India have a plethora of opportunities in this field.
The average salary range for phishing professionals in India varies based on experience: - Entry-level: INR 3-6 lakhs per annum - Mid-level: INR 6-12 lakhs per annum - Experienced: INR 12-20 lakhs per annum
In the field of phishing, a typical career path may include roles such as: - Junior Security Analyst - Security Engineer - Senior Security Consultant - Security Architect
Apart from expertise in phishing, professionals in this field are often expected to have knowledge in: - Cybersecurity - Network security - Incident response - Security operations
As you prepare for your journey into the world of phishing jobs in India, remember to stay informed, practice your skills, and approach interviews with confidence. With the right knowledge and expertise, you can make a significant impact in the cybersecurity landscape of the country. Good luck in your job search!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough