Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
0 years
0 Lacs
Chandigarh, India
On-site
Company Description Dizimods is a dynamic digital marketing agency and IT company that has been providing innovative solutions to businesses for over 7 years. Specializing in cutting-edge digital marketing strategies, web development, software development, and mobile app development, Dizimods offers customized solutions to meet each client's unique needs. The team of experts at Dizimods works closely with clients to deliver tangible results and drive growth, helping businesses succeed in the digital world. Role Description This is a full-time on-site role for a Black Hat Hacker at Dizimods located in Chandigarh. The Black Hat Hacker will be responsible for executing unauthorized activities such as hacking into systems, exploiting vulnerabilities, and stealing data from target systems. The role involves staying up to date on cybersecurity trends, identifying vulnerabilities, and providing recommendations to enhance security measures. Qualifications Proficiency in Ethical Hacking, Penetration Testing, and Cybersecurity Experience with Social Engineering and Phishing techniques Familiarity with Programming languages like Python, Java, or C Knowledge of Network Security and Encryption protocols Strong problem-solving skills and attention to detail Ability to work independently and in a team environment Certifications such as CEH (Certified Ethical Hacker) are a plus Bachelor's degree in Computer Science, Information Technology, or related field Show more Show less
Posted 4 weeks ago
0 years
0 Lacs
Hyderabad, Telangana, India
Remote
LivePerson (NASDAQ: LPSN) is the global leader in enterprise conversations. Hundreds of the world’s leading brands — including HSBC, Chipotle, and Virgin Media — use our award-winning Conversational Cloud platform to connect with millions of consumers. We power nearly a billion conversational interactions every month, providing a uniquely rich data set and safety tools to unlock the power of Conversational AI for better customer experiences. At LivePerson, we foster an inclusive workplace culture that encourages meaningful connection, collaboration, and innovation. Everyone is invited to ask questions, actively seek new ways to achieve success, nd reach their full potential. We are continually looking for ways to improve our products and make things better. This means spotting opportunities, solving ambiguities, and seeking effective solutions to the problems our customers care about. Overview You will join Liveperson’s Global Product organization as the Principal Technical Product Manager for critical Conversational AI components within Conversation Builder, Liveperson’s Bot Building suite. Responsibilities Product Strategy: Develop and articulate a clear product vision and strategy for brand experiences in Conversational AI, aligned with the company's overall goals and market trends. Feature Prioritization: Define, review feature requests, and prioritize product features and enhancements based on customer feedback, market research, competitive analysis, and business objectives. Roadmap Planning: Create and maintain a detailed product roadmap, outlining key milestones, dependencies, and timelines for delivering new features and capabilities. Cross-Functional Collaboration: Collaborate closely with Engineering, Design, Sales, Marketing, and Customer Success teams to ensure alignment and effective execution of the product roadmap. Responsible for creating and consolidating program timelines, ensuring each vertical team understands the overall project objectives and timeline and how their deliverables impact the overall program, and communicating overall progress with external stakeholders, including leadership leaders from enterprise customers Champion a user-centric approach to product development, working closely with Design teams to create intuitive and engaging user experiences that delight customers. Market Analysis: Conduct ongoing market research and analysis to identify emerging trends, customer needs, and competitive threats. Use insights to inform product strategy and decision-making. Customer Engagement: Engage directly with customers to gather feedback, validate ideas, understand pain points, and translate insights into actionable product improvements. Go-to-Market Strategy: Collaborate with Marketing and Sales teams to develop and enhance go-to-market strategies, messaging, and collateral to drive product adoption and revenue growth. Performance Tracking: Define key performance indicators (KPIs) and metrics to measure the success and impact of product initiatives and use data to iterate and optimize product performance. Thought Leadership: Stay informed about industry trends, best practices, and emerging technologies in Conversational AI and brand experiences, and share knowledge and insights with the broader team. Requirements Bachelor's degree in Computer Science, Engineering, Business, or a related field (MBA preferred). 10+ years of experience in product management, with a track record of successfully launching and managing SaaS products or platforms. Preferred but not required experiences building customer engagement platform and products in digital messaging space Proven ability to develop and execute product strategy, prioritize features, and drive product roadmap planning in a fast-paced, agile environment. Strong analytical skills, with the ability to gather and interpret data, identify trends, and make data-driven decisions. Excellent communication, collaboration, and leadership skills, with the ability to influence and inspire cross-functional teams as well as leading meeting with leadership audience from customer side Experience working with enterprise customers and a strong customer focus, with the ability to empathize with customer needs and pain points. Passion for innovation, creativity, and solving complex problems to deliver impactful solutions. Benefits Health: Medical, Dental, and Vision Time away: Vacation and holidays Equal opportunity employer Why You’ll Love Working Here As leaders in enterprise customer conversations, we celebrate diversity, empowering our team to forge impactful conversations globally. LivePerson is a place where uniqueness is embraced, growth is constant, and everyone is empowered to create their own success. And, we're very proud to have earned recognition from Fast Company, Newsweek, and BuiltIn for being a top innovative, beloved, and remote-friendly workplace. Belonging At LivePerson We are proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. We also consider qualified applicants with criminal histories, consistent with applicable federal, state, and local law. We are committed to the accessibility needs of applicants and employees. We provide reasonable accommodations to job applicants with physical or mental disabilities. Applicants with a disability who require reasonable accommodation for any part of the application or hiring process should inform their recruiting contact upon initial connection. The talent acquisition team at LivePerson has recently been notified of a phishing scam targeting candidates applying for our open roles. Scammers have been posing as hiring managers and recruiters in an effort to access candidates' personal and financial information. This phishing scam is not isolated to only LivePerson and has been documented in news articles and media outlets. Please note that any communication from our hiring teams at LivePerson regarding a job opportunity will only be made by a LivePerson employee with an @ liveperson.com email address. LivePerson does not ask for personal or financial information as part of our interview process, including but not limited to your social security number, online account passwords, credit card numbers, passport information and other related banking information. If you have any questions and or concerns, please feel free to contact recruiting-lp@liveperson.com Show more Show less
Posted 4 weeks ago
2 - 3 years
0 Lacs
Kochi, Kerala, India
On-site
Role Description Job Title: L1 SOC Analyst Experience : 2 to 3 years Location: Trivandrum, Kochi, Chennai, Bangalore, Hyderabad Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. Job Responsibilities Eyes on the glass monitoring of the SOAR/SIEM platform for the detection of SOC Level 1 Analysis 24*7*365 Shifts on a rotational basis - Performing the Monitoring, Detection and Response Adherence to Shift Schedules, shift hand-over and completion of activities designated for the shift within the designated SLAs and KPIs Familiarity with SIEM Platforms such as Splunk, Sentinel, QRadar etc Perform Triage, Investigation, context enrichment and opening of Incident, as per the documented playbooks. Ability to learn additional security tools and platforms depending on the situational needs and ability to operate on those tools in optimum levels – such as DDOS Detection Tools, End-point security tools, EDR and MDR tools, DLP Tools, Phishing investigation tools etc Familiarity with OpenSource Intelligence tools. Professionalism in documenting Security Incidents, Investigation findings and reasoning Must Have Skills Monitoring and investigation experience on 1 or more SIEM tools and/or SOAR Platforms Experience in any of the SIEM Platforms such as Splunk, Sentinel, QRadar etc Minimum of 2 years of experience in Information Security In depth operational experience with SIEM technologies. Demonstrated process orientation and ability to manage out of the ordinary cyber threat detection and investigation steps Strong communicator and fluent in English and ability to work smoothly with multinational clients Aptitude and interest towards Cyber security concepts and evolution of new offence and defense methodologies Good To Have Skills Certifications such as CEH, CCNA, CISSP, CISSP or on common SOC Tools/Platforms Show more Show less
Posted 4 weeks ago
0 years
0 Lacs
India
Remote
We’re Hiring: IT Senior Systems Engineer Looking for a role that fosters collaboration, creativity and career growth in a vibrant office environment? We got you covered! We are currently on the lookout for an IT Senior Systems Engineer to join our team at Cloudstaff, the #1 workplace everywhere! Think you qualify for the role? Attach a 1-2 minute video intro and introduce yourself to us so we can meet you virtually. Attach this together with your updated CV to become a priority applicant! Send your application here ⤵️ CS Jobs - IT Senior Systems Engineer Role : IT Senior Systems Engineer Work Arrangement : Work from Office Location : India - Bangalore Schedule : Morning shift Purpose of Role The IT Senior Systems engineer will be responsible for maintaining the infrastructure systems and participating in Infrastructure Projects while supporting the IT Servicedesk Team with escalated L3 Incidents. The candidate will plan, design, build, maintain and support technical systems. M&A projects activities will include, Reverse engineering, migration and integration of Existing environments onto ZEDRA’s Infrastructure in the most efficient way. Key Accountabilities Provide 3rd line technical support Identify problematic areas and implement strategic solutions in time with Senior IT management team Actively support the Continuous Improvement Plan to generally improve infrastructure Direct bridge between Engineering team and Servicedesk team on technical handover of newly integrated systems Build detailed documentation of systems implemented in our Knowledgebase Resolve complex technical incidents on infrastructure systems All-round experience of takeover with existing systems Pro-active real-time monitoring of IT systems using PRTG. Preventive Infrastructure Resource Planning Creating new Infrastructure operational tasks for both engineers and IT Servicedesk team Expansion of backup, monitoring and update of the Systems. End of month reoccurring out of hour patch management Participating in out of hour IT migration/upgrade projects Design, develop, implement and coordinate systems, policies and procedures Ensure maximum uptime of the systems by escalating in time to Systems Engineers Ensure security of data, network and backup systems using preventive maintenance tasks and incoming tickets. Orchestrating of Service Delivery. Managing and monitoring agreed SLAs, and providing timely reporting to management. Management of IT support engineers and origination of staff covering the 24/5 with potential expansion to 24/7 shift resource planning. Build and provide IT management reports and Inter group customer reports. Working with Senior IT management to ensure the ITSM within the business follows global standards according to ISO27001 and ITLv4 standards. Coordination and support of IT Engineers and on time completion of operational tasks with proven evidence Ensuing the Service Desk team adhere to ITSM process and procedures such as Incident / Service, Problem and Change management Act as escalation point within the team Management of asset register; ensure all Zedra groups hardware is recorded and managed. Monitoring alerting and escalating to the engineering team when required Qualification and requirements: 5+ year experience Perfect corporate level of English speaking, reading and writing Knowledge with business facing incident management Experience in Financial Services and or banking industries is preferred Experience with remote management and collaboration with team members in different region/time zone Experience with Merger and Acquisitions would be advantageous ITILv4 certification is a must Technical Experience Experience with IT Servicedesk solution (preferably Manage Engine Servicedesk Plus) Citrix CVAD 7+ virtual desktop and app deployment. And or similar technologies (VMware Horizon) Understanding of industry security best practices (example: Encryption / Data leakage / Phishing / Pen testing) Microsoft Azure & Microsoft 365 administration and configuration Mobile Device Management system experience (such as Intune, MobileIron) Backup software experience – Commvault is preferred Printer installation, configuration and Management Knowledge of monitoring systems such as PTRG Proven skills with Active Directory including but not limited to User administration, Site Services, Hybrid replication and Group policy object management Remote support assistance on non-managed devices (BYOD) Email management system experience Microsoft SQL Database administration skills Storage experience such as SAN or NAS Hosting troubleshooting (DNS/MX/CNAME/A records) Expert Networking knowledge in LAN, WAN, SDWAN Perks & Benefits: Comprehensive health and life insurance on your 16th day of employment, covering 1 free dependent on the 16th day of employment Flexible leave credits which may be used for vacation, emergency and sick leaves Quarterly perks boxes for WFH staff, offering groceries and snacks to keep you fueled Superb and exciting Mid-Year Parties – with items to give away and cash prizes! Endless opportunities for career advancement Annual Performance Review with Salary Increase We set you up for success with a company-provided PC/Laptop and fiber internet connection Tech-on-wheels Support Participate and join our CS Social Clubs and Special Interest Groups to connect with colleagues International career growth and connections Unlimited cash incentives for hired referrals Mental Wellness Employee Assistance program through Lifeworks In-house psychiatrist available to support employees' well-being Become part of the Employee Share Units program Cloudstaff Dream Points - To be used for bidding useful items like appliances, kitchenettes etc Cloudstaff: Build Your Career, Anywhere Established in 2005, Cloudstaff is a leading outsourcing company that empowers businesses to thrive through smarter talent solutions. We're passionate about creating a work environment that fosters your professional growth and overall well-being. Why Cloudstaff is the #1 Workplace? Award-winning Culture: We're committed to building the #1 Workplace Everywhere, with a proven track record of staff engagement initiatives and industry recognition Invest in You: We support your development through comprehensive training programs, mentoring and opportunities for career advancement Thrive as an Individual: We offer a strong work-life balance with flexible schedules, meaningful perks and a collaborative team environment. **To become a priority applicant, please share a 1-2 minute video introduction detailing your experience in this specific role. You can upload your video to the CSJobs platforms. Please use a clean, distraction-free background and speak clearly and articulately.** Show more Show less
Posted 4 weeks ago
2 - 3 years
0 Lacs
Trivandrum, Kerala, India
On-site
Role Description Job Title: L1 SOC Analyst Experience : 2 to 3 years Location: Trivandrum, Kochi, Chennai, Bangalore, Hyderabad Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. The primary role of a SOC Level 1 Analyst is to serve as the frontline defense, managing first triage and ranking of security cases, and initiating the threat detection and response processes for client-related security events. The Analyst is integral to the MDR, working collaboratively with other teams to ensure high quality of service, and will be given opportunities for professional growth in cybersecurity. The position entails conducting inquiry procedures as dictated by CyberProof methodology and contributing insights on the case investigation and detection quality. Principal Duties Quickly respond to and classify all incoming security cases, ensuring that incidents are appropriately escalated to the right analyst within the predefined SLA period during the Analyst's shift. Conduct the first triage investigations into the assigned cases using a blended approach based on tools integrated into the SOAR platform and document all collected evidence and conclusions. At the shift's commencement, diligently review all new information in the SOAR, through the Teams channel, shared mailbox, and any other designated communication mediums to ensure readiness to continue or start case the investigation and address client queries. Facilitate a smooth handoff to the next team at the end of the shift, ensuring continuous and seamless security monitoring. Remain to any procedural inconsistencies or issues and proactively report these to the team leader or upper analytical layer (L2) for resolution or consultation. Should uncertainty or complex issues arise, elevate the matter promptly to a senior L1 Analyst or Shift and Technical Leads before resorting to the L2 team. Support the Lead Analysts and the L2 team in the extraction and compilation of data needed for the preparation of Weekly, Monthly, and Quarterly Business Review (QBR) documentation. Skills And Qualifications At least 1 year of experience as a security analyst Proficient in investigating s related to phishing, malware, and similar threats. Solid understanding of computer security and networking concepts Experience with SIEM or similar security tools (Splunk or Qradar or Sentinel). Knowledgeable about endpoint protection tools Skilled in analyzing network traffic, interpreting logs, and examining packet capture. Strong critical thinking and analytical abilities Excellent written and verbal communication skills Experience managing and analyzing s from security tools is a plus. Familiarity with cloud solutions is advantageous. Relevant certifications are a plus. Show more Show less
Posted 4 weeks ago
2 - 3 years
0 Lacs
Trivandrum, Kerala, India
On-site
Role Description Job Title: L1 SOC Analyst Experience : 2 to 3 years Location: Trivandrum, Kochi, Chennai, Bangalore, Hyderabad Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. The primary role of a SOC Level 1 Analyst is to serve as the frontline defense, managing first triage and ranking of security cases, and initiating the threat detection and response processes for client-related security events. The Analyst is integral to the MDR, working collaboratively with other teams to ensure high quality of service, and will be given opportunities for professional growth in cybersecurity. The position entails conducting inquiry procedures as dictated by CyberProof methodology and contributing insights on the case investigation and detection quality. Principal Duties Quickly respond to and classify all incoming security cases, ensuring that incidents are appropriately escalated to the right analyst within the predefined SLA period during the Analyst's shift. Conduct the first triage investigations into the assigned cases using a blended approach based on tools integrated into the SOAR platform and document all collected evidence and conclusions. At the shift's commencement, diligently review all new information in the SOAR, through the Teams channel, shared mailbox, and any other designated communication mediums to ensure readiness to continue or start case the investigation and address client queries. Facilitate a smooth handoff to the next team at the end of the shift, ensuring continuous and seamless security monitoring. Remain to any procedural inconsistencies or issues and proactively report these to the team leader or upper analytical layer (L2) for resolution or consultation. Should uncertainty or complex issues arise, elevate the matter promptly to a senior L1 Analyst or Shift and Technical Leads before resorting to the L2 team. Support the Lead Analysts and the L2 team in the extraction and compilation of data needed for the preparation of Weekly, Monthly, and Quarterly Business Review (QBR) documentation. Skills And Qualifications At least 1 year of experience as a security analyst Proficient in investigating s related to phishing, malware, and similar threats. Solid understanding of computer security and networking concepts Experience with SIEM or similar security tools (Splunk or Qradar or Sentinel). Knowledgeable about endpoint protection tools Skilled in analyzing network traffic, interpreting logs, and examining packet capture. Strong critical thinking and analytical abilities Excellent written and verbal communication skills Experience managing and analyzing s from security tools is a plus. Familiarity with cloud solutions is advantageous. Relevant certifications are a plus. Skills SOC Analysis,MItre Analysis,Invetigation,Sentinel Show more Show less
Posted 4 weeks ago
0 years
0 Lacs
Navi Mumbai, Maharashtra, India
Remote
