Jobs
Interviews

696 Phishing Jobs - Page 6

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Essential Services : Role & Location fungibility At ICICI Bank, we believe in serving our customers beyond our role definition, product boundaries, and domain limitations through our philosophy of customer 360-degree. In essence, this captures our belief in serving the entire banking needs of our customers as One Bank, One Team . To achieve this, employees at ICICI Bank are expected to be role and location-fungible with the understanding that Banking is an essential service . The role descriptions give you an overview of the responsibilities, it is only directional and guiding in nature. About the Role At ICICI Bank, Information Security Group believes in providing services to its customers in the safest and most secure manner keeping in mind that data protection for its customers is as important as providing quality banking services across the spectrum. Our support application team performs application vulnerability assessments and document vulnerabilities which were found and provides recommendations for remediation according to BFSI guidelines and industry best practices. As an Application Security Manager, you will provide guidance to the application team on application security best practices, support remediation effort and track open issues and follow up to ensure remediation. You will work along with cross functional business teams to get closure of identified gaps and utilize escalation matrix effectively wherever necessary. You will conduct application security assessment results review and mitigation approval. You will keep abreast of new technologies to ensure that the organization remains at the forefront of security. Key Responsibilities: Support and Testing: Vulnerability Assessments & Penetration Testing (Automated + Manual) on business critical assets with security tools like BurpSuite, Nessus, Nmap, Accunetix, Metasploit Netsparker, Qualys etc. Analysis: Perform in-depth analysis of VAPT results, Review assessment reports to provide risk mitigation & recommendations on that basis. Collaboration: Collaborate with the application team and provide them guidance on application security best practices, support remediation effort and track open issues and follow up to ensure remediation. Qualifications & Skills Educational Qualification: Engineering Graduate in CS, IT, EC or InfoSec, CyberSec or MCA equivalent with relevant experience. Certifications: OSCP Compliance: Knowledge of cyber security trends & hacking techniques, MITRE ATT&CK framework with hacker mindset. Network Security: Knowledge of Network Security technology in areas of Firewall, IPS, VPN, Gateway security solutions (proxy, web filtering) Key Technologies: Familiarity with OWASP, SANS vulnerabilities along with its validations in source code and other security frameworks & Compliance, Knowledge of Networking concepts & Good understanding of latest Network /security technologies such as Cloud security and recent trends. About the Business Group ICICI Bank’s Information Security Group believes in providing services to its customers in the safest and secured manner, keeping in mind that data protection for its customers is as important as providing quality banking services across the spectrum. The CIA triad of Confidentiality, Integrity, and Availability is built on the vision of creating a comprehensive information security framework. The Bank also lays emphasis on customer elements like protection from phishing, adaptive authentication, awareness initiatives, and provide easy to use protection and risk configuration ability in the hands of customers. With this core responsibly, ICICI administer and promotes on going campaigns to create awareness among customers on security aspects while banking through digital channels.

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Noida, Uttar Pradesh

On-site

Job Description Job Title: Cyber Security Expert Location: Noida Department: IT Operations Job Summary: Security Expert will manage the planning, implementation, and continuous enhancement of Avaada's cybersecurity program, including the establishment of a Security Operations Centre (SOC), modernization of tools and controls, policy upgrades, and alignment with global standards like ISO 27001:2022 and NIST. The role encompasses end-to-end responsibility across cybersecurity operations, strategictooling, governance, cloud, OT/ICS, and compliance. Key Responsibilities: Security Operations Centre (SOC) Setup & Management Design, plan, and manage the Security Operation Centre (SOC) aligned with business needs. Define log sources, event flows, SIEM integration points, and threat intelligence feeds. Develop operational playbooks, escalation workflows, shift schedules, and knowledge base documents. Implement SOC KPIs (MTTD, MTTR, False Positive Rates, etc.) and periodic SOC effectiveness reviews. Coordinate with IT, network, and cloud teams for 24/7 monitoring enablement. Perform ongoing tuning of correlation rules, alerts, and response procedures. Support audits by ensuring SOC processes are documented and control evidence is maintained. Cybersecurity Operations Management Manage threat detection, incident response, vulnerability remediation, and endpoint protection. Oversee daily security alerts, logs, and forensic investigations using existing platforms. Track zero-day threats, malware trends, and APT behavior impacting the renewable energy sector. Coordinate triage of cyber incidents and manage incident response teams during escalations. Manage KPIs for threat detection, incident closure, and endpoint compliance across locations. Security Strategy, Roadmap & Modernization Prepare and maintain Avaada’s Cybersecurity Roadmap with quarterly, half yearly and annual goals. Identify security gaps, outdated tools, or manual processes for modernization or automation. Benchmark current posture against global security trends, risks, and industry best practices. Coordinate with leadership for board-level reporting and long-term security investment planning. Ensure alignment of the roadmap with IT initiatives, OT expansion, and cloud-first transformation. Infrastructure, Cloud & Identity Security Ensure infrastructure and cloud services follow secure-by-design principles. Implement and monitor identity and access controls across cloud infrastructure and internal tools. Review firewall policies, VPN configurations, and segmentation zones for security gaps. Collaborate with cloud architects to align workloads with CIS Benchmarks and cloudnative controls. Enforce identity lifecycle management and privileged access workflows. OT/ICS & Plant Cybersecurity Manage cyber risk assessments for OT environments, SCADA systems, and substations. Oversee segmentation between IT and OT networks (e.g., firewalls, DMZ, whitelisting). Coordinate security hardening and asset inventory for field-level equipment. Implement monitoring tools for critical energy infrastructure events and access. Ensure physical security controls integrate with cybersecurity systems where feasible. Plan cybersecurity drills and simulations for plant-level scenarios. Awareness & Cyber Hygiene Conduct ongoing cybersecurity training, phishing simulations, and e-learning modules. Regularly update content based on real-world threats and incidents. Track and report user participation, risk scores, and improvement areas. Promote a security-first culture across employees, vendors, and partner ecosystems. Run executive awareness sessions to foster top-down risk ownership. Qualifications & Skills: Bachelor's/Master’s degree in IT, Computer Science, or a related field. 10+ years of experience in Cyber Security with At least 5 years in a cybersecurity leadership or specialist role, managing teams, SOC operations, or enterprise-wide security programs. Certifications : Either 2 or more of the following o CISSP o CISM o CEH o CCSP Strong understanding of o Enterprise security architecture and secure network design o Security tools (SIEM, XDR, SOAR, UEBA, PAM) o Cloud Security Experience with Cloud security OT/ICS/SCADA cybersecurity (preferred in energy/renewable sector) is a plus Proven experience in o Managing cybersecurity frameworks (ISO/IEC 27001, NIST CSF, CIS) o Threat detection and response (SOC, SIEM, SOAR) o Endpoint, cloud, and application security controls Excellent problem-solving, communication, and leadership skills. Job Snapshot Updated Date 19-07-2025 Job ID AvaadaJob1015 Department Information Technology Location Noida 62, Noida, Uttar Pradesh, India Experience 7 - 15 Years Employee Type Permanent

Posted 2 weeks ago

Apply

0.0 - 4.0 years

0 Lacs

ahmedabad, gujarat

On-site

You are invited to join our Information Security team as a 1st Line Security Engineer in the role of Network Associate. This entry-level position offers an excellent opportunity for individuals who are enthusiastic about commencing their career in cybersecurity. As a Network Associate, your primary responsibility will be to serve as the initial point of contact for security alerts and incidents. You will be tasked with monitoring our systems, identifying potential threats, and promptly escalating issues to senior engineers when necessary. To support your professional development in a dynamic and rapidly evolving security environment, we are committed to providing comprehensive training and mentorship. Your main duties will involve monitoring security tools and dashboards, such as SIEM, endpoint protection, and firewalls, to detect any suspicious activities. You will be responsible for conducting initial triage and analysis of security alerts, documenting incidents accurately, and maintaining organized records in the ticketing system. Additionally, you will assist in vulnerability scanning, follow-ups on patch management, participate in user awareness campaigns and phishing simulations, and contribute to compliance audits and documentation efforts. It is crucial to stay informed about the latest cyber threats and attack vectors to effectively fulfill your role. To qualify for this position, you should hold a Bachelor's degree in information security, Computer Science, or a related field, or possess equivalent experience. A basic understanding of networking principles (TCP/IP, firewalls, DNS) and operating systems (Windows/Linux) is essential. Familiarity with common cybersecurity tools and concepts, such as antivirus, phishing, malware, ransomware, and SIEM, is advantageous. Strong communication skills, problem-solving abilities, and a willingness to work in shifts or participate in on-call rotations, if necessary, are key attributes we are looking for in potential candidates. While not mandatory, having certifications like CompTIA Security+, CEH, or equivalents would be beneficial. Hands-on experience with tools like Splunk, CrowdStrike, Microsoft Defender, Wireshark, or previous involvement in cybersecurity-related internships or academic projects focused on incident response are considered as preferred qualifications for this role. Join us in this exciting opportunity to kickstart your cybersecurity career and make a meaningful impact in the field of Information Security.,

Posted 2 weeks ago

Apply

0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

We are looking for an experienced and highly motivated Senior Information Security Consultant I to join our cybersecurity team. The ideal candidate will bring deep expertise in Phishing Threat Mitigation, Email Security, Microsoft Defender, and Security Operations (SOC & SIEM). Responsibilities You will play a key role in protecting our organization against evolving email-based threats and ensuring robust incident response Responsibilities : Lead and manage the organization's email security infrastructure, including configuration, monitoring, and optimization of tools like Microsoft Defender and other email security platforms. Design, implement, and manage phishing threat detection and mitigation strategies. Investigate and respond to phishing incidents, coordinate with relevant stakeholders for containment and remediation. Monitor and analyze email threat intelligence feeds and proactively adjust policies and controls. Integrate email security with SIEM platforms for centralized monitoring and incident detection. Provide subject matter expertise in SOC operations, guiding junior analysts on phishing-related escalations. Ensure adherence to email authentication protocols (e.g., SPF, DKIM, DMARC). Maintain detailed documentation of configurations, response procedures, and incident handling processes. Collaborate with internal teams to improve cybersecurity awareness and training, especially around email threats. Contribute to security audits, risk assessments, and regulatory compliance efforts. Key Skills & Technologies Deep knowledge of phishing techniques, email threat vectors, and Expertise in Microsoft Defender for Office 365, and similar tools (e.g., Proofpoint, Mimecast, Barracuda). Hands-on experience with SIEM platforms such as Splunk, QRadar, or Microsoft Sentinel. Familiarity with email security protocols : SPF, DKIM, DMARC. Experience working in or with a Security Operations Center (SOC). Strong scripting and automation skills (PowerShell preferred) for security tool integration and response. Sound knowledge of security frameworks (NIST, ISO 27001, etc.) and incident management : Bachelor's degree in Cybersecurity, Computer Science, or a related field. Relevant certifications are a plus (e.g., CISSP, CEH, Microsoft SC-200, GIAC certifications) (ref:hirist.tech)

Posted 2 weeks ago

Apply

4.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. The candidate would be expected to work in diverse risk consulting engagements and are willing to travel to Middle East countries for project execution atleast 60% of their time. The candidate are expected to have experience / knowledge with respect to the following: Experience with infrastructure penetration testing and vulnerability assessments Good knowledge of OWASP and Secure SDLC standards Should have performed web/mobile/API penetration testing. Good knowledge of encryption technologies & MiTM attacks Experience in performing security code reviews and log analysis. Knowledge of Linux administration, TCP/IP, DNS, Network protocols and OSI model Good understanding of MITRE ATT&CK framework and how to leverage it. Good understanding of AD administration, different authentication mechanisms, trust boundaries etc. Experience in performing security configuration reviews for OS, Databases, Network & Security devices, applications etc. Should have good understanding of the cloud services (AWS, Azure and GCP), its architecture, potential attack vectors and mitigation plans Should have good understanding of the Container services, Kubernetes auditing and LLM security Experience in performing architecture design review for network and applications Experience in performing CS audits/maturity assessments against relevant standards like SAMA CSF, NCA, NIST, NESA, Qatar Cybersecurity Framework etc. Support in conducting technical reviews as part of IT/CS audits Should hold atleast 1 of the certifications or its equivalent : OSCP, GPEN, OSWE, OSWP, CRTP, LPT, ECSA, ISO27001, CEH Hands on experience will security testing tools/frameworks like Burp Suite, Nessus, Qualys etc. Hands on experience with programming using Python/Perl/PowerShell/C# Hands on experience with setting-up phishing and performing social engineering assessments Experience with AV/NAC evasion, obfuscation, bypass windows ASR/device guard, network security controls, emails gateway filtering etc. Experience with Active directory assessments Experience with different stages of cyber kill chain Review operational logs and event console activity to determine cause of security-related events or to identify potential security related events Analysis of the patches released by the vendors Good in report writing and convey the observations to the top management in layman’s language emphasizing on the business risks. Experience with mentoring junior resources or managing stakeholders/client Should be open-minded and ready to take up additional challenges or tasks outside your core domain expertise Skills Network Vulnerability Scanning and Penetration Testing, Web Application Penetration Testing, Mobile Application Penetration Testing, Web service/API Security Assessment, Secure Code review, AD Security Assessments, Social Engineering Assessments, Configuration Audit (Automated and Manual), Wireless Penetration Testing, Threat Modelling Qualification required-MCA/BTech /BSc ( Comp Science/Electronics and communication, or equivalent) Qualification preferred- Minimum 4+ years of IT/cyber risk consulting & penetration testing experience EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 2 weeks ago

Apply

4.0 years

0 Lacs

Kanayannur, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. The candidate would be expected to work in diverse risk consulting engagements and are willing to travel to Middle East countries for project execution atleast 60% of their time. The candidate are expected to have experience / knowledge with respect to the following: Experience with infrastructure penetration testing and vulnerability assessments Good knowledge of OWASP and Secure SDLC standards Should have performed web/mobile/API penetration testing. Good knowledge of encryption technologies & MiTM attacks Experience in performing security code reviews and log analysis. Knowledge of Linux administration, TCP/IP, DNS, Network protocols and OSI model Good understanding of MITRE ATT&CK framework and how to leverage it. Good understanding of AD administration, different authentication mechanisms, trust boundaries etc. Experience in performing security configuration reviews for OS, Databases, Network & Security devices, applications etc. Should have good understanding of the cloud services (AWS, Azure and GCP), its architecture, potential attack vectors and mitigation plans Should have good understanding of the Container services, Kubernetes auditing and LLM security Experience in performing architecture design review for network and applications Experience in performing CS audits/maturity assessments against relevant standards like SAMA CSF, NCA, NIST, NESA, Qatar Cybersecurity Framework etc. Support in conducting technical reviews as part of IT/CS audits Should hold atleast 1 of the certifications or its equivalent : OSCP, GPEN, OSWE, OSWP, CRTP, LPT, ECSA, ISO27001, CEH Hands on experience will security testing tools/frameworks like Burp Suite, Nessus, Qualys etc. Hands on experience with programming using Python/Perl/PowerShell/C# Hands on experience with setting-up phishing and performing social engineering assessments Experience with AV/NAC evasion, obfuscation, bypass windows ASR/device guard, network security controls, emails gateway filtering etc. Experience with Active directory assessments Experience with different stages of cyber kill chain Review operational logs and event console activity to determine cause of security-related events or to identify potential security related events Analysis of the patches released by the vendors Good in report writing and convey the observations to the top management in layman’s language emphasizing on the business risks. Experience with mentoring junior resources or managing stakeholders/client Should be open-minded and ready to take up additional challenges or tasks outside your core domain expertise Skills Network Vulnerability Scanning and Penetration Testing, Web Application Penetration Testing, Mobile Application Penetration Testing, Web service/API Security Assessment, Secure Code review, AD Security Assessments, Social Engineering Assessments, Configuration Audit (Automated and Manual), Wireless Penetration Testing, Threat Modelling Qualification required-MCA/BTech /BSc ( Comp Science/Electronics and communication, or equivalent) Qualification preferred- Minimum 4+ years of IT/cyber risk consulting & penetration testing experience EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 2 weeks ago

Apply

0.0 years

1 - 3 Lacs

Bengaluru

Work from Office

OPPORTUNITY OVERVIEW In this position, youll join our Platform Operations team who supports ZeroFOX's cyber security solution that helps organizations manage information security risks across social media. Your work will directly impact the success of ZeroFOX customers, partners, and pre- sales pilots, affecting the growth of our social risk management platform and its core services. This important role will have direct impact on protecting against social media threats, and give you valuable experience in the growing cyber security field. This position offers high growth potential and the opportunity to work cross-functionally with various teams throughout the organization. Successful candidates must be fluent in the English language. Role & responsibilities Fulfill a high volume of information requests Interpret, understand and act upon rules and procedures Be responsible for confidential documents Update internal stakeholders on tasking progress Track success metrics and Key Performance Indicators Preferred candidate profile Computer and social media savv Willingness to work an alternative work schedule, including partial weekends Exceptional attention to detail and thoroughness Ability to learn quickly; can grasp technical terms and concepts quickly Proficient verbal and written communication skills; able to present complex concepts in a clear, concise manner. Fluency (written and spoken) in the English language Trustworthiness, reliability and high self motivation Interest in research and customer service Must be willing to work alternative work schedule including partial weekends Huge Plus: Previous experience and / or relevant coursework in cyber security

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Security Platform Engineering Good to have skills : NA Minimum 5 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: We are seeking a skilled Security Engineer with expertise in Google Chronicle SIEM, parser development, and foundational knowledge of cybersecurity. The ideal candidate will be responsible for analyzing security data and logs, ensuring accurate aggregation, normalization, tagging, and classification. You will work closely with log sources, particularly security and networking devices, to enhance our security monitoring capabilities. Roles & Responsibilities: Conduct security and data/log analysis, focusing on the aggregation, normalization, tagging, and classification of logs. Research, analyze, and understand log sources for security monitoring, with a particular focus on security and networking devices such as firewalls, routers, antivirus products, proxies, IDS/IPS, and operating systems. Validate log sources and indexed data, optimizing search criteria to improve search efficiency. Utilize automation tools to build and validate log collectors for parsing aggregated logs. Professional & Technical Skills: Proficiency in log analysis and SIEM tools, including but not limited to Google Chronicle, Splunk, ArcSight, and QRadar. Experience in SIEM content creation and reporting is essential. Strong experience in manual security log review and analysis, such as Windows Event Log and Linux Syslog, including incident classification, investigation, and remediation. Solid understanding of multiple attack vectors, including malware, Trojans, exploit kits, ransomware, phishing techniques, and APTs, as well as familiarity with attack techniques outlined in the OWASP Top 10. Knowledge of security and networking devices, including firewalls, routers, antivirus products, proxies, IDS/IPS, and operating systems. TCP/IP networking skills for packet and log analysis. Experience working with Windows and Unix platforms. Familiarity with databases is an advantage. Experience in GCP, AWS and Azure environments is a plus. Additional Information: - The candidate should have minimum 5 years of experience in Security Platform Engineering. - This position is based at our Pune office. - A 15 years full time education is required.

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Zscaler Architecture Good to have skills : NA Minimum 3 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: We are seeking an experienced and driven Cloud Security Engineer with a strong focus on Zscaler security technologies, email security, and cloud security best practices. The ideal candidate will have a solid background in enterprise security solutions, cloud architectures, and SaaS-based security platforms. Roles & Responsibilities: - Configure, manage, and troubleshoot Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) platforms. - Design and implement security policies in Zscaler cloud firewall and proxy modules. - Monitor and enhance email security platforms (e.g., valimail, abnormal security , Microsoft Defender for Office 365). - Ensure protection against phishing, spoofing, and malware through DKIM, SPF, and DMARC implementation and tuning. - Perform cloud security posture management (CSPM) and support secure cloud migration. - Work closely with network and application teams to enforce zero trust architecture using Zscaler. - Analyze security logs, alerts, and incidents to drive continuous improvement. - Respond to security incidents and conduct RCA (Root Cause Analysis). - Support compliance and audit activities across cloud and email platforms. - Maintain documentation and assist in developing security playbooks and SOPs. Professional & Technical Skills: - Strong working knowledge of Zscaler ZIA / ZPA, including policy creation, traffic forwarding, and troubleshooting - Expertise in email security technologies (O365 ATP, DMARC, SPF, DKIM, etc.) - Good understanding of cloud platforms (Azure, AWS, GCP) and associated security models - Familiarity with SIEM, DLP, CASB, and Secure Web Gateway (SWG) - Ability to interpret logs and perform packet capture analysis (e.g., Wireshark) - Knowledge of industry standards such as NIST, ISO 27001, CIS Benchmarks - Scripting knowledge (PowerShell, Python) is a plus Additional Information: - 3+ years of hands-on experience in cloud security, email security, and network security - Preferred certifications:-Zscaler Certified Professional (ZCP/ZIA/ZPA) and Microsoft Certified: Security, Compliance, and Identity Fundamentals - This position is based at our Pune office. - A 15 years full time education is required., 15 years full time education

Posted 2 weeks ago

Apply

3.0 - 8.0 years

4 - 7 Lacs

Gurugram

Work from Office

Role & responsibilities This position is responsible for supervising all aspects of IT security, which includes: * Designing and developing security measures * Implementing security protocols * Managing incident response * Overseeing product selection * Ensuring adherence to relevant regulations This role is a mandatory work-from-office position based in our Gurgaon location, and the person in this role must be willing to work in 24/7 rotational shifts. Key responsibilities include: 1. Cybersecurity defense for endpoints and servers. 2. Investigation of alerts through SIEM, EPP, and XDR. 3. Vulnerability assessment and patch management. 4. Authorization of third-party software. 5. Collaboration with various departments to reduce risk. 6. Awareness of potential harm from new threats to network infrastructure and existing security procedures. 7. Providing security training to employees. 8. Facilitation of system and software configuration through Endpoint Management. 9. Willingness to work in a 24/7 SOC environment. Preferred candidate profile Perks and benefits

Posted 2 weeks ago

Apply

0 years

2 - 6 Lacs

Gurgaon

Remote

We’re AtkinsRéalis, a world class Engineering Services and Nuclear organization. We connect people, data and technology to transform the world's infrastructure and energy systems. Together, with our industry partners and clients, and our global team of consultants, designers, engineers and project managers, we can change the world. Created by the integration of long-standing organizations dating back to 1911, we are a world-leading professional services company dedicated to engineering a better future for our planet and its people. We deploy global capabilities locally to our clients and deliver unique end-to-end services across the whole life cycle of an asset including consulting, advisory & environmental services, intelligent networks & cybersecurity, design & engineering, procurement, project & construction management, operations & maintenance, decommissioning and capital. The breadth and depth of our capabilities are delivered to clients in key strategic sectors. News and information are available at www.atkinsrealis.com or follow us on LinkedIn. Our teams take great pride in delivering some of the world’s most prestigious projects. This success is driven by our talented people, whose diverse perspectives, expertise, and knowledge set us apart. Join us and you'll be part of our genuinely collaborative environment, where everyone is supported to make the most of their talents and expertise. When it comes to work-life balance, AtkinsRéalis is a great place to be. So, let's discuss how our flexible and remote working policies can support your priorities. We're passionate about are work while valuing each other equally. So, ask us about some of our recent pledges for Women's Equality and being a 'Disability Confident' and 'Inclusive Employer’. Job Description: Background: This position sits within the Security Support Services Team, part of the IT Security function. The Security Support Services Team is a multi-disciplinary team to support the different products and services provided by the Security function. Job Details: The Security Support Services Engineer position is a hands-on role providing a broad range of support services across the Security product set. Working within the team, you will provide support through proactive monitoring of our services, responding to alerts received via our monitoring systems, resolving incidents assigned to our queues, implementing customer requests, delivering on projects tasks, threat hunting and investigations, cloud management and system configuration. This role would suit an individual who is looking to gain experience within a 3rd line support environment and a career in Security. We are looking for someone who has experience troubleshooting issues within a large organisation. The successful candidate will be dynamic, inquisitive, analytical and be able to come up with smart solutions. We are looking for a real problem solver. Key Deliverables/Responsibilities: Management and completion of catalogue requests and project tasks assigned to the team. Responding to incidents, including root cause analysis for a “Fix Once” approach. Monitoring and triage of security related alerts and events from different monitoring systems. Security and account investigations, routing out the true root causes. Collaboration with the broader Security team, other IT functions and OEM / vendors, for problem resolution and knowledge sharing. Perform Ad hoc tasks from the Security Practices; Security Architecture, Security Architecture, Connectivity and Endpoint, Identity and Access Management. Identify and make recommendations on improvements to security processes. Adhere to ITIL best practice procedure in relation to all aspects of change and configuration management. Experience Required: Essential: Proactive work attitude, ability to work independently while still acting as part of a team. Problem solving, a desire to maintain a “Fix Once” approach. Experience with designing and writing troubleshooting guides, playbooks, knowledge base articles for support teams. Proven analytical and creative problem-solving abilities. Great communicator, ability to convey technical information in a non-technical way. Capable of providing support and training to upskill team members and support teams. Desirable: Understanding of enterprise IT. Advanced Excel skillset and familiarity of manipulating data sets. Scripting with PowerShell. Automating administration-based tasks. Knowledge of monitoring & reporting based systems, ideally SCOM / SOC Tools. Experience of triaging security events in a SIEM and identifying / analysing phishing emails Networking fundamentals and troubleshooting. Familiarity with: Phishing, Cofense, Cloud Platforms (Azure), Zscaler, Varonis, Vulnerability Management, the concept of Zero Trust, Privilege Access Management, Multi-Factor Authentication, Elastic Security, and Active Directory. Behavioural Competencies: Desire to broaden knowledge in Security technologies and practices. Focus on customer satisfaction. Strong analytical and investigative skills. Proven experience of delivering process efficiencies and improvements. Clear and fluent English (both verbal and written). Ability to build and maintain efficient working relationships with remote teams. Demonstrate ability to take ownership of and accountability for relevant products and services. Ability to plan, prioritise and complete your own work, whilst remaining a team player. Willingness to engage with and work in other technologies. What We Can Offer You: Varied, interesting and meaningful work. A hybrid working environment with flexibility and great opportunities. Opportunities for training and, as the team grows, career progression or sideways moves. An opportunity to work within a large global multi-disciplinary consultancy on a mission to change the ways we approach business as usual. Why work for AtkinsRéalis? We at AtkinsRéalis are committed to developing its people both personally and professionally. Our colleagues have the advantage of access to a high ranging training portfolio and development activities designed to help make the best of individual’s abilities and talents. We also actively support staff in achieving corporate membership of relevant institutions. Meeting Your Needs: To help you get the most out of life in and outside of work, we offer employees ‘Total Reward’. Making sure you're supported is important to us. So, if you identify as having a disability, tell us ahead of your interview, and we’ll discuss any adjustments you might need. Additional Information: We are an equal opportunity, drug-free employer committed to promoting a diverse and inclusive community - a place where we can all be ourselves, thrive and develop. To help embed inclusion for all, from day one, we offer a range of family friendly, inclusive employment policies, flexible working arrangements and employee networks to support staff from different backgrounds. As an Equal Opportunities Employer, we value applications from all backgrounds, cultures and ability. We care about your privacy and are committed to protecting your privacy. Please consult our Privacy Notice on our Careers site to know more about how we collect, use and transfer your Personal Data. Link: Equality, diversity & inclusion | Atkins India (atkinsrealis.com)

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Kozhikode, Kerala, India

On-site

We are hiring Senior Security Consultant -VAPT Specialist for our client located in Kozhikode. Position Summary As a Senior VAPT Specialist, you will be responsible for conducting comprehensive security assessments, managing client relationships, and delivering high-quality penetration testing services. You will also conduct client-side vulnerability checks for your diverse clients. These will include assessing their security postures and offering actionable recommendations to fortify their cybersecurity defenses. As a senior VAPT specialist, you will engage in tasks that include: Client Management & Communication Be the trusted security expert and advisor for your assigned clients in undertaking security assessments. Lead engaging briefings, provide status updates, and prepare effective presentations. Convert complex technical findings into insights that drive decision-making for our clients. Build relationships that not only last, but also ensure client satisfaction, trust, and value for your service-oriented projects. Document findings that guide you to derive solutions. Threat Modeling & Risk Assessment Develop comprehensive threat models for client applications and infrastructure Conduct risk assessments and prioritize security findings based on business impact Design attack scenarios and security test cases based on threat intelligence Collaborate with development teams to integrate security into SDLC processes Red Team Operations Plan and execute red team exercises to simulate real-world attack scenarios Develop custom tools and exploits for specific client environments Conduct social engineering assessments and physical security testing when required Provide post-exercise debriefings and improvement recommendations Documentation & Reporting Contribute to internal knowledge base and best practices documentation Create detailed technical reports documenting vulnerabilities, exploitation methods, and remediation steps Develop executive summaries tailored for C-level audiences Maintain accurate project documentation and testing methodologies Required Qualifications Experience & Background 3-5 years of hands-on experience in vulnerability assessment and penetration testing Proven track record of successful client engagements and project delivery Experience with enterprise-level security assessments across various industries Demonstrated ability to work independently and manage multiple projects simultaneously Technical Expertise Deep understanding of security frameworks and standards: Penetration Testing Execution Standard (PTES) OWASP Top 10 and OWASP Testing Guide SANS Top 25 Most Dangerous Software Errors NIST Cybersecurity Framework CIS Critical Security Controls MITRE ATT & CK Framework Development & Programming Experience Software Development Background: Hands-on experience in application development and an understanding of secure coding practices are highly recommended. Programming and Scripting Languages: If you’re proficient in Python and Bash, that would be an added advantage. Additional experience in PowerShell is highly appreciated. Basic knowledge in at least one compiled language (C/C++, Go, Java, or C#) Custom Tool Development: You can efficiently develop custom security tools, exploits, and automation scripts Security Tools Expertise: You’re the person who can confidently leverage security tools with expert-level proficiency, such as Burp Suite Professional, OWASP ZAP, Nmap, Nessus, OpenVAS, Metasploit, Cobalt Strike, Wireshark, tcpdump, Static analysis tools (SonarQube, Checkmarx, and Veracode), and Custom exploit development tools. Social Engineering & Phishing Expertise Social Engineering Assessments: Design social engineering tests to trigger human response to various threat scenarios. Phishing Simulations: Run phishing simulations ethically. Physical Security Testing: Perform on-site assessments through tailgating, badge cloning, and facility penetration. Awareness Training: Provide security awareness training based on assessment findings OSINT (Open Source Intelligence): Gather and analyze publicly available information for reconnaissance and social engineering preparation. Communication & Language Skills Excellent communication skills (both written and spoken) Effectively communicate complex technical concepts to non-technical stakeholders Strong presentation and public-speaking abilities Can professionally draft technical documentation and reports Professional Attributes Strong analytical and problem-solving abilities Attention to detail with a methodical approach to testing Ability to think like an attacker and anticipate security threats Commitment to ethical hacking principles and professional conduct Continuous learning mindset to stay current with emerging threats and technologies Research-Oriented Mindset: Can deep research in all efficacy to understand emerging vulnerabilities, attack vectors, and security trends. Innovation and Tool Development: Proactive approach to developing custom security tools, scripts, and methodologies for enhancing testing capabilities Creative thinking for developing novel attack scenarios and bypassing security controls Preferred Qualifications Certifications: OSCP (Added Advantage), GPEN, CRTO, and CRT Additional Experience (If any applicable) Experience with DevSecOps practices and CI/CD pipeline security Background in software development or system administration Knowledge of compliance frameworks (PCI DSS, HIPAA, GDPR, SOC2, ISO 27001) Experience with threat intelligence platforms and indicators of compromise Familiarity with containerization security (Docker, Kubernetes) Previous consulting or client-facing experience Location: Govt. Cyberpark, Calicut Experience: 3 – 5 Years Be it undertaking vulnerability assessment or performing in-depth penetration testing, your role as a senior VAPT consultant highly counts when it comes to safeguarding our clients’ critical assets by detecting threats and closing security gaps – proactively and efficiently. Where confidence, knowledge, and aptitude combine to effectively undertake high-profile security tests like ethical hacking, it is these qualities that we expect from you for the concerned role. Contact us if you believe you aptly fit in this role.

Posted 2 weeks ago

Apply

8.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Job Purpose: The Network person is responsible for the smooth functioning and upkeep of the IT infrastructure (including software and hardware) at RE. Position Overview: Location: Chennai Position Title: Deputy Manager - Network Reports to: Information Technology - Functional Head Function: Information Technology What you’ll do: Network Architecture and Planning: Suggest architecture of Royal Enfield Network to Infra Head Stay updated on new technology and its implications to ROYAL ENFIELD Network. Keep Network Architecture (WAN, LAN, Cloud, Wifi) and other related documents updated Deploy necessary tools to monitor the network. Review LAN architectures of Data Center, Plants, HQ, Warehouse, offices etc Maintain EOS and EOL of all devices and suggest timely replacements Participate/Manage network projects with external vendors. Capacity Management: Continually reviewing current service capacity and service performance Ensuring Team follow the right approach while installing new network devices in production. There should be thorough review of system resources and discussion before deployment. Sufficient sizing of network links should be done well in advance to avoid unexpected performance issues or resource crunch. Propose upgradation/ changes in system resources if any to Infra Head well in advance Availability Management: All mission Critical network devices should be configured in high availability. HA Failover testing half yearly/ yearly or based on business need Ensuring the Backup of all critical network devices are done as per defined policy. Network Links review every week to see SLAs of service providers. Oversee usage of Tools to monitor network availability. Configuration management: Manage configuration of all network devices Execute changes and configuration as required POC and Upgrade of network devices after getting approvals from Infra Head Keep backup of configurations. IT Infra Processes compliance and Documentation of core domain: Ensuring up to date SOPs uploaded on portals for network team operations. Develop and maintain documents of Network and security devices Assisting in designing and implementation of the Infrastructure support processes and policies Identify and facilitate training programs for IT teams to improve productivity of IT tools. Operations management: Supervise the daily operations of any future NOC and FMS network team/security domain leads. Analysis of network traffic flow and take appropriate improvement actions wherever needed Escalate and report the exceptions to Infra Head. Technical Support: Technical support to be given to CMS domain leads wherever they stuck, Provide L3 / L4 Support on network and security devices and Conclude RCA Do analysis and prepare RCAs for major incidents and submit to Infra head. Make sure proper handover to be given at the time of replacement of domain leads. Security and Patch Management: Ensure upgradation of firmware’s and other security updates on all critical network devices on a Quarterly basis. This include testing of patches on test environment and then pushing to production environment Hardening of Network device as per standards. Ensure updating all security devices like Firewall’s OS on latest firmware, IPS, IDS with latest signatures on all internet firewalls. Quarterly review of Vulnerability Assessment Scan and closure penetration testing of all Network critical devices). Test and VAPT scan data center devices before setting up in the production environment. Do activities for Infra compliance for ISO27001 security standards Log management Event log analyzer: Review logs as per the access management. Analyzing logs and try to find out a pattern of the vulnerability. Check for suspicious contents accessed by any user. Real Time Review multiple login failures, command executed on the firewall etc. 100% capturing of Admin Activities / Task (internal / FMS Team) done on Network devices. Any changes made in system without approval can be tracked down Real time analyzing of events logs generated out of the system - to ensure the system is free of Bots, Phishing activities, Virus. Backup of Log analysis for Audit requirement IT Change Management: Operates as the Change Manager for IT network changes. Support Infra Head on completion of Changes authorized. What you'll bring: Experience: Network Technical Lead having 8+ years overall experience in managing Network Infrastructure. He should have a s trong understanding of the following technologies. Qualification: BE/BTech/MCA/ Diploma in Systems / engineering Cisco Switching (L3 Experience 3-5 years) Cisco Catalyst 2k, 3k, 9k series switches like Cisco 2900, 3500, 3750, 3650, 3850, 9300, 9500 & Cisco Nexus 2k, 7k and 9k series switches Cisco Wireless (L3 Experience 3 years) Wireless: Cisco 2k, 3k, 5k and 8k series WLC wireless controller Fortigate Firewall (L3 Experience 3-5 years) Configuring Firewall, Policy creation, Installing & Managing Fortinet firewall 80F, 100F, 200F, 600F, 1000F 1800F, 3000F etc. Fortinet SD WAN (L3 Experience 3 years) Additional Skills set : Experience 2-3 years Load balancer SD Access - Cisco DNA Network Automation Tools IT/OT convergence Ready to Join Us? Apply via our website today. Join our trailblazing team and be a part of our legacy! “So why wait? Join us and experience the freedom of embracing the road, riding with pure motorcycling passion.”

Posted 2 weeks ago

Apply

4.0 - 1.0 years

0 Lacs

Surat, Gujarat

On-site

Surat, Gujarat Work Type: Full Time About Company: Casepoint provides full eDiscovery capabilities through a powerful, secure, cloud-based platform. We are repeatedly chosen by leading law firms and multinational corporations for their largest matters. On an upward trajectory for almost a decade, Casepoint is looking to expand its team globally. Team cooperation, “work hard, play hard” attitude, open communication, and kindness mark Casepoint’s culture. Number of positions currently vacant: 01 Position Summary: We are seeking an experienced Security Lead with demonstrated expertise across both Blue Team (defensive operations, detection, and response) and Red Team (offensive security, penetration testing, and adversary simulation) domains. This leadership role will design, implement, and manage comprehensive security strategies to enhance our organization's cyber resilience, proactively identify vulnerabilities, and ensure regulatory compliance. Key job responsibilities: Leadership & Strategic Planning Develop and execute security strategies aligning with business goals. Lead a multidisciplinary team of security analysts and engineers across Blue Team and Red Team functions. Establish metrics-driven frameworks to assess, mature, and report security posture to executive leadership and stakeholders. Blue Team – Defensive Operations Oversee Security Operations Center (SOC) activities, including SIEM/SOAR tuning, advanced threat detection, and incident response playbook development. Perform continuous monitoring, threat hunting, and vulnerability management to proactively mitigate risks. Lead forensic investigations, root cause analysis, and recovery processes post-incident to strengthen organizational defenses. Red Team – Offensive Operations Plan and execute adversary emulation exercises, penetration tests, and social engineering campaigns to evaluate real-world security gaps. Develop and maintain custom tools and scripts to simulate evolving threat actor TTPs (MITRE ATT&CK framework). Provide actionable remediation recommendations and collaborate with Blue Team to enhance detection and response capabilities based on Red Team findings. Innovation & Continuous Improvement Drive adoption of advanced security solutions including AI/ML-based threat detection, EDR/XDR optimization, and blockchain for data integrity where applicable. Evaluate and implement emerging security technologies to maintain a proactive security posture against APTs and evolving attack vectors. Required skills & experience Education: Bachelor’s or Master’s degree in Cybersecurity, Information Security, Computer Science, or related field. Certifications (preferred but not mandatory) Offensive Security: OSCP, OSCE, OSEP, CRTO, or equivalent Defensive Security: GCIA, GCED, GCIH, or equivalent Leadership & Strategy: CISSP, CISM, CCSP Experience Minimum 4 years of progressive experience in cybersecurity with at least 1 year in a leadership or technical lead role. Proven track record in managing Blue Team operations (SOC, SIEM, IR) and conducting Red Team assessments (external/internal pentests, phishing campaigns, adversary emulation). Deep understanding of threat intelligence, MITRE ATT&CK, cyber kill chain, and Purple Team methodologies. Desired Skills Expert in EDR, SIEM (Splunk, Elastic, Graylog), SOAR, and vulnerability management tools. Strong scripting skills (Python, PowerShell, Bash) for automation and tool development. Familiarity with container and cloud security (Kubernetes, Docker, AWS/Azure security services). Excellent communication and stakeholder management abilities, including executive reporting. Compensation & culture: Excellent culture produces an excellent product. We value our team members, so we provide a nurturing environment of camaraderie. We recognize talent with competitive compensation and career empowerment. Location: Surat, India

Posted 2 weeks ago

Apply

0.0 - 12.0 years

0 Lacs

Saidapet, Chennai, Tamil Nadu

On-site

Job Information Date Opened 07/18/2025 Job Type Full time City Saidapet State/Province Tamil Nadu Country India Zip/Postal Code 600096 Industry Technology Job Description Job Title: Cybersecurity Consultant Job Summary: The Cybersecurity Consultant is responsible for evaluating and strengthening the organization's cybersecurity posture across systems, networks, and user environments. This role involves conducting detailed audits, delivering threat intelligence and analysis, and developing incident response improvement plans. The consultant ensures that all cybersecurity practices align with national regulations and industry standards, helping the organization mitigate risks and maintain robust digital resilience. Key Responsibilities: Cybersecurity Audits & Assessments: Perform in-depth audits of IT systems, network infrastructure, and user access controls. Identify vulnerabilities, misconfigurations, and compliance gaps. Provide actionable recommendations to enhance security posture. Threat Analysis & Intelligence: Monitor and analyze emerging cyber threats and attack vectors. Conduct forensic investigations and root cause analysis of security incidents. Develop threat models and risk assessments to inform security strategies. Incident Response & Recovery Planning: Design and implement incident response frameworks and playbooks. Collaborate with internal teams to improve detection, containment, and recovery capabilities. Conduct post-incident reviews and update response protocols accordingly. Compliance & Regulatory Alignment: Ensure cybersecurity practices comply with national regulations and standards (e.g., NIST, ISO 27001, GDPR). Prepare documentation and reports for audits and regulatory reviews. Support certification and accreditation processes. Security Architecture & Best Practices: Advise on secure system and network architecture design. Promote adoption of best practices in identity management, encryption, and endpoint protection. Support implementation of Zero Trust and other modern security models. Training & Awareness: Conduct cybersecurity awareness sessions for employees and stakeholders. Develop training materials and simulate phishing or breach scenarios. Foster a culture of security across the organization. Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Information Security, Computer Science, or related field. Professional certifications such as CISSP, CISM, CEH, or equivalent. Proven experience in cybersecurity consulting, threat analysis, and incident response. Strong understanding of security frameworks, regulatory requirements, and risk management Excellent analytical, communication, and problem-solving skills. 8-12 years of relevant experience in IT Requirements We request the provision of the following resources on a priority basis for an upcoming engagement. These consultants are expected to operate independently as Subject Matter Experts (SMEs) within their respective domains, demonstrating proficiency across multiple technologies. The assignment will be on-site and is expected to extend for more than 12 months. The client will provide all the necessary logistical support required for the on-site deployment. We are looking forward to your confirmation and your support in mobilising these resources. City within KSA - Job will be based in Jeddah, but the resources need to go Makkah and Madina as and when needed

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Hyderabad, Telangana, India

Remote

We are united in our mission to make a positive impact on healthcare. Join Us! South Florida Business Journal, Best Places to Work 2024 Inc. 5000 Fastest-Growing Private Companies in America 2024 2024 Black Book Awards, ranked #1 EHR in 11 Specialties 2024 Spring Digital Health Awards, “Web-based Digital Health” category for EMA Health Records (Gold) 2024 Stevie American Business Award (Silver), New Product and Service: Health Technology Solution (Klara) Who We Are We Are Modernizing Medicine (WAMM)! We’re a team of bright, passionate, and positive problem-solvers on a mission to place doctors and patients at the center of care through an intelligent, specialty-specific cloud platform. Our vision is a world where the software we build increases medical practice success and improves patient outcomes. Founded in 2010 by Daniel Cane and Dr. Michael Sherling, we have grown to over 3400 combined direct and contingent team members serving eleven specialties, and we are just getting started! ModMed's global headquarters is based in Boca Raton, FL, with a growing office in Hyderabad, India, and a robust remote workforce across the US, Chile, and Germany. RCM Payer Inbound Services Specialist, is responsible to answer the Inbound payer calls, clarify the queries and update/resolve the issues at account level. Also coordinate with multiple functions within RCM to ensure towards end resolution . Roles And Responsibilities Responds to Inbound Payer calls most professionally. They are responsible for taking the information and providing the necessary insights to Payer representatives Updating the necessary information in the patient account and fixing the same as and when it is required and deemed fit Coordinate with the respective RCM departments to ensure issue is resolved/updated Tracking the details/updates and cascade the same with RCM department Review the trend and suggest process level changes in order to reduce the communication and bring efficiency Escalate any issues which are reported by the payers with the respective Team and Manager in order to reduce the recurrences Experience And Qualifications Bachelor’s degree (Graduation in any stream would suffice) Minimum 5+ years of experience in Provider RCM out of which at least 2 years as a Subject Matter Expert on resolving Claims independently through inbound/ outbound payer Calls ModMed Benefits Highlight: At ModMed, we believe it’s important to offer a competitive benefits package designed to meet the diverse needs of our growing workforce. Eligible Modernizers can enroll in a wide range of benefits: India Meals & Snacks: Enjoy complimentary office lunches & dinners on select days and healthy snacks delivered to your desk, Insurance Coverage: Comprehensive health, accidental, and life insurance plans, including coverage for family members, all at no cost to employees, Allowances: Annual wellness allowance to support your well-being and productivity, Earned, casual, and sick leaves to maintain a healthy work-life balance, Bereavement leave for difficult times and extended medical leave options, Paid parental leaves, including maternity, paternity, adoption, surrogacy, and abortion leave, Celebration leave to make your special day even more memorable, and company-paid holidays to recharge and unwind. United States Comprehensive medical, dental, and vision benefits, including a company Health Savings Account contribution, 401(k): ModMed provides a matching contribution each payday of 50% of your contribution deferred on up to 6% of your compensation. After one year of employment with ModMed, 100% of any matching contribution you receive is yours to keep. Generous Paid Time Off and Paid Parental Leave programs, Company paid Life and Disability benefits, Flexible Spending Account, and Employee Assistance Programs, Company-sponsored Business Resource & Special Interest Groups that provide engaged and supportive communities within ModMed, Professional development opportunities, including tuition reimbursement programs and unlimited access to LinkedIn Learning, Global presence and in-person collaboration opportunities; dog-friendly HQ (US), Hybrid office-based roles and remote availability for some roles, Weekly catered breakfast and lunch, treadmill workstations, Zen, and wellness rooms within our BRIC headquarters. PHISHING SCAM WARNING: ModMed is among several companies recently made aware of a phishing scam involving imposters posing as hiring managers recruiting via email, text and social media. The imposters are creating misleading email accounts, conducting remote "interviews," and making fake job offers in order to collect personal and financial information from unsuspecting individuals. Please be aware that no job offers will be made from ModMed without a formal interview process, and valid communications from our hiring team will come from our employees with a ModMed email address (first.lastname@modmed.com). Please check senders’ email addresses carefully. Additionally, ModMed will not ask you to purchase equipment or supplies as part of your onboarding process. If you are receiving communications as described above, please report them to the FTC website.

Posted 2 weeks ago

Apply

8.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Who We Are Addepar is a global technology and data company that helps investment professionals provide the most informed, precise guidance for their clients. Hundreds of thousands of users have entrusted Addepar to empower smarter investment decisions and better advice over the last decade. With client presence in more than 50 countries, Addepar’s platform aggregates portfolio, market and client data for over $7 trillion in assets. Addepar’s open platform integrates with more than 100 software, data and services partners to deliver a complete solution for a wide range of firms and use cases. Addepar embraces a global flexible workforce model with offices in New York City, Salt Lake City, Chicago, London, Edinburgh, Pune, and Dubai. The Role We are currently seeking a Senior Business/Product Analyst to join our Business Analytics team! Our team is passionate about empowering everyone to make data-driven decisions about product design, client management, and business priorities. We play an important role in ensuring people’s valuable time and efforts are spent on solving the right problem the right way. You will develop a keen understanding of our clients, products, and product development workflows. You will use your curiosity and analytical skills to support major company initiatives, from defining and monitoring success metrics, dissecting user behaviors, and gathering and analyzing additional data to support decisions along the way. What You’ll Do Collaborate with product, engineering and business partners to understand data needed to make product, design and prioritization decisions Assess data availability and quality, and work with data engineers to ensure required data sets are extracted and transformed, if needed, for analysis Analyze and visualize data to generate actionable insights for business partners Present your findings and recommendations to your business partners Enable self-service monitoring of key metrics through good dashboard experience, documentation and business partner training Who You Are At least 8+ years of experience in a business and/or product analytics role 3+ years of experience building reports and dashboards with BI or reporting tools such as Looker (Preferred) OR Power BI, Tableau, etc. Solid understanding of SQL, python and other analytics programming languages Excellent communication (verbal, written and visual) and storytelling skills Experience working with business partners from a broad range of business teams including product development is highly desirable Passion for seeking insights, developing and telling a story with data Readiness to learn new technologies and systems Familiarity with the financial industry a plus Important Note - This role requires working from our Pune office 3 days a week (Hybrid work model) Our Values Act Like an Owner - Think and operate with intention, purpose and care. Own outcomes. Build Together - Collaborate to unlock the best solutions. Deliver lasting value. Champion Our Clients - Exceed client expectations. Our clients’ success is our success. Drive Innovation - Be bold and unconstrained in problem solving. Transform the industry. Embrace Learning - Engage our community to broaden our perspective. Bring a growth mindset. In addition to our core values, Addepar is proud to be an equal opportunity employer. We seek to bring together diverse ideas, experiences, skill sets, perspectives, backgrounds and identities to drive innovative solutions. We commit to promoting a welcoming environment where inclusion and belonging are held as a shared responsibility. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. PHISHING SCAM WARNING: Addepar is among several companies recently made aware of a phishing scam involving con artists posing as hiring managers recruiting via email, text and social media. The imposters are creating misleading email accounts, conducting remote “interviews,” and making fake job offers in order to collect personal and financial information from unsuspecting individuals. Please be aware that no job offers will be made from Addepar without a formal interview process. Additionally, Addepar will not ask you to purchase equipment or supplies as part of your onboarding process. If you have any questions, please reach out to TAinfo@addepar.com.

Posted 2 weeks ago

Apply

8.0 years

0 Lacs

Cochin

Remote

About KnowBe4 KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, is used by tens of thousands of organizations around the globe. KnowBe4 enables organizations to manage the ongoing problem of social engineering by helping them train employees to make smarter security decisions, every day. Fortune has ranked us as a best place to work for women, for millennials, and in technology for four years in a row! We have been certified as a "Great Place To Work" in 8 countries, plus we've earned numerous other prestigious awards, including Glassdoor's Best Places To Work. Our team values radical transparency, extreme ownership, and continuous professional development in a welcoming workplace that encourages all employees to be themselves. Whether working remotely or in-person, we strive to make every day fun and engaging; from team lunches to trivia competitions to local outings, there is always something exciting happening at KnowBe4. Please submit your resume in English. This individual in this role is responsible for developing new and exciting products for KnowBe4's customers, alongside other engineers in a fast-paced, agile development environment. Responsibilities: Develops software using the KnowBe4 Software Development Lifecycle and Agile Methodologies Recommends solutions to engineering problems Assist other team members by providing technical direction Defines approaches and solutions to complex technical problems Helps to translate KnowBe4's strategic goals into operational plans Provides coordination across functional boundaries May act as team lead for sub-projects Requirements: BS or equivalent plus 8 years experience MS or equivalent plus 3 years experience Ph.D. or equivalent plus 2 years experience Training in secure coding practices (preferred) Our Fantastic Benefits We offer company-wide bonuses based on monthly sales targets, employee referral bonuses, adoption assistance, tuition reimbursement, certification reimbursement, certification completion bonuses, and a relaxed dress code - all in a modern, high-tech, and fun work environment. For more details about our benefits in each office location, please visit www.knowbe4.com/careers/benefits. Note: An applicant assessment and background check may be part of your hiring procedure. Individuals seeking employment at KnowBe4 are considered without prejudice to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, sexual orientation or any other characteristic protected under applicable federal, state, or local law. If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please visit www.knowbe4.com/careers/request-accommodation. No recruitment agencies, please.

