Jobs
Interviews

703 Phishing Jobs - Page 20

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 years

0 Lacs

Thane, Maharashtra, India

On-site

Responsibilities Design, implement, and maintain comprehensive cybersecurity measures for safeguarding systems, networks, and sensitive data. Administer and optimize cybersecurity infrastructure including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint detection and response (EDR), privileged access management (PAM), and cloud security posture management (CSPM) platforms. Perform regular security assessments and audits to proactively identify vulnerabilities, prioritizing and addressing remediations. Continuously monitor network and system activity for suspicious behavior or potential threats, performing detailed risk analysis and incident investigation. Serve as a vital member of the Incident Response Team, effectively addressing cybersecurity breaches and minimizing business impact. Develop, document, and execute emergency response plans, disaster recovery protocols, and incident playbooks. Collaborate closely with IT teams and various business units to integrate robust security practices across the organization. Partner actively with the Security Operations team to stay ahead of emerging ransomware, phishing campaigns, and zero-day vulnerabilities, and implement appropriate preventive measures. Contribute to the creation, review, and enforcement of cybersecurity policies and procedures, ensuring compliance with applicable regulations and industry standards. Generate clear, concise, and timely reports on security posture, threats, incidents, and mitigation measures for senior management. Stay abreast of industry developments, emerging threats, innovative technologies, and best practices to continually enhance cybersecurity defenses. Recommend improvements to security architecture, technology adoption, and procedures based on threat intelligence and industry advancements. Perform additional cybersecurity-related duties as required. Basic Qualifications Minimum 3 years of experience in cybersecurity roles, with a solid understanding of network infrastructure and database security. Demonstrated proficiency in security technologies including firewalls, VPN, IDS/IPS, endpoint protection, encryption, and cloud security. Hands-on experience working in diverse environments such as cloud, hybrid-cloud, multi-cloud, and on-premises systems. Familiarity with cybersecurity frameworks (e.g., NIST, ISO 27001) and regulatory standards (e.g., GDPR, HIPAA). Strong analytical, critical thinking, and problem-solving capabilities. Excellent written and verbal communication skills in English, with proven ability to collaborate effectively across teams. Relevant industry certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) strongly preferred. Ability to travel domestically or internationally up to 10% as needed. Preferred Characteristics Bachelor’s or Master's degree in Computer Science, Information Security, or related technical fields. Experience securing Operational Technology (OT) systems in global manufacturing environments. Expertise in defending against sophisticated threats, including nation-state threat actors. Prior U.S. Security Clearance or experience in highly regulated environments. Familiarity and experience conducting audits and maintaining compliance with standards such as SOC, ISO 27001/27017/27018/27701, FedRAMP, SOX 404, HITRUST CSF, HIPAA, GxP, 21 CFR Part 11, EU Annex 11, and NIST guidelines. Proficiency in scripting languages such as Python, Shell, Ruby, or Perl. Previous experience in corporate IT, help desk, or infrastructure support roles. Show more Show less

Posted 1 month ago

Apply

2.0 - 5.0 years

3 - 7 Lacs

Mumbai

Work from Office

Advanced Incident Analysis: Utilize advanced tools and techniques to analyze and investigate security incidents detected within the organization's networks and systems. Incident Response: Lead incident response efforts, coordinating with internal and external stakeholders to mitigate and remediate security incidents promptly. Team Leadership: Provide mentorship and guidance to the L1 SOC team, assisting in the development of their skills in incident analysis, parser creation, rule views, and report management. Parser Creation: Develop and maintain parsers to enhance the capability of the SOC's security information and event management (SIEM) system in detecting and correlating security events. Rule View Management: Manage and optimize rule views within the SIEM platform to ensure accurate and timely detection of security threats. Report Management: Oversee the generation and distribution of security reports, including incident reports, trend analysis, and recommendations for improvement. Collaboration: Work closely with other teams within the organization, including IT operations, network engineering, and application development, to improve overall security posture and incident response capabilities.

Posted 1 month ago

Apply

140.0 years

5 - 7 Lacs

Gurgaon

On-site

About NCR VOYIX NCR VOYIX Corporation (NYSE: VYX) is a leading global provider of digital commerce solutions for the retail, restaurant and banking industries. NCR VOYIX is headquartered in Atlanta, Georgia, with approximately 16,000 employees in 35 countries across the globe. For nearly 140 years, we have been the global leader in consumer transaction technologies, turning everyday consumer interactions into meaningful moments. Today, NCR VOYIX transforms the stores, restaurants and digital banking experiences with cloud-based, platform-led SaaS and services capabilities. Not only are we the leader in the market segments we serve and the technology we deliver, but we create exceptional consumer experiences in partnership with the world’s leading retailers, restaurants and financial institutions. We leverage our expertise, R&D capabilities and unique platform to help navigate, simplify and run our customers’ technology systems. Our customers are at the center of everything we do. Our mission is to enable stores, restaurants and financial institutions to exceed their goals – from customer satisfaction to revenue growth, to operational excellence, to reduced costs and profit growth. Our solutions empower our customers to succeed in today’s competitive landscape. Our unique perspective brings innovative, industry-leading tech to all the moving parts of business across industries. NCR VOYIX has earned the trust of businesses large and small — from the best-known brands around the world to your local favorite around the corner. We are looking for a motivated and detail-oriented SOC Analyst to join our Security Operations Center team. As a first line of defense, you will be responsible for monitoring, detecting, and responding to security events and alerts in real-time. This is an excellent opportunity for individuals looking to start or grow their career in cybersecurity. Key Responsibilities As an active member of the team, monitor and process response for security events on a 24x7 basis. Perform initial triage, analysis and respond to a security Incident Escalate incidents based on Severity and established protocols Document security incidents and investigation thoroughly Leverage automation and orchestration solutions to automate repetitive tasks. Work alongside other security team members to hunt for and identify security issues generated from the network, including third-party relationships. Coordinate incident response activities across multiple independently managed environments and security teams. Leverage knowledge in multiple security disciplines, such as Windows, Unix, Linux, data loss prevention (DLP), endpoint controls, Public Cloud, and networking, to offer global solutions for a complex heterogeneous environment. Utilize multiple security/threat intelligence tools and resources to understand threats. Analyze and respond to minor and major incidents, reported SPAM and Phishing e-mails. Partner with the detection engineering team to improve tool usage and workflow, as well as with the advanced threats and assessment team to mature monitoring and response capabilities. Support 24/7 operations Perform other duties as assigned Skills and Qualifications Strong knowledge of network, backend systems, operating systems, applications, and web services in a manner that allows for the interaction of all as it relates to security and services. 2+ Years as an incident responder Ability to apply analytical expertise and critical thinking to security incidents Ability to assimilate, understand and utilize various security technologies Ability to collaborate within a geographically distributed team of Incident Response Analysts Demonstrated team or functional leadership experience Experience processing and analyzing intelligence in support of management decision making Current Information Security related certification preferred. Current Public cloud related certification preferred. Knowledge of relevant information security and incident response frameworks such as NIST Cyber Security Framework, MITRE ATT&CK Framework. Strong communication skills and ability to work in a collaborative atmosphere Strong attention to detail Ability to deal with ambiguity and translate high level objectives into detailed tasks Ability to prioritize work with multiple, simultaneous work assignments. Ability and willingness to learn new tools and processes. Experience documenting business processes or technical procedures preferred. Offers of employment are conditional upon passage of screening criteria applicable to the job EEO Statement Integrated into our shared values is NCR Voyix’s commitment to diversity and equal employment opportunity. All qualified applicants will receive consideration for employment without regard to sex, age, race, color, creed, religion, national origin, disability, sexual orientation, gender identity, veteran status, military service, genetic information, or any other characteristic or conduct protected by law. NCR Voyix is committed to being a globally inclusive company where all people are treated fairly, recognized for their individuality, promoted based on performance and encouraged to strive to reach their full potential. We believe in understanding and respecting differences among all people. Every individual at NCR Voyix has an ongoing responsibility to respect and support a globally diverse environment. Statement to Third Party Agencies To ALL recruitment agencies: NCR Voyix only accepts resumes from agencies on the preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Voyix employees, or any NCR Voyix facility. NCR Voyix is not responsible for any fees or charges associated with unsolicited resumes “When applying for a job, please make sure to only open emails that you will receive during your application process that come from a @ncrvoyix.com email domain.”

Posted 1 month ago

Apply

4.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Level Up Your Career with Zynga! At Zynga, we bring people together through the power of play. As a global leader in interactive entertainment and a proud label of Take-Two Interactive, our games have been downloaded over 6 billion times—connecting players in 175+ countries through fun, strategy, and a little friendly competition. From thrilling casino spins to epic strategy battles, mind-bending puzzles, and social word challenges, our diverse game portfolio has something for everyone. Fan-favorites and latest hits include FarmVille™, Words With Friends™, Zynga Poker™, Game of Thrones Slots Casino™, Wizard of Oz Slots™, Hit it Rich! Slots™, Wonka Slots™, Top Eleven™, Toon Blast™, Empires & Puzzles™, Merge Dragons!™, CSR Racing™, Harry Potter: Puzzles & Spells™, Match Factory™, and Color Block Jam™—plus many more! Founded in 2007 and headquartered in California, our teams span North America, Europe, and Asia, working together to craft unforgettable gaming experiences. Whether you're spinning, strategizing, matching, or competing, Zynga is where fun meets innovation—and where you can take your career to the next level. Join us and be part of the play! What You'll Do Design, code, and develop new features/fix bugs/add enhancements to large scale services and solutions to be consumed by millions of mobile and web clients Analyze and improve efficiency, scalability and stability of various system resources Take a hands-on approach in writing, reviewing and testing code. Follow engineering standard methodologies to ensure code quality, performance and reliability. Review detailed tech plans and code from others, aligning with the team and Zynga-wide technical vision. Work collaboratively across teams to understand product/customer requirements and propose technical solutions. Provide production & integration support for shared technology across Zynga games. What You Bring Bachelor’s or Master’s degree in Computer Science, or equivalent. 4+ years of professional experience in software development in building backend applications using Ruby on Rails, Python. Experience working with AWS cloud, memcahe, redis and MySql databases. Experience with monitoring and logging systems like splunk is an advantage. Experience in object-oriented design of applications/systems. Experience in design and development of highly scalable backend REST services Exposure to Software development practices, Continuous Integration. Follow technology trends, Software Engineering methodology while enjoying the challenge of solving complex problems Strong Debugging and problem-solving skills We encourage you to apply even if you don’t meet every single requirement. Your unique perspective and experience could be exactly what we’re looking for. What We Offer You Zynga offers a world-class benefits package that helps support and balance the needs of our teams. To find out more about our benefits, visit the Zynga Benefits We are proud to be an equal opportunity employer, which means we are committed to creating and celebrating diverse thoughts, cultures, and backgrounds throughout our organization. Employment with us is based on substantive ability, objective qualifications, and work ethic – not an individual’s race, creed, color, religion, sex or gender, gender identity or expression, sexual orientation, national origin or ancestry, alienage or citizenship status, physical or mental disability, pregnancy, age, genetic information, veteran status, marital status, status as a victim of domestic violence or sex offenses, reproductive health decision, or any other characteristics protected by applicable law. As an equal opportunity employer, we are committed to providing the necessary support and accommodation to qualified individuals with disabilities, health conditions, or impairments (subject to any local qualifying requirements) to ensure their full participation in the job application or interview process. Please contact us at accommodationrequest@zynga.com to request any accommodations or for support related to your application for an open position. Please be aware that Zynga does not conduct job interviews or make job offers over third-party messaging apps such as Telegram, WhatsApp, or others. Zynga also does not engage in any financial exchanges during the recruitment or onboarding process, and will never ask a candidate for their personal or financial information over an app or other unofficial chat channel. Any attempt to do so may be the result of a scamp or phishing attack, and you should not engage. Zynga’s in-house recruitment team will only contact individuals through their official Company email addresses (i.e., via a zynga.com, naturalmotion.com, smallgiantgames.com, themavens.com, gram.gs email domain). Show more Show less

Posted 1 month ago

Apply

4.0 years

4 - 9 Lacs

Bengaluru

On-site

Level Up Your Career with Zynga! At Zynga, we bring people together through the power of play. As a global leader in interactive entertainment and a proud label of Take-Two Interactive, our games have been downloaded over 6 billion times—connecting players in 175+ countries through fun, strategy, and a little friendly competition. From thrilling casino spins to epic strategy battles, mind-bending puzzles, and social word challenges, our diverse game portfolio has something for everyone. Fan-favorites and latest hits include FarmVille™, Words With Friends™, Zynga Poker™, Game of Thrones Slots Casino™, Wizard of Oz Slots™, Hit it Rich! Slots™, Wonka Slots™, Top Eleven™, Toon Blast™, Empires & Puzzles™, Merge Dragons!™, CSR Racing™, Harry Potter: Puzzles & Spells™, Match Factory™, and Color Block Jam™—plus many more! Founded in 2007 and headquartered in California, our teams span North America, Europe, and Asia, working together to craft unforgettable gaming experiences. Whether you're spinning, strategizing, matching, or competing, Zynga is where fun meets innovation—and where you can take your career to the next level. Join us and be part of the play! What You'll Do: Design, code, and develop new features/fix bugs/add enhancements to large scale services and solutions to be consumed by millions of mobile and web clients Analyze and improve efficiency, scalability and stability of various system resources Take a hands-on approach in writing, reviewing and testing code. Follow engineering standard methodologies to ensure code quality, performance and reliability. Review detailed tech plans and code from others, aligning with the team and Zynga-wide technical vision. Work collaboratively across teams to understand product/customer requirements and propose technical solutions. Provide production & integration support for shared technology across Zynga games. What You Bring : Bachelor’s or Master’s degree in Computer Science, or equivalent. 4+ years of professional experience in software development in building backend applications using Ruby on Rails, Python. Experience working with AWS cloud, memcahe, redis and MySql databases. Experience with monitoring and logging systems like splunk is an advantage. Experience in object-oriented design of applications/systems. Experience in design and development of highly scalable backend REST services Exposure to Software development practices, Continuous Integration. Follow technology trends, Software Engineering methodology while enjoying the challenge of solving complex problems Strong Debugging and problem-solving skills We encourage you to apply even if you don’t meet every single requirement. Your unique perspective and experience could be exactly what we’re looking for. What We Offer You : Zynga offers a world-class benefits package that helps support and balance the needs of our teams. #LI-Hybrid We are proud to be an equal opportunity employer, which means we are committed to creating and celebrating diverse thoughts, cultures, and backgrounds throughout our organization. Employment with us is based on substantive ability, objective qualifications, and work ethic – not an individual’s race, creed, color, religion, sex or gender, gender identity or expression, sexual orientation, national origin or ancestry, alienage or citizenship status, physical or mental disability, pregnancy, age, genetic information, veteran status, marital status, status as a victim of domestic violence or sex offenses, reproductive health decision, or any other characteristics protected by applicable law. As an equal opportunity employer, we are committed to providing the necessary support and accommodation to qualified individuals with disabilities, health conditions, or impairments (subject to any local qualifying requirements) to ensure their full participation in the job application or interview process. Please contact us at accommodationrequest@zynga.com to request any accommodations or for support related to your application for an open position. Please be aware that Zynga does not conduct job interviews or make job offers over third-party messaging apps such as Telegram, WhatsApp, or others. Zynga also does not engage in any financial exchanges during the recruitment or onboarding process, and will never ask a candidate for their personal or financial information over an app or other unofficial chat channel. Any attempt to do so may be the result of a scamp or phishing attack, and you should not engage. Zynga’s in-house recruitment team will only contact individuals through their official Company email addresses (i.e., via a zynga.com, naturalmotion.com, smallgiantgames.com, themavens.com, gram.gs email domain).

Posted 1 month ago

Apply

140.0 years

0 Lacs

Gurgaon, Haryana, India

On-site

About NCR VOYIX NCR VOYIX Corporation (NYSE: VYX) is a leading global provider of digital commerce solutions for the retail, restaurant and banking industries. NCR VOYIX is headquartered in Atlanta, Georgia, with approximately 16,000 employees in 35 countries across the globe. For nearly 140 years, we have been the global leader in consumer transaction technologies, turning everyday consumer interactions into meaningful moments. Today, NCR VOYIX transforms the stores, restaurants and digital banking experiences with cloud-based, platform-led SaaS and services capabilities. Not only are we the leader in the market segments we serve and the technology we deliver, but we create exceptional consumer experiences in partnership with the world’s leading retailers, restaurants and financial institutions. We leverage our expertise, R&D capabilities and unique platform to help navigate, simplify and run our customers’ technology systems. Our customers are at the center of everything we do. Our mission is to enable stores, restaurants and financial institutions to exceed their goals – from customer satisfaction to revenue growth, to operational excellence, to reduced costs and profit growth. Our solutions empower our customers to succeed in today’s competitive landscape. Our unique perspective brings innovative, industry-leading tech to all the moving parts of business across industries. NCR VOYIX has earned the trust of businesses large and small — from the best-known brands around the world to your local favorite around the corner. We are looking for a motivated and detail-oriented SOC Analyst to join our Security Operations Center team. As a first line of defense, you will be responsible for monitoring, detecting, and responding to security events and alerts in real-time. This is an excellent opportunity for individuals looking to start or grow their career in cybersecurity. Key Responsibilities As an active member of the team, monitor and process response for security events on a 24x7 basis. Perform initial triage, analysis and respond to a security Incident Escalate incidents based on Severity and established protocols Document security incidents and investigation thoroughly Leverage automation and orchestration solutions to automate repetitive tasks. Work alongside other security team members to hunt for and identify security issues generated from the network, including third-party relationships. Coordinate incident response activities across multiple independently managed environments and security teams. Leverage knowledge in multiple security disciplines, such as Windows, Unix, Linux, data loss prevention (DLP), endpoint controls, Public Cloud, and networking, to offer global solutions for a complex heterogeneous environment. Utilize multiple security/threat intelligence tools and resources to understand threats. Analyze and respond to minor and major incidents, reported SPAM and Phishing e-mails. Partner with the detection engineering team to improve tool usage and workflow, as well as with the advanced threats and assessment team to mature monitoring and response capabilities. Support 24/7 operations Perform other duties as assigned Skills And Qualifications Strong knowledge of network, backend systems, operating systems, applications, and web services in a manner that allows for the interaction of all as it relates to security and services. 2+ Years as an incident responder Ability to apply analytical expertise and critical thinking to security incidents Ability to assimilate, understand and utilize various security technologies Ability to collaborate within a geographically distributed team of Incident Response Analysts Demonstrated team or functional leadership experience Experience processing and analyzing intelligence in support of management decision making Current Information Security related certification preferred. Current Public cloud related certification preferred. Knowledge of relevant information security and incident response frameworks such as NIST Cyber Security Framework, MITRE ATT&CK Framework. Strong communication skills and ability to work in a collaborative atmosphere Strong attention to detail Ability to deal with ambiguity and translate high level objectives into detailed tasks Ability to prioritize work with multiple, simultaneous work assignments. Ability and willingness to learn new tools and processes. Experience documenting business processes or technical procedures preferred. Offers of employment are conditional upon passage of screening criteria applicable to the job EEO Statement Integrated into our shared values is NCR Voyix’s commitment to diversity and equal employment opportunity. All qualified applicants will receive consideration for employment without regard to sex, age, race, color, creed, religion, national origin, disability, sexual orientation, gender identity, veteran status, military service, genetic information, or any other characteristic or conduct protected by law. NCR Voyix is committed to being a globally inclusive company where all people are treated fairly, recognized for their individuality, promoted based on performance and encouraged to strive to reach their full potential. We believe in understanding and respecting differences among all people. Every individual at NCR Voyix has an ongoing responsibility to respect and support a globally diverse environment. Statement to Third Party Agencies To ALL recruitment agencies: NCR Voyix only accepts resumes from agencies on the preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Voyix employees, or any NCR Voyix facility. NCR Voyix is not responsible for any fees or charges associated with unsolicited resumes “When applying for a job, please make sure to only open emails that you will receive during your application process that come from a @ncrvoyix.com email domain.” Show more Show less

Posted 1 month ago

Apply

5.0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

Job Title: Red Team Member Location: Ahmedabad Department: Cybersecurity / Offensive Security Employment Type: Full-Time Job Summary: We are seeking an experienced and highly skilled Red Team Member to join our cybersecurity team. The ideal candidate will bring a minimum of 5 years of hands-on experience in penetration testing and offensive security operations. This role involves emulating advanced persistent threats (APTs), identifying weaknesses in enterprise environments, and helping organizations improve their security posture. Candidates must hold relevant industry certifications such as OSCP , OSCE , CRTP , OSEP , or equivalent. Key Responsibilities: Plan, execute, and report on Red Team engagements simulating real-world attack scenarios (including physical, network, social engineering, and application-based attacks). Perform advanced penetration testing on internal and external networks, applications, and cloud infrastructures. Develop and utilize custom tools, scripts, and exploits to simulate threat actor tactics, techniques, and procedures (TTPs). Work closely with Blue Teams to improve detection capabilities and validate security controls. Participate in threat modeling, risk assessments, and adversary emulation exercises. Produce clear and actionable reports detailing findings, exploitation paths, and remediation guidance. Stay updated on the latest vulnerabilities, exploits, and attack vectors. Contribute to continuous improvement of Red Team methodologies, playbooks, and tooling. Required Qualifications: Minimum 5 years of professional experience in penetration testing, ethical hacking, or offensive security roles. Proven experience in Red Team operations or advanced adversary simulations. Strong understanding of MITRE ATT&CK framework, threat emulation, and TTPs of modern threat actors. Solid knowledge of networking protocols, Windows/Linux systems, Active Directory, cloud platforms (AWS, Azure, GCP), and common security controls. Proficient in scripting/programming languages such as Python, PowerShell, Bash, or similar. Certifications: Required: OSCP, OSCE, OSEP, CRTP, CRTO, GXPN, or similar advanced offensive security certifications. Preferred Skills: Experience with C2 frameworks (e.g., Cobalt Strike, Sliver, Mythic). Familiarity with EDR evasion techniques and OPSEC-safe offensive operations. Experience in purple team collaboration and working with detection engineering teams. Knowledge of social engineering and phishing techniques. Ability to communicate technical findings to both technical and non-technical stakeholders. Join our team and contribute to a collaborative, innovative environment, where your ideas can truly make a difference. We look forward to receiving your application Show more Show less

Posted 1 month ago

Apply

8.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

We are seeking a highly skilled and experienced Senior Manager – Information Security to lead the development and execution of our cybersecurity strategy. This role will play a key part in securing our cloud-native digital lending platforms and ensuring compliance with key regulations such as the RBI Master Directions, DPDP Act, and ISO 27001 standards. You will lead governance, risk, compliance, and security operations while collaborating with Legal, IT, Compliance, and Product teams. This is a critical leadership role in building a security-first culture and enabling business growth through robust information security practices. What You'll Do: Governance & Compliance: Develop and maintain information security policies and drive compliance with ISO 27001, SOC 2, and RBI guidelines. Act as the primary contact for audits and inspections. Risk Management: Conduct risk assessments, manage risk registers, and oversee third-party/vendor security reviews. Security Operations: Oversee tools and processes for SIEM, DLP, EDR, patch management, and incident response. Lead security incident simulations and resolution. Cloud & App Security: Manage AWS security architecture, implement CSPM programs, and embed secure coding and DevSecOps practices across CI/CD pipelines. Business Continuity & DR: Maintain and test disaster recovery and continuity plans (RTO: 60 mins; near-zero RPO). Awareness & Culture: Run regular security training, phishing drills, and promote a security-aware culture across the organization. Reporting & Strategy: Present security metrics, dashboards, and risk reports to leadership and participate in strategic IT governance forums. What We’re Looking For: 8+ years in cybersecurity or information security roles; at least 3 years in a leadership capacity. Background in fintech, NBFC, or regulated financial services preferred. Proven track record in managing audits (ISO 27001, SOC 2), incident response, and cloud security (AWS). Strong knowledge of cybersecurity tools and frameworks: AWS, SIEM, CSPM, IAM, patch management, DLP, EDR. Familiar with secure SDLC, DevSecOps, threat modeling, and regulatory compliance. Effective communicator with experience working across cross-functional teams. Certifications (preferred): CISSP, CISM, CISA, ISO 27001 Lead Auditor/Implementer, AWS Security Specialty. Bonus: DCPP, CIPP/E, or other data privacy/RBI-focused certifications. About Kissht: Kissht, a Great Place to Work® certified organization, is a consumer-first credit app that is transforming the landscape of consumer credit. As one of the fastest-growing and most respected FinTech companies, Kissht is a pioneer in data and machine-based lending. With over 15 million customers, including 40% from tier 2 cities and beyond, we offer both short and long-term loans for personal consumption, business needs, and recurring expenses. Founded by Ranvir and Krishnan, alumni of IIT and IIM, and backed by renowned investors like Endiya Partners, the Brunei Investment Authority, and the Singapore Government, Kissht is synonymous with excellence in the industry. Join us and be a part of a dynamic, innovative company that is changing the future of financial technology. Show more Show less

Posted 1 month ago

Apply

2.0 - 5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Are you a passionately curious individual who possesses a steady and unshakable eye for detail? Are you not afraid of searching for a needle in the stack of hay? Do you think you have the skillset, knowledge, to be the first line of defense between cyber adversaries and the organization? Do you believe in working for a mission to protect your organization 365*24*7? If you are in love with the tools and technology that help you to solve this daunting challenge, then we are looking for you. Who we are? Payatu is a GPTW certified company where we strive to create a culture of excellence, growth and innovation that empowers our employees to reach new heights in their careers. We are young and passionate folks driven by the power of the latest and innovative technologies in IoT, AI/ML, Blockchain, and many other advanced technologies. We are on the mission of making Cyberworld safe for every organization, product, and individual. What we look for outside work parameters? Your expertise is your primary qualification, not your degree or certification. Your publicly known contributions are your credentials . Your write-up and blogs reflect your interests and ethics. You are a perfect technical fit if: At least 2 to 5 years of experience handling SIEM tools ( Splunk ), Incident Response. Knowledge and Hands-on experience on Security appliances like (IPS, Proxy, XDR/EDR, Email Security Gateway, Cloud Access Security Broker). Experience in Security Orchestration and Automation. Should possess strong working knowledge of Power BI, Tableau, and Power Automate. Should have good knowledge of one or more programming/scripting languages like Python, Go, PowerShell, Bash. Have good experience in handling IT Security incidents, phishing analysis, triaging and analyzing malware, developing and fine-tuning use cases. Experience in host and network forensics. Experience in analyzing logs and should have hands-on experience in Windows and Linux. Should have experience in working on and monitoring cloud environment [ AWS & Azure] . Should have experience on Entra ID, Microsoft Defender, Sentinel, KQL. You Have All Our Desired Qualities, if: You like scripting and automating stuff. You like writing tools. You have excellent written and verbal communication skills and the ability to express your thoughts clearly. You have the skill to articulate and present technical things in business language. You can work independently as well as within a team. You have strong problem solving, troubleshooting, and analysis skills. You are passionate about your area of expertise and self-driven. You are comfortable working in a dynamic and fast-paced work environment. You are Self-driven, proactive, hardworking, team-player. You are working on something on your own in your field apart from official work. Your everyday work will look like: Automation & Orchestration: Automate mundane and repetitive tasks to improve existing workflows and improve response times. Engineering: Create custom solutions for various Incident Response activities as per business requirement. Incident Response activities: Identity, investigate and respond to potential security incidents to minimize the operational and organizational impact. Malware Analysis: Analyse and triage the malware found on the system. Forensics: Perform forensic analysis on system and network artifacts to identify indicators of compromise. Identify Gaps: Investigate and document gaps in controls, event data, and work with internal teams to resolve. Process Improvement: Execute, develop, and document Incident Handling Guides and processes. Show more Show less

Posted 1 month ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Hi, Exp: 5-10 Years Minimum of 4+ years’ experience with Microsoft DLP (Microsoft Defender /MS Purview & Compliance) and Microsoft Sentinel tool equivalent with other similar data leakage tool etc.) · Must have hands on experience for data loss product evaluations, building and implementing it, operationalize and integrating with existing systems for effective and efficient use and providing technical support and stakeholder management experience. · Must have hands-on experience with rule creation and maintenance, antispam and anti-phishing administration, report analysis and providing recommendations of future configurations and rules · Exposure/ knowledge of Data Loss Prevention integration with SIEM technologies (i.e.: Splunk, HP ArcSight, etc.) · Knowledge of programming languages a plus (i.e.: Java, .NET, Python, etc.) Top 3 Skills Required MS Purview & Compliance (MS DLP) MS Sentinel Basic scripting for automation If interested please share resume at deepika.eaga@quesscorp.com Show more Show less

Posted 1 month ago

Apply

5.0 years

0 Lacs

India

Remote

Job Title: Penetration Tester Location: Remote Experience Required: 5 Years Employment Type: Full-Time Job Summary: We are seeking a highly skilled and experienced Senior Penetration Tester with 5 years of hands-on experience in offensive security. The ideal candidate will be responsible for conducting advanced security assessments, simulating real-world cyberattacks, and providing actionable recommendations to enhance the organization’s security posture. This role demands deep technical expertise, strong analytical skills, and the ability to communicate effectively with both technical and non-technical stakeholders. Key Responsibilities: Plan, execute, and document black-box, grey-box, and white-box penetration tests across various environments (web apps, networks, APIs, mobile, cloud, etc.) Conduct Red Team/Blue Team exercises and collaborate with threat hunters and SOC teams. Identify, exploit, and report vulnerabilities in systems, applications, and infrastructure. Develop and maintain custom exploitation tools, scripts, and payloads . Perform social engineering engagements , including phishing simulations and physical assessments (where applicable). Provide detailed, risk-based reporting , including technical findings, proof-of-concept exploits, and remediation guidance. Stay current with emerging threats, vulnerabilities, and tools in the cybersecurity domain. Mentor junior team members and contribute to the development of internal testing methodologies and frameworks. Participate in threat modeling, architecture reviews, and security design discussions . Required Skills and Qualifications: 5 years of professional experience in penetration testing, red teaming, or offensive security . Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, Cobalt Strike, Nessus, etc. Deep understanding of OWASP Top 10 , MITRE ATT&CK , and NIST security frameworks . Strong knowledge of network protocols, web application architectures, cloud environments (AWS/Azure/GCP), and secure coding practices. Experience with manual testing techniques and not just automated scanners. Strong scripting and automation skills in Python, PowerShell, Bash, or Go . Experience with Active Directory exploitation , privilege escalation, and lateral movement techniques. Demonstrated ability to write clear, concise, and detailed technical reports. Strong verbal and written communication skills. Preferred Certifications (any of the following): Offensive Security Certified Professional (OSCP) Offensive Security Certified Expert (OSCE) Certified Red Team Professional (CRTP) GIAC Penetration Tester (GPEN) Certified Ethical Hacker (CEH) CREST Registered Tester or equivalent Show more Show less

Posted 1 month ago

Apply

0.0 - 8.0 years

0 Lacs

Gujarat

On-site

Location Gujarat,Maharashtra Ahmedabad,Pune Experience Range 8 - 10 Years Qualification BE (EEE) MCA (Computers) Job Description Senior Information Security Engineer Roles and Responsibilities Candidate will work as a member of the Corporate Security Team and assist in various day to day operational activities such as: Analyze findings from vulnerability scans and penetration tests, work with stakeholders to prioritize and remediate issues. Develop and maintain custom testing scripts and tools to simulate real-world attack scenarios. Oversee security architecture and implement advanced security controls to mitigate identified threats. Conduct email security risk assessments and manage email security solutions (e.g., Proofpoint, Mimecast, Microsoft Defender, Cisco Email Security). Monitor, detect, and respond to phishing, spoofing, and email-based attacks. Manage and tune SIEM, EDR, DLP, and other security technologies. Guide the organization's incident response efforts and participate in forensic investigations. Conduct risk assessments and security reviews for infrastructure and applications, both on-prem and in cloud environments. Ensure compliance with industry regulations and security standards (e.g., ISO 27001, NIST, PCI-DSS, GDPR). Contribute to secure SDLC practices by integrating security into CI/CD pipelines. Support vulnerability lifecycle management and recommend remediation strategies to IT and DevOps teams. Mentor junior staff and drive security awareness programs organization wide. Drive Corporate Security Program based on the NIST CSF – Identify, Detect, Protect, Respond and Recover. Develops, publishes, and maintains a comprehensive organization-wide information privacy and security plans, policies, procedures, and guidelines. Function as primary liaison with auditors, internal teams and vendors and be the resident expert on systems and services in use for PCI compliance and reporting Responsible for managing all aspects of the Vulnerability Risk Management Program including vulnerability identification, analysis, remediation coordination and reporting. Lead the development, implementation, and maintenance of security policies, standards, and guidelines. Identify and Monitor Corporate Networks to determine if there have been any attacks. Analyze network traffic to identify anomalies and test information security controls for weaknesses. Design and implement safeguards to protect the system with the help of network engineers and other members of the Technology Services team. Respond to threats by taking mitigating actions to contain the activity and minimize damage. Participate in risk assessments and breach readiness exercises for incident management. Facilitate forensics analysis to determine the source of the threat. Document lessons learned as well as identify process improvements. Communicate security issues to management via reports, dashboards. Provide weekly metrics on overall security posture. Research emerging threats and work with the Security Operations Center (SOC). Drive the Third-party vendor security evaluation. Participate in the security toll-gates on SSDLC projects. Implement innovative solutions to scale the program with emphasis on automation where applicable. Qualifications Basic Qualifications: Bachelor's Degree in Business, Computer Science or in a STEM major (Science, Technology, Engineering, or Math). Minimum of 8 years of experience in Information Security Experience in at least one full lifecycle supporting PCI compliance is a must have Experience in managing and maintaining a vulnerability management program using Qualys is a must have Experience in developing content in Splunk – searches, alerts (including POC and tuning), dashboards, Apps. Experience of Security Incident and Event Management (SIEM) tools (Splunk) – ingesting data (Forwarders, HTTP Event Collectors, add-ons), troubleshooting Splunk Installation. Experience in Endpoint security (EDR) – Detection and Response. Help create policies and SOP for Response workflow. Experience in Cortex XDR preferred. Experience in Security evaluation of third-party tools. Experience in Email Security and running phishing campaign Experience in Incident Management Experience in system and network security. Experience in Network Penetration testing. Knowledge of software development, computer networks and Internet threat activity. Programming experience in python, Perl and HTML/JS Previous enterprise or platform/cloud vulnerability management experience and Cloud Security is a plus Excellent written and verbal communication skills, including experience engaging with executive and technical audiences. Must be able to work in a fast paced, high profile environment.

Posted 1 month ago

Apply

0 years

0 Lacs

Bangalore Urban, Karnataka, India

On-site

What Success Looks Like In This Role Analyzing network traffic to identify compromised systems, negate denial of service attacks, and pinpoint resource abuse. Incorporate threat intelligence feeds into Microsoft Sentinel to enhance threat detection and response capabilities. Develop and implement security automation scripts and playbooks in Microsoft Sentinel to streamline security operations. Create reports and documentation related to security incidents, investigations, and overall security posture. Supporting priority incident investigations and threat intelligence discoveries with hunting expertise to identify the extent of any potential compromise. Respond to security incidents by containing, eradicating, and recovering from them using Microsoft Defender's tools and features. Educate users and colleagues about cybersecurity best practices and the use of Microsoft Defender. Perform onboarding and offboarding defender agents. Troubleshoot Defender agents not reporting to the portal Conduct investigations using EDR and live response Conduct Vulnerability Assessment using Defender. Investigate, identify, and prevent or mitigate abusive activities such as intrusion attempts, DDoS, malware distribution, phishing attacks, etc. Monitoring threat/vulnerability landscape and security advisories Appropriately manage time and customer issues based on issue severity and business needs Continuously monitors the security alerts queue, triages security alerts Monitors health of customer security sensors and SIEM infrastructure Ensures documented processes and procedures are relevant and up to date Investigate, document, and report on any security threat issues as well as emerging trends Enabling a world-class cyber defense program by working closely with other technical, vulnerability management, incident management, intelligence analyst and forensic personnel to develop a fuller understanding of the intent, objectives, and activity of cyber threat actors, and ultimately drive improvement to the organizations’ overall security posture Notify appropriate business stakeholders about serious security events, implement security improvements by assessing current situation, evaluating market trends, and anticipating requirements Perform threat hunting and threat analysis Monitor, detect, and analyze network threats Employ automation to aid in research and hunting tasks Write blogs and papers related to threat hunting and analysis Investigate, document, and report all security issues to contribute to incident response You will be successful in this role if you have: Qualifications Key Qualifications A Bachelor’s or Master's degree from a university (preferably in Computer Science, Engineering, or a related discipline), or equivalent security industry work experience Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law. This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise complete your expression of interest, without additional assistance and would like to discuss a request for reasonable accommodation, please contact our Global Recruiting organization at GlobalRecruiting@unisys.com or alternatively Toll Free: 888-560-1782 (Prompt 4). US job seekers can find more information about Unisys’ EEO commitment here. Show more Show less

Posted 1 month ago

Apply

7.0 years

3 - 4 Lacs

Bengaluru

On-site

We help the world run better At SAP, we enable you to bring out your best. Our company culture is focused on collaboration and a shared passion to help the world run better. How? We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences, values flexibility, and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative, caring team environment with a strong focus on learning and development, recognition for your individual contributions, and a variety of benefit options for you to choose from. Summary An SAP Global Cyber Incident Response and Recovery Investigator plays a critical role in safeguarding SAP’s digital enterprise. As a front-line defender, the Investigator is responsible for triaging security events identified by monitoring tools, analyzing data to assess severity and urgency, and conducting initial evaluations to determine whether a cyberattack is underway. When a potential incident is identified, the Investigator works closely with Global Security Operations to scope the impact, coordinate containment efforts, and support forensic investigations to uncover the nature and details of the attack. What you'll do Our Global Cyber Security Incident Response and Recovery Investigator are our first line of response for security event and incidents with a global scope. They are responsible for triaging security alerts detected by Enterprise Detection and SIEM, analyzing available data to determine scope, severity, and priority to determine follow on actions, which could include escalation to a IR Investigator. In escalation cases, they then work in a supportive capacity to further validate if a cyber-attack is occurring, scoping the extent of a suspected attack, coordinating efforts to contain attacks, supporting forensic investigations to determine the details around an attack, and providing guidance on remediation actions. In this role, you will: Conduct initial assessments and help drive root cause analysis. Contribute to the development of attack remediation and response strategies. Coordinate escalation handling and communication across teams. Triage operational security processes, including phishing response. Assist in maintaining and improving incident handling documentation—such as playbooks, runbooks, and standard operating procedures. Collaborate with Detection and SIEM teams to enhance detection logic and alert accuracy. Support forensic investigations with technical insights and evidence collection. Analysing cloud logs and telemetry for signs of compromise (e.g., CloudTrail, VPC Flow Logs, Azure Activity Logs). Leverage your offensive knowledge to identify gaps, simulate attacks, and drive improvements in detection, response, and hardening strategies. We value hands-on practitioners—our environment includes sandboxing, red vs. blue testing, or adversary emulation frameworks (e.g., MITRE ATT&CK, CALDERA, Atomic Red Team) and opportunities to build tooling or simulate attack chains. What you bring We are seeking analytical and detail-oriented critical thinkers who are solution-focused and thrive in dynamic environments. The ideal candidate should be a fast learner with the ability to adapt quickly and respond effectively to changing circumstances. Preferred Technical Skills and Experience: Experience: 7–10+ years in a cyber incident investigation role or equivalent combination of education, certifications, and relevant training. Certifications - Industry-recognized certifications such as Security+, GCIA, GCIH, CISSP (or equivalent). Strong understanding of Advanced Persistent Threat (APT) actors, their tools, techniques, and procedures (TTPs), as well as threat modelling frameworks. Proficiency in TCP/IP communications and knowledge of core network protocols and applications such as DNS, HTTP, and SMB. Operating Systems & Forensics: In-depth knowledge of forensic artifacts across one or more platforms: Windows/Active Directory (file systems, registry, memory artifacts) Unix/Linux (file systems, memory artifacts) macOS (file systems, memory artifacts) Specialized Domains (any of the following): Cyber incident response in cloud, mobile, web application, or database environments Cybersecurity automation and orchestration Web servers and web applications Cloud Platforms: Deep familiarity with AWS, Azure, and/or GCP — with an emphasis on security posture, logging, and IR tooling. Experience conducting incident response and post-incident forensics in cloud environments. Understanding of cloud-native service abuse and misconfigurations (IAM, serverless, container runtime attacks). Security Infrastructure Tools: (SIEM, IDS, EDR, DNS, other Deception technologies) Proficiency in scripting languages such as PowerShell, Python, or Bash . Bring out your best SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, you can bring out your best. We win with inclusion SAP’s culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone – regardless of background – feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world. SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team: Careers@sap.com For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program, according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training. EOE AA M/F/Vet/Disability: Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, age, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability. Successful candidates might be required to undergo a background verification with an external vendor. Requisition ID: 411769 | Work Area: Information Technology | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid.

Posted 1 month ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Junior Security Analyst – The Solenis Security Analyst (SSA) has a wide variety of skills, including performing intrusion analysis, a deep understanding of the 18x5 security monitoring environment. The SSA role requires defense against cyber threats by identifying and triaging security incidents. The ideal person in this role brings experience in monitoring and investigating network and endpoint intrusions, as well as experience handling security incidents within the Security Operations Center (SOC). This role must be able to solve complex problems independently and know when to escalate issues to senior IT Security Leads and Managers. This individual will work with multiple technology platforms and interface with other groups within IT Security Operations. The Solenis Security Analyst (SSA) for the SOC will be responsible for responding to Security incidents/alerts, and threats that impact information security at Solenis. This individual's role includes the following functions. Roles And Responsibilities Monitor and analyze security event logs from various systems and applications. Experience in responding to security incidents and investigations, including data breaches, malware infections, and denial-of-service attacks. Expertise in L1 SOC operations on various Security tools, eg: EDR, SIEM, Network logs, DLP, and email security. Perform preliminary analysis and assist in forensic investigations as required. Experience in handling various operating systems. Good Understanding In SIEM Event correlation, Log-ingestion, Fine-tuning and analysis Good understanding in Automation (SOAR) and Custom KQL queries. Research emerging threats and vulnerabilities to aid in the identification of Security incidents. Familiar with the IOC’s block/allow actions. Good experience in analyzing phishing emails and security threats. Familiar with email security policies and best practices to safeguard against threats such as phishing, malware, and data breaches. Escalates issues to other senior team members upon exhausting all technical options available to them. Perform/review regular vulnerability assessment reports to identify weaknesses in systems and applications. Analyze external threat feeds and stay informed about emerging threats and vulnerabilities relevant to the organization. Engage in research and development of security solutions, testing new tools and methods for potential implementation. Show more Show less

Posted 1 month ago

Apply

9.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Who We Are Addepar is a global technology and data company that helps investment professionals provide the most informed, precise guidance for their clients. Hundreds of thousands of users have entrusted Addepar to empower smarter investment decisions and better advice over the last decade. With client presence in more than 50 countries, Addepar’s platform aggregates portfolio, market and client data for over $7 trillion in assets. Addepar’s open platform integrates with more than 100 software, data and services partners to deliver a complete solution for a wide range of firms and use cases. Addepar embraces a global flexible workforce model with offices in Silicon Valley, New York City, Salt Lake City, Chicago, London, Edinburgh, Pune, and Dubai. The Role Be at the forefront of building the modern data platform at Addepar! Addepar is hiring a hands-on staff engineer who will bring technical vision to build the core infrastructure and toolings for the modern data platform of Addepar. What You’ll Do Work in partnership with engineering partners and other platform users to identify requirements and priorities, and map out solutions for challenging technology and workflow problems Make Addepar’s Data Lakehouse the central financial data hub by establishing integrations with various data sources Act as a technical lead for a high-performing team of engineers in India who can design, develop, and deploy data Lakehouse solutions with a focus on infrastructure and data tooling and integrations, and help other teams at Addepar build on top of the Addepar Data Lakehouse. Lay a solid foundation of the software architecture for the team in system design and code development Who You Are Minimum 9+ years of relevant work experience in data platform development and management, with a strong foundation in data engineering, cloud infrastructure and platform toolings for internal teams A confident and positive outlook with low ego; high degree of ingenuity, resourcefulness, and problem-solving skills Comfortable working in a cloud context, with automated infrastructure and service-oriented architecture A product and customer oriented mindset Our engineering stack has PySpark on Databricks for data engineering, terraform for infrastructure, streamlit for light-weight tooling apps; while experience in these technologies is preferred, there is flexibility to cross-train if coming from another similar context. Experience with Java or Python will be required. Practical knowledge of agile practices with an outlook that prioritises experimentation and iteration combined with an ability to guide teams toward activities and processes that facilitate optimal outcomes Experience with AWS will be highly preferred. Important Note - This role requires working from our Pune office 3 days a week (Hybrid work model) Our Values Act Like an Owner - Think and operate with intention, purpose and care. Own outcomes. Build Together - Collaborate to unlock the best solutions. Deliver lasting value. Champion Our Clients - Exceed client expectations. Our clients’ success is our success. Drive Innovation - Be bold and unconstrained in problem solving. Transform the industry. Embrace Learning - Engage our community to broaden our perspective. Bring a growth mindset. In addition to our core values, Addepar is proud to be an equal opportunity employer. We seek to bring together diverse ideas, experiences, skill sets, perspectives, backgrounds and identities to drive innovative solutions. We commit to promoting a welcoming environment where inclusion and belonging are held as a shared responsibility. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. PHISHING SCAM WARNING: Addepar is among several companies recently made aware of a phishing scam involving con artists posing as hiring managers recruiting via email, text and social media. The imposters are creating misleading email accounts, conducting remote “interviews,” and making fake job offers in order to collect personal and financial information from unsuspecting individuals. Please be aware that no job offers will be made from Addepar without a formal interview process. Additionally, Addepar will not ask you to purchase equipment or supplies as part of your onboarding process. If you have any questions, please reach out to TAinfo@addepar.com. Show more Show less

Posted 1 month ago

Apply

140.0 years

0 Lacs

India

On-site

Mitsui O.S.K. Lines (MOL) is one of the world's largest multimodal deep-sea carriers, with a rich maritime legacy spanning over 140 years . Operating across Asia, the Middle East, Europe, Africa, North America, South America, and Oceania , MOL connects global trade routes with a strong presence in international shipping and logistics. MOL Information Technology (MOL-IT) is the dedicated ICT solutions provider for the MOL Group, delivering customized technology solutions across the shipping, logistics, and supply chain domains . Established in 1997 , MOL-IT has expanded significantly, operating from four offices in Kolkata, Hyderabad, Mumbai, and Hong Kong , with a talented team of over 380 software and management professionals . As part of its growth strategy, MOL-IT is enhancing its suite of ICT solutions for existing customers while exploring opportunities to diversify beyond the MOL Group. For further details about organization, please visit www.mol-it.com/ Video - An Introduction to MOL-IT - YouTube Challenge Innovate through insight Honesty Do the right thing Accountability Commit to acting with a sense of ownership Reliability Gain the trust of customers Teamwork Build a strong team Safety Pursue the world’s highest level of safety culture Position Overview : As a Software Analyst, you will contribute to requirement analysis sessions to understand business needs and create comprehensive requirement documents (BRD, etc.). Collaborate with stakeholders to translate business objectives into technical solutions. Contribute to designing software solutions that meet project goals and industry standards, considering scalability and usability SOC Security Analyst (L2) will be responsible for responsible for day-to-day security threat monitoring and analysis. You will manage security incidents and review security alerts. You will work on known or suspected security threats. You will also work on threat intelligence, forensics and incident response adhering to security practices and frameworks. You will be part of 24x7 Security Operations Centre (SOC) team. You will be required to work in shifts. Job Responsibilities Experience of monitoring threats in a 24x7 Security Operation Center (SOC) Responsible for investigating incidents, analyzing attack methods, researching new defense techniques and tools, developing security policy, and documenting procedures for SOC. Correct root cause analysis as well identify suitable corrective steps. Perform deep packet analysis, collection of IOC (Indicator of Compromise). Collection of evidence, malware reverse engineering and write custom scripts whenever required. Threat mitigation and reporting are top priority for this position. Rule base Management, SOC Fine tuning and administer SIEM tools Manage and coordinate with team to accomplish daily operational tasks as per defined standard and Maintaining the SLA’s. Identify vulnerabilities, recommend corrective measures and ensure the adequacy of existing information security controls. Advanced working skills with Microsoft Sentinel, Cortex XDR, Trend Micro Exchange Security, Microsoft Defender for Endpoint, Fortigate etc. Relevant certification is a plus. Good working knowledge with SOAR and EDR tools. Investigate and respond to security incidents. Document and report on information security issues Evaluate and implement SIEM use cases. Document and continuously improve playbooks. Monitor for threats, analyze, and escalate as per process. Analyze functional and technical cases and provide a resolution in accordance with agreed metrics. Knowledge about different type of attacks like XSS, CSRF, LFI, Bruteforce, MITM etc. Basic knowledge of Linux operating system and windows events logs Manage and support the log collection, security scanning, intrusion detection, proxy, mail gateway and other security technologies. Review, triage security alerts, provide analysis, suggest remediation, track remediation. Support in resolving security incidents. Monitor networks and systems for potential threats. Knowledge of network data flows, ports, protocols, and other network and application services/technologies. Respond to incidents by collecting, analyzing and preserving digital evidence to assist with remediation of critical information security incidents. Improve and challenge existing processes and procedures in a very agile and fast-moving information security environment. Ability to write technical documentation and present technical briefings to diverse audiences. Strong understanding of threat landscape in terms of the tools, tactics, and techniques of threats employing both commodity and custom malware. Current knowledge of security threat intelligence and recent attack vectors Strong forensics analysis skills Minimum Qualification & Background: 3-5 years of Information Security experience. Minimum 3 years in a large 24x7 Security Operations Centre (SOC) Relevant security certification CEH, CompTIA Network Security Plus, CHFI, Certified SOC analyst will be a plus. Basic knowledge about SIEM Knowledge of current security threats, techniques, and landscape. Security events, incident review and triage experience with Endpoint Detection and Response (EDR) tools Experience and knowledge related to the configuration and maintenance of security monitoring and reporting platforms. Ability to conduct detailed analysis of various security related events like Phishing, Spoofing, Ransomware and SQL Injections etc. Incident Response experience (identifying, investigating, and responding to complex attacks) Experience with threat hunting.

Posted 1 month ago

Apply

130.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job Description Current Employees apply HERE Current Contingent Workers apply HERE Secondary Language(s) Job Description Manager, Cybersecurity Engineering Cloud and App Security The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company’s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. You will be tasked with identifying vulnerabilities, supporting the response to incidents, and ensuring that security protocols and controls are adhered to. Your role is vital in safeguarding critical assets and ensuring compliance with legal and regulatory standards. What Will You Do In This Role Contribute to the development of enhanced cloud and application security control integrations and architectural best practices. Contribute to the development and implementation of product security policies and standards to ensure that application, cloud services and infrastructure meet organizational security requirements. Help maintain and monitor security tools and dashboards, ensuring that applications deployed in our environments adhere to organizational security standards and compliance requirements. Identify and prioritize adoption of our security tools within other teams ensuring the inputs and outputs are fully integrated enabling a complete security function. Follow standard approaches and established design patterns to create new designs for systems or system components. Identify and resolve minor design issues. Assist in implementing and maintaining specific security controls as required by organisational policy and local risk assessments and contribute to identifying risks that arise from potential technical solution architectures. Monitor and log the actual service provided, compared to that required by service level agreements. Undertake low-complexity routine vulnerability assessments using automated and semi-automated tools and contribute to evaluating and documenting the scope of results. Design, implement, test, document, and support integration of security tools and technologies in pipelines, Also, assist the product teams in related activities. Assist in maintaining security infrastructure and performing system updates. Investigate minor security breaches in accordance with established procedures. Assist users in defining their access rights and privileges and perform non-standard operational security tasks. Resolve security events and operational security issues. Work closely with cross-functional Infrastructure teams on Automation and Orchestration. Create and document detailed designs for simple software applications or components. Apply agreed modelling techniques, standards, patterns, and tools. Work within a matrix organizational structure, reporting to both the functional manager and the project manager. What Should You Have Bachelors’ degree in Information Technology, Computer Science or any Technology stream. Working experience in cloud environments AWS must have and good to have Azure, or GCP. Understanding of OWASP Top 10 security risks and mitigation strategies, relevant NIST standards, and Zero Trust principles. Familiarity with programming/scripting languages like Python, Bash, Terraform, Ansible, JSON, PowerShell, or JavaScript for automating tasks. Familiarity with software development/delivery lifecycle and related technologies 3+ years of hands-on experience working with network protocols, firewalls, intrusion detection systems, encryption technologies, and endpoint security solutions. Proficiency in security tools in the areas of cloud, application, endpoint, network or identity, vulnerability scanners, and malware analysis platforms.. Knowledge of authentication methods, identity management, and security access protocols (e.g., SSO, MFA, LDAP). Ideally AWS certified. Good interpersonal and communication skills (verbal and written). Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are often required or highly desirable. Proven record of delivering high-quality results. Product and customer-centric approach. Innovative thinking, experimental mindset. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who We Are We are known as Merck & Co., Inc., Rahway, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world. What We Look For Imagine getting up in the morning for a job as important as helping to save and improve lives around the world. Here, you have that opportunity. You can put your empathy, creativity, digital mastery, or scientific genius to work in collaboration with a diverse group of colleagues who pursue and bring hope to countless people who are battling some of the most challenging diseases of our time. Our team is constantly evolving, so if you are among the intellectually curious, join us—and start making your impact today. #HYDIT2025 Search Firm Representatives Please Read Carefully Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails. Employee Status Regular Relocation VISA Sponsorship Travel Requirements Flexible Work Arrangements Hybrid Shift Valid Driving License Hazardous Material(s) Required Skills Design Applications, Information Security, Security Operations, SLA Management, Software Development, Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Scanning Preferred Skills Job Posting End Date 06/15/2025 A job posting is effective until 11 59 59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID R335939 Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

India

On-site

FireMon has learned an unknown and unauthorized third party is impersonating FireMon HR as part of a phishing attempt. Communications from FireMon will always originate from the FireMon.com domain. FireMon will never ask for any banking information as part of an interview process. If you are concerned whether a communication from FireMon is legitimate, please contact us at security@firemon.com As a thought leader in the space, FireMon is paving the way in the cybersecurity industry across the globe. At FireMon, you will find a disruptive, cutting-edge environment. It's a place where being proactive is rewarded and each day is more innovative than the last. This drive permeates everything we do – from how we develop our products to how we engage with our customers and how we get things done. The Device Engineer will work with Product Management and other Engineers to design, develop, and maintain network device integration software. About The Role Develop support for emerging next-generation technologies in the networking security space Develop device integration solutions for products from Palo Alto, Juniper, Checkpoint, and others, including firewall brands specific to the APAC region Gather technical requirements for integrating with the security devices through administrator guides, user guides, CLI guides, and other available resources Learn the inner workings of the security device and convert that logic into a structure that the application can use Work closely with the sales engineering team to prioritize device pack development based on the needs of prospects and customers in the APAC region Occasionally participate in customer and support calls to understand and troubleshoot device-related issues Required Skills And Experience Bachelor's Degree in Computer Science, Information Technology, Engineering or another related field Proficient Java coding skills, including an understanding of optimization, performance ramifications of coding decisions, and object-oriented design Scripting expertise in either BASH or Python programming languages Linux and general command-line experience Experience with and working knowledge of Maven, SQL, JUnit, XML/XSLT, RESTful web services, and logback/log4j preferred Expertise in networking (Cisco, Juniper, Check Point, Palo Alto, etc.) Regex experience Outstanding problem-solving skills. Able to pick apart software, analyze it and become a subject matter expert on it Must be willing to work in a fast-paced environment with multiple roles and demonstrate high emotional intelligence Flexible and able to handle and prioritize multiple tasks Possess a positive attitude and work well with others Preferred Skills And Experience Experience in an Agile/Scrum software development lifecycle XML / XSD Design experience Cisco, Check Point, Juniper expertise preferred, but any firewall technology is acceptable Cisco network and security certification is a plus (CCIE / CCNA) Show more Show less

Posted 1 month ago

Apply

130.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job Description As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. Current Employees apply HERE Current Contingent Workers apply HERE Secondary Language(s) Job Description Senior Manager, Cybersecurity Engineering Cloud and App Security The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company’s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. You will be tasked with identifying vulnerabilities, supporting the response to incidents, and ensuring that security protocols and controls are adhered to. Your role is vital in safeguarding critical assets and ensuring compliance with legal and regulatory standards. What Will You Do In This Role Lead the development of enhanced cloud and application security control integrations and architectural best practices. Lead the development and implementation of product security policies and standards to ensure that application, cloud services and infrastructure meet organizational security requirements. Lead the maintenance and monitoring security tools and dashboards, ensuring that applications deployed in our environments adhere to organizational security standards and compliance requirements. Lead adoption of our security tools within other teams ensuring the inputs and outputs are fully integrated enabling a complete security function. Design, implement, test, document, and support integration of security tools and technologies in pipelines, Also, assist the product teams in related activities. Work closely with cross-functional Infrastructure teams on Automation and Orchestration. Create and document detailed designs for simple software applications or components. Apply agreed modelling techniques, standards, patterns, and tools. Work within a matrix organizational structure, reporting to both the functional manager and the project manager. What Should You Have Bachelors’ degree in Information Technology, Computer Science or any Technology stream. Working experience in cloud environments AWS must have and good to have Azure, or GCP. Understanding of OWASP Top 10 security risks and mitigation strategies, relevant NIST standards, and Zero Trust principles. Familiarity with programming/scripting languages like Python, Bash, Terraform, Ansible, JSON, PowerShell, or JavaScript for automating tasks. Familiarity with software development/delivery lifecycle and related technologies 7+ years of hands-on experience working with network protocols, firewalls, intrusion detection systems, encryption technologies, and endpoint security solutions. Proficiency in security tools in the areas of cloud, application, endpoint, network or identity, vulnerability scanners, and malware analysis platforms. Knowledge of authentication methods, identity management, and security access protocols (e.g., SSO, MFA, LDAP). Ideally AWS certified. Good interpersonal and communication skills (verbal and written). Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are often required or highly desirable. Proven record of delivering high-quality results. Product and customer-centric approach. Innovative thinking, experimental mindset. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who We Are We are known as Merck & Co., Inc., Rahway, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world. What We Look For Imagine getting up in the morning for a job as important as helping to save and improve lives around the world. Here, you have that opportunity. You can put your empathy, creativity, digital mastery, or scientific genius to work in collaboration with a diverse group of colleagues who pursue and bring hope to countless people who are battling some of the most challenging diseases of our time. Our team is constantly evolving, so if you are among the intellectually curious, join us—and start making your impact today. #HYDIT2025 Search Firm Representatives Please Read Carefully Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails. Employee Status Regular Relocation VISA Sponsorship Travel Requirements Flexible Work Arrangements Hybrid Shift Valid Driving License Hazardous Material(s) Required Skills Design Applications, Information Security, Security Operations, SLA Management, Software Development, Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Scanning Preferred Skills Job Posting End Date 06/20/2025 A job posting is effective until 11 59 59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID R335936 Show more Show less

Posted 1 month ago

Apply

2.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

STCI Primary Dealer Limited , is one of the largest Primary Dealers accredited by RBI for underwriting and market making in Government securities. We are a leading player in the fixed income market and our operations include trading in Government Securities, Treasury Bills, SDLs, corporate bonds, CDs/CPs and interest rate derivatives. We also trade on proprietary account in equity markets and currency derivatives market. Role: Cyber Security Analyst We are looking for a Cyber Security Analyst, with a solid understanding of cybersecurity principles, tools, and threat landscapes, who will assist in monitoring, detecting, and responding to security threats while supporting various cybersecurity solutions. Location: Mumbai Previous Work Experience: 1–2 years of experience in cybersecurity or IT security operations. Key Responsibilities: Manage and monitor security tools such as XDR, WAF, DNS, and PAM solutions Respond to and remediate cybersecurity alerts and incidents Perform threat analysis and vulnerability assessments Participate in Attack Surface Management (ASM) to identify and mitigate vulnerabilities. Assist in Breach & Attack Simulation (BAS) and Red Team exercises under supervision. Conduct phishing simulation campaigns and report on user awareness. Collaborate with IT teams to ensure compliance with security policies and procedures Monitor systems, perform compliance checks, and report findings Implement security policy changes post-approval Interact with internal teams to resolve alerts Stay updated with evolving cybersecurity threats and trends Support security audits (internal/external) and ensure documentation is up to date Coordinate with vendors for support and maintenance of security tools Participate in tabletop exercises and business continuity planning Document incident response processes Review firewall logs and alerts to identify potential threats or misconfigurations Required Skills: Strong knowledge of networking protocols, operating systems, and web application technologies Experience with cloud architecture and modern security platforms Proficiency in security monitoring, incident response, and threat hunting Familiarity with alert remediation and cyber threat analysis Knowledge of threat detection, vulnerability assessment, and security frameworks. Familiarity with SIEM, EDR, XDR, NAC, and MDM solutions. Understanding of phishing, ransomware, and attack simulations. Basic knowledge of Active Directory and compliance standards. Certifications like Security+, CEH, or CySA+ are a plus. Excellent problem-solving skills and ability to work both independently and in team settings Strong interpersonal and communication skills Familiarity with Zero Trust architecture and Identity & Access Management (IAM) principles Familiarity with regulatory standards Preferred Skills: Experience in financial or insurance sector security operations is a plus Hands-on with security compliance frameworks and best practices Interested candidates may mail their resume to recruitment@stcipd.com or to The Head HR, STCI Primary Dealer Ltd, Marathon Innova, Marathon Nextgen Compound, Lower Parel (W), Mumbai – 400 013 Social Media handles: www.stcipd.com Show more Show less

Posted 1 month ago

Apply

8.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Senior Information Security Engineer Exp: 10 yrs + Location Baner, Pune/Ahemdabad Immediate to 15 Days Roles and Responsibilities Candidate will work as a member of the Corporate Security Team and assist in various day to day operational activities such as: Drive customer's Corporate Security Program based on the NIST CSF – Identify, Detect, Protect, Respond and Recover. Develops, publishes, and maintains a comprehensive organization-wide information privacy and security plans, policies, procedures, and guidelines. Function as primary liaison with auditors, internal teams and vendors and be the resident expert on systems and services in use for PCI compliance and reporting Responsible for managing all aspects of the Vulnerability Risk Management Program including vulnerability identification, analysis, remediation coordination and reporting. Lead the development, implementation, and maintenance of security policies, standards, and guidelines. Identify and Monitor Customer's Corporate Networks to determine if there have been any attacks. Analyze network traffic to identify anomalies and test information security controls for weaknesses. Design and implement safeguards to protect the system with the help of network engineers and other members of the Technology Services team. Respond to threats by taking mitigating actions to contain the activity and minimize damage. Participate in risk assessments and breach readiness exercises for incident management. Facilitate forensics analysis to determine the source of the threat. Document lessons learned as well as identify process improvements. Communicate security issues to management via reports, dashboards. Provide weekly metrics on overall security posture. Research emerging threats and work with the Security Operations Center (SOC). Drive the Third party vendor security evaluation. Participate in the security toll-gates on SSDLC projects. Implement innovative solutions to scale the program with emphasis on automation where applicable. Qualifications Basic Qualifications: Bachelor's Degree in Business, Computer Science or in a STEM major (Science, Technology, Engineering, or Math). Minimum of 8 years of experience in Information Security Experience in at least one full lifecycle supporting PCI compliance is a must have Experience in managing and maintaining a vulnerability management program using Qualys is a must have Experience in developing content in Splunk – searches, alerts (including POC and tuning), dashboards, Apps. Experience of Security Incident and Event Management (SIEM) tools (Splunk) – ingesting data (Forwarders, HTTP Event Collectors, add-ons), troubleshooting Splunk Installation. Experience in Endpoint security (EDR) – Detection and Response. Help create policies and SOP for Response workflow. Experience in Cortex XDR preferred. Experience in Security evaluation of third-party tools. Experience in Email Security and running phishing campaign Experience in Incident Management Experience in system and network security. Experience in Network Penetration testing. Knowledge of software development, computer networks and Internet threat activity. Programming experience in python, perl and HTML/JS Previous enterprise or platform/cloud vulnerability management experience and Cloud Security is a plus Excellent written and verbal communication skills, including experience engaging with executive and technical audiences. Must be able to work in a fast paced, high profile environment Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

Greater Hyderabad Area

On-site

Hyderabad, Telangana | Full Time Apply Now About Neudesic Passion for technology drives us, but it’s innovation that defines us . From design to development and support to management, Neudesic offers decades of experience, proven frameworks, and a disciplined approach to quickly deliver reliable, quality solutions that help our customers go to market faster. What sets us apart from the rest is an amazing collection of people who live and lead with our core values. We believe that everyone should be Passionate about what they do, Disciplined to the core, Innovative by nature, committed to a Team and conduct themselves with Integrity. If these attributes mean something to you - we'd like to hear from you. Design, develop, and implement MLOps pipelines for the continuous deployment and integration of machine learning models. Machine Learning Consultant with ML Ops Skill and 2-3 minimum production level implementation on their portfoli Azure ML experience preferred Strong problem-solving skills and ability to troubleshoot complex issues. Ability to work collaboratively in cross-functional teams Be aware of phishing scams involving fraudulent career recruiting and fictitious job postings; visit our Phishing Scams page to learn more. Neudesic Is An Equal Employment Opportunity Employer All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law. Neudesic is an IBM subsidiary which has been acquired by IBM and will be integrated into the IBM organization. Neudesic will be the hiring entity. By proceeding with this application, you understand that Neudesic will share your personal information with other IBM companies involved in your recruitment process, wherever these are located. More Information on how IBM protects your personal information, including the safeguards in case of cross-border data transfer, are available here: https://www.ibm.com/us-en/privacy?lnk=flg-priv-usen Submit Your Application You have successfully applied You have errors in applying Apply With Resume * First Name* Middle Name Last Name* Email* Mobile Phone Social Network and Web Links Provide us with links to see some of your work (Git/ Dribble/ Behance/ Pinterest/ Blog/ Medium) Show more Show less

Posted 1 month ago

Apply

12.0 - 15.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Hi, We are having an opening for Senior Domain Lead-AD/IDAM & Email Lead/Architect at our Mumbai location Job Summary : We are seeking an accomplished and strategic Senior Domain Lead to oversee enterprise email and collaboration systems , Active Directory (AD) , Identity & Access Management (IDAM) , and their security and cloud integrations . The role focuses on end-to-end management and security governance across hybrid environments, ensuring scalable, secure, and compliant digital identity and collaboration infrastructure. Areas Of Responsibility : Key Responsibilities: 1. Infrastructure & Operations Management Manage daily operations for Microsoft 365 (Exchange Online, Teams, SharePoint), Active Directory (on-prem and Azure AD), and domain services. Ensure stability and performance of hybrid AD and collaboration systems through proactive monitoring and incident management. Maintain internal and public DNS, DHCP, certificates, and domain name configurations. 2. Identity & Access Management (IDAM) Own the implementation and operation of IDAM platforms supporting user lifecycle management, access provisioning, and deprovisioning. Design and manage SSO, MFA, conditional access , and privileged access controls (PAM) using tools like Azure AD, SailPoint, or Saviynt. Ensure proper RBAC models, access certifications, and policy enforcement across systems. 3. Email & AD Security Strengthen security posture of email systems by configuring and maintaining anti-phishing, DLP, spam filtering, and encryption tools (e.g., Microsoft Defender for Office 365, Mimecast, Proofpoint). Implement and maintain DMARC, DKIM, SPF , and secure mail flow policies. Lead AD security hardening , including Tiered Administration, Kerberos policies, ACL reviews, and delegation best practices. Enforce least privilege , admin account separation , and monitoring of high-privilege actions (via SIEM or native auditing tools). Key Responsibilities: 1. Infrastructure & Operations Management Manage daily operations for Microsoft 365 (Exchange Online, Teams, SharePoint), Active Directory (on-prem and Azure AD), and domain services. Ensure stability and performance of hybrid AD and collaboration systems through proactive monitoring and incident management. Maintain internal and public DNS, DHCP, certificates, and domain name configurations. 2. Identity & Access Management (IDAM) Own the implementation and operation of IDAM platforms supporting user lifecycle management, access provisioning, and deprovisioning. Design and manage SSO, MFA, conditional access , and privileged access controls (PAM) using tools like Azure AD, SailPoint, or Saviynt. Ensure proper RBAC models, access certifications, and policy enforcement across systems. 3. Email & AD Security Strengthen security posture of email systems by configuring and maintaining anti-phishing, DLP, spam filtering, and encryption tools (e.g., Microsoft Defender for Office 365, Mimecast, Proofpoint). Implement and maintain DMARC, DKIM, SPF , and secure mail flow policies. Lead AD security hardening , including Tiered Administration, Kerberos policies, ACL reviews, and delegation best practices. Enforce least privilege , admin account separation , and monitoring of high-privilege actions (via SIEM or native auditing tools). Partner with SOC and Security teams to respond to identity and email-related threats or incidents. 4. Cloud Integration & Identity Governance Administer and secure cloud identity solutions across Azure, Microsoft 365, and third-party SaaS platforms. Align hybrid AD and Azure AD with cloud security frameworks and Zero Trust principles. Manage B2B/B2C identities, OAuth/SAML integrations, and conditional access policies for external partners. 5. Projects & Transformation Lead initiatives such as: Email platform migration or consolidation (e.g., from on-prem to M365), Deployment of IDAM platforms, Secure collaboration tool rollouts, Cloud-first identity transformations. Define project scope, success metrics, resource plans, and stakeholder engagement strategy. 6. Compliance, Governance & Risk Management Define and maintain governance frameworks for collaboration, identity, and directory services. Ensure alignment with compliance standards (e.g., GDPR, ISO 27001, HIPAA, SOX). Conduct periodic access reviews, admin audits, and mailbox permissions checks. Own documentation, runbooks, and policy lifecycle management. 7. Vendor & License Management Manage third-party service providers and tools across email security, cloud identity, and collaboration suites. Oversee licensing, renewals, and performance reviews. Evaluate and onboard new solutions as per evolving enterprise needs. 8. Leadership & People Management Lead a team of email, AD, cloud, and IDAM specialists. Assign responsibilities, set goals, and promote cross-skilling and upskilling. Ensure availability through structured support models, escalation procedures, and documentation. Educational Qualification : Degree or appropriate professional qualification Specific Certification : Certification & Trainings on following technology domains: Microsoft Certified: Enterprise Administrator Expert Microsoft Certified: Identity and Access Administrator Associate Azure Administrator / Security Engineer Associate Certified Information Systems Security Professional (CISSP) optional but a plus ITIL Foundation / Intermediate Project Management Certification (PMP / Prince2) Experience : 12-15 Years of experience Skill (Functional & Behavioural): Technical Skills: Microsoft 365 administration: Exchange, Teams, SharePoint, Defender for O365 Hybrid AD and Azure AD, including AD Connect, GPOs, DNS, DHCP PowerShell scripting for automation and reporting Identity tools: SailPoint, Okta, Saviynt, Azure AD Premium Email security protocols: SPF, DKIM, DMARC Email filtering & security: Defender, Mimecast, Proofpoint AD security best practices and hardening (LAPS, tiering, auditing) Cloud identity and app integration (OAuth, SAML) Soft Skills: Strong leadership, communication, and cross-functional collaboration High attention to detail, especially around security and compliance Problem-solving under pressure and with complex systems Strategic thinking with a proactive mindset toward continuous improvement Pharma industry experience is an advantage. Show more Show less

Posted 1 month ago

Apply

12.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Who We Are Addepar is a global technology and data company that helps investment professionals provide the most informed, precise guidance for their clients. Hundreds of thousands of users have entrusted Addepar to empower smarter investment decisions and better advice over the last decade. With client presence in more than 50 countries, Addepar’s platform aggregates portfolio, market and client data for over $7 trillion in assets. Addepar’s open platform integrates with more than 100 software, data and services partners to deliver a complete solution for a wide range of firms and use cases. Addepar embraces a global flexible workforce model with offices in Silicon Valley, New York City, Salt Lake City, Chicago, London, Edinburgh, Pune, and Dubai. The Role We are currently seeking a Market Data Operations Lead. This role is based in Addepar’s office in Pune, India. The Market Data Operations team is responsible for ensuring Addepar's clients have timely and accurate data to make investment decisions. This will include leading all aspects of the processing of market data feeds, ensuring data quality through verification checks, and collaborating with our engineers. As Addepar launches new products to cover the entire investment process including security / market data operations, trading, and an investment book of record, the Data Operations team will take on the responsibility to handle all aspects of the operations process. The Market Data Operations team sits at the nexus of Addepar's activity and requires daily communications with data providers, clients, and other personnel within Data Operations and across the firm. What You’ll Do Pioneer the Market Data Operations function and establish a team of world-class analysts. Design procedures for internal verification checks, ensuring market data integrity and availability within SLAs. Develop and complete quality assurance tests for market data product features and integrations. Manage market data pipeline workflows and client inquiries regarding benchmarks, FX rates, and general security reference data. Work with Product and Engineering teams to acquire, validate, and update related referential security data for all asset classes supported by Addepar. Manage the onboarding, mentorship, and career development of individuals on the team through timely and effective performance feedback and by providing learning and growth opportunities Lead the team to accomplish goals that are aligned with the organization’s business and culture objectives and hold self and everyone accountable for meeting expectations Collaborate with leads of different teams on new data related initiatives, product offerings and technology transformation/automation initiatives. Who You Are Minimum 12+ years experience at a financial services or financial data organization. Need experience managing medium size teams. Deep knowledge and experience within the Investment Management or Wealth Management industry required. Strong experience building client sensitive and business critical operational processes with clear client SLA and operational KPIs. Proven track record of leading teams and excelling in a forward-thinking fast paced environment enabling decisions to achieve the desired results in the shortest amount of time. Possess good knowledge on trade processing, NAV review, corporate actions, income processing, security valuation, financial reports, production, query handling, and other ad-hoc reporting for funds. Technical skills preferred in any or all of the following: Microsoft Excel, Google Suite, Atlassian Jira/Confluence, SQL, Salesforce, Bloomberg, Thomson Reuters, or other common financial services systems and applications. Our Values Act Like an Owner - Think and operate with intention, purpose and care. Own outcomes. Build Together - Collaborate to unlock the best solutions. Deliver lasting value. Champion Our Clients - Exceed client expectations. Our clients’ success is our success. Drive Innovation - Be bold and unconstrained in problem solving. Transform the industry. Embrace Learning - Engage our community to broaden our perspective. Bring a growth mindset. In addition to our core values, Addepar is proud to be an equal opportunity employer. We seek to bring together diverse ideas, experiences, skill sets, perspectives, backgrounds and identities to drive innovative solutions. We commit to promoting a welcoming environment where inclusion and belonging are held as a shared responsibility. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. PHISHING SCAM WARNING: Addepar is among several companies recently made aware of a phishing scam involving con artists posing as hiring managers recruiting via email, text and social media. The imposters are creating misleading email accounts, conducting remote “interviews,” and making fake job offers in order to collect personal and financial information from unsuspecting individuals. Please be aware that no job offers will be made from Addepar without a formal interview process. Additionally, Addepar will not ask you to purchase equipment or supplies as part of your onboarding process. If you have any questions, please reach out to TAinfo@addepar.com. Show more Show less

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies