Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 5.0 years
6 - 7 Lacs
Chennai
Work from Office
Responsible for identifying, assessing, and mitigating security vulnerabilities through automated and manual penetration testing. Develops remediation plans, conducts security audits, and ensures compliance with industry standards. Expertise in vulnerability scanners, ethical hacking, and cybersecurity frameworks is required.
Posted 1 month ago
2.0 - 7.0 years
5 - 11 Lacs
Bengaluru
Hybrid
Preferred candidate profile OWASP methodologies application is a mandatory. 2 4-year experience in IT Security minimum University degree, preferably in Computer Science with spec. in IT Security Exceptional communication and advocacy skills, both verbal and written, with the ability to express complex technical issues in an easily understood manner. Curious and highly implicated in IT Security Team player Experience working in an international and complex financial environment, dealing with both business constraints and IT users across countries. Good knowledge of Security scanning tools like Qualys, Nexpose, Appspider is highly appreciated along with good understanding of Kubernetes. Experience in a multi-cultural environment is appreciated. CEH or Any Security certifications are appreciated. Experience in Development languages and scripting is appreciated.
Posted 1 month ago
2.0 - 7.0 years
5 - 11 Lacs
Mumbai, Navi Mumbai, Mumbai (All Areas)
Hybrid
Preferred candidate profile OWASP methodologies application is a mandatory. 2 4-year experience in IT Security minimum Experience working in an international and complex financial environment, dealing with both business constraints and IT users across countries. Good knowledge of Security scanning tools like Qualys, Nexpose, Appspider is highly appreciated along with good understanding of Kubernetes. CEH or Any Security certifications are appreciated. Experience in Development languages and scripting is appreciated.
Posted 1 month ago
3.0 years
0 Lacs
India
Remote
Need an Immediate Joiner!! Position: Senior Systems Engineer(CrowdStrike) Location: Remote Duration: Fulltime Hire (40 hours per week) Multi Year Contract This role is going to be WFH, flexible working hours. Job Description: Server Remediation Static code analysis Vulnerability Management for Software Development SONARQube for Security testing. Automation: IAAC/IAAS This position will be operations-focused, directly supporting IT teams with vulnerability remediation, coordination, tracking mitigation efforts, managing security exceptions, and providing management reporting. Specifically looking for a consultant or technical specialist who will handle end-to-end vulnerability management across our critical IT applications and infrastructure. Key responsibilities include: Analysing scan results, assessing exploitability, and prioritizing remediation based on criticality, CVSS scores, and business impact. Collaborating with IT, DevOps, SME’s and system owners to validate and verify remediation efforts. Developing and maintaining dashboards and reports to track remediation progress for management updates. Assisting with patch validation, system hardening, and misconfiguration remediation. Maintaining and improving vulnerability management policies and procedures. Required qualifications: Atleast 3+ years of experience in vulnerability management or related cybersecurity role. Proficiency with vulnerability scanning tools (e.g., Nessus, Qualys, CrowdStrike) . Strong understanding of cloud environments (AWS, Azure, GCP). Experience with scripting languages like Python or PowerShell.
Posted 1 month ago
10.0 - 15.0 years
5 - 8 Lacs
Hyderabad
Work from Office
We have Immediate Openings on VulnerabilityManagement Contract to Hire role for multiple clients. Job Details Skills VulnerabilityManagement JD Primary & Secondary Skills Vulneribility ManagementQualys GuardQualys AgentPolicy ComplianceVulneribilty Scanning RESPONSIBILITIES Perform vulnerability assessment using leading Vulnerability Scanning solutions like Qualys, Microsoft Defender, etc. Perform vulnerability assessments on On-prem, Cloud hosted systems, container (like Docker & Kubernetes), databases, web services and other widely deployed infrastructure components. Perform false positive validation and ensure delivery of quality reports. Act as a technical SME to analyse the vulnerability results & detection logic. Provide technical advice and support on remediation to infrastructure / application support teams. Manage & Implement approved scan exclusions based on the request from platform support teams. Review findings and identify root causes for common issues and provide recommendations for sustainable improvements. Responsible to maintain vulnerability quality assurance by building VM team technical knowledge base. Research and report on security vulnerabilities and latest advancements in the vulnerability management lifecycle. Understand security policies, procedures and guidelines to all levels of management and staff. Communicate effectively orally and in writing and establish cooperative working relationships. Provide suggestion to improve vulnerability Management service based on current trends in information technology (Network, system security software and hardware). Act as line manager in the absence of team lead. People and Talent Minimum 6 years of experience in Information security and preferably in Banking and Financial services sector Good understanding and Implementation experience on Enterprise Network Security Architecture and Enterprise Network Design. In-depth working experience on Cloud technologies, routers, switches, firewalls, load balancers and proxy will be added advantage for the role. Bachelor Degree in Engineering, Computer Science/Information Technology or its equivalent. Industry certifications will be a plus e.g. CISSP, CCNA Security, CCIE, CCNP Security, CISA, CRISC and CISM. Strong knowledge and subject matter expertise in multiple areas within Information Security. Hands on skill and expertise in performing risk / threat assessments/risk consulting. Excellent written, oral communication and reporting skills. Provides technical leadership, expertise and direction working with district and college technical staff for design and implementation of information technology security systems. Develops strategy for propagating, maintaining, and measuring compliance against security policies, standards, and guidelines district-wide. Time management and organizational skills Ability and desire to learn new skills quickly Performs other related duties as assigned. Risk Management Key StakeholdersClick here to enter text. Other ResponsibilitiesClick here to enter text. COMPETENCIESS FRAMEWORKGrow Self Applicable for all roles.Action OrientedTaking on new opportunities and tough challenges with a sense of urgency, energy and enthusiasm.CollaboratesBuilding partnerships and working collaboratively with others to meet shared objectives.CourageStepping up to address difficult issues and saying what needs to be said.Customer FocusBuilding strong customer relationships and delivering customer-centric solutions.Instils TrustGaining the confidence and trust of others through honesty, integrity and authenticity.Nimble LearningActively learning through experimentation when tackling new problems. Using both successes and failures as a learning factor d integration tasks. If you are interested in, please share the update profile with below details. Current CTC Expected CTC Notice Period Total Experience Relevant Experience
Posted 1 month ago
8.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
We are the leading provider of professional services to the middle market globally, our purpose is to instill confidence in a world of change, empowering our clients and people to realize their full potential. Our exceptional people are the key to our unrivaled, inclusive culture and talent experience and our ability to be compelling to our clients. You’ll find an environment that inspires and empowers you to thrive both personally and professionally. There’s no one like you and that’s why there’s nowhere like RSM. Bachelor or Master degree in computer science with a minimum of 8 years in cyber security domain Technical background in networking/system administration, security testing or related fields In-depth knowledge of TCP/IP Two or more years of Perl, Python, Bash, or C experience Operating System Configuration and Security experience (Windows, HP-UX, Linux, Solaris, AIX, etc.) Configuration and Security experience with firewalls, switches, routers, VPNs Experience with security and architecture testing and development frameworks, such as the Open Web Application Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), Information Systems Security Assessment Framework (ISSAF), and NIST SP800-115 Familiar with security testing techniques such as threat modeling, network discovery, port and service identification, vulnerability scanning, network sniffing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing, fuzzing, and password cracking and can perform these techniques from a variety of adversarial perspectives (white-, grey-, black-box) Experience with discovering, utilizing, and possibly writing exploits for such vulnerabilities as buffer and stack overflows Familiar with the logistics of security testing such as acquiring authorization for testing, reporting, risk analysis of findings, data handling, and legal considerations Commercial Application Security tools experience (Nessus, Nexpose, Qualys, Appdetective, Appscan, etc.) Open source and free tools experience (Kali Linux suite, Metasploit, nmap, airsnort, Wireshark, Burp Suite, Paros, etc.) One or more of the following testing certifications: Certified Ethical Hacker (CEH); GIAC Certified Penetration Tester (GPEN); Offensive Security Certified Professional (OSCP); or equivalent development or testing certification (ECSA, CEPT, CPTE, CPTS, etc) In addition, one or more of the following governance certifications is preferred: Certified Information Systems Security Professionals® (CISSP®); Certified Information Systems Auditor® (CISA®); Certified Information Security Manager® (CISM®) Strong leadership and communication skills, technical knowledge, and the ability to write at a "publication" quality level in order to communicate findings and recommendations to the client's senior management Must possess a high degree of integrity and confidentiality, as well as the ability to adhere to both company policies and best practices The standard work hours for this role are from 3:30 PM to 11:00 PM IST, aligned to support client requirements and deliverables and engagements. Candidates should be comfortable with this fixed shift timing Position & Key Responsibilities Develop an understanding of the RSM US Risk Consulting service offerings, methodologies, and tools Perform analysis and testing to verify the strengths and weaknesses of client IT environments utilizing commercial and open source security testing tools Perform Internet penetration testing (blackbox/ greybox / whitebox testing) and network architecture reviews (manual/ automated) Perform other security testing tasks such as wireless penetration testing, social engineering campaigns (email, web, phone, physical, etc.), mobile application testing, embedded device testing, and similar activities meant to identify critical weaknesses within client environments Assist with the development of remediation recommendations for identified findings Identify and clearly articulate (written and verbal) findings to senior management and clients Help identify improvement opportunities for assigned clients Supervise and provide engagement management for other staff working on assigned engagements Works closely with the client and RSM team to make sure we meet or exceed client expectations on each engagement and maintain high customer satisfaction. Exercise professional skepticism, judgment and adhere to the code of ethics while on engagements Ensure that documentation is compliant with the quality standards of the firm Work collaboratively as a part of the team and communicate effectively with RSM consulting professionals, and senior management in the U.S. on a daily basis Key Skills To Accelerate Career Maintains a high degree of quality and client relationship on multiple clients at the same time Positively engages, motivates and influences team members Identifies client needs/requirements and initiates discussion to expand services through a solid understanding of the firm’s service capabilities and offerings Subscribes to and actively read industry publications and share relevant information with clients as considered applicable At RSM, we offer a competitive benefits and compensation package for all our people. We offer flexibility in your schedule, empowering you to balance life’s demands, while also maintaining your ability to serve clients. Learn more about our total rewards at https://rsmus.com/careers/india.html. RSM does not tolerate discrimination and/or harassment based on race; colour; creed; sincerely held religious beliefs, practices or observances; sex (including pregnancy or disabilities related to nursing); gender (including gender identity and/or gender expression); sexual orientation; HIV Status; national origin; ancestry; familial or marital status; age; physical or mental disability; citizenship; political affiliation; medical condition (including family and medical leave); domestic violence victim status; past, current or prospective service in the Indian Armed Forces; Indian Armed Forces Veterans, and Indian Armed Forces Personnel status; pre-disposing genetic characteristics or any other characteristic protected under applicable provincial employment legislation. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process and/or employment/partnership. RSM is committed to providing equal opportunity and reasonable accommodation for people with disabilities. If you require a reasonable accommodation to complete an application, interview, or otherwise participate in the recruiting process, please send us an email at careers@rsmus.com.
Posted 1 month ago
6.0 - 11.0 years
4 - 8 Lacs
Hyderabad
Work from Office
Immediate Openings on Security Consultants with Vulnerability _Contract_Pan India 6+ Years Security Consultants with Vulnerability Pan India Period :Immediate. Type Contract Description 7 + Years Security Consultants with Vulnerability tools exp like Qualys or Tenable (prefer Qualys) and ServiceNow. Experience with Vulnerability tools such as Qualys or Tenable (prefer Qualys) and ServiceNow .
Posted 1 month ago
8.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Job Description: About Us At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day. One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We’re devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being. Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization. Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us! Global Business Services Global Business Services delivers Technology and Operations capabilities to Lines of Business and Staff Support Functions of Bank of America through a centrally managed, globally integrated delivery model and globally resilient operations. Global Business Services is recognized for flawless execution, sound risk management, operational resiliency, operational excellence and innovation. In India, we are present in five locations and operate as BA Continuum India Private Limited (BACI), a non-banking subsidiary of Bank of America Corporation and the operating company for India operations of Global Business Services. Process Overview* Global Information Security (GIS) functions by analyzing, researching, improving, defining, implementing, and executing information security processes defined, in large part, by past high profile audit issues. Key responsibilities include Data Quality management of closed manually identified P2 vulnerabilities, developing an understanding of the LOBs that report vulnerabilities via manual flat file to GIS, following standard practices and procedures in analyzing situations or data, and supporting team members in performing specialized GIS functions, primarily Data Quality assurance. Job expectations include partnering with teams inside, and outside, of GIS, inclusive of GIS, CTI, EET, APS&E, GT Risk, and others. Job Description* This job is responsible for supporting Global Information Security (GIS) functions by analyzing, researching, improving, defining, implementing, and executing information security controls and standards. Key responsibilities include developing an understanding of the business, validating remediation of manually reported. CVE vulnerabilities, engaging with Qualys vendor support, following standard practices and procedures in analyzing situations or data, creating and updating semi-technical Quality Control vulnerability related documentation, and supporting team members in performing specialized GIS functions. Job expectations include partnering with team to provide blended security and business insights to ensure appropriate management of information security risks. Responsibilities* Vulnerability Management NVD / NIST / Discovery / CMDB Remedy / other SOR tool usage Visio Flowcharting Product Version Interpretation Understands CVE Vulnerability Data Leads Meetings / Coordinates across Stakeholders Controls Management Data Governance Risk Management Requirements* Education* : B.E. / B Tech / M.E. / M Tech / MCA / M.Sc., Certifications (If Any) : ISO 27001 LA, Ethical Hacking Experience Range* : 8+ Years Foundational Skills: Experience in Vulnerability Management/Assessment Experience in Product Version Interpretation Strong understanding of CVE/CSS/CWE Understanding of Stakeholder Engagements Understanding of Compliance and Governance Experience in Information Security Management Experience in Governance, Risk & Compliance Excellent written/verbal communication skills Desired Skills: Knowledge in Vulnerability Assessment Vulnerability Remediation Strong Technical knowledge Work Timings* : 1:30 PM - 10:30 PM Job Location* : Chennai, Hyderabad
Posted 1 month ago
4.0 years
0 Lacs
Delhi
On-site
Job Description: VAPT lead with experience in vulnerability assessment and penetration testing is preferred The resource should mandatorily have minimum 4 Years experience in VAPT Responsible for planning executing and managing infrastructure level vulnerability assessments and penetration testing activities across the organization s IT landscape Key Responsibilities: Lead and manage end to end Vulnerability Assessment and Penetration Testing VAPT activities across infrastructure components including networks servers endpoints and cloud environments Design and implement VAPT strategies tailored to organizational risk profiles and compliance requirements Conduct thorough assessments to identify security vulnerabilities simulate attack scenarios and evaluate the effectiveness of existing security controls Collaborate with infrastructure network and application teams to validate findings and support remediation efforts Prepare detailed technical reports and executive summaries outlining identified risks impact analysis and recommended mitigation strategies Ensure VAPT activities align with industry standards such as ISO 27001 NIST OWASP and CIS Benchmarks Maintain up to date knowledge of emerging threats tools and techniques in the vulnerability assessment and penetration testing domain Technical Requirements: Proven experience in conducting infrastructure level Vulnerability Assessment and Penetration Testing VAPT across networks servers endpoints and cloud environments Strong hands on expertise with VAPT tools such as Nessus Qualys Nmap Metasploit Burp Suite etc In depth understanding of network protocols system configurations and common vulnerabilities in enterprise IT environments Ability to identify analyze and prioritize security vulnerabilities and provide detailed remediation guidance to technical teams Preferred Skills: Technology->Application Security->Vulnerability Management
Posted 1 month ago
8.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Job Description: About Us At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day. One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We’re devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being. Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization. Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us! Global Business Services Global Business Services delivers Technology and Operations capabilities to Lines of Business and Staff Support Functions of Bank of America through a centrally managed, globally integrated delivery model and globally resilient operations. Global Business Services is recognized for flawless execution, sound risk management, operational resiliency, operational excellence and innovation. In India, we are present in five locations and operate as BA Continuum India Private Limited (BACI), a non-banking subsidiary of Bank of America Corporation and the operating company for India operations of Global Business Services. Process Overview* Global Information Security (GIS) functions by analyzing, researching, improving, defining, implementing, and executing information security processes defined, in large part, by past high profile audit issues. Key responsibilities include Data Quality management of closed manually identified P2 vulnerabilities, developing an understanding of the LOBs that report vulnerabilities via manual flat file to GIS, following standard practices and procedures in analyzing situations or data, and supporting team members in performing specialized GIS functions, primarily Data Quality assurance. Job expectations include partnering with teams inside, and outside, of GIS, inclusive of GIS, CTI, EET, APS&E, GT Risk, and others. Job Description* This job is responsible for supporting Global Information Security (GIS) functions by analyzing, researching, improving, defining, implementing, and executing information security controls and standards. Key responsibilities include developing an understanding of the business, validating remediation of manually reported. CVE vulnerabilities, engaging with Qualys vendor support, following standard practices and procedures in analyzing situations or data, creating and updating semi-technical Quality Control vulnerability related documentation, and supporting team members in performing specialized GIS functions. Job expectations include partnering with team to provide blended security and business insights to ensure appropriate management of information security risks. Responsibilities* Vulnerability Management NVD / NIST / Discovery / CMDB Remedy / other SOR tool usage Visio Flowcharting Product Version Interpretation Understands CVE Vulnerability Data Leads Meetings / Coordinates across Stakeholders Controls Management Data Governance Risk Management Requirements* Education* : B.E. / B Tech / M.E. / M Tech / MCA / M.Sc., Certifications (If Any) : ISO 27001 LA, Ethical Hacking Experience Range* : 8+ Years Foundational Skills: Experience in Vulnerability Management/Assessment Experience in Product Version Interpretation Strong understanding of CVE/CSS/CWE Understanding of Stakeholder Engagements Understanding of Compliance and Governance Experience in Information Security Management Experience in Governance, Risk & Compliance Excellent written/verbal communication skills Desired Skills: Knowledge in Vulnerability Assessment Vulnerability Remediation Strong Technical knowledge Work Timings* : 1:30 PM - 10:30 PM Job Location* : Chennai, Hyderabad