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Summary Position Summary Red Team —Consultant 2 - Solution Delivery Advisor Deloitte’s CyberRiskServices helpourclientstobesecure,vigilant,andresilientinthefaceofanever-increasing array of cyber threats and vulnerabilities. Our Cyber Risk practice helps organizations with the management of information and technology risks by delivering end-to-end solutions using proven methodologies and tools in a consistent manner.Ourserviceshelporganizationsto address,in atimelymanner,pervasiveissues,suchasidentity theft, data security breaches, data leakage, cyber security, and system outages across organizations of various sizes and industries with the goal of enabling ongoing, secure, and reliable operations across the enterprise. Deloitte’s Cyber Risk Services have been recognized as a leader by a number of independent analyst firms. Kennedy Consulting Research & Advisory, a leading analyst firm, recently named Deloitte a global leader in cyber security consulting. Source: Kennedy Consulting Research & Advisory; Cyber Security Consulting 2013; Kennedy Consulting Research & Advisory estimates © 2013 Kennedy Information, LLC. Reproduced under license. Workyouwill do Works on projects with clearly defined guidelines as team member with responsibility for project delivery Works on the projects with clearly defined guidelines such as standard operating procedures Adhers to Service Level Agreements Works under general supervision with few direct instructions Performs development and customization work on larger security and data protection technology implementation projects Understands basic business and information technology management processes. Demonstrates knowledge of firm apposes methodologies, frameworks and tools (required) Participate in practice development initiatives The Team Deloitte’s Red Team is a standardized process, to help clients combat today’s growing array of system threats. We help organizations assess their infrastructure, networks and application environments to identify vulnerabilities and controlweaknesses.Wedevelopanddeploythetechnicalandarchitecturalimprovementsnecessarytoreduceattack exposure OurApplicationandVulnerabilityManagementserviceshelporganizationsidentifythetechnicalandarchitectural improvements needed to minimize exposure to attacks. With our customized methodology, we assess the many aspects of risk to support identification of both internal and external facing threats. Required: - Core Skills: Strong communication skills (written & verbal) Understanding of basic business and information technology management processes Knowledge and understanding of Dev-Sec-Ops Vulnerability Management, Threat Management, Penetration testing, Mobile Testing, Red Teaming, Phishing. Experience with tools related to the domains mentioned above Experienced in one or more of the above areas (as the career progresses) Deep knowledge of commonly used protocols such as TCP/IP, DNS Understanfing of ITIL and ITSM Understaing of SANS TOP 25 Additional Skills Familiarity with industry standards and frameworks such as OWASP, CIS, NIST ISO/IEC 17799, etc. Assist clients with discovering vulnerabilities and rogue assets (such as shadow IT) in their networks as part of a team of engineers and analysts around the world who specialize in the tactics, tools and procedures used by cyber criminals. Configure and execute vulnerability scans enumerating vulnerabilities within the internal and external network. Analyze, enrich and prioritize specific activities designed to remediate discovered vulnerabilities such as patch deployment or configuration hardening. Assist in producing a comprehensive operating picture and cyber security situational awareness. Work with various vulnerability threat feeds (such as vendor bulletins), assessment tools, asset inventory tools as well as reporting tools and frameworks to match assets to identified vulnerabilities and produce reports. Respond to requests for ad-hoc reporting and research topics from management and analysts as required. Identify gaps in available asset information and engage with leadership on strategies to meet service-level requirements through affirmative handoff with remediation partners. Quickly understand and deliver on company and customer requirements Aid in and participate in daily, weekly, quarterly, and yearly production reporting for clients, partners, and internal teams Adhere to internal operational security and other Understanding of common network infrastructure devices such as routers and switches Understanding of basic networking protocols such as TCP/IP, DNS, HTTP Understanding of vulnerability classification using National Vulnerability Database nomenclature such as CVE/CVSS Basic knowledge in system security architecture and security solutions Mandatory Certification - CEH, Security+ Preffered Certification: OSCP, OSWP, CRTO, CREST Certified Certified Web Application Tester, OSCE, CREST Certified Simulated Attack Specialist, CREST Certified Certified Simulated Attack Specialist), AWS Security Speciaist, CKE, Certified Information Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc. Preferred: B. E / B.Tech (Tier 2 or 3)/ M.S in any engineering discipline; 3-5 years of cyber risk services experience. Proven ability to emulate sophisticated adversary tactics, techniques, and procedures (TTPs) to identify and exploit weaknesses in organizational defenses. Familiarity with red teaming methodologies, offensive security tools, and frameworks such as MITRE ATT&CK. Experience with tools like Cobalt Strike, Metasploit, and Empire for command and control, exploitation, and lateral movement within environments. Proficiency in scripting languages like Python, PowerShell, or Bash for automation and custom tool creation. Knowledge of evasion techniques to bypass antivirus (AV), endpoint detection and response (EDR), and network monitoring tools. Strong understanding of privilege escalation, lateral movement, and persistence mechanisms in both Windows and Linux environments. Hands-on experience conducting phishing campaigns, social engineering attacks, and delivering payloads via HTML smuggling or other covert techniques. Ability to assess and manipulate Active Directory configurations, conduct password spraying, and exploit common misconfigurations. Strong knowledge of reverse engineering tools such as IDA Pro and Ghidra for analyzing malware or binaries. Excellent ability to create detailed post-engagement reports and recommendations for improving detection and response capabilities. Knowledge of operational security (OpSec) best practices to avoid detection during adversarial engagements. Ability to think creatively in developing offensive strategies and adapting to blue team defenses. Strong desire to continuously learn emerging attack vectors and defensive countermeasures. Outstanding communication skills, with the ability to explain offensive security techniques to both technical and non-technical stakeholders. Howyouwill Grow At Deloitte,we have invested a great deal to create arich environment in whichour professionals can grow.We want all ourpeopleto developin their own way,playingto theirown strengthsastheyhonetheirleadershipskills.And,as a part of our efforts, we provide our professionals with a variety of learning and networking opportunities—including exposuretoleaders,sponsors,coaches,andchallengingassignments—tohelpacceleratetheircareersalongtheway. No two people learn in exactly the same way. So, we provide a range of resources, including live classrooms, team-based learning,and eLearning.Deloitte University(DU):The LeadershipCenter in India,our state-of-the-art, world-class learning centerin the Hyderabad office, is an extension of the DU in Westlake, Texas, and represents a tangiblesymbolofourcommitmenttoourpeople’sgrowthanddevelopment. ExploreDU:TheLeadershipCenterin India . Benefits AtDeloitte,weknowthatgreatpeoplemakeagreatorganization.Wevalueourpeopleandofferemployeesabroad range of benefits. Learn more about what working at Deloitte can mean for you. Deloitte’s culture Our positive and supportive culture encourages our people to do their best workeveryday. We celebrate individuals by recognizing their uniqueness and offering them the flexibility to make daily choices that can help them to be healthy,centered,confident,andaware.Weofferwell-beingprogramsandarecontinuouslylookingfornewwaysto maintainaculturethatisinclusive,invitesauthenticity,leveragesourdiversity,andwhereourpeopleexcelandlead healthy, happy lives. Learn more about Life at Deloitte. Corporate citizenship Deloitte is led by a purpose: to make an impact that matters. This purpose defines who we are and extends to relationshipswithourclients,ourpeople,andourcommunities.Webelievethatbusinesshasthepowertoinspireand transform.We focus on education,giving,skill-basedvolunteerism,and leadership to help drive positive social impact in our communities. Learn more about Deloitte’s impact on the world. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Professional development At Deloitte, professionals have the opportunity to work with some of the best and discover what works best for them. Here, we prioritize professional growth, offering diverse learning and networking opportunities to help accelerate careers and enhance leadership skills. Our state-of-the-art DU: The Leadership Center in India, located in Hyderabad, represents a tangible symbol of our commitment to the holistic growth and development of our people. Explore DU: The Leadership Center in India . Benefits To Help You Thrive At Deloitte, we know that great people make a great organization. Our comprehensive rewards program helps us deliver a distinctly Deloitte experience that helps that empowers our professionals to thrive mentally, physically, and financially—and live their purpose. To support our professionals and their loved ones, we offer a broad range of benefits. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Requisition code: 300420

Posted 2 weeks ago

Apply

7.0 - 9.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Summary Position Summary Red Team — Senior Consultant 2 – Senior Solution Delivery Lead Deloitte’s CyberRiskServices helpourclientstobesecure,vigilant,andresilientinthefaceofanever-increasing array of cyber threats and vulnerabilities. Our Cyber Risk practice helps organizations with the management of information and technology risks by delivering end-to-end solutions using proven methodologies and tools in a consistent manner.Ourserviceshelporganizationsto address,in atimelymanner,pervasiveissues,suchasidentity theft, data security breaches, data leakage, cyber security, and system outages across organizations of various sizes and industries with the goal of enabling ongoing, secure, and reliable operations across the enterprise. Deloitte’s Cyber Risk Services have been recognized as a leader by a number of independent analyst firms. Kennedy Consulting Research & Advisory, a leading analyst firm, recently named Deloitte a global leader in cyber security consulting. Source: Kennedy Consulting Research & Advisory; Cyber Security Consulting 2013; Kennedy Consulting Research & Advisory estimates © 2013 Kennedy Information, LLC. Reproduced under license. Workyouwill do Manages Cyber Threat Management projects, guides the team on a day-to-day basis and ensures that assigned tasks and responsibilities are fulfilled in a timely fashion Demonstrates understanding of complex business and information technology management processes Interacts with clients, managers and partners to build and nurture strong relationships Tailors firm tools and methodologies as per client requirements Assists in implementing standard operating procedures Adheres to Service Level Agreements Identified opportunities for service optimization Evaluates, counsels, mentors and provides feedback on performance of others Manages day-to-day client relationships with their direct client contacts at a minimum at appropriate management levels Participates in proposal development efforts to sell quot;add-on quot; work to clients Identifies opportunities to improve engagement economics Lead practice development initiatives The Team Deloitte’s Red Team is a standardized process, to help clients combat today’s growing array of system threats. We help organizations assess their infrastructure, networks and application environments to identify vulnerabilities and controlweaknesses.Wedevelopanddeploythetechnicalandarchitecturalimprovementsnecessarytoreduceattack exposure OurApplicationandVulnerabilityManagementserviceshelporganizationsidentifythetechnicalandarchitectural improvements needed to minimize exposure to attacks. With our customized methodology, we assess the many aspects of risk to support identification of both internal and external facing threats. Required: - Core Skills: Advanced communication skills (written and verbal) with experience delivering high-level technical presentations, detailed engagement reports, and executive briefings to stakeholders and leadership teams. Proven ability to design and execute complex red team operations, providing tactical and strategic guidance for enhancing organizational security posture through actionable insights. Comprehensive project management skills, with experience in leading large-scale offensive security engagements from inception to execution, including coordinating cross-functional teams. Expert-level understanding of threat analysis, enterprise-level defense mechanisms, and advanced mitigation strategies, with a focus on bridging offensive techniques with defensive improvements. Hands-on experience in bypassing complex security defenses such as firewalls, EDR, IDS/IPS, SIEM solutions (e.g., Splunk, QRadar, ArcSight), using cutting-edge evasion techniques. Extensive knowledge of cyber kill chains, advanced multi-stage attack scenarios, and the ability to execute sophisticated adversarial campaigns using real-world TTPs. Deep expertise in reverse engineering, malware analysis, and exploiting vulnerabilities to uncover security flaws within complex infrastructures. Strong knowledge of cloud security (AWS, Azure, GCP) and demonstrated ability to conduct adversarial simulations targeting cloud-based environments. Advanced knowledge of operating systems (Windows/Linux) and networking technologies critical to red team operations, with the ability to exploit system misconfigurations and weaknesses. Mastery of adversarial simulation tools like Cobalt Strike, Sliver, Metasploit, Empire, Nessus, nmap, Qualys, and Tenable, with the capability to customize attack vectors. Mandatory Certifications - OSCP, OSWP, GPEN, OSCE, CRTO, GXPN, CREST Certified Simulated Attack Specialist Preferred Certifications - OSCE3, OSWE, OSEP, OSED, CREST Certified Simulated Attack Specialist, SABSA, AWS Security Specialist Proven experience leading red teaming, purple teaming, and Breach Attack Simulations (BAS) at the enterprise level, simulating advanced persistent threats (APTs) to assess security defenses. Expertise in spear-phishing campaigns, HTML smuggling, payload delivery mechanisms, and opsec strategies to evade detection throughout engagements. Deep understanding of advanced attack frameworks like MITRE ATT&CK and SANS Top 25, using them to design tailored attack scenarios specific to client environments. In-depth knowledge of EDR/AV evasion techniques, privilege escalation, lateral movement, and persistence in both on-premise and hybrid cloud infrastructures. Ability to architect, deploy, and optimize custom Red Team/Offensive Security solutions, including managing command and control infrastructure, payload obfuscation, and real-time response actions. Ability to manage cross-functional teams across red, blue, and purple engagements, fostering collaboration and improving overall security resilience through continuous improvement cycles. High-level proficiency in strategic planning, engaging with leadership to define security objectives, risk prioritization, and translating technical findings into business-centric solutions. Strong knowledge of attack surface management and vulnerability management, with experience discovering and analyzing hidden or misconfigured assets, especially shadow IT. Advanced OpSec and tradecraft knowledge, ensuring red team engagements are conducted without exposing tools or tactics to detection, while continuously adapting methods to outpace blue team defenses. As a Senior Solutions Delivery Lead, you will lead the charge in adversarial simulation operations, pushing the boundaries of offensive security capabilities. You will: Architect and lead advanced red team engagements, simulating the tactics, tools, and techniques used by sophisticated threat actors to test client defenses. Conduct multi-phase, coordinated attack campaigns, including phishing simulations, exploitation of vulnerabilities, and covert lateral movement across complex environments. Develop and optimize adversarial simulation tactics, ensuring constant evolution of red team methodologies in response to emerging threats. Provide in-depth reports and post-engagement briefings with a focus on strategic remediation advice that aligns with organizational security goals. Oversee the red team infrastructure, ensuring all tools, C2 systems, and exploit frameworks are continually updated and configured for optimal effectiveness. Lead purple team exercises, working closely with blue teams to collaboratively improve detection, response, and mitigation strategies in real time. Remain at the forefront of offensive security innovations, guiding the team through new techniques, tools, and adversarial simulations to enhance effectiveness. Ensure OpSec best practices are strictly followed to avoid detection during engagements and protect the integrity of the red team toolkit. Collaborate with clients and stakeholders to review attack scenarios, findings, and deliver customized security enhancements tailored to their specific business risks. Preferred: B. E / B.Tech / M.S in any engineering discipline; 7-9 years of cyber risk services experience. Proven ability to emulate sophisticated adversary tactics, techniques, and procedures (TTPs) to identify and exploit weaknesses in organizational defenses. Familiarity with red teaming methodologies, offensive security tools, and frameworks such as MITRE ATT&CK. Experience with tools like Cobalt Strike, Metasploit, and Empire for command and control, exploitation, and lateral movement within environments. Proficiency in scripting languages like Python, PowerShell, or Bash for automation and custom tool creation. Knowledge of evasion techniques to bypass antivirus (AV), endpoint detection and response (EDR), and network monitoring tools. Strong understanding of privilege escalation, lateral movement, and persistence mechanisms in both Windows and Linux environments. Hands-on experience conducting phishing campaigns, social engineering attacks, and delivering payloads via HTML smuggling or other covert techniques. Ability to assess and manipulate Active Directory configurations, conduct password spraying, and exploit common misconfigurations. Strong knowledge of reverse engineering tools such as IDA Pro and Ghidra for analyzing malware or binaries. Excellent ability to create detailed post-engagement reports and recommendations for improving detection and response capabilities. Knowledge of operational security (OpSec) best practices to avoid detection during adversarial engagements. Ability to think creatively in developing offensive strategies and adapting to blue team defenses. Strong desire to continuously learn emerging attack vectors and defensive countermeasures. Outstanding communication skills, with the ability to explain offensive security techniques to both technical and non-technical stakeholders. Howyouwill Grow At Deloitte,we have invested a great deal to create arich environment in whichour professionals can grow.We want all ourpeopleto developin their own way,playingto theirown strengthsastheyhonetheirleadershipskills.And,as a part of our efforts, we provide our professionals with a variety of learning and networking opportunities—including exposuretoleaders,sponsors,coaches,andchallengingassignments—tohelpacceleratetheircareersalongtheway. No two people learn in exactly the same way. So, we provide a range of resources, including live classrooms, team-based learning,and eLearning.Deloitte University(DU):The LeadershipCenter in India,our state-of-the-art, world-class learning centerin the Hyderabad office, is an extension of the DU in Westlake, Texas, and represents a tangiblesymbolofourcommitmenttoourpeople’sgrowthanddevelopment. ExploreDU:TheLeadershipCenterin India . Benefits AtDeloitte,weknowthatgreatpeoplemakeagreatorganization.Wevalueourpeopleandofferemployeesabroad range of benefits. Learn more about what working at Deloitte can mean for you. Deloitte’s culture Our positive and supportive culture encourages our people to do their best workeveryday. We celebrate individuals by recognizing their uniqueness and offering them the flexibility to make daily choices that can help them to be healthy,centered,confident,andaware.Weofferwell-beingprogramsandarecontinuouslylookingfornewwaysto maintainaculturethatisinclusive,invitesauthenticity,leveragesourdiversity,andwhereourpeopleexcelandlead healthy, happy lives. Learn more about Life at Deloitte. Corporate citizenship Deloitte is led by a purpose: to make an impact that matters. This purpose defines who we are and extends to relationshipswithourclients,ourpeople,andourcommunities.Webelievethatbusinesshasthepowertoinspireand transform.We focus on education,giving,skill-basedvolunteerism,and leadership to help drive positive social impact in our communities. Learn more about Deloitte’s impact on the world. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Professional development At Deloitte, professionals have the opportunity to work with some of the best and discover what works best for them. Here, we prioritize professional growth, offering diverse learning and networking opportunities to help accelerate careers and enhance leadership skills. Our state-of-the-art DU: The Leadership Center in India, located in Hyderabad, represents a tangible symbol of our commitment to the holistic growth and development of our people. Explore DU: The Leadership Center in India . Benefits To Help You Thrive At Deloitte, we know that great people make a great organization. Our comprehensive rewards program helps us deliver a distinctly Deloitte experience that helps that empowers our professionals to thrive mentally, physically, and financially—and live their purpose. To support our professionals and their loved ones, we offer a broad range of benefits. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Requisition code: 306123

Posted 2 weeks ago

Apply

8.0 years

0 Lacs

Kochi, Kerala, India

Remote

About KnowBe4 KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, is used by tens of thousands of organizations around the globe. KnowBe4 enables organizations to manage the ongoing problem of social engineering by helping them train employees to make smarter security decisions, every day. Fortune has ranked us as a best place to work for women, for millennials, and in technology for four years in a row! We have been certified as a "Great Place To Work" in 8 countries, plus we've earned numerous other prestigious awards, including Glassdoor's Best Places To Work. Our team values radical transparency, extreme ownership, and continuous professional development in a welcoming workplace that encourages all employees to be themselves. Whether working remotely or in-person, we strive to make every day fun and engaging; from team lunches to trivia competitions to local outings, there is always something exciting happening at KnowBe4. Please submit your resume in English. This individual in this role is responsible for developing new and exciting products for KnowBe4’s customers, alongside other engineers in a fast-paced, agile development environment. Responsibilities Develops software using the KnowBe4 Software Development Lifecycle and Agile Methodologies Recommends solutions to engineering problems Assist other team members by providing technical direction Defines approaches and solutions to complex technical problems Helps to translate KnowBe4's strategic goals into operational plans Provides coordination across functional boundaries May act as team lead for sub-projects Requirements BS or equivalent plus 8 years experience MS or equivalent plus 3 years experience Ph.D. or equivalent plus 2 years experience Training in secure coding practices (preferred) Our Fantastic Benefits We offer company-wide bonuses based on monthly sales targets, employee referral bonuses, adoption assistance, tuition reimbursement, certification reimbursement, certification completion bonuses, and a relaxed dress code - all in a modern, high-tech, and fun work environment. For more details about our benefits in each office location, please visit www.knowbe4.com/careers/benefits. Note: An applicant assessment and background check may be part of your hiring procedure. Individuals seeking employment at KnowBe4 are considered without prejudice to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, sexual orientation or any other characteristic protected under applicable federal, state, or local law. If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please visit www.knowbe4.com/careers/request-accommodation. No recruitment agencies, please.

Posted 2 weeks ago

Apply

0 years

0 Lacs

India

Remote

About Us Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos’ complete portfolio includes industry-leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com. Role Summary Malware Researcher? Red/Blue/Purple team member? We have a fantastic opportunity here at Sophos Labs for a Threat Researcher role to join our global team of Behavioural Protection engineers, to hunt, to research, and to add real-time protection for suspicious activity across our customer environments. Our team of skilled security experts combine their passion to detect & disrupt cyber-attacks with their capability to develop protection rules that can cut through the noise in modern computing environments to tease out attacker’s nefarious activities. You are intrinsically motivated to understand the core logic behind malware and hacking attacks, to find & predict new ways attackers will modify their techniques and take great satisfaction in developing robust protection logic that is immune to evasive actions. You will be responsible for writing behavioural protection rules that are able to block malicious activities across all types of TTP (even if a Mitre Technique doesn’t exist yet). This is the foundation of Sophos next-gen approach. Above all - you enjoy thinking creatively; combining your deep technical knowledge, your tenacity for innovation, and your can-do attitude to solve complex and challenging problems on daily basis. Additionally, you will also be supporting our remediation effort to remove artifacts left behind, by writing clean-up rules, and supporting our Sandbox development, such as (but not limited to) creating signatures, identifying evasion techniques that prevent the sandbox from running the threat smoothly. What You Will Do Conduct in-depth behavioural analysis of Windows threats Develop Behavioural rules for various threat behaviours including hands-on keyboard attack, malware payloads, initial attack vectors and Advanced Persistent Threats (APTs) Produce quality threat analysis reports for both internal and external audience Assist in sandbox improvements by analysing malware that hinders the sandbox environment in running the threat, which deploys various anti-analysis techniques Develop Clean-up rules to remove artifacts that are left behind by the behavioural protection rules Collaborate with other cross-functional teams to improve behavioural protection capability based on the threat analysis Guide and train junior team members in assisting malware analysis, peer code review Assist in the development of tools wherever necessary to improve day-to-day task What You Will Bring 8+ yrs of strong knowledge of Windows Internals including Memory management, Processes, Threads Proficiency in both static and dynamic analysis of threats, using tools such as IDAPro, WinDbg Demonstrated programming experience. Preferred: Python, Lua Excellent communication skills with the ability to demonstrate complex technical problem to peer researchers as well as to product engineering team Excellent analytical and problem-solving skills with the ability to think strategically and creatively Bachelor’s degree in computer software (Computer Security preferable) or equivalent experience #B2 Ready to Join Us? At Sophos, we believe in the power of diverse perspectives to fuel innovation. Research shows that candidates sometimes hesitate to apply if they don't check every box in a job description. We challenge that notion. Your unique experiences and skills might be exactly what we need to enhance our team. Don't let a checklist hold you back – we encourage you to apply. What's Great About Sophos? · Sophos operates a remote-first working model, making remote work the primary option for most employees. However, some roles may necessitate a hybrid approach. Please refer to the location details in our job postings for further information. · Our people – we innovate and create, all of which are accompanied by a great sense of fun and team spirit · Employee-led diversity and inclusion networks that build community and provide education and advocacy · Annual charity and fundraising initiatives and volunteer days for employees to support local communities · Global employee sustainability initiatives to reduce our environmental footprint · Global fitness and trivia competitions to keep our bodies and minds sharp · Global wellbeing days for employees to relax and recharge · Monthly wellbeing webinars and training to support employee health and wellbeing Our Commitment To You We’re proud of the diverse and inclusive environment we have at Sophos, and we’re committed to ensuring equality of opportunity. We believe that diversity, combined with excellence, builds a better Sophos, so we encourage applicants who can contribute to the diversity of our team. All applicants will be treated in a fair and equal manner and in accordance with the law regardless of gender, sex, gender reassignment, marital status, race, religion or belief, color, age, military veteran status, disability, pregnancy, maternity or sexual orientation. We want to give you every opportunity to show us your best self, so if there are any adjustments we could make to the recruitment and selection process to support you, please let us know. Data Protection If you choose to explore an opportunity, and subsequently share your CV or other personal details with Sophos, these details will be held by Sophos for 12 months in accordance with our Privacy Policy and used by our recruitment team to contact you regarding this or other relevant opportunities at Sophos. If you would like Sophos to delete or update your details at any time, please follow the steps set out in the Privacy Policy describing your individual rights. For more information on Sophos’ data protection practices, please consult our Privacy Policy Cybersecurity as a Service Delivered | Sophos

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Level Up Your Career with Zynga! At Zynga, we bring people together through the power of play. As a global leader in interactive entertainment and a proud label of Take-Two Interactive, our games have been downloaded over 6 billion times—connecting players in 175+ countries through fun, strategy, and a little friendly competition. From thrilling casino spins to epic strategy battles, mind-bending puzzles, and social word challenges, our diverse game portfolio has something for everyone. Fan-favorites and latest hits include FarmVille™, Words With Friends™, Zynga Poker™, Game of Thrones Slots Casino™, Wizard of Oz Slots™, Hit it Rich! Slots™, Wonka Slots™, Top Eleven™, Toon Blast™, Empires & Puzzles™, Merge Dragons!™, CSR Racing™, Harry Potter: Puzzles & Spells™, Match Factory™, and Color Block Jam™—plus many more! Founded in 2007 and headquartered in California, our teams span North America, Europe, and Asia, working together to craft unforgettable gaming experiences. Whether you're spinning, strategizing, matching, or competing, Zynga is where fun meets innovation—and where you can take your career to the next level. Join us and be part of the play! Position Overview As an LCM Supervisor, you will be responsible to plan and optimize Lifecycle Programs to drive Customer Engagement and User Retention across multiple games and genres. This position requires you to be data-driven, and focus on automation, optimization, and implementation of LCM best practices. You will be a Lifecycle Team representative in cross-functional and strategy meetings and set team objectives in line with the BU objectives. What You'll Do Manage a team of Lifecycle Specialists. Take ownership of specific game genres and business verticals, driving annual growth targets. Develop execution plans of the broader strategies for owned games. Manage team goals, ensuring roadmap completion through effective people management. Monitor day-to-day tasks to ensure timely execution of LCM initiatives, playing a crucial role in team efficiency. Serve as the primary problem solver for LCM Specialists, including tasks like overseeing template setup, audience segmentation, campaign deployment, A/B testing, and reporting. Plan and analyze A/B tests to enhance retention, engagement, conversion rate, and customer loyalty. Identify key user segments for targeted programs to maximize ROI and impact KPIs. Collaborate cross-functionally with Production, Product, Marketing, Analytics, and Support teams to craft personalized customer journeys. Lead post-campaign reporting, fostering transparency with stakeholders. Document, QA, launch, and measure both evergreen and experimental campaigns, establishing a scalable, repeatable optimization process Implementation of best practices for sustained channel health. Be analytical, critical, and offer data driven recommendations. What You Bring Bachelor’s degree 3+ years of relevant experience in CRM or Lifecycle Marketing roles (B2C only) 1+ years of managerial experience Technical knowledge of HTML, SQL, and Content Management Systems like Braze/Leanplum/Moengage. CMS Tool integration experience is preferred Must have experience in warming up new IPs and monitoring domain reputation Technical knowledge of Email, Push, SMS, and IAMs – deliverability, optimization, and best practices. Self-starter with ability to thrive under pressure in a fast-paced environment Strong communication, copywriting, organizational and project management skills Attention to detail Team-first attitude Passion for games What We Offer You Zynga offers a world-class benefits package that helps support and balance the needs of our teams. To find out more about our benefits, visit the Zynga Benefits We are proud to be an equal opportunity employer, which means we are committed to creating and celebrating diverse thoughts, cultures, and backgrounds throughout our organization. Employment with us is based on substantive ability, objective qualifications, and work ethic – not an individual’s race, creed, color, religion, sex or gender, gender identity or expression, sexual orientation, national origin or ancestry, alienage or citizenship status, physical or mental disability, pregnancy, age, genetic information, veteran status, marital status, status as a victim of domestic violence or sex offenses, reproductive health decision, or any other characteristics protected by applicable law. As an equal opportunity employer, we are committed to providing the necessary support and accommodation to qualified individuals with disabilities, health conditions, or impairments (subject to any local qualifying requirements) to ensure their full participation in the job application or interview process. Please contact us at accommodationrequest@zynga.com to request any accommodations or for support related to your application for an open position. Please be aware that Zynga does not conduct job interviews or make job offers over third-party messaging apps such as Telegram, WhatsApp, or others. Zynga also does not engage in any financial exchanges during the recruitment or onboarding process, and will never ask a candidate for their personal or financial information over an app or other unofficial chat channel. Any attempt to do so may be the result of a scamp or phishing attack, and you should not engage. Zynga’s in-house recruitment team will only contact individuals through their official Company email addresses (i.e., via a zynga.com, naturalmotion.com, smallgiantgames.com, themavens.com, gram.gs email domain).

Posted 2 weeks ago

Apply

3.0 - 6.0 years

0 Lacs

Navi Mumbai, Mumbai (All Areas)

Work from Office

Responsiblities: Lead Engineer - Email gateway Reports to Senior Manager/Architect location) University degree in the field of computer science or IT. This role involves acting as primary point of contact for operational tickets resolution, enhancing, email security measures and providing document support. Experience/Qualifications * The ideal candidate will have a strong background in email security and vendor collaboration. * Must possess patching experience as well as upgrade and update and implementation of email gateways * Mandatory skills are Email authentication spf, dkim. dmarc also should be aware of spam, phishing, spoofing * Should possess basic networking and dns records knowledge Act as a primary point of contact for resolving operational tickets related to Trend micro email gateway which specifically includes ddei and imsva Daily monitoring reports for services, resource optimization, patching and Responsibilities upgrade activity. Rca preparation for mail flow issues Provide full email analysis for spam, spoofing,phishing, malware etc. Manage and maintaining server resources for email gateway Desired Skill: Mandatory skills are Email authentication spf, dkim.dmarc also should be aware of spam, phishing, spoofing Must possess patching experience as well as upgrade and update and implementation of email gateways Rca preparation for mail flow issues

Posted 2 weeks ago

Apply

0 years

0 Lacs

Hyderābād

On-site

Job requisition ID :: 85200 Date: Jul 14, 2025 Location: Hyderabad Designation: Assistant Manager Entity: Deloitte Touche Tohmatsu India LLP Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organisations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks Your work profile As Assistant Manager in our Cyber Team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - Key Responsibilities & Desired qualifications We are seeking an experienced and proactive L2 SOC Analyst with expertise in SOAR Playbook development. The candidate will be responsible for managing, developing, and enhancing automation and orchestration workflows within SOAR. Key Requirements: Develop and maintain playbooks in SOAR for automated threat detection and response. Integrate various security tools (SIEM, EDR, threat intel feeds, etc.) into SOAR. Create custom automations/scripts using Python and XSOAR’s automation engine. Tune and optimize existing playbooks for performance, accuracy, and false positive reduction. Document playbook logic, automation scripts, and incident handling procedures. Provide mentorship and support to L1 analysts and contribute to SOC knowledge sharing. Strong hands-on experience with Cortex XSOAR and playbook development. Familiarity with Python scripting for automation in SOAR. Working knowledge of SIEM tools (e.g., Splunk, QRadar, Elastic). Good understanding of cybersecurity concepts: malware, phishing, MITRE ATT&CK, etc. Strong analytical and problem-solving skills. Ability to work independently and as part of a team in a fast-paced environment. Preferred Qualifications: Knowledge of incident response frameworks (NIST, SANS). SOAR Certified Automation Engineer. Location and way of working Base location: Hyderabad Professional is required to work from office Your role as Senior Execuive We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society. In addition to living our purpose, Senior Executive across our organization must strive to be: Inspiring - Leading with integrity to build inclusion and motivation Committed to creating purpose - Creating a sense of vision and purpose Agile - Achieving high-quality results through collaboration and Team unity Skilled at building diverse capability - Developing diverse capabilities for the future Persuasive / Influencing - Persuading and influencing stakeholders Collaborating - Partnering to build new solutions Delivering value - Showing commercial acumen Committed to expanding business - Leveraging new business opportunities Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization Effective communication – Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s) Managing change - Responding to changing environment with resilience Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviours and attitudes to become more inclusive. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome… entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution. In this regard, you may refer to a more detailed advisory given on our website at: https://www2.deloitte.com/in/en/careers/advisory-for-career-aspirants.html?icid=wn_

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies