Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
4.0 - 8.0 years
12 - 16 Lacs
Mumbai, Mumbai Suburban, Mumbai (All Areas)
Work from Office
Monitor,analyze security events,alerts across various platforms. Investigate potential security incidents,escalate as appropriate,following defined incident response processes. Correlate events from multiple sources to identify patterns or anomalies Required Candidate profile Lead,participate in threat hunting activities to proactively identify potential threats vulnerabilities Serve as the administrator for SOC tools including SIEM, EDR, SOAR,threat intelligence platforms Perks and benefits To be disclosed post interview
Posted 6 days ago
8.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Level Up Your Career with Zynga! At Zynga, we bring people together through the power of play. As a global leader in interactive entertainment and a proud label of Take-Two Interactive, our games have been downloaded over 6 billion times—connecting players in 175+ countries through fun, strategy, and a little friendly competition. From thrilling casino spins to epic strategy battles, mind-bending puzzles, and social word challenges, our diverse game portfolio has something for everyone. Fan-favorites and latest hits include FarmVille™, Words With Friends™, Zynga Poker™, Game of Thrones Slots Casino™, Wizard of Oz Slots™, Hit it Rich! Slots™, Wonka Slots™, Top Eleven™, Toon Blast™, Empires & Puzzles™, Merge Dragons!™, CSR Racing™, Harry Potter: Puzzles & Spells™, Match Factory™, and Color Block Jam™—plus many more! Founded in 2007 and headquartered in California, our teams span North America, Europe, and Asia, working together to craft unforgettable gaming experiences. Whether you're spinning, strategizing, matching, or competing, Zynga is where fun meets innovation—and where you can take your career to the next level. Join us and be part of the play! Position Overview The vision for our global Marketing Creative Team at Zynga is informed by an aggressive pursuit of new and different ideas, rapid creative development, and efficient production. We develop creative executions across digital marketing channels that invite millions of players worldwide to take part in our games. We prioritize achieving both performance objectives and execution excellence while fostering a collaborative culture that embraces and drives creative trends in the mobile marketing & acquisition space. As a Senior Motion Graphic Designer on Zynga’s Marketing Creative team, you will be responsible for designing motion/video advertisements for Zynga's game titles. The ideal candidate should be able to work independently to generate a variety of creative executions inspired by a central selling point to engage a target audience. What You'll Do Contribute to an efficient, high-volume pipeline of User Acquisition advertising, App Store, and live-ops marketing assets Work with the Art Lead, Art Director, and Producer to generate video marketing content that translates campaign goals and performs against KPIs. Address and integrate creative feedback to ensure projects meet a successful result Ability to develop and execute a 10-30 sec ad using creative assets and resources on hand within a 2-3 day timeframe; deliver on time or ahead of schedule Engage in creative brainstorming, design retrospectives, and constructive feedback sessions; openly share in group settings to foster a culture of creativity & collaboration Create engaging animations and transitions to communicate creative ideas to a mass audience using Adobe CC and other industry-standard tools. Adapt to different requirements within a short period, understand the production pipeline, and foster quick turnaround deliverables. Able to find creative/technical solutions on a case-to-case basis Continually learn and seek to refine your craft and artistic skill set Mentor young designers toward creative success Seek new technological advancement and bring in the same to facilitate production Develop/contribute to new production pipelines from past experience/learning Templatize work for wider use within the motion team Studying competitor's work and analyzing the same for design strategies Driving meaningful sessions related to motion/design/video Absorbing multiple design/motion styles & approaches resulting in simultaneous production support for multiple titles What You Bring At least 8-10 years of professional experience developing and executing video creatives Strong ad production skills - Video/sound editing experience, compositing and efficient asset and time management Superior knowledge of Adobe After Effects, Premiere Pro, Audition along with good knowledge of Photoshop/Illustrator Excellent grip on design and animation principles Strong conceptual and visual design skills leading to thoughtful creative executions Confident working in an extremely fast-paced environment with multiple projects and quick turn-around ensuring minimum quality loss Decent understanding of consumer-facing ad experiences on social ad platforms (Facebook, Instagram, YouTube) and general performance marketing methods. Decent understanding of the nuances of creating video assets for the iOS and Google Play storefronts. An ability to manage multiple deadlines and thrive under pressure Great communication skills and a team-first attitude Strong understanding of 3D pipeline along with good lighting, HDR, rendering, look & feel development skills. Excellent fundamental skills of strong storytelling with logical editing & camera animation Good understanding of 3D organic animation and generic Unreal pipeline Should have a decent understanding of Ae expressions & logic Thorough understanding of Trapcode suite, Red Giant Plugins, Element 3D, Optical Flares, and other industry plugins Strong graphic design skill is a plus Good knowledge specifically on Unity, Maya & C4D is a plus What We Offer You Zynga offers a world-class benefits package that helps support and balance the needs of our teams. To find out more about our benefits, visit the Zynga Benefits We are proud to be an equal opportunity employer, which means we are committed to creating and celebrating diverse thoughts, cultures, and backgrounds throughout our organization. Employment with us is based on substantive ability, objective qualifications, and work ethic – not an individual’s race, creed, color, religion, sex or gender, gender identity or expression, sexual orientation, national origin or ancestry, alienage or citizenship status, physical or mental disability, pregnancy, age, genetic information, veteran status, marital status, status as a victim of domestic violence or sex offenses, reproductive health decision, or any other characteristics protected by applicable law. As an equal opportunity employer, we are committed to providing the necessary support and accommodation to qualified individuals with disabilities, health conditions, or impairments (subject to any local qualifying requirements) to ensure their full participation in the job application or interview process. Please contact us at accommodationrequest@zynga.com to request any accommodations or for support related to your application for an open position. Please be aware that Zynga does not conduct job interviews or make job offers over third-party messaging apps such as Telegram, WhatsApp, or others. Zynga also does not engage in any financial exchanges during the recruitment or onboarding process, and will never ask a candidate for their personal or financial information over an app or other unofficial chat channel. Any attempt to do so may be the result of a scamp or phishing attack, and you should not engage. Zynga’s in-house recruitment team will only contact individuals through their official Company email addresses (i.e., via a zynga.com, naturalmotion.com, smallgiantgames.com, themavens.com, gram.gs email domain). Show more Show less
Posted 6 days ago
1.0 years
0 Lacs
Bangalore Urban, Karnataka, India
On-site
Job Description: Analyst Role Objective Evaluating pre-recorded audio calls and transcripts for Google Ads for Quality and Compliance parameters outlined. Based on the guidelines provided, identify and evaluate potential frauds or any possibility of customers' sensitive information being collected or misused by the advertisers (relating to call quality, scam etc.) Role Responsibilities Obtain consumer / provider information by listening to telephone calls/ text & messages Determine eligibility by comparing consumer / provider information to requirements Based on the pre-recorded calls, Identify Scam/Phishing and customers sensitive information Meet the required target and quality metrics Work effectively with other teams Skills/Qualifications [IMPORTANT] Comprehensive and analytical skills [IMPORTANT] Good knowledge of websites, and how to navigate to obtain desired information [IMPORTANT] Excellent Communication Skills (both written & oral) [IMPORTANT] Decision-making skills Strong Logical/ Analytical skills (cognitive ability) Multi-tasking ability Excellent time management skills, most workload involves fluctuation Extremely proactive and organized with a track record of success in a team environment Basic knowledge of excel sheets Preferred Attributes Possesses basic knowledge on the US culture Relevant experience from customer service is an added advantage >1year experience. Show more Show less
Posted 6 days ago
3.0 years
0 Lacs
Hyderabad, Telangana, India
Remote
We are united in our mission to make a positive impact on healthcare. Join Us! South Florida Business Journal, Best Places to Work 2024 Inc. 5000 Fastest-Growing Private Companies in America 2024 2024 Black Book Awards, ranked #1 EHR in 11 Specialties 2024 Spring Digital Health Awards, “Web-based Digital Health” category for EMA Health Records (Gold) 2024 Stevie American Business Award (Silver), New Product and Service: Health Technology Solution (Klara) Who We Are We Are Modernizing Medicine (WAMM)! We’re a team of bright, passionate, and positive problem-solvers on a mission to place doctors and patients at the center of care through an intelligent, specialty-specific cloud platform. Our vision is a world where the software we build increases medical practice success and improves patient outcomes. Founded in 2010 by Daniel Cane and Dr. Michael Sherling, we have grown to over 3400 combined direct and contingent team members serving eleven specialties, and we are just getting started! ModMed is based in Boca Raton, FL, with office locations in Santiago, Chile, Berlin, Germany, Hyderabad, India, and a robust remote workforce with team members across the US. This role supports activities from Quote-to-Cash (QTC) in Salesforce, document and process management, ModMed GPT maintenance, and cross-functional taskforces. A strong focus will be on data integrity, contract workflows, and ensuring that tools and documentation are up-to-date to support internal teams in driving customer satisfaction, retention and experience in working with Salesforce and CPQ tools within a B2B SaaS organization. Key Responsibilities Quote-to-Cash Execution: Support contract changes such as downgrades, upsells, and license amendments via CPQ Process contract amendments for fee waivers, provider adds, and billing corrections Manage re-contracting workflows between parent and child accounts Ensure accurate setup of contracts to streamline revenue recognition Data Accuracy & System Support: Perform regular audits and clean-ups in Salesforce and CPQ Address and resolve CPQ error messages or support requests Maintain consistency of customer data across platforms (Salesforce, NetSuite) Knowledge Management: Maintain and update all SOPs and quick reference guides in DMS Support ModMed GPT maintenance by chunking and uploading SOP updates Operational Project Support: Participate in ad hoc initiatives such as Salesforce cleanup and client outreach Work cross-functionally to support taskforces and special CS projects Experience & Skills Requirements Bachelor’s degree required; healthcare or tech-related field preferred Minimum 3 years of experience in a Customer Success, Sales Ops, or Professional Services Ops role in a B2B SaaS company Strong knowledge of Salesforce, CPQ tools, and Quote-to-Cash processes (NetSuite knowledge is a plus) Experience in healthcare technology is highly desirable Exceptional attention to detail and organizational skills Excellent written and verbal communication in English Proficiency in documentation, knowledge management tools, and project collaboration platforms (e.g., Confluence, Jira, DMS) Ideal Traits Self-starter who thrives in a fast-paced, evolving environment Analytical thinker with a problem-solving mindset Collaborator with the ability to work across teams and functions Passion for process improvement and operational excellence ModMed Benefits Highlight: At ModMed, we believe it’s important to offer a competitive benefits package designed to meet the diverse needs of our growing workforce. Eligible Modernizers can enroll in a wide range of benefits: India Meals & Snacks: Enjoy complimentary office lunches & dinners on select days and healthy snacks delivered to your desk, Insurance Coverage: Comprehensive health, accidental, and life insurance plans, including coverage for family members, all at no cost to employees, Allowances: Annual wellness allowance to support your well-being and productivity, Earned, casual, and sick leaves to maintain a healthy work-life balance, Bereavement leave for difficult times and extended medical leave options, Paid parental leaves, including maternity, paternity, adoption, surrogacy, and abortion leave, Celebration leave to make your special day even more memorable, and company-paid holidays to recharge and unwind. United States Comprehensive medical, dental, and vision benefits, including a company Health Savings Account contribution, 401(k): ModMed provides a matching contribution each payday of 50% of your contribution deferred on up to 6% of your compensation. After one year of employment with ModMed, 100% of any matching contribution you receive is yours to keep. Generous Paid Time Off and Paid Parental Leave programs, Company paid Life and Disability benefits, Flexible Spending Account, and Employee Assistance Programs, Company-sponsored Business Resource & Special Interest Groups that provide engaged and supportive communities within ModMed, Professional development opportunities, including tuition reimbursement programs and unlimited access to LinkedIn Learning, Global presence and in-person collaboration opportunities; dog-friendly HQ (US), Hybrid office-based roles and remote availability for some roles, Weekly catered breakfast and lunch, treadmill workstations, Zen, and wellness rooms within our BRIC headquarters. PHISHING SCAM WARNING: ModMed is among several companies recently made aware of a phishing scam involving imposters posing as hiring managers recruiting via email, text and social media. The imposters are creating misleading email accounts, conducting remote "interviews," and making fake job offers in order to collect personal and financial information from unsuspecting individuals. Please be aware that no job offers will be made from ModMed without a formal interview process, and valid communications from our hiring team will come from our employees with a ModMed email address (first.lastname@modmed.com). Please check senders’ email addresses carefully. Additionally, ModMed will not ask you to purchase equipment or supplies as part of your onboarding process. If you are receiving communications as described above, please report them to the FTC website. Show more Show less
Posted 6 days ago
2.0 - 3.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
Role Description Job Title: L1 SOC Analyst Experience : 2 to 3 years Location: Trivandrum, Kochi, Chennai, Bangalore, Hyderabad Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. The primary role of a SOC Level 1 Analyst is to serve as the frontline defense, managing first triage and ranking of security cases, and initiating the threat detection and response processes for client-related security events. The Analyst is integral to the MDR, working collaboratively with other teams to ensure high quality of service, and will be given opportunities for professional growth in cybersecurity. The position entails conducting inquiry procedures as dictated by CyberProof methodology and contributing insights on the case investigation and detection quality. Principal Duties Quickly respond to and classify all incoming security cases, ensuring that incidents are appropriately escalated to the right analyst within the predefined SLA period during the Analyst's shift. Conduct the first triage investigations into the assigned cases using a blended approach based on tools integrated into the SOAR platform and document all collected evidence and conclusions. At the shift's commencement, diligently review all new information in the SOAR, through the Teams channel, shared mailbox, and any other designated communication mediums to ensure readiness to continue or start case the investigation and address client queries. Facilitate a smooth handoff to the next team at the end of the shift, ensuring continuous and seamless security monitoring. Remain to any procedural inconsistencies or issues and proactively report these to the team leader or upper analytical layer (L2) for resolution or consultation. Should uncertainty or complex issues arise, elevate the matter promptly to a senior L1 Analyst or Shift and Technical Leads before resorting to the L2 team. Support the Lead Analysts and the L2 team in the extraction and compilation of data needed for the preparation of Weekly, Monthly, and Quarterly Business Review (QBR) documentation. Skills And Qualifications At least 1 year of experience as a security analyst Proficient in investigating s related to phishing, malware, and similar threats. Solid understanding of computer security and networking concepts Experience with SIEM or similar security tools (Splunk or Qradar or Sentinel). Knowledgeable about endpoint protection tools Skilled in analyzing network traffic, interpreting logs, and examining packet capture. Strong critical thinking and analytical abilities Excellent written and verbal communication skills Experience managing and analyzing s from security tools is a plus. Familiarity with cloud solutions is advantageous. Relevant certifications are a plus. Show more Show less
Posted 6 days ago
2.0 - 6.0 years
3 - 8 Lacs
Hyderabad, Bengaluru
Hybrid
About the Role: Uber's Security Response and Investigations (SRI) team is the cybersecurity incident response body at Uber. SRI responds to security incidents and mitigates security threats across the company. The SRI team is made of three teams: vSOC (virtual Security Operations Center), Investigations and Automation, and Incident Command. You will be joining the vSOC team. As a Security Analyst on the vSOC team, You will be on the front-line of defence for the Uber Security Incident Response program. You will be handling triage for all security alerts for Uber globally across all environments (cloud, prod, corp). You will build Standard Operating Procedures (SOP) and help improve the incident response program. You will serve as an incident coordinator during high and critical severity incidents. Expect to work weekend shift (Saturday / Sunday) Basic Qualifications: Good understanding of cybersecurity fundamentals. This includes but is not limited to network protocols (e.g. TCP/IP stack) and security, system security, email security, etc. 2+ years of hands-on experience in a cybersecurity role. 1+ year of hands-on experience with security monitoring and response in a SOC environment. Strong problem-solving skills. Good communication skills. Preferred Qualifications: Experience with cybersecurity forensic methodologies and software. Experience driving complex incidents or leading investigations end-to-end. Threat hunting and Automation experience(SOAR/Python). Applied knowledge of cyber intel frameworks such as ATT&CK framework and kill-chain model. Experience working crisis events for a global company. Ability to work across geographically distributed teams. Certifications in Security is a plus
Posted 6 days ago
4.0 - 6.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
The Clinical Systems Specialist plays a critical role in the implementation, management and optimization of clinical trial systems, ensuring their functionality and alignment with study needs. They collaborate with the System Administrator & vendor on system configuration to deliver features, fixes, and updates in alignment with the system’s roadmap, ensuring efficient operation and compliance throughout the clinical trial lifecycle. Additionally, they assist with system maintenance activities and act as the primary point of contact for training, end-user technical support, and communications, to ensure operational efficiency and compliance with internal & external requirements. System Development & Implementation (10-20%) Support the System Administrator in performing key system development lifecycle (SDLC) activities including requirements analysis, configuration and validation, system updates, and change control. Collaborate with IT and clinical teams to improve system efficiencies and automation, supporting continuous improvement of system management. System Maintenance, Security & Compliance (30-40%) Support user account management and access controls for compliance with regulatory standards and assist with user access reviews. Support audit activities (sponsor audits, vendor audits and regulatory audits) to demonstrate compliance Coordinates & executes data governance initiatives such as identifying opportunities for data cleaning, training end-users or other system support staff on data governance activities, and conducting oversight on these activities. Assist with system-related assessments including vendor assessments, risk assessments, and validation reviews, and audit trail reviews. Support necessary data inputs, lead and support data governance efforts, and configure or generate required reports or dashboards for end users User Support & Training (40-50%) Provide technical support to end-users and troubleshoot system-related issues. Provide training to end-users and collaborate with System Administrator on creation and management of training materials. Provide study-related services for end-users including study setup and publishing reports & dashboards, to support study reporting and compliance related study activities. Oversee user onboarding to system including assignment to system roles & studies. Qualifications 4 - 6 years of related experience (Honors) Bachelor’s degree Additional Knowledge / Skills Education in IT, software or a related field is preferred but not required Strong problem-solving and analytical skills Excellent communication and stakeholder management skills Ability to work independently and as part of a team. A minimum of 4 years of experience in clinical systems management, technical support, or a related role within the pharmaceutical, biotechnology, or contract research organization (CRO) industry is preferred. Experience working with clinical trial platforms such as clinical trial management systems (CTMS), electronic data capture (EDC) systems, electronic trial master file (eTMF) systems, or other platforms is essential. Previous experience in system configuration, validation, and troubleshooting in a regulated environment is highly desirable. Understanding of clinical trial processes, regulatory requirements, including GxP, 21 CFR Part 11, and other relevant guidelines. Knowledge of system validation procedures, including user acceptance testing (UAT), configuration management, and compliance documentation, is essential. Familiarity with clinical data integrity standards and audit processes is also required. Strong analytical and problem-solving skills with the ability to identify and resolve complex system issues independently. Excellent communication skills, both verbal and written, to effectively interact with technical and non-technical stakeholders. The ability to prioritize tasks, manage multiple projects, and meet deadlines in a fast-paced environment. Attention to detail and a commitment to ensuring the accuracy and integrity of clinical data. Ability to work independently with minimal supervision while collaborating with cross-functional teams. Proactive approach to continuous learning and adapting to new technologies and industry trends PHISHING SCAM WARNING: Alimentiv is aware of the continued increase of phishing scams, leveraging various methods of attack via email, text, voice and social media. Please note that Alimentiv only uses company email addresses, which contain “@ alimentiv.com ”, to communicate with candidates via email. If you are contacted by someone about an open job at Alimentiv, please verify the domain of the sender’s email address and that they are asking you to apply on this website. If you believe you’ve been a victim of a phishing scam, please contact your local government cyber authority to report. Show more Show less
Posted 1 week ago
15.0 - 20.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Cloud Security Architecture Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and transitioning to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. You will play a crucial role in safeguarding the organization's cloud infrastructure and data, contributing to the overall security posture of the business. Roles & Responsibilities:-Design and implement cloud security architectures in accordance with security best practices and compliance standards.-Configure and manage Microsoft Defender for Cloud (MDC) to monitor and respond to security alerts and vulnerabilities.-Develop, manage, and enforce Azure Policies to ensure governance and compliance across cloud resources.-Administer Defender for Office 365 to safeguard email and collaboration platforms against phishing, malware, and other threats.-Leverage AppOmni to assess and secure SaaS platforms, including Salesforce. -Develop automation scripts and remediation processes to improve response times and reduce manual effort.-Continuously monitor, evaluate, and improve cloud security posture through audits, assessments, and penetration tests.-Document processes, policies, and technical procedures to support compliance and operational readiness. -Stay current with evolving security threats, cloud technologies, and industry best practices. -Experience in CSPM solution like Palo Alto Prisma, Wiz is added advantage. Professional & Technical Skills: -Microsoft Defender for Cloud (MDC), -Azure Policy,-Defender for Office 365 -AppOmni Additional Information:- The candidate should have minimum 5 years of experience in Cloud Security Architecture.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 week ago
15.0 - 20.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Email Security Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitating the transition to cloud security-managed operations. You will engage in discussions to align security strategies with organizational objectives, ensuring that all security measures are effectively integrated into the cloud environment. Your role will also require you to stay updated on the latest security trends and technologies to enhance the overall security posture of the organization. Roles & Responsibilities:-Monitor email traffic for suspicious activities.-Configure and manage email security platforms-Analyze and respond to phishing attacks, spam, and malware delivered via email-Implement and maintain email authentication protocols (SPF, DKIM, DMARC).-develop and enforce email security policies (e.g., email encryption,-Respond to email-related security incidents.-Conduct forensic analysis of email-based attacks.-Work with SOC teams during breach investigations.-Conduct phishing user training.-Automate detection and response using SOAR tools.-Analysis of Email Header and Email body analysis Professional & Technical Skills: - Email protocols:SMTP, IMAP, POP3 -DNS records:SPF, DKIM, DMARC Additional Information:- The candidate should have minimum 5 years of experience in Email Security.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 week ago
3.0 years
0 Lacs
Thane, Maharashtra, India
On-site
Responsibilities Design, implement, and maintain comprehensive cybersecurity measures for safeguarding systems, networks, and sensitive data. Administer and optimize cybersecurity infrastructure including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint detection and response (EDR), privileged access management (PAM), and cloud security posture management (CSPM) platforms. Perform regular security assessments and audits to proactively identify vulnerabilities, prioritizing and addressing remediations. Continuously monitor network and system activity for suspicious behavior or potential threats, performing detailed risk analysis and incident investigation. Serve as a vital member of the Incident Response Team, effectively addressing cybersecurity breaches and minimizing business impact. Develop, document, and execute emergency response plans, disaster recovery protocols, and incident playbooks. Collaborate closely with IT teams and various business units to integrate robust security practices across the organization. Partner actively with the Security Operations team to stay ahead of emerging ransomware, phishing campaigns, and zero-day vulnerabilities, and implement appropriate preventive measures. Contribute to the creation, review, and enforcement of cybersecurity policies and procedures, ensuring compliance with applicable regulations and industry standards. Generate clear, concise, and timely reports on security posture, threats, incidents, and mitigation measures for senior management. Stay abreast of industry developments, emerging threats, innovative technologies, and best practices to continually enhance cybersecurity defenses. Recommend improvements to security architecture, technology adoption, and procedures based on threat intelligence and industry advancements. Perform additional cybersecurity-related duties as required. Basic Qualifications Minimum 3 years of experience in cybersecurity roles, with a solid understanding of network infrastructure and database security. Demonstrated proficiency in security technologies including firewalls, VPN, IDS/IPS, endpoint protection, encryption, and cloud security. Hands-on experience working in diverse environments such as cloud, hybrid-cloud, multi-cloud, and on-premises systems. Familiarity with cybersecurity frameworks (e.g., NIST, ISO 27001) and regulatory standards (e.g., GDPR, HIPAA). Strong analytical, critical thinking, and problem-solving capabilities. Excellent written and verbal communication skills in English, with proven ability to collaborate effectively across teams. Relevant industry certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) strongly preferred. Ability to travel domestically or internationally up to 10% as needed. Preferred Characteristics Bachelor’s or Master's degree in Computer Science, Information Security, or related technical fields. Experience securing Operational Technology (OT) systems in global manufacturing environments. Expertise in defending against sophisticated threats, including nation-state threat actors. Prior U.S. Security Clearance or experience in highly regulated environments. Familiarity and experience conducting audits and maintaining compliance with standards such as SOC, ISO 27001/27017/27018/27701, FedRAMP, SOX 404, HITRUST CSF, HIPAA, GxP, 21 CFR Part 11, EU Annex 11, and NIST guidelines. Proficiency in scripting languages such as Python, Shell, Ruby, or Perl. Previous experience in corporate IT, help desk, or infrastructure support roles. Show more Show less
Posted 1 week ago
2.0 - 5.0 years
3 - 7 Lacs
Mumbai
Work from Office
Advanced Incident Analysis: Utilize advanced tools and techniques to analyze and investigate security incidents detected within the organization's networks and systems. Incident Response: Lead incident response efforts, coordinating with internal and external stakeholders to mitigate and remediate security incidents promptly. Team Leadership: Provide mentorship and guidance to the L1 SOC team, assisting in the development of their skills in incident analysis, parser creation, rule views, and report management. Parser Creation: Develop and maintain parsers to enhance the capability of the SOC's security information and event management (SIEM) system in detecting and correlating security events. Rule View Management: Manage and optimize rule views within the SIEM platform to ensure accurate and timely detection of security threats. Report Management: Oversee the generation and distribution of security reports, including incident reports, trend analysis, and recommendations for improvement. Collaboration: Work closely with other teams within the organization, including IT operations, network engineering, and application development, to improve overall security posture and incident response capabilities.
Posted 1 week ago
140.0 years
5 - 7 Lacs
Gurgaon
On-site
About NCR VOYIX NCR VOYIX Corporation (NYSE: VYX) is a leading global provider of digital commerce solutions for the retail, restaurant and banking industries. NCR VOYIX is headquartered in Atlanta, Georgia, with approximately 16,000 employees in 35 countries across the globe. For nearly 140 years, we have been the global leader in consumer transaction technologies, turning everyday consumer interactions into meaningful moments. Today, NCR VOYIX transforms the stores, restaurants and digital banking experiences with cloud-based, platform-led SaaS and services capabilities. Not only are we the leader in the market segments we serve and the technology we deliver, but we create exceptional consumer experiences in partnership with the world’s leading retailers, restaurants and financial institutions. We leverage our expertise, R&D capabilities and unique platform to help navigate, simplify and run our customers’ technology systems. Our customers are at the center of everything we do. Our mission is to enable stores, restaurants and financial institutions to exceed their goals – from customer satisfaction to revenue growth, to operational excellence, to reduced costs and profit growth. Our solutions empower our customers to succeed in today’s competitive landscape. Our unique perspective brings innovative, industry-leading tech to all the moving parts of business across industries. NCR VOYIX has earned the trust of businesses large and small — from the best-known brands around the world to your local favorite around the corner. We are looking for a motivated and detail-oriented SOC Analyst to join our Security Operations Center team. As a first line of defense, you will be responsible for monitoring, detecting, and responding to security events and alerts in real-time. This is an excellent opportunity for individuals looking to start or grow their career in cybersecurity. Key Responsibilities As an active member of the team, monitor and process response for security events on a 24x7 basis. Perform initial triage, analysis and respond to a security Incident Escalate incidents based on Severity and established protocols Document security incidents and investigation thoroughly Leverage automation and orchestration solutions to automate repetitive tasks. Work alongside other security team members to hunt for and identify security issues generated from the network, including third-party relationships. Coordinate incident response activities across multiple independently managed environments and security teams. Leverage knowledge in multiple security disciplines, such as Windows, Unix, Linux, data loss prevention (DLP), endpoint controls, Public Cloud, and networking, to offer global solutions for a complex heterogeneous environment. Utilize multiple security/threat intelligence tools and resources to understand threats. Analyze and respond to minor and major incidents, reported SPAM and Phishing e-mails. Partner with the detection engineering team to improve tool usage and workflow, as well as with the advanced threats and assessment team to mature monitoring and response capabilities. Support 24/7 operations Perform other duties as assigned Skills and Qualifications Strong knowledge of network, backend systems, operating systems, applications, and web services in a manner that allows for the interaction of all as it relates to security and services. 2+ Years as an incident responder Ability to apply analytical expertise and critical thinking to security incidents Ability to assimilate, understand and utilize various security technologies Ability to collaborate within a geographically distributed team of Incident Response Analysts Demonstrated team or functional leadership experience Experience processing and analyzing intelligence in support of management decision making Current Information Security related certification preferred. Current Public cloud related certification preferred. Knowledge of relevant information security and incident response frameworks such as NIST Cyber Security Framework, MITRE ATT&CK Framework. Strong communication skills and ability to work in a collaborative atmosphere Strong attention to detail Ability to deal with ambiguity and translate high level objectives into detailed tasks Ability to prioritize work with multiple, simultaneous work assignments. Ability and willingness to learn new tools and processes. Experience documenting business processes or technical procedures preferred. Offers of employment are conditional upon passage of screening criteria applicable to the job EEO Statement Integrated into our shared values is NCR Voyix’s commitment to diversity and equal employment opportunity. All qualified applicants will receive consideration for employment without regard to sex, age, race, color, creed, religion, national origin, disability, sexual orientation, gender identity, veteran status, military service, genetic information, or any other characteristic or conduct protected by law. NCR Voyix is committed to being a globally inclusive company where all people are treated fairly, recognized for their individuality, promoted based on performance and encouraged to strive to reach their full potential. We believe in understanding and respecting differences among all people. Every individual at NCR Voyix has an ongoing responsibility to respect and support a globally diverse environment. Statement to Third Party Agencies To ALL recruitment agencies: NCR Voyix only accepts resumes from agencies on the preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Voyix employees, or any NCR Voyix facility. NCR Voyix is not responsible for any fees or charges associated with unsolicited resumes “When applying for a job, please make sure to only open emails that you will receive during your application process that come from a @ncrvoyix.com email domain.”
Posted 1 week ago
4.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Level Up Your Career with Zynga! At Zynga, we bring people together through the power of play. As a global leader in interactive entertainment and a proud label of Take-Two Interactive, our games have been downloaded over 6 billion times—connecting players in 175+ countries through fun, strategy, and a little friendly competition. From thrilling casino spins to epic strategy battles, mind-bending puzzles, and social word challenges, our diverse game portfolio has something for everyone. Fan-favorites and latest hits include FarmVille™, Words With Friends™, Zynga Poker™, Game of Thrones Slots Casino™, Wizard of Oz Slots™, Hit it Rich! Slots™, Wonka Slots™, Top Eleven™, Toon Blast™, Empires & Puzzles™, Merge Dragons!™, CSR Racing™, Harry Potter: Puzzles & Spells™, Match Factory™, and Color Block Jam™—plus many more! Founded in 2007 and headquartered in California, our teams span North America, Europe, and Asia, working together to craft unforgettable gaming experiences. Whether you're spinning, strategizing, matching, or competing, Zynga is where fun meets innovation—and where you can take your career to the next level. Join us and be part of the play! What You'll Do Design, code, and develop new features/fix bugs/add enhancements to large scale services and solutions to be consumed by millions of mobile and web clients Analyze and improve efficiency, scalability and stability of various system resources Take a hands-on approach in writing, reviewing and testing code. Follow engineering standard methodologies to ensure code quality, performance and reliability. Review detailed tech plans and code from others, aligning with the team and Zynga-wide technical vision. Work collaboratively across teams to understand product/customer requirements and propose technical solutions. Provide production & integration support for shared technology across Zynga games. What You Bring Bachelor’s or Master’s degree in Computer Science, or equivalent. 4+ years of professional experience in software development in building backend applications using Ruby on Rails, Python. Experience working with AWS cloud, memcahe, redis and MySql databases. Experience with monitoring and logging systems like splunk is an advantage. Experience in object-oriented design of applications/systems. Experience in design and development of highly scalable backend REST services Exposure to Software development practices, Continuous Integration. Follow technology trends, Software Engineering methodology while enjoying the challenge of solving complex problems Strong Debugging and problem-solving skills We encourage you to apply even if you don’t meet every single requirement. Your unique perspective and experience could be exactly what we’re looking for. What We Offer You Zynga offers a world-class benefits package that helps support and balance the needs of our teams. To find out more about our benefits, visit the Zynga Benefits We are proud to be an equal opportunity employer, which means we are committed to creating and celebrating diverse thoughts, cultures, and backgrounds throughout our organization. Employment with us is based on substantive ability, objective qualifications, and work ethic – not an individual’s race, creed, color, religion, sex or gender, gender identity or expression, sexual orientation, national origin or ancestry, alienage or citizenship status, physical or mental disability, pregnancy, age, genetic information, veteran status, marital status, status as a victim of domestic violence or sex offenses, reproductive health decision, or any other characteristics protected by applicable law. As an equal opportunity employer, we are committed to providing the necessary support and accommodation to qualified individuals with disabilities, health conditions, or impairments (subject to any local qualifying requirements) to ensure their full participation in the job application or interview process. Please contact us at accommodationrequest@zynga.com to request any accommodations or for support related to your application for an open position. Please be aware that Zynga does not conduct job interviews or make job offers over third-party messaging apps such as Telegram, WhatsApp, or others. Zynga also does not engage in any financial exchanges during the recruitment or onboarding process, and will never ask a candidate for their personal or financial information over an app or other unofficial chat channel. Any attempt to do so may be the result of a scamp or phishing attack, and you should not engage. Zynga’s in-house recruitment team will only contact individuals through their official Company email addresses (i.e., via a zynga.com, naturalmotion.com, smallgiantgames.com, themavens.com, gram.gs email domain). Show more Show less
Posted 1 week ago
4.0 years
4 - 9 Lacs
Bengaluru
On-site
Level Up Your Career with Zynga! At Zynga, we bring people together through the power of play. As a global leader in interactive entertainment and a proud label of Take-Two Interactive, our games have been downloaded over 6 billion times—connecting players in 175+ countries through fun, strategy, and a little friendly competition. From thrilling casino spins to epic strategy battles, mind-bending puzzles, and social word challenges, our diverse game portfolio has something for everyone. Fan-favorites and latest hits include FarmVille™, Words With Friends™, Zynga Poker™, Game of Thrones Slots Casino™, Wizard of Oz Slots™, Hit it Rich! Slots™, Wonka Slots™, Top Eleven™, Toon Blast™, Empires & Puzzles™, Merge Dragons!™, CSR Racing™, Harry Potter: Puzzles & Spells™, Match Factory™, and Color Block Jam™—plus many more! Founded in 2007 and headquartered in California, our teams span North America, Europe, and Asia, working together to craft unforgettable gaming experiences. Whether you're spinning, strategizing, matching, or competing, Zynga is where fun meets innovation—and where you can take your career to the next level. Join us and be part of the play! What You'll Do: Design, code, and develop new features/fix bugs/add enhancements to large scale services and solutions to be consumed by millions of mobile and web clients Analyze and improve efficiency, scalability and stability of various system resources Take a hands-on approach in writing, reviewing and testing code. Follow engineering standard methodologies to ensure code quality, performance and reliability. Review detailed tech plans and code from others, aligning with the team and Zynga-wide technical vision. Work collaboratively across teams to understand product/customer requirements and propose technical solutions. Provide production & integration support for shared technology across Zynga games. What You Bring : Bachelor’s or Master’s degree in Computer Science, or equivalent. 4+ years of professional experience in software development in building backend applications using Ruby on Rails, Python. Experience working with AWS cloud, memcahe, redis and MySql databases. Experience with monitoring and logging systems like splunk is an advantage. Experience in object-oriented design of applications/systems. Experience in design and development of highly scalable backend REST services Exposure to Software development practices, Continuous Integration. Follow technology trends, Software Engineering methodology while enjoying the challenge of solving complex problems Strong Debugging and problem-solving skills We encourage you to apply even if you don’t meet every single requirement. Your unique perspective and experience could be exactly what we’re looking for. What We Offer You : Zynga offers a world-class benefits package that helps support and balance the needs of our teams. #LI-Hybrid We are proud to be an equal opportunity employer, which means we are committed to creating and celebrating diverse thoughts, cultures, and backgrounds throughout our organization. Employment with us is based on substantive ability, objective qualifications, and work ethic – not an individual’s race, creed, color, religion, sex or gender, gender identity or expression, sexual orientation, national origin or ancestry, alienage or citizenship status, physical or mental disability, pregnancy, age, genetic information, veteran status, marital status, status as a victim of domestic violence or sex offenses, reproductive health decision, or any other characteristics protected by applicable law. As an equal opportunity employer, we are committed to providing the necessary support and accommodation to qualified individuals with disabilities, health conditions, or impairments (subject to any local qualifying requirements) to ensure their full participation in the job application or interview process. Please contact us at accommodationrequest@zynga.com to request any accommodations or for support related to your application for an open position. Please be aware that Zynga does not conduct job interviews or make job offers over third-party messaging apps such as Telegram, WhatsApp, or others. Zynga also does not engage in any financial exchanges during the recruitment or onboarding process, and will never ask a candidate for their personal or financial information over an app or other unofficial chat channel. Any attempt to do so may be the result of a scamp or phishing attack, and you should not engage. Zynga’s in-house recruitment team will only contact individuals through their official Company email addresses (i.e., via a zynga.com, naturalmotion.com, smallgiantgames.com, themavens.com, gram.gs email domain).
Posted 1 week ago
140.0 years
0 Lacs
Gurgaon, Haryana, India
On-site
About NCR VOYIX NCR VOYIX Corporation (NYSE: VYX) is a leading global provider of digital commerce solutions for the retail, restaurant and banking industries. NCR VOYIX is headquartered in Atlanta, Georgia, with approximately 16,000 employees in 35 countries across the globe. For nearly 140 years, we have been the global leader in consumer transaction technologies, turning everyday consumer interactions into meaningful moments. Today, NCR VOYIX transforms the stores, restaurants and digital banking experiences with cloud-based, platform-led SaaS and services capabilities. Not only are we the leader in the market segments we serve and the technology we deliver, but we create exceptional consumer experiences in partnership with the world’s leading retailers, restaurants and financial institutions. We leverage our expertise, R&D capabilities and unique platform to help navigate, simplify and run our customers’ technology systems. Our customers are at the center of everything we do. Our mission is to enable stores, restaurants and financial institutions to exceed their goals – from customer satisfaction to revenue growth, to operational excellence, to reduced costs and profit growth. Our solutions empower our customers to succeed in today’s competitive landscape. Our unique perspective brings innovative, industry-leading tech to all the moving parts of business across industries. NCR VOYIX has earned the trust of businesses large and small — from the best-known brands around the world to your local favorite around the corner. We are looking for a motivated and detail-oriented SOC Analyst to join our Security Operations Center team. As a first line of defense, you will be responsible for monitoring, detecting, and responding to security events and alerts in real-time. This is an excellent opportunity for individuals looking to start or grow their career in cybersecurity. Key Responsibilities As an active member of the team, monitor and process response for security events on a 24x7 basis. Perform initial triage, analysis and respond to a security Incident Escalate incidents based on Severity and established protocols Document security incidents and investigation thoroughly Leverage automation and orchestration solutions to automate repetitive tasks. Work alongside other security team members to hunt for and identify security issues generated from the network, including third-party relationships. Coordinate incident response activities across multiple independently managed environments and security teams. Leverage knowledge in multiple security disciplines, such as Windows, Unix, Linux, data loss prevention (DLP), endpoint controls, Public Cloud, and networking, to offer global solutions for a complex heterogeneous environment. Utilize multiple security/threat intelligence tools and resources to understand threats. Analyze and respond to minor and major incidents, reported SPAM and Phishing e-mails. Partner with the detection engineering team to improve tool usage and workflow, as well as with the advanced threats and assessment team to mature monitoring and response capabilities. Support 24/7 operations Perform other duties as assigned Skills And Qualifications Strong knowledge of network, backend systems, operating systems, applications, and web services in a manner that allows for the interaction of all as it relates to security and services. 2+ Years as an incident responder Ability to apply analytical expertise and critical thinking to security incidents Ability to assimilate, understand and utilize various security technologies Ability to collaborate within a geographically distributed team of Incident Response Analysts Demonstrated team or functional leadership experience Experience processing and analyzing intelligence in support of management decision making Current Information Security related certification preferred. Current Public cloud related certification preferred. Knowledge of relevant information security and incident response frameworks such as NIST Cyber Security Framework, MITRE ATT&CK Framework. Strong communication skills and ability to work in a collaborative atmosphere Strong attention to detail Ability to deal with ambiguity and translate high level objectives into detailed tasks Ability to prioritize work with multiple, simultaneous work assignments. Ability and willingness to learn new tools and processes. Experience documenting business processes or technical procedures preferred. Offers of employment are conditional upon passage of screening criteria applicable to the job EEO Statement Integrated into our shared values is NCR Voyix’s commitment to diversity and equal employment opportunity. All qualified applicants will receive consideration for employment without regard to sex, age, race, color, creed, religion, national origin, disability, sexual orientation, gender identity, veteran status, military service, genetic information, or any other characteristic or conduct protected by law. NCR Voyix is committed to being a globally inclusive company where all people are treated fairly, recognized for their individuality, promoted based on performance and encouraged to strive to reach their full potential. We believe in understanding and respecting differences among all people. Every individual at NCR Voyix has an ongoing responsibility to respect and support a globally diverse environment. Statement to Third Party Agencies To ALL recruitment agencies: NCR Voyix only accepts resumes from agencies on the preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Voyix employees, or any NCR Voyix facility. NCR Voyix is not responsible for any fees or charges associated with unsolicited resumes “When applying for a job, please make sure to only open emails that you will receive during your application process that come from a @ncrvoyix.com email domain.” Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Ahmedabad, Gujarat, India
On-site
Job Title: Red Team Member Location: Ahmedabad Department: Cybersecurity / Offensive Security Employment Type: Full-Time Job Summary: We are seeking an experienced and highly skilled Red Team Member to join our cybersecurity team. The ideal candidate will bring a minimum of 5 years of hands-on experience in penetration testing and offensive security operations. This role involves emulating advanced persistent threats (APTs), identifying weaknesses in enterprise environments, and helping organizations improve their security posture. Candidates must hold relevant industry certifications such as OSCP , OSCE , CRTP , OSEP , or equivalent. Key Responsibilities: Plan, execute, and report on Red Team engagements simulating real-world attack scenarios (including physical, network, social engineering, and application-based attacks). Perform advanced penetration testing on internal and external networks, applications, and cloud infrastructures. Develop and utilize custom tools, scripts, and exploits to simulate threat actor tactics, techniques, and procedures (TTPs). Work closely with Blue Teams to improve detection capabilities and validate security controls. Participate in threat modeling, risk assessments, and adversary emulation exercises. Produce clear and actionable reports detailing findings, exploitation paths, and remediation guidance. Stay updated on the latest vulnerabilities, exploits, and attack vectors. Contribute to continuous improvement of Red Team methodologies, playbooks, and tooling. Required Qualifications: Minimum 5 years of professional experience in penetration testing, ethical hacking, or offensive security roles. Proven experience in Red Team operations or advanced adversary simulations. Strong understanding of MITRE ATT&CK framework, threat emulation, and TTPs of modern threat actors. Solid knowledge of networking protocols, Windows/Linux systems, Active Directory, cloud platforms (AWS, Azure, GCP), and common security controls. Proficient in scripting/programming languages such as Python, PowerShell, Bash, or similar. Certifications: Required: OSCP, OSCE, OSEP, CRTP, CRTO, GXPN, or similar advanced offensive security certifications. Preferred Skills: Experience with C2 frameworks (e.g., Cobalt Strike, Sliver, Mythic). Familiarity with EDR evasion techniques and OPSEC-safe offensive operations. Experience in purple team collaboration and working with detection engineering teams. Knowledge of social engineering and phishing techniques. Ability to communicate technical findings to both technical and non-technical stakeholders. Join our team and contribute to a collaborative, innovative environment, where your ideas can truly make a difference. We look forward to receiving your application Show more Show less
Posted 1 week ago
8.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
We are seeking a highly skilled and experienced Senior Manager – Information Security to lead the development and execution of our cybersecurity strategy. This role will play a key part in securing our cloud-native digital lending platforms and ensuring compliance with key regulations such as the RBI Master Directions, DPDP Act, and ISO 27001 standards. You will lead governance, risk, compliance, and security operations while collaborating with Legal, IT, Compliance, and Product teams. This is a critical leadership role in building a security-first culture and enabling business growth through robust information security practices. What You'll Do: Governance & Compliance: Develop and maintain information security policies and drive compliance with ISO 27001, SOC 2, and RBI guidelines. Act as the primary contact for audits and inspections. Risk Management: Conduct risk assessments, manage risk registers, and oversee third-party/vendor security reviews. Security Operations: Oversee tools and processes for SIEM, DLP, EDR, patch management, and incident response. Lead security incident simulations and resolution. Cloud & App Security: Manage AWS security architecture, implement CSPM programs, and embed secure coding and DevSecOps practices across CI/CD pipelines. Business Continuity & DR: Maintain and test disaster recovery and continuity plans (RTO: 60 mins; near-zero RPO). Awareness & Culture: Run regular security training, phishing drills, and promote a security-aware culture across the organization. Reporting & Strategy: Present security metrics, dashboards, and risk reports to leadership and participate in strategic IT governance forums. What We’re Looking For: 8+ years in cybersecurity or information security roles; at least 3 years in a leadership capacity. Background in fintech, NBFC, or regulated financial services preferred. Proven track record in managing audits (ISO 27001, SOC 2), incident response, and cloud security (AWS). Strong knowledge of cybersecurity tools and frameworks: AWS, SIEM, CSPM, IAM, patch management, DLP, EDR. Familiar with secure SDLC, DevSecOps, threat modeling, and regulatory compliance. Effective communicator with experience working across cross-functional teams. Certifications (preferred): CISSP, CISM, CISA, ISO 27001 Lead Auditor/Implementer, AWS Security Specialty. Bonus: DCPP, CIPP/E, or other data privacy/RBI-focused certifications. About Kissht: Kissht, a Great Place to Work® certified organization, is a consumer-first credit app that is transforming the landscape of consumer credit. As one of the fastest-growing and most respected FinTech companies, Kissht is a pioneer in data and machine-based lending. With over 15 million customers, including 40% from tier 2 cities and beyond, we offer both short and long-term loans for personal consumption, business needs, and recurring expenses. Founded by Ranvir and Krishnan, alumni of IIT and IIM, and backed by renowned investors like Endiya Partners, the Brunei Investment Authority, and the Singapore Government, Kissht is synonymous with excellence in the industry. Join us and be a part of a dynamic, innovative company that is changing the future of financial technology. Show more Show less
Posted 1 week ago
2.0 - 5.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Are you a passionately curious individual who possesses a steady and unshakable eye for detail? Are you not afraid of searching for a needle in the stack of hay? Do you think you have the skillset, knowledge, to be the first line of defense between cyber adversaries and the organization? Do you believe in working for a mission to protect your organization 365*24*7? If you are in love with the tools and technology that help you to solve this daunting challenge, then we are looking for you. Who we are? Payatu is a GPTW certified company where we strive to create a culture of excellence, growth and innovation that empowers our employees to reach new heights in their careers. We are young and passionate folks driven by the power of the latest and innovative technologies in IoT, AI/ML, Blockchain, and many other advanced technologies. We are on the mission of making Cyberworld safe for every organization, product, and individual. What we look for outside work parameters? Your expertise is your primary qualification, not your degree or certification. Your publicly known contributions are your credentials . Your write-up and blogs reflect your interests and ethics. You are a perfect technical fit if: At least 2 to 5 years of experience handling SIEM tools ( Splunk ), Incident Response. Knowledge and Hands-on experience on Security appliances like (IPS, Proxy, XDR/EDR, Email Security Gateway, Cloud Access Security Broker). Experience in Security Orchestration and Automation. Should possess strong working knowledge of Power BI, Tableau, and Power Automate. Should have good knowledge of one or more programming/scripting languages like Python, Go, PowerShell, Bash. Have good experience in handling IT Security incidents, phishing analysis, triaging and analyzing malware, developing and fine-tuning use cases. Experience in host and network forensics. Experience in analyzing logs and should have hands-on experience in Windows and Linux. Should have experience in working on and monitoring cloud environment [ AWS & Azure] . Should have experience on Entra ID, Microsoft Defender, Sentinel, KQL. You Have All Our Desired Qualities, if: You like scripting and automating stuff. You like writing tools. You have excellent written and verbal communication skills and the ability to express your thoughts clearly. You have the skill to articulate and present technical things in business language. You can work independently as well as within a team. You have strong problem solving, troubleshooting, and analysis skills. You are passionate about your area of expertise and self-driven. You are comfortable working in a dynamic and fast-paced work environment. You are Self-driven, proactive, hardworking, team-player. You are working on something on your own in your field apart from official work. Your everyday work will look like: Automation & Orchestration: Automate mundane and repetitive tasks to improve existing workflows and improve response times. Engineering: Create custom solutions for various Incident Response activities as per business requirement. Incident Response activities: Identity, investigate and respond to potential security incidents to minimize the operational and organizational impact. Malware Analysis: Analyse and triage the malware found on the system. Forensics: Perform forensic analysis on system and network artifacts to identify indicators of compromise. Identify Gaps: Investigate and document gaps in controls, event data, and work with internal teams to resolve. Process Improvement: Execute, develop, and document Incident Handling Guides and processes. Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Hi, Exp: 5-10 Years Minimum of 4+ years’ experience with Microsoft DLP (Microsoft Defender /MS Purview & Compliance) and Microsoft Sentinel tool equivalent with other similar data leakage tool etc.) · Must have hands on experience for data loss product evaluations, building and implementing it, operationalize and integrating with existing systems for effective and efficient use and providing technical support and stakeholder management experience. · Must have hands-on experience with rule creation and maintenance, antispam and anti-phishing administration, report analysis and providing recommendations of future configurations and rules · Exposure/ knowledge of Data Loss Prevention integration with SIEM technologies (i.e.: Splunk, HP ArcSight, etc.) · Knowledge of programming languages a plus (i.e.: Java, .NET, Python, etc.) Top 3 Skills Required MS Purview & Compliance (MS DLP) MS Sentinel Basic scripting for automation If interested please share resume at deepika.eaga@quesscorp.com Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
India
Remote
Job Title: Penetration Tester Location: Remote Experience Required: 5 Years Employment Type: Full-Time Job Summary: We are seeking a highly skilled and experienced Senior Penetration Tester with 5 years of hands-on experience in offensive security. The ideal candidate will be responsible for conducting advanced security assessments, simulating real-world cyberattacks, and providing actionable recommendations to enhance the organization’s security posture. This role demands deep technical expertise, strong analytical skills, and the ability to communicate effectively with both technical and non-technical stakeholders. Key Responsibilities: Plan, execute, and document black-box, grey-box, and white-box penetration tests across various environments (web apps, networks, APIs, mobile, cloud, etc.) Conduct Red Team/Blue Team exercises and collaborate with threat hunters and SOC teams. Identify, exploit, and report vulnerabilities in systems, applications, and infrastructure. Develop and maintain custom exploitation tools, scripts, and payloads . Perform social engineering engagements , including phishing simulations and physical assessments (where applicable). Provide detailed, risk-based reporting , including technical findings, proof-of-concept exploits, and remediation guidance. Stay current with emerging threats, vulnerabilities, and tools in the cybersecurity domain. Mentor junior team members and contribute to the development of internal testing methodologies and frameworks. Participate in threat modeling, architecture reviews, and security design discussions . Required Skills and Qualifications: 5 years of professional experience in penetration testing, red teaming, or offensive security . Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, Cobalt Strike, Nessus, etc. Deep understanding of OWASP Top 10 , MITRE ATT&CK , and NIST security frameworks . Strong knowledge of network protocols, web application architectures, cloud environments (AWS/Azure/GCP), and secure coding practices. Experience with manual testing techniques and not just automated scanners. Strong scripting and automation skills in Python, PowerShell, Bash, or Go . Experience with Active Directory exploitation , privilege escalation, and lateral movement techniques. Demonstrated ability to write clear, concise, and detailed technical reports. Strong verbal and written communication skills. Preferred Certifications (any of the following): Offensive Security Certified Professional (OSCP) Offensive Security Certified Expert (OSCE) Certified Red Team Professional (CRTP) GIAC Penetration Tester (GPEN) Certified Ethical Hacker (CEH) CREST Registered Tester or equivalent Show more Show less
Posted 1 week ago
0.0 - 8.0 years
0 Lacs
Gujarat
On-site
Location Gujarat,Maharashtra Ahmedabad,Pune Experience Range 8 - 10 Years Qualification BE (EEE) MCA (Computers) Job Description Senior Information Security Engineer Roles and Responsibilities Candidate will work as a member of the Corporate Security Team and assist in various day to day operational activities such as: Analyze findings from vulnerability scans and penetration tests, work with stakeholders to prioritize and remediate issues. Develop and maintain custom testing scripts and tools to simulate real-world attack scenarios. Oversee security architecture and implement advanced security controls to mitigate identified threats. Conduct email security risk assessments and manage email security solutions (e.g., Proofpoint, Mimecast, Microsoft Defender, Cisco Email Security). Monitor, detect, and respond to phishing, spoofing, and email-based attacks. Manage and tune SIEM, EDR, DLP, and other security technologies. Guide the organization's incident response efforts and participate in forensic investigations. Conduct risk assessments and security reviews for infrastructure and applications, both on-prem and in cloud environments. Ensure compliance with industry regulations and security standards (e.g., ISO 27001, NIST, PCI-DSS, GDPR). Contribute to secure SDLC practices by integrating security into CI/CD pipelines. Support vulnerability lifecycle management and recommend remediation strategies to IT and DevOps teams. Mentor junior staff and drive security awareness programs organization wide. Drive Corporate Security Program based on the NIST CSF – Identify, Detect, Protect, Respond and Recover. Develops, publishes, and maintains a comprehensive organization-wide information privacy and security plans, policies, procedures, and guidelines. Function as primary liaison with auditors, internal teams and vendors and be the resident expert on systems and services in use for PCI compliance and reporting Responsible for managing all aspects of the Vulnerability Risk Management Program including vulnerability identification, analysis, remediation coordination and reporting. Lead the development, implementation, and maintenance of security policies, standards, and guidelines. Identify and Monitor Corporate Networks to determine if there have been any attacks. Analyze network traffic to identify anomalies and test information security controls for weaknesses. Design and implement safeguards to protect the system with the help of network engineers and other members of the Technology Services team. Respond to threats by taking mitigating actions to contain the activity and minimize damage. Participate in risk assessments and breach readiness exercises for incident management. Facilitate forensics analysis to determine the source of the threat. Document lessons learned as well as identify process improvements. Communicate security issues to management via reports, dashboards. Provide weekly metrics on overall security posture. Research emerging threats and work with the Security Operations Center (SOC). Drive the Third-party vendor security evaluation. Participate in the security toll-gates on SSDLC projects. Implement innovative solutions to scale the program with emphasis on automation where applicable. Qualifications Basic Qualifications: Bachelor's Degree in Business, Computer Science or in a STEM major (Science, Technology, Engineering, or Math). Minimum of 8 years of experience in Information Security Experience in at least one full lifecycle supporting PCI compliance is a must have Experience in managing and maintaining a vulnerability management program using Qualys is a must have Experience in developing content in Splunk – searches, alerts (including POC and tuning), dashboards, Apps. Experience of Security Incident and Event Management (SIEM) tools (Splunk) – ingesting data (Forwarders, HTTP Event Collectors, add-ons), troubleshooting Splunk Installation. Experience in Endpoint security (EDR) – Detection and Response. Help create policies and SOP for Response workflow. Experience in Cortex XDR preferred. Experience in Security evaluation of third-party tools. Experience in Email Security and running phishing campaign Experience in Incident Management Experience in system and network security. Experience in Network Penetration testing. Knowledge of software development, computer networks and Internet threat activity. Programming experience in python, Perl and HTML/JS Previous enterprise or platform/cloud vulnerability management experience and Cloud Security is a plus Excellent written and verbal communication skills, including experience engaging with executive and technical audiences. Must be able to work in a fast paced, high profile environment.
Posted 1 week ago
0 years
0 Lacs
Bangalore Urban, Karnataka, India
On-site
What Success Looks Like In This Role Analyzing network traffic to identify compromised systems, negate denial of service attacks, and pinpoint resource abuse. Incorporate threat intelligence feeds into Microsoft Sentinel to enhance threat detection and response capabilities. Develop and implement security automation scripts and playbooks in Microsoft Sentinel to streamline security operations. Create reports and documentation related to security incidents, investigations, and overall security posture. Supporting priority incident investigations and threat intelligence discoveries with hunting expertise to identify the extent of any potential compromise. Respond to security incidents by containing, eradicating, and recovering from them using Microsoft Defender's tools and features. Educate users and colleagues about cybersecurity best practices and the use of Microsoft Defender. Perform onboarding and offboarding defender agents. Troubleshoot Defender agents not reporting to the portal Conduct investigations using EDR and live response Conduct Vulnerability Assessment using Defender. Investigate, identify, and prevent or mitigate abusive activities such as intrusion attempts, DDoS, malware distribution, phishing attacks, etc. Monitoring threat/vulnerability landscape and security advisories Appropriately manage time and customer issues based on issue severity and business needs Continuously monitors the security alerts queue, triages security alerts Monitors health of customer security sensors and SIEM infrastructure Ensures documented processes and procedures are relevant and up to date Investigate, document, and report on any security threat issues as well as emerging trends Enabling a world-class cyber defense program by working closely with other technical, vulnerability management, incident management, intelligence analyst and forensic personnel to develop a fuller understanding of the intent, objectives, and activity of cyber threat actors, and ultimately drive improvement to the organizations’ overall security posture Notify appropriate business stakeholders about serious security events, implement security improvements by assessing current situation, evaluating market trends, and anticipating requirements Perform threat hunting and threat analysis Monitor, detect, and analyze network threats Employ automation to aid in research and hunting tasks Write blogs and papers related to threat hunting and analysis Investigate, document, and report all security issues to contribute to incident response You will be successful in this role if you have: Qualifications Key Qualifications A Bachelor’s or Master's degree from a university (preferably in Computer Science, Engineering, or a related discipline), or equivalent security industry work experience Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law. This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise complete your expression of interest, without additional assistance and would like to discuss a request for reasonable accommodation, please contact our Global Recruiting organization at GlobalRecruiting@unisys.com or alternatively Toll Free: 888-560-1782 (Prompt 4). US job seekers can find more information about Unisys’ EEO commitment here. Show more Show less
Posted 1 week ago
7.0 years
3 - 4 Lacs
Bengaluru
On-site
We help the world run better At SAP, we enable you to bring out your best. Our company culture is focused on collaboration and a shared passion to help the world run better. How? We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences, values flexibility, and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative, caring team environment with a strong focus on learning and development, recognition for your individual contributions, and a variety of benefit options for you to choose from. Summary An SAP Global Cyber Incident Response and Recovery Investigator plays a critical role in safeguarding SAP’s digital enterprise. As a front-line defender, the Investigator is responsible for triaging security events identified by monitoring tools, analyzing data to assess severity and urgency, and conducting initial evaluations to determine whether a cyberattack is underway. When a potential incident is identified, the Investigator works closely with Global Security Operations to scope the impact, coordinate containment efforts, and support forensic investigations to uncover the nature and details of the attack. What you'll do Our Global Cyber Security Incident Response and Recovery Investigator are our first line of response for security event and incidents with a global scope. They are responsible for triaging security alerts detected by Enterprise Detection and SIEM, analyzing available data to determine scope, severity, and priority to determine follow on actions, which could include escalation to a IR Investigator. In escalation cases, they then work in a supportive capacity to further validate if a cyber-attack is occurring, scoping the extent of a suspected attack, coordinating efforts to contain attacks, supporting forensic investigations to determine the details around an attack, and providing guidance on remediation actions. In this role, you will: Conduct initial assessments and help drive root cause analysis. Contribute to the development of attack remediation and response strategies. Coordinate escalation handling and communication across teams. Triage operational security processes, including phishing response. Assist in maintaining and improving incident handling documentation—such as playbooks, runbooks, and standard operating procedures. Collaborate with Detection and SIEM teams to enhance detection logic and alert accuracy. Support forensic investigations with technical insights and evidence collection. Analysing cloud logs and telemetry for signs of compromise (e.g., CloudTrail, VPC Flow Logs, Azure Activity Logs). Leverage your offensive knowledge to identify gaps, simulate attacks, and drive improvements in detection, response, and hardening strategies. We value hands-on practitioners—our environment includes sandboxing, red vs. blue testing, or adversary emulation frameworks (e.g., MITRE ATT&CK, CALDERA, Atomic Red Team) and opportunities to build tooling or simulate attack chains. What you bring We are seeking analytical and detail-oriented critical thinkers who are solution-focused and thrive in dynamic environments. The ideal candidate should be a fast learner with the ability to adapt quickly and respond effectively to changing circumstances. Preferred Technical Skills and Experience: Experience: 7–10+ years in a cyber incident investigation role or equivalent combination of education, certifications, and relevant training. Certifications - Industry-recognized certifications such as Security+, GCIA, GCIH, CISSP (or equivalent). Strong understanding of Advanced Persistent Threat (APT) actors, their tools, techniques, and procedures (TTPs), as well as threat modelling frameworks. Proficiency in TCP/IP communications and knowledge of core network protocols and applications such as DNS, HTTP, and SMB. Operating Systems & Forensics: In-depth knowledge of forensic artifacts across one or more platforms: Windows/Active Directory (file systems, registry, memory artifacts) Unix/Linux (file systems, memory artifacts) macOS (file systems, memory artifacts) Specialized Domains (any of the following): Cyber incident response in cloud, mobile, web application, or database environments Cybersecurity automation and orchestration Web servers and web applications Cloud Platforms: Deep familiarity with AWS, Azure, and/or GCP — with an emphasis on security posture, logging, and IR tooling. Experience conducting incident response and post-incident forensics in cloud environments. Understanding of cloud-native service abuse and misconfigurations (IAM, serverless, container runtime attacks). Security Infrastructure Tools: (SIEM, IDS, EDR, DNS, other Deception technologies) Proficiency in scripting languages such as PowerShell, Python, or Bash . Bring out your best SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, you can bring out your best. We win with inclusion SAP’s culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone – regardless of background – feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world. SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team: Careers@sap.com For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program, according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training. EOE AA M/F/Vet/Disability: Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, age, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability. Successful candidates might be required to undergo a background verification with an external vendor. Requisition ID: 411769 | Work Area: Information Technology | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid.
Posted 1 week ago
0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Junior Security Analyst – The Solenis Security Analyst (SSA) has a wide variety of skills, including performing intrusion analysis, a deep understanding of the 18x5 security monitoring environment. The SSA role requires defense against cyber threats by identifying and triaging security incidents. The ideal person in this role brings experience in monitoring and investigating network and endpoint intrusions, as well as experience handling security incidents within the Security Operations Center (SOC). This role must be able to solve complex problems independently and know when to escalate issues to senior IT Security Leads and Managers. This individual will work with multiple technology platforms and interface with other groups within IT Security Operations. The Solenis Security Analyst (SSA) for the SOC will be responsible for responding to Security incidents/alerts, and threats that impact information security at Solenis. This individual's role includes the following functions. Roles And Responsibilities Monitor and analyze security event logs from various systems and applications. Experience in responding to security incidents and investigations, including data breaches, malware infections, and denial-of-service attacks. Expertise in L1 SOC operations on various Security tools, eg: EDR, SIEM, Network logs, DLP, and email security. Perform preliminary analysis and assist in forensic investigations as required. Experience in handling various operating systems. Good Understanding In SIEM Event correlation, Log-ingestion, Fine-tuning and analysis Good understanding in Automation (SOAR) and Custom KQL queries. Research emerging threats and vulnerabilities to aid in the identification of Security incidents. Familiar with the IOC’s block/allow actions. Good experience in analyzing phishing emails and security threats. Familiar with email security policies and best practices to safeguard against threats such as phishing, malware, and data breaches. Escalates issues to other senior team members upon exhausting all technical options available to them. Perform/review regular vulnerability assessment reports to identify weaknesses in systems and applications. Analyze external threat feeds and stay informed about emerging threats and vulnerabilities relevant to the organization. Engage in research and development of security solutions, testing new tools and methods for potential implementation. Show more Show less
Posted 1 week ago
2.0 - 5.0 years
0 Lacs
Hyderabad, Telangana, India
Remote
We are united in our mission to make a positive impact on healthcare. Join Us! South Florida Business Journal, Best Places to Work 2024 Inc. 5000 Fastest-Growing Private Companies in America 2024 2024 Black Book Awards, ranked #1 EHR in 11 Specialties 2024 Spring Digital Health Awards, “Web-based Digital Health” category for EMA Health Records (Gold) 2024 Stevie American Business Award (Silver), New Product and Service: Health Technology Solution (Klara) Who We Are We Are Modernizing Medicine (WAMM)! We’re a team of bright, passionate, and positive problem-solvers on a mission to place doctors and patients at the center of care through an intelligent, specialty-specific cloud platform. Our vision is a world where the software we build increases medical practice success and improves patient outcomes. Founded in 2010 by Daniel Cane and Dr. Michael Sherling, we have grown to over 3400 combined direct and contingent team members serving eleven specialties, and we are just getting started! ModMed is based in Boca Raton, FL, with office locations in Santiago, Chile, Berlin, Germany, Hyderabad, India, and a robust remote workforce with team members across the US. ModMed is hiring a motivated corporate Talent Acquisition / Recruiting Coordinator to join our recently established and growing Team in India! This is an exciting opportunity to help build our presence in India and work with a hyper-growth SaaS company that is truly Modernizing Medicine! We are hiring a Talent Acquisition Coordinator who is passionate about providing a high-quality candidate and hiring-team experiences. As our TA Coordinator, you excel at detail-oriented tasks and have experience with complex, dynamic calendar management and software systems. You are customer service-focused and thrive in a fast-paced environment where you can have a major impact on the future growth of ModMed. Your Role Work closely with a team of 5-6 recruiters to schedule candidate interviews with hiring teams. Deliver exceptional experiences through proactive, high-touch communication and drive. Proactively schedule phone, virtual, and on-site interviews between candidates and hiring managers and teams. Track candidates throughout the hiring process in our applicant tracking system (Greenhouse). Reduce time to hire by proactively connecting with candidates and the hiring team to move candidates through the selection process in a timely manner. Work seamlessly across multiple platforms to capture information and distribute that information to the hiring team (Recruiter, hiring managers, hiring team). Enhance and ensure an excellent candidate experience to include timely and professional communication throughout the interview process. Build and maintain good working relationships with hiring managers and team members. Participate in kickoff meetings for new open positions and subsequent regular status meetings. Participate in recruiting events and logistics. Maintain a high level of professionalism and confidentiality at all times. Skills & Requirements 2-5 years of relevant fast-paced, highly administrative experience; previous recruiting coordination experience is a strong plus. Must have a strong professional and customer service mindset and operate with a sense of urgency. Strong problem-solving skills. Excellent organizational and time management skills with the ability to handle multiple competing priorities. Excellent verbal and written communication skills. Ability to work in a fast-paced, team environment. Ability to identify and contribute to continuous process improvement. Detail-oriented and flexible. Tech-savvy. Represent the company to prospective candidates and the community in a way that aligns with our core values. ModMed Benefits Highlight: At ModMed, we believe it’s important to offer a competitive benefits package designed to meet the diverse needs of our growing workforce. Eligible Modernizers can enroll in a wide range of benefits: India Meals & Snacks: Enjoy complimentary office lunches & dinners on select days and healthy snacks delivered to your desk, Insurance Coverage: Comprehensive health, accidental, and life insurance plans, including coverage for family members, all at no cost to employees, Allowances: Annual wellness allowance to support your well-being and productivity, Earned, casual, and sick leaves to maintain a healthy work-life balance, Bereavement leave for difficult times and extended medical leave options, Paid parental leaves, including maternity, paternity, adoption, surrogacy, and abortion leave, Celebration leave to make your special day even more memorable, and company-paid holidays to recharge and unwind. United States Comprehensive medical, dental, and vision benefits, including a company Health Savings Account contribution, 401(k): ModMed provides a matching contribution each payday of 50% of your contribution deferred on up to 6% of your compensation. After one year of employment with ModMed, 100% of any matching contribution you receive is yours to keep. Generous Paid Time Off and Paid Parental Leave programs, Company paid Life and Disability benefits, Flexible Spending Account, and Employee Assistance Programs, Company-sponsored Business Resource & Special Interest Groups that provide engaged and supportive communities within ModMed, Professional development opportunities, including tuition reimbursement programs and unlimited access to LinkedIn Learning, Global presence and in-person collaboration opportunities; dog-friendly HQ (US), Hybrid office-based roles and remote availability for some roles, Weekly catered breakfast and lunch, treadmill workstations, Zen, and wellness rooms within our BRIC headquarters. PHISHING SCAM WARNING: ModMed is among several companies recently made aware of a phishing scam involving imposters posing as hiring managers recruiting via email, text and social media. The imposters are creating misleading email accounts, conducting remote "interviews," and making fake job offers in order to collect personal and financial information from unsuspecting individuals. Please be aware that no job offers will be made from ModMed without a formal interview process, and valid communications from our hiring team will come from our employees with a ModMed email address (first.lastname@modmed.com). Please check senders’ email addresses carefully. Additionally, ModMed will not ask you to purchase equipment or supplies as part of your onboarding process. If you are receiving communications as described above, please report them to the FTC website. Show more Show less
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2