SecureLayer7 is a CREST Certified & Recognized Vulnerability Assessment & Penetration Testing Provider with over 10 Years of Experience Conducting Advanced Pentests for Applications, Infra and All Digital Assets for Businesses of all sizes. Securelayer7 is one of the few companies with an incredibly powerful in-house platform - BugDazz and an in-house team of experienced consultants that makes our security offerings the most comprehensive! Key Responsibilities - Execute full-scope Red Team engagements, including phishing, social engineering, and network penetration. Simulate advanced hacking techniques and replicate adversary tactics to uncover security weaknesses. Work closely with Blue Teams in Purple Team exercises to enhance detection and response capabilities. Develop, extend, or modify exploits, shellcode, or tools to simulate sophisticated attacks. Perform reverse engineering of malware (advantageous but not mandatory). Write clear and actionable reports outlining vulnerabilities, exploitation techniques, and remediation strategies. Stay updated on the latest cyber threats, attack methods, and emerging technologies. Required Skills & Experience - Deep understanding and extensive experience in penetration testing methodologies and tools. Strong technical knowledge of various technologies and the ability to quickly learn and adapt to new ones. A passion for learning new technologies and breaking them apart is essential. Expertise in Active Directory attacks and defenses. Proficiency with tools such as Metasploit, Cobalt Strike, BloodHound, and similar offensive security frameworks. Knowledge of hacking methods and frameworks like MITRE ATT&CK. Strong scripting skills (Python, PowerShell, Bash) and experience in manual exploitation techniques. Certifications such as OSCP, OSEP, CRTO, or equivalent are highly valued. What We Offer Competitive salary and benefits package. Exciting projects that challenge your skills and creativity. A collaborative environment where you’ll learn and grow alongside top talent. Access to cutting-edge tools and resources to stay ahead in the cybersecurity field. Opportunities to shape the future of offensive security and contribute to meaningful projects. Location Onsite/ Workfrom Office. In special case Remote Show more Show less
Posted 4 weeks ago
0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
As a Product Manager, you will define, build, and scale the Kratikal & Threatcop product suite —including AutoSecT, TSAT, TLMS, TDMARC, and TPIR . You will collaborate closely with development, customer success, and cross-functional teams to drive the roadmap and execution, ensuring our solutions meet market and customer needs with speed, scale, and quality . This role sits at the intersection of technology, user needs, and business strategy , ideal for someone who thrives in a fast-paced and collaborative environment . Key Responsibilities: Craft clear, detailed, and technically sound product requirements, workflows, and user stories grounded in user needs and business goals Leverage product usage data, feature adoption metrics, and customer journey insights to guide prioritization and development efforts. Own and groom the product backlog, breaking down epics and prioritizing features based on user value, technical feasibility, and strategic alignment. Collaborate with developers to scope solutions and manage sprints to ensure timely, high-quality delivery. Analyze and act on customer feedback to identify pain points, prioritize fixes, and improve the product experience. Conduct regular feature research to enhance existing capabilities and introduce new ones based on user input and competitive benchmarking. Drive the adoption of AI in the product to enable intelligent automation, particularly focusing on agent-based AI capabilities that enhance user experience and reduce manual effort. Contribute to the conceptualization and execution of the auto GRC (Governance, Risk, and Compliance) product —ensuring alignment with regulatory requirements, customer needs, and automation best practices. Translate product vision, customer needs, and technical constraints into a shared understanding across development, QA, DevOps, customer success, and other stakeholders. Coordinate with QA and DevOps to manage releases, uphold performance and reliability standards, and ensure seamless delivery to end users. Support product launch planning, manage post-release reviews, and implement iteration cycles to optimize adoption, engagement, and product-market fit. Qualifications/Skills Required: Bachelor’s degree in Engineering, Computer Science, or a related field. 5+ years of experience in product management within B2B SaaS environments is a must. Project Management: Project Planning, Agile, Scrum, Waterfall, Risk Management, Scope Management. Tools and Software: JIRA, Confluence, SharePoint. Technical Skills: Agile, ITIL (Information Technology Infrastructure Library), Data Analysis. Soft Skills: Communication, Time Management, Problem-Solving, Multitasking, Attention to Detail. Why You'll Enjoy Working at Kratikal: Get the fast learning and exciting environment of a startup, combined with the stable work and strong performance of a bigger company. There's lots of room to learn, grow, and share your ideas. We also provide good benefits like health insurance, a gratuity payment, and Employees' Provident Fund (a savings plan for your future). We are an equal opportunity employer, where everyone has a fair chance. About Us: Kratikal Tech Private Limited is a leading B2B cybersecurity firm offering cutting-edge cybersecurity solutions and services such as Network Security Audits, Compliance Implementation, IoT Security, and VAPT. Serving over 150+ enterprise customers and 1825+ SMEs across industries including E-commerce, Fintech, BFSI, NBFC, Telecom, Consumer Internet, Cloud Service Platforms, Manufacturing, and Healthcare, Kratikal is dedicated to helping organizations combat cybercriminals using advanced, technology-driven cybersecurity solutions. The company also develops in-house cybersecurity products, including AutoSecT , competing with industry giants, alongside TSAT (Threatcop Security Awareness Training), TDMARC (Threatcop DMARC), TLMS (Threatcop Learning Management System), and TPIR (Threatcop Phishing Incident Response). These products have received numerous awards and recognitions for their innovation and effectiveness. Kratikal has been honored as the Top Cyber Security Startup at the 12th Top 100 CISO Awards. With a global reach, Kratikal collaborates with renowned organizations to secure their digital landscapes. For more information, visit our websites at www.kratikal.com and www.threatcop.com Show more Show less
Posted 4 weeks ago
0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role As a System Administrator at Kyndryl, you’ll solve complex problems and identify potential future issues across the spectrum of platforms and services. Do you want to be at the forefront of designing and implementing cutting-edge network solutions? Within our Network Services team at Kyndryl, you will be the go-to expert for providing top-of-the-line technical solutions throughout the entire solution lifecycle. You will be responsible for creating local and wide-area network solutions that utilize multiple platforms and protocols, ensuring that our customers have the best possible network infrastructure to support their business needs. Your skills in routers, networking controllers, bridges, and networking software will be essential as you troubleshoot network issues and coordinate with vendors to install the latest hardware and software, such as routers and switches. Not only will you help keep our customer’s networks running smoothly, but you will also work on project implementation, conduct project planning and cost analysis, and build proof-of-concept solutions with networking system technology. In this role, you will have the opportunity to review project requirements, communicate them accurately to the team, and ensure they are appropriately fulfilled. You will use your expertise to design and implement local and wide-area network solutions, including IP and VOIP, that address customer requirements. You will also provide high-quality technical solutions to our customers to prepare them for implementation, go-live, and maintenance. Responsibilities: Design, implement, and maintain network security architectures, including firewalls, IPS, and VPNs. Configure and troubleshoot Cisco FTD, Check Point Firewall, and Fortinet Firewall systems. Monitor and analyze network traffic to identify potential security threats. Develop and implement security policies and procedures to ensure compliance with industry standards. Conduct vulnerability assessments and penetration testing to identify weaknesses in network security. Collaborate with IT teams to ensure secure integration of new applications and systems. Provide training and support to junior network administrators on network security best practices. Participate in on-call rotations for after-hours support. If you are excited about using your technical expertise to create innovative network solutions and provide outstanding customer service, then this is the role for you! Your Future at Kyndryl At Kyndryl, we understand the importance of investing in our employees' professional growth and development. In Network Services, you can expect to receive a lot of support for training programs to keep your skills and knowledge up to date with the latest industry trends and technologies. By joining our team, you will have the opportunity to work on cutting-edge projects and contribute to the development of innovative solutions for our customers – including new wireless and 5G technologies – not yet adopted by most companies. Your Future at Kyndryl At Kyndryl, we understand the importance of investing in our employees' professional growth and development. In Network Services, you can expect to receive a lot of support for training programs to keep your skills and knowledge up to date with the latest industry trends and technologies. By joining our team, you will have the opportunity to work on cutting-edge projects and contribute to the development of innovative solutions for our customers – including new wireless and 5G technologies – not yet adopted by most companies. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical And Professional Expertise 5+ years of experience in network security administration, with a focus on firewall and IPS systems. In-depth knowledge of network security protocols, including TCP/IP, DNS, and VPNs. Experience with Cisco FTD, Check Point Firewall, and Fortinet Firewall systems. Strong understanding of network security threats, including malware, phishing, and DDoS attacks. Excellent problem-solving and analytical skills. Ability to work in a team environment and collaborate with IT teams. Strong communication and documentation skills. Mandatory Certifications: CCNA Security or CCNP Security certification/CCSA (Check Point Certified Security Administrator) certification/Fortinet Certified Network Security Administrator (FCNSA) certification Preferred Technical And Professional Experience Application Centric Infrastructure (ACI) deployment and data center experience Experience with design and implementing Software Defined Network (SDN) and large complex networks Experience with protocols and technologies such as, BDP, OSPF, MP-FBP EVPN, VXLAN, or VPC. Education Qalification - Degree/Diploma Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address. Show more Show less
Posted 4 weeks ago
0 years
0 Lacs
Kochi, Kerala
Remote
1. Technical Support Provide first-level support for hardware, software, and networking issues. Troubleshoot system errors and connectivity problems. Respond to user queries via email, phone, or in person. 2. Installation and Configuration Install and configure computer systems, software, printers, and other IT equipment. Set up new user accounts and profiles in systems (e.g., Windows, email, servers). 3. Maintenance and Monitoring Perform regular maintenance on IT equipment and systems. Monitor performance and ensure system availability and reliability. Maintain backups and ensure data security protocols are followed. 4. Security and Access Control Ensure systems are secure from threats (malware, phishing, unauthorized access). Maintain antivirus software and security patches. Manage permissions and access rights for users. 5. Documentation and Reporting Document issues, solutions, and updates in ticketing systems or logs. Maintain inventory of IT hardware/software assets. Prepare reports on recurring issues or system performance. 6. User Training and Support Assist users in understanding basic functions and software usage. Conduct training for employees on new systems or updates. Provide support during onboarding for new employees. 7. Support for Remote Work & Cloud Tools Assist with VPN setup, remote desktop access, and cloud collaboration tools (e.g., Google Workspace, Microsoft 365). Support video conferencing and online meetings. 8. Coordination with Vendors and External Support Liaise with external service providers or vendors for warranties, hardware issues, or outsourced services. Job Type: Full-time Pay: From ₹18,000.00 per month Benefits: Paid time off Shift: Day shift Work Days: Weekend availability Work Location: In person Application Deadline: 10/06/2025 Expected Start Date: 01/06/2025
Posted 4 weeks ago
0 years
0 Lacs
Bengaluru, Karnataka, India
Remote
About Us Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos’ complete portfolio includes industry-leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com. Role Summary We are looking for a high performing Enterprise Account Manager to lead strategic engagements with top enterprise accounts in the Bangalore region. This role demands a strong track record in selling full suite cybersecurity solutions, not just individual components. You’ll own the customer relationship, drive complex consultative sales cycles, and be a trusted advisor to CISOs and CIOs navigating today's threat landscape. What you will do Drive growth across large, strategic enterprise accounts in Bangalore and surrounding regions Position end-to-end cybersecurity offerings including MDR, XDR, SOC-as-a-Service, EASM, Zero Trust, and Cloud Security – not limited to point products Build strong executive relationships with CISOs, CIOs, and security leaders to understand business challenges and drive value-based selling Lead full sales cycle: from territory planning, demand generation, discovery, solution alignment, commercial closure, to long-term account expansion Collaborate with internal stakeholders including Sales Engineering, Product Specialists, Marketing, and Channel Partners to deliver integrated solutions Accurately forecast pipeline and revenue in CRM (e.g., Salesforce) Represent the brand at industry events, customer briefings, and strategic forums What you will bring 6–10+ years of enterprise cybersecurity sales experience with proven success in large account selling in Bangalore region Experience in selling platform led security solutions, such as MDR/XDR, EDR suites, or integrated cloud/network security, not just point products like antivirus or basic firewalls Strong understanding of security frameworks and enterprise threat landscape Familiarity with MEDDPICC or other structured sales methodologies Deep relationships in enterprise segments across BFSI, IT/ITES, Manufacturing, and Healthcare in Bangalore Strong executive presence, negotiation skills, and business acumen #B2 Ready to Join Us? At Sophos, we believe in the power of diverse perspectives to fuel innovation. Research shows that candidates sometimes hesitate to apply if they don't check every box in a job description. We challenge that notion. Your unique experiences and skills might be exactly what we need to enhance our team. Don't let a checklist hold you back – we encourage you to apply. What's Great About Sophos? · Sophos operates a remote-first working model, making remote work the primary option for most employees. However, some roles may necessitate a hybrid approach. Please refer to the location details in our job postings for further information. · Our people – we innovate and create, all of which are accompanied by a great sense of fun and team spirit · Employee-led diversity and inclusion networks that build community and provide education and advocacy · Annual charity and fundraising initiatives and volunteer days for employees to support local communities · Global employee sustainability initiatives to reduce our environmental footprint · Global fitness and trivia competitions to keep our bodies and minds sharp · Global wellbeing days for employees to relax and recharge · Monthly wellbeing webinars and training to support employee health and wellbeing Our Commitment To You We’re proud of the diverse and inclusive environment we have at Sophos, and we’re committed to ensuring equality of opportunity. We believe that diversity, combined with excellence, builds a better Sophos, so we encourage applicants who can contribute to the diversity of our team. All applicants will be treated in a fair and equal manner and in accordance with the law regardless of gender, sex, gender reassignment, marital status, race, religion or belief, color, age, military veteran status, disability, pregnancy, maternity or sexual orientation. We want to give you every opportunity to show us your best self, so if there are any adjustments we could make to the recruitment and selection process to support you, please let us know. Data Protection If you choose to explore an opportunity, and subsequently share your CV or other personal details with Sophos, these details will be held by Sophos for 12 months in accordance with our Privacy Policy and used by our recruitment team to contact you regarding this or other relevant opportunities at Sophos. If you would like Sophos to delete or update your details at any time, please follow the steps set out in the Privacy Policy describing your individual rights. For more information on Sophos’ data protection practices, please consult our Privacy Policy Cybersecurity as a Service Delivered | Sophos Show more Show less
Posted 4 weeks ago
2 years
0 Lacs
Bengaluru, Karnataka
Work from Office
Level Up Your Career with Zynga! At Zynga, we bring people together through the power of play. As a global leader in interactive entertainment and a proud label of Take-Two Interactive, our games have been downloaded over 6 billion times—connecting players in 175+ countries through fun, strategy, and a little friendly competition. From thrilling casino spins to epic strategy battles, mind-bending puzzles, and social word challenges, our diverse game portfolio has something for everyone. Fan-favorites and latest hits include FarmVille™, Words With Friends™, Zynga Poker™, Game of Thrones Slots Casino™, Wizard of Oz Slots™, Hit it Rich! Slots™, Wonka Slots™, Top Eleven™, Toon Blast™, Empires & Puzzles™, Merge Dragons!™, CSR Racing™, Harry Potter: Puzzles & Spells™, Match Factory™, and Color Block Jam™—plus many more! Founded in 2007 and headquartered in California, our teams span North America, Europe, and Asia, working together to craft unforgettable gaming experiences. Whether you're spinning, strategizing, matching, or competing, Zynga is where fun meets innovation—and where you can take your career to the next level. Join us and be part of the play! Position overview: Zynga is looking for a dynamic Experience Designer to join our hardworking team! You are responsible for crafting user-centered design solutions that promote ease of use, employ outstanding game/interaction design, and optimize the user experience universally. This includes all phases of the design process including conceptual design/development, graphic and interface design, Interaction models, prototypes, user/task flows and art production. You will work closely with the UX Lead to establish and maintain the game's visual integrity, interaction methods, brand standards, and consistency and collaborate with engineering to execute the design. What you'll do: Employ immersive storytelling and user-centered design to deliver outstanding interactive game experiences Evaluate designs quickly and craft creative high quality work. Possess a strong foundation of visual design principles, style guidelines, design processes, and creative workflow. Execution, delivery of UI designs and integration of production assets Rapid prototyping, MVP/clickthrough prototypes for internal buy-in Expert in working with industry-standard tools like Figma, Principle and Adobe Photoshop/ Creative suite apps. Expertise in multi-device/platform design Open to learning different game development tools (Unity) and understanding game metrics. Proficiency in building Design Systems and Prototyping frameworks Ability to own features by contributing towards making design decisions, solving design problems independently and presenting design concepts. Support design decisions from a practical, UX standard methodologies standpoint. Interface with and collaborate with key stakeholders and project partners to ensure the user experience reflects player needs and consistency. What you bring: 2+ years' experience in UX Design. Strong grasp of visual design principles and skill set. Expertise in initial data gathering, competitive analysis, information architecture, usability evaluation, interaction design for co-creating the spec and driving product conversations, strategy in new/large features, and experiments. Expertise in conducting user research Proactive collaboration skills and team player. Should be able to mentor juniors, establish OKRs and follow up. Should be able to operate independently with minimal supervision, and check-in. Encouraged to follow and evangelize UX best practices and improve design patterns. Hands-on experience or knowledge of Unity 3D and motion design is a plus. Excellent written and verbal communication Excellent presentation skills Real passion for gaming What we offer you: Zynga offers a world-class benefits package that helps support and balance the needs of our teams. To find out more about our benefits, visit the Zynga Benefits We are proud to be an equal opportunity employer, which means we are committed to creating and celebrating diverse thoughts, cultures, and backgrounds throughout our organization. Employment with us is based on substantive ability, objective qualifications, and work ethic – not an individual's race, creed, color, religion, sex or gender, gender identity or expression, sexual orientation, national origin or ancestry, alienage or citizenship status, physical or mental disability, pregnancy, age, genetic information, veteran status, marital status, status as a victim of domestic violence or sex offenses, reproductive health decision, or any other characteristics protected by applicable law. As an equal opportunity employer, we are committed to providing the necessary support and accommodation to qualified individuals with disabilities, health conditions, or impairments (subject to any local qualifying requirements) to ensure their full participation in the job application or interview process. Please contact us at accommodationrequest@zynga.com to request any accommodations or for support related to your application for an open position. Please be aware that Zynga does not conduct job interviews or make job offers over third-party messaging apps such as Telegram, WhatsApp, or others. Zynga also does not engage in any financial exchanges during the recruitment or onboarding process, and will never ask a candidate for their personal or financial information over an app or other unofficial chat channel. Any attempt to do so may be the result of a scamp or phishing attack, and you should not engage. Zynga's in-house recruitment team will only contact individuals through their official Company email addresses (i.e., via a zynga.com, naturalmotion.com, smallgiantgames.com, themavens.com, gram.gs email domain).
Posted 4 weeks ago
0 - 3 years
0 Lacs
Mumbai, Maharashtra
Work from Office
As the Chief Information Security Officer (CISO) at Ring, you will be responsible for overseeing and implementing comprehensive security strategies to safeguard our organization's information assets and ensure compliance with industry regulations. You will play a critical role in maintaining the confidentiality, integrity, and availability of our data, systems, and infrastructure—both on-premises and in the cloud (particularly AWS)—thereby fostering trust with our customers and stakeholders. What You'll Do: Strategic Leadership Develop and execute a strategic cybersecurity roadmap aligned with business objectives, cloud strategy (including AWS), and industry best practices. Provide expert guidance on security matters to executive management and the board of directors. Monitor emerging threats, cybersecurity trends, and AWS-specific threat landscapes, integrating them into security strategies. Risk Management Identify, assess, and prioritize cybersecurity risks across cloud and on-prem environments. Implement robust risk mitigation controls, particularly in AWS infrastructure using native AWS security tools and frameworks. Conduct regular security assessments, cloud configuration reviews, and penetration testing to ensure robust defenses. Compliance and Regulatory Governance Ensure compliance with data protection laws, regulations, and standards (e.g., GDPR, PCI DSS, ISO 27001, AWS Well-Architected Framework – Security Pillar). Maintain documentation and security policies that align with AWS shared responsibility model and compliance programs. Partner with legal and compliance teams to address evolving privacy and regulatory concerns. Governance & Compliance: Develop and maintain information security policies and drive compliance with ISO 27001, SOC 2, and RBI guidelines. Act as the primary contact for audits and inspections. Risk Management: Conduct risk assessments, manage risk registers, and oversee third-party/vendor security reviews. Security Operations: Oversee tools and processes for SIEM, DLP, EDR, patch management, and incident response. Lead security incident simulations and resolution. Cloud & App Security: Manage AWS security architecture, implement CSPM programs, and embed secure coding and DevSecOps practices across CI/CD pipelines. Business Continuity & DR: Maintain and test disaster recovery and continuity plans (RTO: 60 mins; near-zero RPO). Awareness & Culture: Run regular security training, phishing drills, and promote a security-aware culture across the organization. Reporting & Strategy: Present security metrics, dashboards, and risk reports to leadership and participate in strategic IT governance forums. Security Operations Oversee daily security operations, including monitoring of AWS CloudTrail, GuardDuty, and other security tools. Establish and manage incident response protocols across cloud and on-prem systems. Lead incident investigation and root cause analysis using AWS native tools when applicable. Promote organization-wide security awareness and cloud security training initiatives. Vendor Risk Management Evaluate and monitor third-party vendors’ security posture, especially those integrated into AWS-hosted services. Implement risk management protocols for vendors and ensure SLAs include AWS security considerations. What We’re Looking For: Bachelor’s degree in Computer Science, Information Security, or a related field; Master’s degree preferred. Relevant certifications such as CISSP, CISM, AWS Certified Security – Specialty, or equivalent preferred. 10+ years of experience in cybersecurity roles, with at least 3 years in a leadership capacity. Proven success in developing and implementing cybersecurity strategies, particularly in cloud (AWS) and financial/FinTech environments. Deep understanding of security technologies including firewalls, IDS/IPS, encryption, IAM, and AWS-native security services. Strong communication and interpersonal skills, with the ability to influence senior stakeholders and cross-functional teams.
Posted 4 weeks ago
0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Company Information At Advarra, we are passionate about making a difference in the world of clinical research and advancing human health. With a rich history rooted in ethical review services combined with innovative technology solutions and deep industry expertise, we are at the forefront of industry change. A market leader and pioneer, Advarra breaks the silos that impede clinical research, aligning patients, sites, sponsors, and CROs in a connected ecosystem to accelerate trials. Company Culture Our employees are the heart of Advarra. They are the key to our success and the driving force behind our mission and vision. Our values (Patient-Centric, Ethical, Quality Focused, Collaborative) guide our actions and decisions. Knowing the impact of our work on trial participants and patients, we act with urgency and purpose to advance clinical research so that people can live happier, healthier lives. At Advarra, we seek to foster an inclusive and collaborative environment where everyone is treated with respect and diverse perspectives are embraced. Treating one another, our clients, and clinical trial participants with empathy and care are key tenets of our culture at Advarra; we are committed to creating a workplace where each employee is not only valued but empowered to thrive and make a meaningful impact. Job Duties & Responsibilities Provides oversight for the information security compliance program for the relevant region, identifying areas of non-compliance and directing corrective action. Consultant and advisor to regional site leadership on information security and related matters. Initiates, facilitates, and promotes activities to foster information security awareness and education within the associated area of responsibility. Fosters a culture of cyber security both with the IT organization and to drive behavioral changes for the business, including reports and communication to regional and site level leadership on security trends and statistics. Assists the CISO, Security Operations Lead, Privacy and Compliance as necessary around incident response for regional security incidents and events including responding to potential breaches of electronic protected health information (ePHI) and electronic personally identifiable information (ePII). Responsible for the development and implementation of associated risk management or corrective action “Plan of Action & Milestones” (POA&M) for the regional or business area of responsibility including the integrity of initial or periodic risk assessment/analysis and the subsequent mitigation and remediation. Coordinates external and internal security and privacy audit controls for that region or business to monitor activity on electronic systems that contain or use electronic protected health information or electronic personally identifiable information and to ensure that activity is appropriate. Such activity would include, but is not limited to, logons and logoffs, file access, updates, edits and printing. Ensure that the disaster recovery, business continuity, risk management and access control needs of the regional or business are documented and addressed. Leads strategic projects as necessary with both regional and national scope, for example Data Leak Protection, Vulnerability Management, Phishing Simulation reporting and others This role will be an individual contributor, with no direct reports. Location This role is open to candidates working hybrid in Bengaluru India. Basic Qualifications Bachelor’s degree in computer science, information systems, related field, or equivalent experience CISSP, CISM certification preferred 5-10 years’ experience leading an information security program and working with a globally distributed information security team Experience in Life Science, Health Care, manufacturing or other highly regulated industries Ability to lead audits and assessments of technology and processes related to ISO27001, HIPAA & HITRUST Experience with vendor and product selections including oversight of enterprise risk assessments Preferred Qualifications CRISC, CGEIT, CISA GSEC, GCIH certifications are helpful but not required Physical And Mental Requirements Sit or stand for extended periods of time at stationary workstation Regularly carry, raise, and lower objects of up to 10 Lbs. Learn and comprehend basic instructions Focus and attention to tasks and responsibilities Verbal communication; listening and understanding, responding, and speaking Advarra is an equal opportunity employer that is committed to diversity, equity and inclusion and providing a workplace that is free from discrimination and harassment of any kind based on race, color, religion, creed, sex (including pregnancy, childbirth, and related medical conditions, sexual orientation, and gender identity), national origin, age, disability or genetic information or any other status or characteristic protected by central, state, or local law. Advarra provides equal employment opportunity to all individuals regardless of these protected characteristics. Further, Advarra takes affirmative action to ensure that applicants and employees are treated without regard to any of these protected characteristics in all terms and conditions of employment, including, but not limited to, hiring, training, promotion, discipline, compensation, benefits, and separation from employment. Show more Show less
Posted 4 weeks ago
0 years
0 Lacs
Mumbai Metropolitan Region
On-site
Certifications, Qualification And Experience Bachelor / PG degree with any of the certifications - ISO 27001, CBCP, CISA, CISM, CRISC, CISSP 2 years to 20 years of applied work experience in cyber security programs, audits, assessments, risk, remediation, or cyber security compliance management. Job Description Implements security controls, risk assessment framework (ISO 31000, NIST), and program that align to regulatory requirements, ensuring documented and sustainable compliance that aligns and advances client business objectives. Evaluates risks and develops security standards, procedures, and controls to manage risks. Improves client security positioning through process improvement, policy, automation, and the continuous evolution of capabilities. Implements processes, such as GRC (governance, risk and compliance), to automate and continuously monitor information security controls, exceptions, risks, testing. Develops reporting metrics, dashboards, and evidence artifacts. Defines and documents business process responsibilities and ownership of the controls in GRC tool (e.g. ServiceNow GRC, Archer, OneTrust, SAP GRC). Schedules regular assessments and testing of effectiveness and efficiency of controls and creates GRC reports. Updates security controls and provides support to all stakeholders on security controls covering internal assessments, regulations, protecting Personally Identifying Information (PII) data, and compliance such PCI DSS, SOX, SOC2, HIPAA, RBI Guideline, ISO standards Performs and investigates internal and external information security risk and exceptions assessments. Assess incidents, vulnerability management, scans, patching status, secure baselines, penetration test result, phishing, and social engineering tests and attacks. Documents and reports control failures and gaps to stakeholders. Provides remediation guidance and prepares management reports to track remediation activities. Assists other staff in the management and oversight of security program functions. Trains, guides, and acts as a resource on security assessment functions to other departments within Client sites. Remains current on best practices and technological advancements and acts as the Client’s technical resource for security assessment and regulatory compliance. Performs other related duties as assigned. Show more Show less
Posted 1 month ago
6 - 10 years
11 - 16 Lacs
Noida, New Delhi, Gurugram
Work from Office
SIEM tools to identify potential threats;VAPT tools, Incident Handling, Forensic Analysis;CEH CSA;CySA+;CISA;incidents and breaches; operating systems, network devices, and security devices.Familiarity with Security Information and Event Management
Posted 1 month ago
0 - 8 years
0 Lacs
Bengaluru, Karnataka
Work from Office
We help the world run better At SAP, we enable you to bring out your best. Our company culture is focused on collaboration and a shared passion to help the world run better. How? We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences, values flexibility, and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative, caring team environment with a strong focus on learning and development, recognition for your individual contributions, and a variety of benefit options for you to choose from. Summary An SAP Global Cyber Incident Response and Recovery Investigator is a crucial front-line defender and core part of SAP’s digital enterprise. Our Cyber Incident Investigators are responsible for triaging security events detected by security monitoring operations tools, analyzing all available data to determine severity and priority, doing an initial assessment whether a cyber-attack is occurring. Then the Investigator will escalate to a Global Security Operations Investigator in scoping the extent of a suspected attack, coordinating efforts to contain attacks, and supporting forensic investigation to determine the details around the attack. What you'll do Our Global Cyber Security Incident Response and Recovery Investigator are our first line of response for security event and incidents with a global scope. They are responsible for triaging security alerts detected by Enterprise Detection and SIEM, analyzing available data to determine scope, severity, and priority to determine follow on actions, which could include escalation to a GSO Investigator. In escalation cases, they then work in a supportive capacity to further validate if a cyber-attack is occurring, scoping the extent of a suspected attack, coordinating efforts to contain attacks, supporting forensic investigations to determine the details around an attack, and providing guidance on remediation actions. In this role, you will not only conduct an initial assessment of the event, but also help scope and determine root cause analysis, support development of attack remediation strategies and coordinate the communication and handling of escalations of security activities. This role also triages operational response processes like those intervening in phishing campaigns. You will also assist in the review and updating of incident handling processes, standard operating procedures, playbooks and runbooks. You will work with Detection and SIEM teams to make improvements to detection and alerting mechanisms and support forensic investigations to determine incident details and provide supporting evidence. What you bring You should have demonstrated experience in cyber-attack analysis and of working in a similar 24/7 environments managing cases with enterprise SIEM or Incident Management systems. Previous experience of supporting multi-function, cross-organizational teams is also highly desirable. We are looking for analytical, critical thinkers, who have an eye for detail and are solution orientated. You should be quick to learn and adapt and operate in a dynamic environment. You typically will have most of the following technical skills and experience: 7 to 8 years’ of experience in a similar incident Investigator role or equivalent combination of education, certifications, and trainings Security certification (e.g. Security+, GCIA, GCIH, CISSP) Knowledge APT actors; their tools, techniques, and procedures (TTPs) Knowledge of TTP methods and frameworks Knowledge of TCP/IP communications & knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB Solid knowledge of one or more: Windows/AD file system, registry functions and memory artifacts Unix/Linux file systems and memory artifacts Mac file systems and memory artifacts Database, web application, cloud, or mobile device cyber incident response principals and techniques Cybersecurity automation Web servers and web applications. SIEM Security tools: IPS, Web proxy, Email proxy, pDNS, Deception, EDR etc.... Experience with one or more scripting languages (Powershell, Python, Bash, etc.) Experience with integration of threat hunting and cyber threat intelligence into the incident response process Experience with information security compliance audit frameworks and requirements e.g. ISO, FISMA, FedRAMP, SOC, SOX, PCI, GDPR and Data Privacy Bring out your best SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, you can bring out your best. We win with inclusion SAP’s culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone – regardless of background – feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world. SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team: Careers@sap.com For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program, according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training. EOE AA M/F/Vet/Disability: Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, age, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability. Successful candidates might be required to undergo a background verification with an external vendor. Requisition ID: 411769 | Work Area: Information Technology | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid.
Posted 1 month ago
3 - 5 years
0 Lacs
Hyderabad, Telangana, India
On-site
Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support EngineerMandatory Skills : Phishing, Threat Attack, Cyber SecurityExperience: 3 to 5 YearsLocation : HyderabadNotice Period : Immediate to 15 Days Job Description:Key ResponsibilitiesConduct email analysis and reverse engineer to identify and mitigate threats.Perform static and dynamic analysisAnalyze network traffic and develop heuristic signatures to detect malicious activities.Investigate security incidents, including data breaches, system intrusions, and policyviolations.Collaborate with cross-functional teams to improve detection capabilities andresponse.Develop and implement incident response plans and coordinate incidentinvestigations.Classify, Maintain and update real-time block lists and URL block lists.Write and review regular expressions for phish, spam and fraud detection.Perform URL and email grading to assess and categorize potential threats.Engage in security response activities to address and resolve security incidents.Conduct threat hunting to proactively identify and address potential detection gaps. Basic QualificationsBachelor's or Master's degree in Computer Science, Computer Engineering,Information Security, or a related field.Strong understanding of computer security, network architecture, and threatlandscape.Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS).Strong knowledge of networking concepts and OSI layers.Understanding of enterprise IT architecture, operating systems, and file systems.Excellent analytical skills and ability to identify patterns and trends.Strong research skills and ability to analyze and present complex data.Good logical reasoning and deep analytical skills.Good communication skills and attention to detail.Ability to perform well under stress, particularly in critical response situations.Basic qualities of a researcher, including curiosity, persistence, and attention todetail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identifyindicators of compromise (IOCs), and respond to incidents promptly.Phishing Detection and Mitigation: Expertise in identifying and mitigating phishingattacks, including spear-phishing and whaling.Malware Analysis: Skills in analyzing email-borne malware, understanding itsbehavior, and developing countermeasures.Cryptography: Knowledge of encryption techniques to secure emailcommunications and protect sensitive data.Network Security: Understanding of network protocols and security measures todetect and prevent email-based attacks.Programming and Scripting: Proficiency in languages like Kusto, Python,PowerShell, or Bash for automating security tasks and analyzing email logs.Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, andothers that impact email security practices. ToolsSecure Email Gateways (SEGs): Tools like Microsoft Defender for Office,Proofpoint, Mimecast, or Barracuda to filter and block malicious emails.Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME(Secure/Multipurpose Internet Mail Extensions) for encrypting email content.Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box likeThreatConnect or Recorded Future to gather and analyze threat intelligence data.Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo AltoNetworks WildFire to safely analyze suspicious email attachments.Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond tophishing attempts.Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to sohail.s@s3staff.com
Posted 1 month ago
2 - 5 years
0 Lacs
Pune, Maharashtra, India
On-site
This role has positions based out of Bangalore and Pune; candidates may be considered for either location based on the interview process. Responsibilities:Application Security Testing/Penetration Testing (Web-based, Thick client, web services, Mobile Android & IOS, Network PT)API TestingSecurity defect Tracking and working closely with Developers to fix the issueStrong experience with the following tools – Burp Suite, Wireshark, Nmap, Metasploit, Checkmarx/Fortify, and Nessus.Excellent English communication skills (verbal and written) Requirements:CEH/ OSCP/ OSCE and ISCP certification and 2+ years of work experience in VAPT Benefits of working with us:Benefits of both the worlds - Enthusiasm & Learning Curve of a Start-Up, Deliveries & Performance of an Enterprise Service Provider.The sky's the limit when it comes to learning, growth & and ideas.We do not follow the typical corporate hierarchy ladder.Medical insurance, gratuity, and provident fund.As part of our dedication to an inclusive and diverse workforce, Kratikal is committed to Equal Employment Opportunity without regard for race, color, national origin, ethnicity, gender, protected veteran status, disability, sexual orientation, gender identity, or religion. About Us: Kratikal Tech Private Limited is a leading B2B cybersecurity firm offering cutting-edgecybersecurity solutions and services such as Network Security Audits, Compliance Implementation, IoT Security, and VAPT. Serving over 150+ enterprise customers and 1825+ SMEs across industries including E-commerce, Fintech, BFSI, NBFC, Telecom, Consumer Internet, Cloud Service Platforms, Manufacturing, and Healthcare, Kratikal is dedicated to helping organizations combat cybercriminals using advanced, technology-driven cybersecurity solutions. The company also develops in-house cybersecurity products, including AutoSecT, competing with industry giants, alongside TSAT (Threatcop Security Awareness Training), TDMARC (Threatcop DMARC), and TPIR (Threatcop Phishing Incident Response). These products have received numerous awards and recognitions for their innovationand effectiveness. Kratikal has been honored as the Top Cyber Security Startup at the 12th Top 100 CISO Awards. With a global reach, Kratikal collaborates with renowned organizations to secure their digital landscapes. For more information, visit our websites at www.kratikal.com and www.threatcop.com.
Posted 1 month ago
0 - 4 years
0 Lacs
Kochi, Kerala
Remote
About the Role: We are seeking an experienced and passionate Threat & Vulnerability Trainer to join our team in Kochi. The ideal candidate will be responsible for delivering comprehensive training programs focused on cybersecurity threats, vulnerability assessments, and remediation strategies. You will work closely with technical teams and trainees to upskill professionals and ensure readiness to tackle evolving cyber threats. Key Responsibilities: Design and deliver in-depth training sessions on cybersecurity topics including: Threat intelligence Vulnerability scanning and management Common attack vectors (phishing, malware, zero-day exploits, etc.) Security frameworks (NIST, ISO 27001, OWASP Top 10) Remediation techniques and best practices Develop customized training materials, hands-on labs, and assessments. Conduct workshops, webinars, and classroom sessions for internal and external learners. Continuously update training content to align with industry trends and threat landscapes. Assess the effectiveness of training sessions through feedback, tests, and practical evaluations. Collaborate with SMEs, SOC teams, and IT departments to understand training needs and integrate real-world scenarios into modules. Required Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field. 3+ years of experience in cybersecurity, with a focus on threat and vulnerability management. Proven experience in delivering technical training or mentoring. Familiarity with tools like Nessus, Qualys, Rapid7, Metasploit, Burp Suite, etc. Strong knowledge of CVEs, threat modeling, penetration testing basics, and SIEM concepts. Excellent communication, presentation, and facilitation skills. Preferred Qualifications: Certifications such as CEH, CompTIA Security+, OSCP, CISSP, or similar. Experience working in a SOC or red/blue team environment. Prior experience with learning management systems (LMS) or e-learning content creation. Work Location & Schedule: Location: Kochi (mandatory on-site presence) Work Hours: Monday to Friday, 9:00 AM – 6:00 PM Job Type: Full-time Benefits: Flexible schedule Internet reimbursement Schedule: Day shift Evening shift Monday to Friday Morning shift US shift Experience: total work: 4 years (Required) Language: English (Required) Work Location: Hybrid remote in Kochi, Ernakulam, Kerala Expected Start Date: 13/05/2025
Posted 1 month ago
0 years
0 - 0 Lacs
Delhi, Delhi
Work from Office
Job Responsibilities: Responsibilities: Hardware Support: Provide first-level technical support for all company-issued hardware, including desktops, laptops, printers, peripherals (e.g., keyboards, mouse, monitors), and mobile devices. Diagnose and troubleshoot hardware malfunctions, perform basic repairs or replacements, and escalate complex issues to senior IT staff or external vendors as necessary. Assist with the setup, configuration, and deployment of new hardware. Maintain an inventory of hardware assets and track hardware-related issues. Provide guidance to users on the proper use and maintenance of hardware. Email Support: Provide comprehensive support for the company's email system (e.g., Microsoft Exchange, Google Workspace). Troubleshoot email-related issues, including account setup, password resets, email client configuration (e.g., Outlook, webmail), sending/receiving errors, spam filtering, and mailbox management. Assist users with email archiving, folder organization, and other email productivity features. Address issues related to email security and phishing attempts, providing user education as needed. Help Desk Operations: Serve as the initial point of contact for all hardware and email-related support requests via phone, email, and in-person. Log all support requests accurately and efficiently in the help desk ticketing system. Prioritize and manage tickets according to severity and impact. Follow up with users to ensure their issues are resolved to their satisfaction. Maintain a knowledge base of common hardware and email issues and their solutions. Contributes to the development of user guides and FAQs. Assist with other IT-related tasks as assigned. Stay up to date with the latest hardware technologies and email systems. Adhere to company IT policies and procedures. Provide training to the clients and team members about the products and services of the organization. Qualifications: High school diploma or equivalent; Associate's or bachelor’s degree in information technology or a related field is preferred. Strong understanding of computer hardware components, operating systems (Windows, macOS), and basic networking. Proficiency in configuring and troubleshooting various email clients (e.g., Microsoft Outlook, web browsers, mobile email apps). Updated email platforms (e.g., Microsoft Exchange, Google Workspace). Familiarity with help desk ticketing systems. Excellent problem-solving and analytical skills. Strong communication (both verbal and written) and interpersonal skills. Ability to work independently and as part of a team. Basic understanding of IT security best practices related to hardware and email. Skills: Hardware troubleshooting and repair Email client configuration and troubleshooting Operating system support (Windows, macOS) Basic networking concepts Help desk ticketing system. Job Type: Full-time Pay: ₹10,000.00 - ₹15,000.00 per month Shift: Evening shift Work Location: In person
Posted 1 month ago
5 - 8 years
0 Lacs
Nagpur, Maharashtra, India
On-site
The Security & Compliance Manager will lead the organization’s IT security and compliance initiatives, acting as the Single Point of Contact (SPOC) for all third-party audits, especially from BFSI clients. This role ensures adherence to regulatory, data protection, and industry standards. Key Responsibilities Act as the Single Point of Contact (SPOC) for all BFSI customer audits, third-party assessments, and compliance reviews.Maintain and enforce security policies, risk registers, audit trails, and compliance documentation.Ensure ongoing compliance with ISO 27001, SOC 2, RBI, GDPR, TRAI, and other applicable BFSI regulations.Conduct internal audits, gap analyses, and drive remediation plans to closure.Coordinate with legal, IT, DevOps, and business teams to ensure audit readiness and evidence collection.Lead incident response planning, security drills, and business continuity testing.Manage vendor risk assessments, NDAs, and third-party compliance documentation.Perform regular risk assessments and maintain an up-to-date risk register.Conduct vulnerability scans across infrastructure, APIs, applications, and endpoints.Coordinate with external vendors for annual penetration testing and ensure timely remediation.Track, prioritize, and patch vulnerabilities based on CVSS scores and business impact.Develop and maintain a compliance calendar to track all audit and certification timelines.Own and manage the Information Security Management System (ISMS) lifecycle.Prepare and present audit reports, dashboards, and risk summaries to senior leadership.Ensure data privacy and protection controls are implemented across all CPaaS services.Conduct security awareness training and phishing simulations for employees.Review and approve security controls for new projects, vendors, and cloud deployments.Maintain incident logs, RCA reports, and ensure timely closure of security incidents.Collaborate with product and engineering teams to embed security-by-design principles.Stay updated with regulatory changes in the BFSI sector and translate them into actionable controls.Lead external certification audits (e.g., ISO, SOC 2) and manage evidence collection and walkthroughs. Required Skills And Qualifications Bachelor’s degree in information security, IT, or related field.6+ years of experience in IT security, audit, and compliance.Strong knowledge of BFSI regulatory frameworks and data privacy laws.Experience with GRC tools, audit frameworks, and documentation.Certifications: CISA, CISM, ISO 27001 Lead Auditor, or equivalent preferred.Excellent communication and stakeholder management skills.
Posted 1 month ago
0 years
0 Lacs
Mumbai, Maharashtra
Work from Office
Key Responsibilities - Execute full-scope Red Team engagements, including phishing, social engineering, and network penetration. Simulate advanced hacking techniques and replicate adversary tactics to uncover security weaknesses. Work closely with Blue Teams in Purple Team exercises to enhance detection and response capabilities. Develop, extend, or modify exploits, shellcode, or tools to simulate sophisticated attacks. Perform reverse engineering of malware (advantageous but not mandatory). Write clear and actionable reports outlining vulnerabilities, exploitation techniques, and remediation strategies. Stay updated on the latest cyber threats, attack methods, and emerging technologies. Required Skills & Experience - Deep understanding and extensive experience in penetration testing methodologies and tools. Strong technical knowledge of various technologies and the ability to quickly learn and adapt to new ones. A passion for learning new technologies and breaking them apart is essential. Expertise in Active Directory attacks and defenses. Proficiency with tools such as Metasploit, Cobalt Strike, BloodHound, and similar offensive security frameworks. Knowledge of hacking methods and frameworks like MITRE ATT&CK. Strong scripting skills (Python, PowerShell, Bash) and experience in manual exploitation techniques. Certifications such as OSCP, OSEP, CRTO, or equivalent are highly valued. What We Offer Competitive salary and benefits package. Exciting projects that challenge your skills and creativity. A collaborative environment where you’ll learn and grow alongside top talent. Access to cutting-edge tools and resources to stay ahead in the cybersecurity field. Opportunities to shape the future of offensive security and contribute to meaningful projects. Job Type: Full-time Schedule: Day shift Work Location: In person
Posted 1 month ago
0 years
0 Lacs
Ahmedabad, Gujarat, India
On-site
Responsibilities Assist in Data Discovery & Classification to identify sensitive data across systems.Support File Upload Security Solutions by monitoring and analyzing file uploads for threats.Participate in Attack Surface Management (ASM) to identify and mitigate vulnerabilities.Assist in Breach & Attack Simulation (BAS) and Red Team exercises under supervision.Conduct Phishing Simulation campaigns and report on user awareness.Monitor Active Directory (AD) Security for suspicious activities.Support IT Governance, Risk & Compliance (GRC) efforts by maintaining security policies.Assist in deploying and monitoring Decoy (Honeypot) systems for threat detection.Help manage Mobile Device Management (MDM) policies and security controls.Support Secure Data Backup & Recovery (Ransomware Protection) processes.Assist in enforcing Network Access Control (NAC) policies. Qualifications2–5 years of experience in cybersecurity operations.Hands-on experience with SIEM, BAS, ASM, and NAC tools.Strong knowledge of phishing, ransomware defense, and AD security.Experience in GRC frameworks (ISO 27001, NIST and GDPR).Familiarity with honeypots, incident response, and threat intelligence.Certifications like CISSP, CISM, OSCP, or CASP+ preferred.
Posted 1 month ago
5 - 8 years
0 Lacs
Chennai, Tamil Nadu, India
At FourKites we have the opportunity to tackle complex challenges with real-world impacts. Whether it’s medical supplies from Cardinal Health or groceries for Walmart, the FourKites platform helps customers operate global supply chains that are efficient, agile and sustainable. Join a team of curious problem solvers that celebrates differences, leads with empathy and values inclusivity. We are seeking a Security Lead with a strong background in cloud infrastructure security, security operations, and compliance. The ideal candidate will provide technical leadership across multi-cloud environments (AWS and Azure), security frameworks (ISO27001, PCI DSS, SOC 2), and modern security tools while bringing experience in SOC operations, vulnerability management, and security governance. This leadership role requires someone who can build and direct security teams, implement robust security controls, manage security incidents, and ensure compliance with industry standards. The Security Lead must excel at developing, implementing, and maintaining a comprehensive suite of security policies and procedures that align with organizational objectives and regulatory requirements. What You’ll Be Doing Security Leadership Lead the security team to deliver effective security services across the organizationContribute to security strategy and roadmap aligned with business objectivesProvide technical guidance and mentorship to team membersServe as the security subject matter expert for managementDrive security maturity improvements based on industry best practicesLead security governance meetings and present security metrics to stakeholders Security Policy Framework Development & Management Lead the development, implementation, and maintenance of the organization's comprehensive security policy framework including:Identity and Access Management & Asset Management ProceduresAccess Control PolicyAcceptable Usage PolicyData Classification and Protection PoliciesInformation Security Management System (ISMS) ManualCloud Security Policy and Cyber Security PolicyCryptography and Key Management PolicyNetwork Security ProceduresApplication Security StandardsVulnerability Management ProceduresThird Party Security Standards and PoliciesSoftware Development Lifecycle ProceduresRisk Management ProceduresEnsure policies adhere to ISO27001 requirements and maintain the Statement of ApplicabilityOversee the development and maintenance of Standard Operating Procedures for IT, DevOps, Admin, Product Support, Application, and Information Security teamsLead regular reviews and updates of the Risk Register and security policies Multi-Cloud Security Implementation Lead the implementation and management of security architecture across AWS and Azure environmentsDesign and implement consistent security controls across multi-cloud platformsOversee WAF solutions to protect web applications from threatsDirect configuration and management of cloud security controls across cloud environmentsGuide implementation of container security measuresOversee cryptographic key management and security automationImplement cloud security best practices for both AWS and Azure Security Operations & Monitoring Lead SOC team to ensure efficient cybersecurity monitoring, incident response, and threat managementOversee implementation and management of SIEM solutionsGuide detection strategy and custom rule developmentEnsure effective incident response and threat managementCoordinate security incident management and response Business Continuity & Disaster Recovery Lead the development and maintenance of Business Continuity Plan and Disaster Recovery PlanCoordinate with stakeholders to ensure plans are regularly tested and updatedImplement backup policies and procedures to ensure data availability Governance, Risk & Compliance Act as the primary liaison for internal, external, and regulatory auditsLead compliance efforts for ISO27001, PCI DSS, and SOC 2Coordinate vendor risk management activitiesContribute to defining roles and responsibilities for ISMS, IT, and DevOps teamsLead preparation of documentation and evidence for compliance audits Physical & Environmental Security Guide development and implementation of physical and environmental security standardsOversee secure disposal processesCoordinate implementation of clear desk and clear screen procedures Vulnerability Management Lead the organization's vulnerability management programCoordinate vulnerability assessment and penetration testing initiativesOversee remediation effortsGuide risk assessments and threat modelingLead patch management implementation Security Awareness & Training Develop security awareness strategy and training programsCoordinate phishing simulation campaignsFoster security culture development initiativesStrong leadership and team coordination abilitiesTactical execution with ability to align security initiatives with business objectivesExceptional ability to develop clear, comprehensive, and effective security policiesStrong analytical, troubleshooting, and problem-solving skillsExcellent communication skills for collaborating with cross-functional teams and managementExperience working as security lead across multiple business unitsAbility to translate complex security concepts for non-technical stakeholdersProactive approach to identifying and addressing security challenges This leadership position offers the opportunity to lead security initiatives across multiple business entities while implementing cutting-edge security solutions and best practices. The role requires a candidate who can provide technical leadership and excel at developing and maintaining the comprehensive policy framework that governs the organization's security posture. Who You Are 6+ years of information security experience with focus on cloud security and security operationsExperience in a security leadership or team lead roleStrong hands-on experience with multi-cloud platforms (AWS and Azure) and their security servicesDemonstrated experience implementing security frameworks and maintaining certifications (ISO27001, PCI DSS, SOC 2)Proven track record in developing, implementing, and managing comprehensive security policiesBackground in security monitoring, incident response, and vulnerability managementExperience with container security and Kubernetes environmentsSecurity policy development and implementationSecurity team leadership and coordinationMulti-cloud security implementation (AWS and Azure)Security monitoring and SIEM implementation (Wazuh, CrowdStrike Falcon)Cloud security tools and WAF configuration (Reblaze, AWS WAF, Azure WAF)Container security (NeuVector, Kubernetes security controls)Vulnerability assessment and penetration testing coordinationIdentity and access management, implementing least privilege principlesSecurity automation and infrastructure as codeISO27001 Implementation experience will be a plusPCI DSS compliance expertise will be a plusSOC 2 compliance expertise will be a plusCloud security certifications (AWS Security, Azure Security) will be a plusSecurity certifications (CISSP, CISM)will be a plus Who we are: FourKites®, the leader in AI-driven supply chain transformation for global enterprises and pioneer of real-time visibility, turns supply chain data into automated action. FourKites’ Intelligent Control Tower™ breaks down enterprise silos by creating a real-time digital twin of orders, shipments, inventory and assets. This comprehensive view, combined with AI-powered digital workers, enables companies to prevent disruptions, automate routine tasks, and optimize performance across As the leader in AI-driven supply chain transformation, FourKites pioneered the Intelligent Control Tower™ powered by the world’s largest real-time visibility network. Our platform creates comprehensive digital twins of your supply chain with AI-powered digital workers to automate resolution, improve collaboration and drive outcomes across all stakeholders. Unlike traditional control towers, we enable true real-time execution and intelligent fulfillment, transforming both your supply and customer. Benefits Medical benefits start on first day of employment36 PTO days( Sick, Casual and Earned) , 5 recharge days, 2 volunteer days Home Office setups and Technology reimbursementLifestyle & Family benefits Annual Swags/ Festive SwagsOngoing learning & development opportunities ( Professional development program, Toast Master club etc.)
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2