Posted 1 month ago
5.0 - 6.0 years
0 Lacs
Mumbai, Maharashtra, India
Remote
About Godrej Agrovet Godrej Agrovet Limited (GAVL) is a diversified, Research & Development focused agri-business Company dedicated to improving the productivity of Indian farmers by innovating products and services that sustainably increase crop and livestock yields. GAVL holds leading market positions in the different businesses it operates - Animal Feed, Crop Protection, Oil Palm, Dairy, Poultry and Processed Foods. GAVL has a pan India presence with sales of over a million tons annually of high-quality animal feed and cutting- edge nutrition products for cattle, poultry, aqua feed and specialty feed. Our teams have worked closely with Indian farmers to develop large Oil Palm Plantations which is helping in bridging the demand and supply gap of edible oil in India. In the crop protection segment, the company meets the niche requirement of farmers through innovative agrochemical offerings. GAVL through its subsidiary Astec Life Sciences Limited, is also a business-to-business (B2B) focused bulk manufacturer of fungicides & herbicides. In Dairy and Poultry and Processed Foods, the company operates through its subsidiaries Creamline Dairy Products Limited and Godrej Tyson Foods Limited. Apart from this, GAVL also has a joint venture with the ACI group of Bangladesh for animal feed business in Bangladesh. For more information on the Company, please log on to www.godrejagrovet.com . Designation Location Mumbai Job Purpose We are seeking a highly skilled and experienced IT & OT Infrastructure, Data, and Applications Security Manager to lead the security strategy and implementation for IT & OT (Operational Technology) environments. This role is responsible for ensuring that critical infrastructure, network systems, and applications are secure from cyber threats while ensuring operational continuity in both the IT and OT domains. The position requires a deep understanding of both IT and OT security frameworks, as well as an ability to collaborate with cross-functional teams to safeguard digital assets and operations. Roles & Responsibilities IT & OT Infrastructure Security: Develop, implement, and maintain security policies, procedures, and controls to protect IT & OT infrastructure components, including servers, networks, industrial control systems (ICS), SCADA, and cloud environments. Collaborate with IT teams to ensure secure integration between IT and OT systems, addressing the unique security requirements of each domain. Conduct regular risk assessments, vulnerability scans, and penetration tests to identify and mitigate threats in IT & OT infrastructures. Manage the security of industrial networks, SCADA systems, and IIoT (Industrial Internet of Things) devices to prevent cyber threats and ensure safe operations. Implement and maintain security for cloud services, on-premises data centers, and critical OT assets, ensuring compliance with industry standards. Data Security: Implement data encryption, tokenization, and masking techniques to protect sensitive and proprietary data across systems, databases, and storage devices. Oversee data classification processes and ensure data protection in compliance with legal and regulatory requirements (GDPR, CCPA, HIPAA, etc.). Ensure proper data backup, disaster recovery, and business continuity planning related to data security. Conduct data loss prevention (DLP) assessments and implement preventative controls. Manage access control policies for databases and ensure segregation of duties for sensitive information. Network Security: Develop and maintain robust network security architecture for IT & OT networks, ensuring protection against unauthorized access, data breaches, and cyber-attacks. Monitor and analyze network traffic and logs to detect potential threats, vulnerabilities, and anomalous activities across IT & OT networks. Implement network segmentation to isolate IT and OT environments while ensuring controlled data exchange between systems. Configure and manage firewalls, intrusion detection/prevention systems (IDS/IPS), and secure VPNs to protect networks from external and internal threats. Manage secure communication channels for IT/OT devices and ensure the proper functioning of secure remote access protocols for IT/OT systems. Applications Security: Lead the implementation of secure application development practices for OT applications. Work with development and OT engineering teams to incorporate secure coding practices into OT software systems. Conduct regular security assessments and code reviews for applications, ensuring that vulnerabilities are identified and mitigated. Oversee security testing of OT applications, including SCADA systems, human-machine interfaces (HMIs), and industrial control software, to ensure that security controls are in place. Implement security controls around application access, user authentication, and data integrity for OT applications. Incident Response & Threat Management: Lead and coordinate response efforts to security incidents involving OT systems, ensuring that containment, investigation, and remediation processes are followed efficiently. Develop and maintain incident response plans that address OT-specific risks, ensuring minimal disruption to critical operations. Conduct post-incident analysis to identify root causes, recommend improvements, and apply corrective actions to prevent future occurrences. Collaborate with internal and external teams (e.g., law enforcement, vendors) during security incidents that may impact OT systems. Security Governance and Compliance: Ensure compliance with relevant industry regulations, standards, and frameworks (e.g., NIST, ISO 27001, IEC 62443, NERC CIP) in OT environments. Implement and enforce security governance, risk management, and compliance strategies across OT assets. Perform regular audits and assessments of OT security controls to ensure compliance with security policies and regulatory requirements. Maintain comprehensive security documentation, including risk assessments, incident reports, and security project plans. Security Awareness and Training: Develop and conduct security awareness training programs for OT staff, ensuring that they are educated on security best practices, emerging threats, and organizational policies. Provide ongoing education to the OT team about the importance of cybersecurity in the context of industrial operations and critical infrastructure. Stay current with emerging security trends, threats, and vulnerabilities specific to OT environments and incorporate new knowledge into security practices. Educational Qualification : Bachelor's degree in Computer Science, Information Security, Cybersecurity, Engineering, or a related field (Master’s preferred). Experience Minimum of 5 to 6 years of experience in IT & OT security, Data security, and application security. Extensive experience securing both OT (industrial control systems, SCADA, ICS, IIoT) environments. Proven experience with network segmentation, firewalls, IDS/IPS, VPNs, and application security frameworks. Familiarity with securing operational technology, including understanding of industrial protocols (Modbus, OPC, DNP3, etc.). Hands-on experience with OT vulnerability management, incident response, and threat intelligence processes. Skills Expertise in securing network and infrastructure devices, systems, and industrial control systems (ICS). Deep knowledge of network protocols and security mechanisms (e.g., IP, TCP/IP, VPNs, firewalls). Proficiency in securing cloud environments (AWS, Azure, Google Cloud) as well as on-premises systems. Experience with tools for vulnerability scanning, penetration testing, and risk assessments (e.g., Nessus, Qualys, Burp Suite). Certifications: CISSP, CISM, CISA, or similar certifications are preferred. OT-specific certifications such as Certified SCADA Security Architect (CSSA) or IEC 62443 certification a plus. Network security certifications such as CCSP, AWS Certified Security Specialty, or CCNA Security are beneficial. Application security certifications (e.g., CEH, OWASP) are a bonus. An inclusive Godrej Before you go, there is something important we want to highlight. There is no place for discrimination at Godrej. Diversity is the philosophy of who we are as a company. And has been for over a century. It’s not just in our DNA and nice to do. Being more diverse - especially having our team members reflect the diversity of our businesses and communities - helps us innovate better and grow faster. We hope this resonates with you. We take pride in being an equal opportunities employer. We recognize merit and encourage diversity. We do not tolerate any form of discrimination on the basis of nationality, race, color, religion, caste, gender identity or expression, sexual orientation, disability, age, or marital status and ensure equal opportunities for all our team members. If this sounds like a role for you, apply now! We look forward to meeting you.
Posted 1 month ago
2.0 - 5.0 years
5 - 10 Lacs
Mumbai Suburban, Navi Mumbai, Mumbai (All Areas)
Hybrid
Hi All, Greetings of the day! Currently we are having opening for the position of Cybersecurity, Risk Management for one of our leading Investment Banking client in Mumbai location. Experience - 2 to 5 Years Location - Goregaon (Hybrid) Responsibilities - Work on the remediation titles to be actionable good understanding of vulnerabilities - Provide data cleaning rules where needed need understanding of Databases and Scripting - Coordinate with Global counterparts - Automatize reporting in GCSD experience in scripting. - Work closely with regional production security teams to transition scanning & reporting activities - Document SOP for operational teams (tools maintenance and IVM activities) Technical & Behavioral Competencies OWASP methodologies application is a mandatory. 2 - 4 year experience in IT Security minimum University degree, preferably in Computer Science with spec. in IT Security Exceptional communication and advocacy skills, both verbal and written, with the ability to express complex technical issues in an easily understood manner. Curious and highly implicated in IT Security Team player Experience working in an international and complex financial environment, dealing with both business constraints and IT users across countries. Good knowledge of Security scanning tools like Qualys, Nexpose, Appspider is highly appreciated along with good understanding of Kubernetes. Experience in a multi-cultural environment is appreciated. CEH or Any Security certifications are appreciated. Experience in Development languages and scripting is appreciate Interested candidates can share their updated resume at dipti.ghavri@kiya.ai
Posted 1 month ago
3.0 - 6.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! The Technical Account Manager (TAM) is responsible for actively driving the sales process with direct and channel customers. The TAM must be able to articulate the Company's technology and product positioning to both business and technical users. He/she must be able to identify all technical and business issues of aligned accounts to ensure customer satisfaction, through all stages of the sales process. Must be able to establish and maintain strong relationships throughout the sales cycle. Responsibilities: Provide product and technical support for assigned accounts. Support, manage and sell to SMB Customers with defined geographic territory. Drive a culture of success through product expertise and positive account management. Provide accurate forecasting on Sales pipeline. Carefully monitor the quality of all services Qualys delivers to the customer by conducting QBRs (Quarterly Business Reviews) and ensuring adoption of technology and discovering upsell opportunity. Engage with channel partners and provide accurate renewal quotes. Raise any necessary alert for the customer’s business or technical situation in a timely manner. Work closely with customers to grow and expand the implementation/integration of Qualys products and services. Act as customer advocate with focus on improving customer contentment. Qualification: The ideal candidate will come from a security and/or networking background while performing an engineering, administration, or support role with 3-6 years of experience. General knowledge of current IT security fields including Firewall, Intrusion Detection Systems IDS, Intrusion Prevention Systems IPS, Vulnerability Management, Network Scanners (Nessus, nmap, Scan alert, ISS Internet Scanner), PCI, Policy Compliance/GRC-IT and Audit Tools is a plus. General knowledge of Desktop and Server operating system configuration, TCP/IP networking hardware, protocols, and LAN configuration, knowledge of LAN and WAN technologies, network design, and web security architectures is a plus. Ability to understand network and security infrastructure elements on advising how best to use Qualys products on cloud platforms. Must have a strong technical background and possess an excellent work ethic with a “make it happen” attitude. Excellent written and verbal communication skills. Works well in small group settings. A strong desire to be a customer-facing, technical solution expert. Extensive use of CRM (preferably salesforce.com) to maintain accurate activity, contact and account information of all customers. Ability to work rotational hours supporting global customers. Preferred Qualification: 3 - 6 years of equivalent experience in consulting or account management. Preferred pre-sales experience in computer networking or information security or public clouds. Candidates from STEM preferred.
Posted 1 month ago
6.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! We are seeking a talented Senior QA Automation Engineer to deliver roadmap features of Enterprise TruRisk Platform which would help customers to Measure, Communicate and Eliminate Cyber Risks. The Senior QA automation engineer will design, implement, document and maintain test framework. You will be responsible for the quality of core product capabilities. You will develop test automation & enable high quality micro-services and Big Data based cloud delivery. This is a fantastic opportunity to be an integral part of a team building Qualys next generation platform using Big Data & Micro-Services based technology to process over billions of transactions data per day, leverage open-source technologies, and work on challenging and business-impacting initiatives. Responsibilities: Own core product capabilities and drive it to deliver the highest quality product. Develop and maintain test automation scripts and frameworks. Develop test plan & automation by working closely with PM on requirements and with dev to understand design. Work closely with SRE, cross team and support team to understand customer inflows and participate in RCA on bug leakage and work on corrective actions. Setup best practices to make test repeatable by extending use of automation. Develop and execute automated performance tests. Setup and configure automation running part of the CI-CD pipeline. Qualifications: 6 years of hands-on experience in QA and at least 4-5 years of working on automation. Experience in Selenium WebDriver with Java/Python, Selenium grid. Good experience in test automation frameworks (data/keyword driven) and tools (Eclipse, JMeter, Cucumber). Experience with Web application testing along with REST APIs. Good understanding of Database concepts and writing SQL queries. Understanding of CI-CD pipelines: Docker, Kubernetes. Experience with Test and defect management tools. Experience with testing in a big data analytics platform/Hadoop ecosystem will be a plus. Good communication skills are important to be able to work with global teams.
Posted 1 month ago
3.0 - 5.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! Job Description This role is within the TechPubs team of the Support organization and would create modern online content that helps users of Qualys Cloud Platform and its integrated apps. The ideal candidate is passionate about creating content that helps train users quickly and effectively in a modern way. Role and Responsibilities: Contribute to the development of high-quality technical documentation by working with diverse stakeholders to scope, design, edit, and publish internal/external facing technical content. Interactively contribute to the document creation and maintenance process. Take ownership of the documentation for multiple products, follow through and complete the product cycle, and report accurate and timely status for all assignments. Write and update high-quality help content and user interface (UI) messaging. -Create new help content that addresses user needs, use cases. Deliver a variety of content i.e. online help, quick starts, Support KB articles, FAQs, API user guides, videos. Work with reviewers to ensure technical accuracy and appropriateness of content according to prescribed project deliverables and schedules. Performs tasks related to the construction of technical and non-technical illustrations and graphics or changes to existing illustrations/graphics. Work closely with the Support team, Product Management, Development, QA, to drive the creation and production of technical information for blogs, Community, Knowledge Base system, technical white papers, etc. Ensures compliance with customer requirements, company and government specifications, engineering standards, and language usage principles. Ensure quality and timeliness of documentation. Ability to concentrate, attention to detail, and command of the English language. The lead must be a self-motivating and self-managing writer who can learn complex technologies quickly, and manage the entire process of writing top-quality documentation. As an Information Developer, the candidate should: Have at least 3-5 years of technical writing experience. Have experience developing technical documentation for enterprise software audiences. Have worked on creating User Guides, Online Help, API documents, etc. Have the ability to adjust priorities and quickly learn new technologies and software applications. Have the ability to effectively own and handle multiple products. Have some experience leading/mentoring junior technical writers. Have been a team player Demonstrate excellent communication and interpersonal skills with the ability to effectively work with global and culturally diverse departments and groups to gather the right information at the right time. Have the ability to ask the right questions to understand the product and product features well. Hands-on experience with accepted team collaboration, authoring, and publishing tools Have good editing skills and preferred to have hands-on with Adobe FrameMaker, Robohelp, Illustrator, Acrobat, Microsoft Office Tools/Suite, and Google Docs. Have the enthusiasm and eagerness to contribute towards building great technical content Be able to think out-of-the-box for technical writing solutions Be up-to-date with the latest trends in Technical Writing.
Posted 1 month ago
0 years
0 Lacs
Delhi Cantonment, Delhi, India
On-site
Proven experience in conducting infrastructure-level Vulnerability Assessment and Penetration Testing (VAPT) across networks, servers, endpoints, and cloud environments. Strong hands-on expertise with VAPT tools such as Nessus, Qualys, Nmap, Metasploit, Burp Suite etc. In-depth understanding of network protocols, system configurations, and common vulnerabilities in enterprise IT environments. Ability to identify, analyze, and prioritize security vulnerabilities, and provide detailed remediation guidance to technical teams. Lead and manage end-to-end Vulnerability Assessment and Penetration Testing (VAPT) activities across infrastructure components including networks, servers, endpoints, and cloud environments. Design and implement VAPT strategies tailored to organizational risk profiles and compliance requirements. Conduct thorough assessments to identify security vulnerabilities, simulate attack scenarios, and evaluate the effectiveness of existing security controls. Collaborate with infrastructure, network, and application teams to validate findings and support remediation efforts. Prepare detailed technical reports and executive summaries outlining identified risks, impact analysis, and recommended mitigation strategies. Ensure VAPT activities align with industry standards such as ISO 27001, NIST, OWASP, and CIS Benchmarks. Maintain up-to-date knowledge of emerging threats, tools, and techniques in the vulnerability assessment and penetration testing domain.
Posted 1 month ago
0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Employment Type: Contract to hire City: Noida State: Description: Summary: A highly skilled and experienced Technical Security Auditor with deep expertise in vulnerability scanning, and network security assessment. Possesses a strong understanding security auditing methodology. Committed to providing comprehensive and actionable security assessments to help organizations strengthen their defenses. Key Skills: ● Security Auditing: Expertise in conducting technical security audits across various systems, networks, and applications. ● Log Management: Responsible for implementing, and optimizing logging infrastructure to ensure efficient, relevant, and high-quality data ingestion into our Security Information and Event Management (SIEM). ● Vulnerability Scanning: Advanced proficiency in using vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) to identify security weaknesses. ● Network Scanning: Deep understanding of network scanning techniques and tools (e.g., Nmap, etc) for network discovery and vulnerability identification. ● Exploit Development: Knowledge of exploit development methodologies and techniques for identifying and exploiting vulnerabilities. ● Risk Assessment: Ability to assess and evaluate security risks and prioritize remediation efforts. ● Network Security: Knowledge of network protocols, firewalls, intrusion detection/prevention systems (IDS/IPS), and VPNs. ● Operating Systems and Applications: Familiarity with various operating systems (Windows, Linux, macOS) and applications. ● Cloud Security: Experience with penetration testing and vulnerability scanning in cloud environments (e.g., AWS, Azure, GCP). ● Scripting and Automation: Proficiency in scripting languages (e.g., Python, PowerShell) for automating security testing tasks. ● Documentation and Reporting: Excellent documentation and reporting skills, with the ability to clearly communicate audit findings and recommendations. ● Communication and Collaboration: Strong communication, interpersonal, and collaboration skills. Ability to work effectively with technical and non-technical stakeholders. Experience: ● Assisted in the development and implementation of security policies and procedures. ● Conducted numerous penetration tests and vulnerability assessments for various organizations, identifying critical vulnerabilities and security gaps. ● Worked with IT and security teams to remediate audit findings. ● Utilized a wide range of penetration testing tools and techniques to exploit vulnerabilities and assess security posture. ● Performed network scanning and analysis to identify network devices, and services. ● Developed and executed comprehensive penetration testing plans and reports. ● Provided expert guidance and training to clients on security best practices and remediation strategies. Education: ● Bachelor’s degree in computer science, Cybersecurity, or a related field. ● Relevant industry certifications (e.g., OSCP, GPEN, GXPN, CISSP, CEH).
Posted 1 month ago
12.0 - 17.0 years
10 - 15 Lacs
Bengaluru
Work from Office
Job Summary Experienced Vulnerability Management and penetration testing Governance lead will manage a team to oversee the identification, assessment, and remediation of security vulnerabilities across enterprise systems. This role will focus on establishing a proactive security posture, ensuring compliance with industry standards, and driving governance initiatives to mitigate risks effectively along with strong leadership and project management skills. Vulnerability Assessment: Lead regular vulnerability scans and penetration testing across infrastructure, cloud environments and outside-In. Security Baseline: Lead development and implementation of Security Baseline using CIS Benchmarks by determining the systems, applications, and network devices to be secured (e.g., Windows, Linux, Cloud, Docker, Kubernetes). Risk Analysis & Prioritization: Evaluate identified vulnerabilities based on severity, exploitability, and potential business impact. Remediation Planning: Collaborate with IT, security, engineering and entity teams to ensure timely remediation of high-risk vulnerabilities. Governance & Compliance: Develop and enforce security governance frameworks in line with industry standards (e.g., NIST, CIS, ISO 27001, PCI-DSS). Threat Intelligence Integration Leverage global threat intelligence feeds to stay ahead of emerging security threats and vulnerabilities. Security Policy Development: Define policies and best practices for vulnerability management, reporting, and remediation. Automation & Continuous Monitoring: Implement automated vulnerability scanning tools and ensure ongoing security assessments. Incident Response Support: Provide technical guidance in vulnerability-related security incidents and audits. Reporting & Metrics: Establish key risk indicators and provide executive reports on vulnerability trends and remediation progress. Experience: 12+ years in cybersecurity, vulnerability management, or Penetration testing roles. Technical Expertise: Hands-on experience with vulnerability scanning tools (e.g., Qualys, Tenable, Rapid7, Nessus, OpenVAS), penetration testing and threat intelligence platforms. Penetration Testing & Ethical Hacking Experience with tools like Metasploit, Burp Suite, Nmap, and Wireshark for real-world security assessments. Security Framework Knowledge: Strong understanding of NIST, CIS benchmarks, OWASP Top 10, and CVSS scoring models. Compliance Awareness: Familiarity with regulatory standards affecting security risk management. Leadership & Communication: Ability to coordinate with multiple stakeholders, drive security improvements, and articulate risks effectively. Certifications such as CISSP, CISM, CEH, OSCP or equivalent. Experience in cloud vulnerability management (AWS, Azure, GCP). Knowledge of DevSecOps practices and security automation. Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
5.0 years
0 Lacs
India
Remote
Welcome to Veradigm! Our Mission is to be the most trusted provider of innovative solutions that empower all stakeholders across the healthcare continuum to deliver world-class outcomes. Our Vision is a Connected Community of Health that spans continents and borders. With the largest community of clients in healthcare, Veradigm is able to deliver an integrated platform of clinical, financial, connectivity and information solutions to facilitate enhanced collaboration and exchange of critical patient information. Veradigm Veradigm is here to transform health, insightfully. Veradigm delivers a unique combination of point-of-care clinical and financial solutions, a commitment to open interoperability, a large and diverse healthcare provider footprint, along with industry proven expert insights. We are dedicated to simplifying the complicated healthcare system with next-generation technology and solutions, transforming healthcare from the point-of-patient care to everyday life. For more information, please explore www.veradigm.com. What Will Your Job Look Like Cyber Security Engineers supports and implements cloud and application security tools and technologies. These technologies include firewalls, IDS/IPS, antivirus, web proxy, certificate management, SIEM, patch management, access controls as well as vulnerability assessments within the Veradigm environment. The Cyber Security Engineer should be comfortable working with a variety of security technologies and implements security measures to protect our systems from attacks, intrusion, and infiltration. An Ideal Candidate Will Have 5+ years of experience monitoring and maintaining firewalls, IDS/IPS systems, web proxy, and content filtering security products for policy violations, intrusions, anomalous behaviors, and day to day incident response activities. Experience with deployment, administration and troubleshooting of endpoint detection and response (EDR) and antivirus (AV) solutions supporting both servers and workstations. Experience securing cloud infrastructure (Azure or AWS). Administers authentication and access controls including provisioning, changes and deprovisioning of user and system accounts, security/access roles and access permissions. Monitoring and analyzing system access logs and deployment and implementation of SIEM solution such as Microsoft Sentinel or Splunk. Experience with Active Directory, Entra ID, and IAM protocols such as SAML, Single Sign On (SSO) and MFA solutions. Experience with email security and filtering, and sender authentication. Experience creating and maintaining automation and scripting tools such as PowerShell, JavaScript, Python, Perl, or Bash. Working knowledge of Windows Server administration and support including security best practices and understanding of Active Directory/Entra ID. Analyze and report organizational security posture trends. Experience with Linux distros such as RHEL, CentOS, Ubuntu, or Oracle Linux a plus. Experience conducting vulnerability assessments or risk assessments with tools such as Nessus, Qualys, Metasploit, Kali and working with application and server owners to review scan results, suggest remediation actions, and track/report on progress to management Certification Requirements Comptia Security Certification Security+ or CySA+ or CASP+ or PenTest+ Other Security Certifications- GSEC or CEH or OSCP or CCSP or MS-500 or AZ-500 Benefits Veradigm believes in empowering our associates with the tools and flexibility to bring the best version of themselves to work. Through our generous benefits package with an emphasis on work/life balance, we give our employees the opportunity to allow their careers to flourish. Quarterly Company-Wide Recharge Days Flexible Work Environment (Remote/Hybrid Options) Peer-based incentive “Cheer” awards “All in to Win” bonus Program Tuition Reimbursement Program To know more about the benefits and culture at Veradigm, please visit the links mentioned below: - https://veradigm.com/about-veradigm/careers/benefits/ https://veradigm.com/about-veradigm/careers/culture/ We are an Equal Opportunity Employer. No job applicant or employee shall receive less favorable treatment or be disadvantaged because of their gender, marital or family status, color, race, ethnic origin, religion, disability or age; nor be subject to less favorable treatment or be disadvantaged on any other basis prohibited by applicable law. Veradigm is proud to be an equal opportunity workplace dedicated to pursuing and hiring a diverse and inclusive workforce. Thank you for reviewing this opportunity! Does this look like a great match for your skill set? If so, please scroll down and tell us more about yourself!
Posted 1 month ago
7.0 years
0 Lacs
India
Remote
Welcome to Veradigm! Our Mission is to be the most trusted provider of innovative solutions that empower all stakeholders across the healthcare continuum to deliver world-class outcomes. Our Vision is a Connected Community of Health that spans continents and borders. With the largest community of clients in healthcare, Veradigm is able to deliver an integrated platform of clinical, financial, connectivity and information solutions to facilitate enhanced collaboration and exchange of critical patient information. Veradigm Veradigm is here to transform health, insightfully. Veradigm delivers a unique combination of point-of-care clinical and financial solutions, a commitment to open interoperability, a large and diverse healthcare provider footprint, along with industry proven expert insights. We are dedicated to simplifying the complicated healthcare system with next-generation technology and solutions, transforming healthcare from the point-of-patient care to everyday life. For more information, please explore www.veradigm.com. What Will Your Job Look Like Cyber Security Engineers supports and implements cloud and application security tools and technologies. These technologies include firewalls, IDS/IPS, antivirus, web proxy, certificate management, SIEM, patch management, access controls as well as vulnerability assessments within the Veradigm environment. The Cyber Security Engineer should be comfortable working with a variety of security technologies and implements security measures to protect our systems from attacks, intrusion, and infiltration. An Ideal Candidate Will Have 7+ years of experience monitoring and maintaining firewalls, IDS/IPS systems, web proxy, and content filtering security products for policy violations, intrusions, anomalous behaviors, and day to day incident response activities. Experience with deployment, administration and troubleshooting of endpoint detection and response (EDR) and antivirus (AV) solutions supporting both servers and workstations. Experience securing cloud infrastructure (Azure or AWS). Administers authentication and access controls including provisioning, changes and deprovisioning of user and system accounts, security/access roles and access permissions. Monitoring and analyzing system access logs and deployment and implementation of SIEM solution such as Microsoft Sentinel or Splunk. Experience with Active Directory, Entra ID, and IAM protocols such as SAML, Single Sign On (SSO) and MFA solutions. Experience with email security and filtering, and sender authentication. Experience creating and maintaining automation and scripting tools such as PowerShell, JavaScript, Python, Perl, or Bash. Working knowledge of Windows Server administration and support including security best practices and understanding of Active Directory/Entra ID. Analyze and report organizational security posture trends. Experience with Linux distros such as RHEL, CentOS, Ubuntu, or Oracle Linux a plus. Experience conducting vulnerability assessments or risk assessments with tools such as Nessus, Qualys, Metasploit, Kali and working with application and server owners to review scan results, suggest remediation actions, and track/report on progress to management Certification Requirements Comptia Security Certification Security+ or CySA+ or CASP+ or PenTest+ Other Security Certifications- GSEC or CEH or OSCP or CCSP or MS-500 or AZ-500 Benefits Veradigm believes in empowering our associates with the tools and flexibility to bring the best version of themselves to work. Through our generous benefits package with an emphasis on work/life balance, we give our employees the opportunity to allow their careers to flourish. Quarterly Company-Wide Recharge Days Flexible Work Environment (Remote/Hybrid Options) Peer-based incentive “Cheer” awards “All in to Win” bonus Program Tuition Reimbursement Program To know more about the benefits and culture at Veradigm, please visit the links mentioned below: - https://veradigm.com/about-veradigm/careers/benefits/ https://veradigm.com/about-veradigm/careers/culture/ We are an Equal Opportunity Employer. No job applicant or employee shall receive less favorable treatment or be disadvantaged because of their gender, marital or family status, color, race, ethnic origin, religion, disability or age; nor be subject to less favorable treatment or be disadvantaged on any other basis prohibited by applicable law. Veradigm is proud to be an equal opportunity workplace dedicated to pursuing and hiring a diverse and inclusive workforce. Thank you for reviewing this opportunity! Does this look like a great match for your skill set? If so, please scroll down and tell us more about yourself!
Posted 1 month ago
5.0 years
0 Lacs
Haryana
On-site
Requisition Number: 101415 Sr Systems Administrator (Linux) Location: The role will be a hybrid position located in Delhi NCR/Bangalore/Pune/Hyderabad Experience- 5+ years Shifts- 24*7 rotational Insight at a Glance 14,000+ engaged teammates globally #20 on Fortune’s World's Best Workplaces™ list $9.2 billion in revenue Received 35+ industry and partner awards in the past year $1.4M+ total charitable contributions in 2023 by Insight globally Now is the time to bring your expertise to Insight. We are not just a tech company; we are a people-first company. We believe that by unlocking the power of people and technology, we can accelerate transformation and achieve extraordinary results. As a Fortune 500 Solutions Integrator with deep expertise in cloud, data, AI, cybersecurity, and intelligent edge, we guide organisations through complex digital decisions. About the role We are seeking a highly skilled and experienced Sr System Administrator to join our team. The ideal candidate will have a minimum of 5 to 7 years of experience in system administration with a strong focus on troubleshooting Windows and Linux issues. The candidate should also possess extensive knowledge in patching and upgrades, as well as expertise in Edge servers, Qualys, and vulnerability management. As a Sr Systems Administrator you will: Install, configure, and maintain Linux and Windows servers and workstations. Design, deploy, and maintain Windows Server infrastructure, including Active Directory, DNS, DHCP, and Group Policy management. Monitor system performance and ensure high availability, performance, and security. Administer system procedures including backup, recovery, and migration. Troubleshoot and resolve system-related problems for both Linux and Windows environments. Upgrade system hardware and software components as required. Interact with the helpdesk and other teams to resolve issues. Conduct routine audits of systems and software. Be AmbITious: This opportunity is not just about what you do today but also about where you can go tomorrow. When you bring your hunger, heart, and harmony to Insight, your potential will be met with continuous opportunities to upskill, earn promotions, and elevate your career What we’re looking for Minimum of 5 to 7 years of experience in system administration. Proven experience with troubleshooting VMware and vCenter. Strong knowledge of patching and upgrades. Expertise in Edge servers, Qualys, and vulnerability management. Excellent problem-solving skills and attention to detail. Strong communication and collaboration skills. Ability to work independently and as part of a team. What you can expect We’re legendary for taking care of you, your family and to help you engage with your local community. We want you to enjoy a full, meaningful life and own your career at Insight. Some of our benefits include: Freedom to work from another location—even an international destination—for up to 30 consecutive calendar days per year. But what really sets us apart are our core values of Hunger, Heart, and Harmony, which guide everything we do, from building relationships with teammates, partners, and clients to making a positive impact in our communities. Join us today, your ambITious journey starts here. Insight is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, sexual orientation or any other characteristic protected by law. When you apply, please tell us the pronouns you use and any reasonable adjustments you may need during the interview process. At Insight, we celebrate diversity of skills and experience so even if you don’t feel like your skills are a perfect match - we still want to hear from you! Insight is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, sexual orientation or any other characteristic protected by law. Insight India Location:Level 16, Tower B, Building No 14, Dlf Cyber City In It/Ites Sez, Sector 24 &25 A Gurugram Gurgaon Hr 122002 India
Posted 1 month ago
7.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
Role Description Vulnerability Management SME (Subject Matter Expert) Experience : 7 plus years Location : Hyderabad/Trivandrum/Kochi/Bangalore/Chennai Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence Job Summary We are seeking a highly experienced and knowledgeable Subject Matter Expert (SME) to join our Vulnerability Management team. The ideal candidate will have extensive experience in cybersecurity, with a deep understanding of vulnerability management processes, tools, and best practices. This role requires strong analytical skills, excellent communication abilities, and a proactive approach to identifying and mitigating security risks. Key Responsibilities Lead the vulnerability management program, ensuring comprehensive identification, assessment, and remediation of vulnerabilities. Develop and implement strategies to enhance the organization's security posture. Conduct in-depth vulnerability assessments and penetration testing to identify security weaknesses. Expertise in vulnerability management tools Qualys VMDR, MS Defender, and CrowdStrike, to detect and analyze vulnerabilities and create reports and dashboards for the customer. Interpret scan results and provide detailed reports with actionable recommendations. Prioritize vulnerabilities based on potential impact and likelihood of exploitation. Collaborate with technical teams to develop and implement effective remediation plans. Stay updated with the latest cybersecurity threats, trends, and technologies. Develop and deliver training sessions on vulnerability management best practices. Participate in incident response activities, providing expertise in vulnerability exploitation and mitigation. Ensure compliance with industry standards and regulatory requirements. Qualifications Bachelor’s degree in computer science, Information Security, or a related field. Minimum of 7 years of experience in cybersecurity, with a focus on vulnerability management. In-depth knowledge of cybersecurity principles, threats, and attack vectors. Knowledge of network protocols, architecture, and topologies. Extensive experience with various operating systems (Windows, Linux, macOS) and their security configurations. Advanced skills in using and configuring vulnerability scanning tools, specifically Qualys VMDR, MS Defender, and CrowdStrike. Experience with Rapid7, Tenable, or cloud security is a plus. Strong analytical and critical thinking abilities to identify root causes and solutions for vulnerabilities. Excellent verbal and written communication skills to effectively communicate with stakeholders. Experience in risk assessment methodologies and patch management best practices. Automation skills and experience with scripting languages (e.g., Python, PowerShell) are a plus. Relevant certifications (e.g., CISSP, CEH, OSCP) are highly desirable.
Posted 1 month ago
2.0 years
0 Lacs
Pune, Maharashtra, India
Remote
About Energy Exemplar In an era where the world is rapidly advancing towards a cleaner future through decarbonization, stakeholders from across the entire energy value chain are having to navigate the complexities of the energy ecosystem. We seek to enable our customers to do so with confidence . Our mission: Empowering Transformative Energy Decisions. Founded in 1999 in Adelaide, Australia, Energy Exemplar’s PLEXOS ® modeling and simulation software is trusted by innovative organizations across the globe. On one unified platform, stakeholders from across the entire energy value chain are revolutionizing the energy ecosystem and seamlessly planning for the future of energy with unprecedented clarity, speed, and innovation. Our impact is global and is being recogni z ed across the industry : Finalist for the 2024 Reuters Global Energy Transition Awards in the 'Technologies of Change' category Finalist for the 2024 Go:Tech Awards in the 'Most Innovative Use of Technology’ category 2022 USEA/USAID Corporate Volunteer of the Year 2022 Impact Award Winner for our impact on the energy industry and the current energy transition At Energy Exemplar, we believe in empowering our people by offering flexibility in how, when, and where they work. This flexibility has been a cornerstone of our success, fueling significant growth over the years, with the company expanding at an impressive rate of approximately 30% year over year . We understand that the best results come when our team members can balance their professional and personal lives, so we support various working arrangements that help you thrive. We don’t just celebrate the excellence of our product s but champion the quality of our people. They own their outcomes and perform to their best – every day. whether you're working from home, in the office, or on the go. Our flexible work culture fosters innovation, collaboration, and trust, making it easier to stay engaged and connected, no matter where you are. That’s what makes us who we are and a great place to work. Our core values ‘Customer Success ’ , ‘One Global Team ’ , ‘Integrity and Ownership’ and ‘Innovation Excellence’ reflect the way we work and are always a t the forefront of everything we do . About Energy Exemplar Energy Exemplar is the global market leader in optimization-based energy market simulation technology. Our software suite, headlined by PLEXOS and Aurora, is used worldwide for a wide range of applications, from short-term analysis to long-term planning studies. Driven by the frenetic pace of advancements in computing technology and mathematical algorithms, our people continually think of novel approaches and more realistic simulations that enhance decision-making, create market opportunities that benefit us all, and enable utilities and regulatory authorities to become smarter, more energy efficient, and profitable. Energy Exemplar continues to ‘push the envelope’, being first-to-market with the latest advanes in mathematical programming and energy market simulation theory, as it strives to offer the most comprehensive simulation software to its customer base. Development continues to be headquartered in Adelaide, South Australia, led by Glenn Drayton and backed by a team with expertise in software development, operations research, economics, mathematics, statistics, and electrical engineering. Our Vision and Core Values Our Vision at Energy Exemplar is to empower our customers to achieve their optimal futures and we make every effort to accomplish this by living and breathing our Core Values : CUSTOMER SUCCESS Solve the problems that matter Deliver solutions that drive outcomes Customers’ success drives our business success. ONE GLOBAL TEAM A place where everyone can do their best work Passionate about making a positive impact Collaborate, communicate and act as one team INTEGRITY & OWNERSHIP Take ownership and be accountable for outcomes Value spirited debate then align behind decisions Operate at the highest standards INNOVATION EXCELLENCE Frontrunners – relentlessly pursuing innovation and excellence Foster idea generation at all levels Create the future by pushing the boundaries of today About the Position Energy Exemplar is seeking a motivated IT Support Engineer to join our Global IT team at our Pune office. This employee will provide end-user support related to hardware, software, and Cloud (Azure & AWS) applications. This engineer will participate in various IT projects and be able to learn and adapt to an ever-changing technology landscape. This engineer must be highly organized, possess excellent communication and customer service skills, and enjoy working with end-users daily to operate efficiently in a fast-paced environment. Key Stakeholder Relationships: This position works closely and collaboratively with all Energy Exemplar staff, but in particular: Product Engineering, Customer Support, CloudOps, Customer Success, Finance, Sales and Marketing Finance, HR, Information Technology Key Accountabilities and Duties Provide Tier 1 and Tier 2 technical support for desktops, laptops, printers, mobile devices, and conferencing systems. Install, configure, and maintain hardware, software, and peripherals for end-users. Troubleshoot issues related to Windows/Mac operating systems, Office 365, email clients, VPN, Zoom and other corporate tools. Provide extraordinary support to all company employees, both on-site and remote. Administer and support Entra ID (Azure AD), including users, groups, and conditional access. Document, track, and monitor hardware and software problems using an existing ticketing system. Configure, deploy, and support desktops, laptops, servers, printers, and other end-user devices. Assist with the Employee onboarding/off-boarding process from beginning to end. Diligently audit user accounts, licenses and user administration for software and hardware assets. Support and administer SaaS applications such as O365, Zoom, MS Teams, and other tools. Ability to support network devices and troubleshoot networking issues. Take ownership of production-related incidents, including communications, escalations, and follow-up for root cause analysis Managing, monitoring, and reporting on all security processes and policies relating to any on-site secure rooms and devices to ensure compliance. Responding to security alerts related to account management, device management, and threat protection. Create knowledge base articles for employee self-service and internal IT procedures. Candidate Requirements Skills, Knowledge and Experience: Solid experience managing Microsoft products like O365 services, Intune, SharePoint, Teams, and Entra ID. Proficient in Cloud computing technologies and experience working with AWS and Microsoft Azure. Directly involved in the deployment, repair, replacement, disposal, and inventory management of end-user Computing equipment (desktops, laptops, phones, printers) Ensures all assigned tickets are updated and moving towards a successful resolution in a manner that meets or exceeds Service Level Objectives. Support of local and remote laptops in a mixed Microsoft and Apple environment. Triage and resolve wireless and remote connectivity, VPN clients, web conferencing, and other issues. Full understanding of typical Mac/PC hardware, servers (Linux, windows), and software installation, configuration, and troubleshooting. Basic knowledge of networking and firewall configurations for Fortinet and troubleshooting. The ability to balance and prioritize multiple projects and remain calm under pressure. Familiarity with desktop applications (Office 365, Teams, AV, VPN, Adobe Acrobat, etc.). Expert understanding of the Microsoft stack of applications- Microsoft O365, Windows Operating Systems (Win 11), Active Directory and Group Policies. Working knowledge of application packaging, operating system imaging, patch management, and deployment with systems similar to Intune MDM and WorkSpace One. IT support knowledge of certification processes such as SOC2 and ISO27001 Experience supporting VoIP and audio/visual systems such as Zoom phone and Zoom meetings. Knowledge of security tools (Qualys, CrowdStrike) and standards (MDM, SSO, MFA). Outstanding communication skills and the ability to collaborate with end users. Exhibit a passion for an employee-service-driven approach. Effectively collaborate and coordinate across geographically distributed teams. Proven resourcefulness, creativity, and troubleshooting skills. Work with vendors and hardware and software providers to acquire IT assets as needed. Must be able to work independently yet adhere to company standards in areas of documentation, planning, and execution. Proven ability to take ownership of job responsibilities with minimal oversight. Flexibility to work various shifts with minimal notice as you are part of a Global team. Experience working in a fast-paced support role. Qualifications: Bachelor’s degree in IT, Computer Science, or equivalent technical college. 2+ years of experience working in a IT Support Engineer role. Experience with Microsoft products, Cloud Platforms (Azure, AWS), and user administration. Self-sufficient, proactive, and ready for a challenge, this position requires a considerable level of independence. You’ll mostly be working on your own while representing our global IT team. Minimum 2+ years of experience in Cloud Technologies, including Azure and AWS. Preferred certifications: CompTIA A+, Microsoft Certified Solutions Expert (MCSE) MCSA, Microsoft 365 Security Administration, AWS Certified SysOps Administrator, Azure Administrator. An eagerness to learn about new technologies. Energy Exemplar is an equal opportunities employer and we value your unique identity and perspective . We are fully committed to providing and fostering a workplace that reflects the diversity of society. Bring your authentic self and help us build an inclusive world together! To support you in being the best version of yourself during the application and interview process, please let us know if you have any specific requirements.
Posted 1 month ago
0.0 - 2.0 years
0 Lacs
Pune, Maharashtra
Remote
Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! About the job Join Qualys, a global leader in cybersecurity, where innovation meets impact! We are looking for a visionary Senior Product Manager to own and drive the AI strategy and product development for the Qualys platform. This role offers a unique opportunity to lead AI-powered security solutions that protect enterprises worldwide. Location: Foster City, California OR Pune, Maharashtra (Minimum 3 days mandatory in office) Remote: Considered for exceptional candidates with strong AI and cybersecurity product management experience The Position Qualys seeks an experienced Senior Product Manager to own the AI product line within the Qualys platform. The ideal candidate will have end-to-end ownership of AI-driven security features, from ideation to delivery, including inbound and outbound product management responsibilities. You will be a subject matter expert in AI/ML technologies applied to cybersecurity, with a deep understanding of the Qualys platform and customer needs. A key focus of this role will be advancing Agentic AI capabilities—AI systems that go beyond reactive responses to autonomously plan, make decisions, and execute actions with minimal human intervention. You will lead the integration of agentic AI to enable proactive, self-driven security workflows that enhance threat detection, automate complex processes, and deliver predictive insights, transforming how enterprises manage cybersecurity risks. You will collaborate closely with engineering, data science, sales, marketing, and customer success teams to align AI product roadmaps with market demands and emerging security challenges. What You Will Be Doing Product Ownership: AI and Agentic AI for Qualys Platform Own the AI and Agentic AI product strategy and roadmap for Qualys’ cybersecurity platform, focusing on autonomous threat detection, intelligent automation, and predictive analytics Drive innovation in AI/ML and agentic AI capabilities that improve platform accuracy, operational efficiency, and user experience by enabling AI systems to act proactively and autonomously within defined guardrails. Define clear objectives and ethical boundaries for agentic AI features to ensure responsible deployment and maintain customer trust. Business Ownership and Responsibilities Act as the ‘Business Owner’ for AI and agentic AI features, prioritizing initiatives that drive revenue growth, customer adoption, and platform differentiation. Analyze product performance metrics such as feature adoption, customer retention, expansion, and renewal; develop business plans to optimize these metrics and present insights to leadership. Lead pipeline generation efforts by collaborating with marketing to design AI-focused campaigns that attract and convert leads. Evaluate pricing and packaging strategies for AI capabilities, including freemium, premium tiers, and bundling with other Qualys products to maximize market penetration. Innovate product-led growth (PLG) and product-led sales (PLS) strategies using AI-driven insights to accelerate pipeline and revenue. Outbound Product Management Responsibilities Develop sales enablement materials including AI and agentic AI product presentations, demo scripts, and competitive positioning documents. Research the AI, agentic AI, and cybersecurity competitive landscape; craft compelling messaging and positioning; and train sales teams to effectively communicate AI value propositions. Build thought leadership content such as white papers, webinars, and case studies to showcase AI and agentic AI innovation within Qualys. Engage directly with customers to gather feedback, understand pain points, and translate insights into actionable product requirements. Inbound Product Management Responsibilities Define and evangelize the AI and agentic AI product vision, strategy, and go-to-market plans. Lead cross-functional teams (Product, Engineering, Data Science, UX, Sales) to deliver AI and agentic AI features on time and with high quality. Prioritize feature development based on customer needs, market trends, and business impact. Establish strong customer relationships to validate AI and agentic AI use cases and ensure product-market fit. What We Need From You Bachelor’s degree in Computer Science, Engineering, Data Science, or related field; MBA or equivalent experience preferred. 7+ years of product management experience, with at least 2 years focused on AI/ML products in cybersecurity or related domains. Deep understanding of AI/ML technologies, including supervised/unsupervised learning, NLP, anomaly detection, predictive analytics, and agentic AI concepts such as autonomous decision-making, task planning, and minimal human oversight as applied to security. Proven track record of building and scaling AI-powered and agentic AI-enabled security products or platforms. Strong business acumen with experience in pricing, packaging, and go-to-market strategies for AI-driven solutions. Excellent communication skills with the ability to articulate complex AI and agentic AI concepts to technical and non-technical audiences. Experience collaborating with data scientists, engineers, and sales teams to deliver customer-centric AI and agentic AI products. Passion for innovation, experimentation, and data-driven decision-making. Familiarity with cybersecurity domains such as vulnerability management, threat intelligence, endpoint security, or cloud security is highly desirable. Ability to thrive in a fast-paced, collaborative environment and lead cross-functional teams to success. Why Qualys? Work on cutting-edge AI and agentic AI technologies that protect organizations worldwide. Collaborate with a passionate, diverse team committed to innovation and customer success. Competitive compensation, benefits, and career growth opportunities. This addition highlights the strategic importance and technical sophistication of agentic AI within the AI product management role, positioning the candidate to lead next-generation autonomous AI capabilities in cybersecurity
Posted 1 month ago
5.0 years
0 Lacs
Haryana, India
On-site
Requisition Number: 101415 Sr Systems Administrator (Linux) Location: The role will be a hybrid position located in Delhi NCR/Bangalore/Pune/Hyderabad Experience- 5+ years Shifts- 24*7 rotational Insight at a Glance 14,000+ engaged teammates globally #20 on Fortune’s World's Best Workplaces™ list $9.2 billion in revenue Received 35+ industry and partner awards in the past year $1.4M+ total charitable contributions in 2023 by Insight globally Now is the time to bring your expertise to Insight. We are not just a tech company; we are a people-first company. We believe that by unlocking the power of people and technology, we can accelerate transformation and achieve extraordinary results. As a Fortune 500 Solutions Integrator with deep expertise in cloud, data, AI, cybersecurity, and intelligent edge, we guide organisations through complex digital decisions. About The Role We are seeking a highly skilled and experienced Sr System Administrator to join our team. The ideal candidate will have a minimum of 5 to 7 years of experience in system administration with a strong focus on troubleshooting Windows and Linux issues. The candidate should also possess extensive knowledge in patching and upgrades, as well as expertise in Edge servers, Qualys, and vulnerability management. As a Sr Systems Administrator You Will Install, configure, and maintain Linux and Windows servers and workstations. Design, deploy, and maintain Windows Server infrastructure, including Active Directory, DNS, DHCP, and Group Policy management. Monitor system performance and ensure high availability, performance, and security. Administer system procedures including backup, recovery, and migration. Troubleshoot and resolve system-related problems for both Linux and Windows environments. Upgrade system hardware and software components as required. Interact with the helpdesk and other teams to resolve issues. Conduct routine audits of systems and software. Be AmbITious: This opportunity is not just about what you do today but also about where you can go tomorrow. When you bring your hunger, heart, and harmony to Insight, your potential will be met with continuous opportunities to upskill, earn promotions, and elevate your career What We’re Looking For Minimum of 5 to 7 years of experience in system administration. Proven experience with troubleshooting VMware and vCenter. Strong knowledge of patching and upgrades. Expertise in Edge servers, Qualys, and vulnerability management. Excellent problem-solving skills and attention to detail. Strong communication and collaboration skills. Ability to work independently and as part of a team. What You Can Expect We’re legendary for taking care of you, your family and to help you engage with your local community. We want you to enjoy a full, meaningful life and own your career at Insight. Some of our benefits include: Freedom to work from another location—even an international destination—for up to 30 consecutive calendar days per year. But what really sets us apart are our core values of Hunger, Heart, and Harmony, which guide everything we do, from building relationships with teammates, partners, and clients to making a positive impact in our communities. Join us today, your ambITious journey starts here. Insight is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, sexual orientation or any other characteristic protected by law. When you apply, please tell us the pronouns you use and any reasonable adjustments you may need during the interview process. At Insight, we celebrate diversity of skills and experience so even if you don’t feel like your skills are a perfect match - we still want to hear from you! Insight is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, sexual orientation or any other characteristic protected by law. Insight India Location:Level 16, Tower B, Building No 14, Dlf Cyber City In It/Ites Sez, Sector 24 &25 A Gurugram Gurgaon Hr 122002 India
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough