Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 3.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Job Summary We are looking for an Application Security Analyst with 2-3 years of experience in IT and security to strengthen our security team. The ideal candidate will focus on securing web and mobile applications (Android/iOS) by conducting penetration testing, vulnerability assessments, API security reviews, and ensuring compliance with security best Responsibilities Security & Penetration Testing : Conduct security assessments for web, mobile (Android/iOS), and APIs. Identify, exploit, and remediate OWASP Top 10 vulnerabilities. Perform manual and automated security testing to uncover security risks. Conduct secure code reviews to detect application security Security (Android & iOS) : Perform static and dynamic analysis of Android/iOS applications. Identify security risks such as insecure data storage, API vulnerabilities, and jailbreak/root detection bypass. Utilize tools like MobSF, Frida, Burp Suite, Objection, Drozer, Jadx, and apktool. Validate applications against OWASP Mobile Top 10 security Security & Secure Development : Perform API penetration testing using Burp Suite, Postman, OWASP ZAP. Identify critical vulnerabilities such as Broken Authentication, Excessive Data Exposure, and IDOR. Collaborate with developers to implement secure coding practices and remediation Management & Compliance : Conduct vulnerability assessments using tools like Nessus, Acunetix, Nexpose, Rapid7, and Qualys. Ensure compliance with ISO 27001, SOC2, GDPR, and other regulatory frameworks. Work closely with development teams to remediate security Skills & Qualifications : Bachelors degree in Computer Science, Information Security, or a related IT field. 2-3 years of experience in IT, with at least 1-2 years focused on Application Security & Penetration Testing. Strong understanding of OWASP Top 10 (Web & Mobile) vulnerabilities. Hands-on experience with security tools such as Burp Suite, MobSF, Frida, Objection, Drozer, Jadx, apktool. Proficiency in secure code review (Java, Swift, Kotlin, JavaScript). Expertise in API Security Testing and secure development best practices. Strong analytical, problem-solving, and communication Qualifications : Security certifications such as OSCP, CEH, eJPT, OSWE, GMOB (preferred). Experience with bug bounty programs or responsible disclosure & Benefits : Competitive salary based on experience. Career growth opportunities in Application Security & Ethical Hacking. Health & wellness benefits. Access to continuous learning, certifications, and security training programs. (ref:hirist.tech) Show more Show less
Posted 1 month ago
8.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
Techvantage.ai is a next-generation technology and product engineering company at the forefront of innovation in Generative AI, Agentic AI, and autonomous intelligent systems. We build intelligent, secure, and scalable digital platforms that power the future of AI across industries. Role Overview We are looking for a Senior Security Specialist with 8+ years of experience in cybersecurity, cloud security, and application security. You will be responsible for identifying, mitigating, and preventing threats across our technology landscape - particularly in AI-powered, data-driven environments. This role involves leading penetration testing efforts, managing vulnerability assessments, and implementing best-in-class security tools and practices to protect our platforms and clients. Key Responsibilities Design and implement robust security architectures for cloud-native and on-prem environments. Conduct penetration testing (internal/external, network, application, API) and deliver clear remediation strategies. Perform regular vulnerability assessments using industry-standard tools and frameworks. Lead threat modeling and risk assessments across systems, services, and data pipelines. Collaborate with development and DevOps teams to integrate security in SDLC and CI/CD pipelines (DevSecOps). Define and enforce security policies, incident response procedures, and access controls. Monitor for security breaches and investigate security events using SIEM and forensic tools. Ensure compliance with global standards such as ISO 27001, SOC 2, GDPR, and HIPAA. Provide guidance on secure implementation of AI/ML components and data protection strategies. Requirements 8+ years of experience in information security, application security, or cybersecurity engineering. Proficient in penetration testing methodologies and use of tools such as Burp Suite, Metasploit, Nmap, Wireshark, Nessus, OWASP ZAP, Qualys, etc. Deep experience in vulnerability management, patching, and security hardening practices. Strong understanding of OWASP Top 10, CWE/SANS Top 25, API security, and secure coding principles. Hands-on experience with cloud security (AWS, Azure, or GCP), IAM, firewalls, WAFs, encryption, and endpoint security. Familiarity with SIEM, EDR, IDS/IPS, and DLP solutions. Knowledge of DevSecOps and tools like Terraform, Kubernetes, Docker, etc. Excellent problem-solving, analytical, and incident-handling capabilities. Preferred Qualifications Certifications such as CISSP, CISM, CEH, OSCP, or AWS Security Specialty. Experience working on security aspects of AI/ML platforms, data pipelines, or model inferencing. Familiarity with governance and compliance frameworks (e.g, PCI-DSS, HIPAA). Experience in secure agile product environments and threat modeling techniques. What We Offer A mission-critical role securing next-gen AI systems. Opportunity to work with an innovative and fast-paced tech company. High visibility and leadership opportunities in a growing security function. Compensation is not a constraint for the right candidate. (ref:hirist.tech) Show more Show less
Posted 1 month ago
5.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! Support Technical Project Manager/Customer Success Enterprise TPM will be responsible for managing critical customer engagements. This will include handling communications across multiple internal teams, solution vendors, and customers. The focus will be to manage all customer escalations/prioritization concerning product defects, Critical feature requests, ticket reviews, and executive reporting. Close coordination is required between various Qualys internal teams: Support, Operations, Development, Quality Assurance, Sales, and Product Management. The right candidate must have excellent technical, organizational, communication, leadership, and customer relationship skills. This candidate needs to understand the customer use case, establish proper expectations with customers, drive speedy resolution within the schedule, and communicate status throughout the organization. DUTIES AND RESPONSIBILITIES: Provide an outstanding experience that increases account retention, which would lead to renewals and the adoption of Qualys products. Improve customer experience throughout the end-to-end customer lifecycle. Partner with Sales to ensure smooth renewal and expansion opportunities are identified. Follow the defined customer success plan to expand product adoption, nurture, grow, and maintain relationships. Ensure that account issues are resolved quickly by escalating to the company's appropriate stakeholders and working with global delivery. Host & drive onboarding, implementation, weekly status meetings with the customer, meeting minutes, and tracking of deliverables. Review product adoption, overall customer experience, and perception of the product and service through establishing MBRs/QBRs. Participate in the Incident management process and drive Incidents for their customers. Participate in Qualys integration and capture the value the customer expects. Complete mapping and understanding of customer infrastructure, process, and use of the Qualys product, and a road map to capture the product's total value to reduce risk. Understand and document the impact an issue may have on a customer, the priority of any open tickets, and timelines for ongoing projects and commitments. Track customer sentiment and identify any revenue risk, document, and project customer voice Facilitate necessary communication between internal teams and customers. Root Cause Analysis (RCAs) and postmortem reports for critical situations Demonstrated ability to successfully resolve situations that are broadly defined, complex, diverse, and/or occasionally, unprecedented. Track and report internally & externally the overall account health and status of escalations where the account has ongoing escalations. KNOWLEDGE, SKILLS, AND ABILITIES REQUIRED: BA/BS computer science degree or equivalent work experience. Experience in the IT Security domain 5+ years of customer-facing experience managing successful and proven outcomes. 5+ years of SAAS experience Familiarity with Vulnerability Management, PCI, NIST, or Web Applications Certifications Desired: CompTIA Security+, PMP, CISM, or CISSP Prior Qualys product experience and knowledge are added benefits. Project Management, business process reengineering, and change management methodology knowledge. Strong technical understanding and passion for learning new technologies. Excellent communication and presentation skills, both written and verbal Self-motivated, highly collaborative, creative, goal- and growth-oriented, and team-centric Ability to engage in technical discussions with the customer regarding product usage and identify the business impact of customer issues. Show more Show less
Posted 1 month ago
2.0 - 10.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Senior Associate Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. Those in penetration testing at PwC will focus on penetration testing (or pen testing) which is a security exercise where a cybersecurity consultant attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defences which attackers could take advantage of. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations Job Description & Summary: Job Description & Summary: We are seeking a highly skilled and experienced Cybersecurity/Risk Consulting Senior Associate to join our Risk Consulting team. As a Cybersecurity Senior Associate, you will be responsible for leading and managing a team of consultants to deliver high-quality cybersecurity and risk management services to our clients. Responsibilities: Key Responsibilities: · Good interpersonal skills (written and oral communication) and ability to articulate complex issues · Ability to communicate technical · information clearly and concisely, commensurate with the audience · Conceptual thinking and communication skills — the ability to conceptualize complex business and technical requirements into comprehensible models and templates. · Good communicator (written and verbal) and listener. · Must be a team player and motivated self-starter with ability to work independently with limited supervision. · Must be assertive, methodical and detail oriented Technical Experience: · Experience in Web and Mobile Application Security Testing, Vulnerability Assessment and Penetration testing · Analyze scan reports and suggest remediation / mitigation plan for security vulnerabilities · Should be aware of tools like Qualys, HP Fortify, IBM Appscan, Burpsuite, Kali Linux suite of tools · Expertise in mobile apps reverse engineering and in-depth knowledge of Android and iOS ecosystems. Knowledge of industry standard tools for mobile pentest. · Thorough understanding of OWASP Top 10 vulnerabilities and their mitigations. Knowledge of Network Security technology in areas of Firewall, IPS, VPN, Gateway security solutions (proxy, web filtering) · Conduct penetration test and launch exploits using Nessus, Metaspoilt, kali linux penetration testing distribution tools sets · Conduct Vulnerability Assessments of Network Devices using various open source and commercial tools · Map out a network, discover ports and services running on the different exposed network and security devices · Research and maintain proficiency in computer network exploitation, tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption. · In-depth understanding on Common Vulnerability Exposure (CVE)/ CERT advisory database. Broad background of networks, operating systems (Window, Unix, Linux), firewalls and security engineering concepts. · Knowledge of scripting languages (Perl, Python, Shell etc) will be added advantage · Knowledge of Open-Source Security Testing Methodology Manual (OSSTMM) Mandatory skill sets: CEH, ECSA, LPT (any one) Preferred skill sets: OSCP, OSWE Years of experience required: 2-10 Years Education qualification: B.Tec Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Master of Business Administration, Bachelor of Engineering Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills SailPoint IdentityIQ Optional Skills SoCs Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date Show more Show less
Posted 1 month ago
3.0 - 5.0 years
5 - 7 Lacs
Bengaluru
Work from Office
Vulnerability Identification & Assessment: Manage and oversee vulnerability scanning tools (Qualys, Tenable, Rapid7, etc.). Analyze vulnerability data from multiple sources and assess the impact on business operations. Perform risk assessments and categorize vulnerabilities based on severity and exploitability. Remediation & Risk Mitigation: Collaborate with IT and development teams to ensure timely remediation of identified vulnerabilities. Prioritize vulnerabilities based on risk to the business and potential exploitability. Track remediation efforts and ensure proper closure of security gaps. Process & Policy Development: Define and maintain vulnerability management policies, standards, and procedures. Establish workflows for vulnerability detection, reporting, remediation, and validation. Ensure compliance with security frameworks such as NIST, CIS, ISO 27001, and regulatory standards like GDPR, HIPAA, and PCI-DSS. Security Monitoring & Threat Intelligence Integration: Work with threat intelligence teams to understand emerging threats and vulnerabilities. Ensure vulnerability management aligns with incident response and threat-hunting processes. Continuously enhance detection mechanisms to improve vulnerability discovery and response. Compliance & Audit Readiness: Ensure that vulnerability management practices align with regulatory and compliance requirements. Maintain records of assessments, remediation efforts, and compliance reports for audits. Support internal and external audits related to vulnerability management. Reporting & Metrics: Develop and present vulnerability status reports to security leadership and executive teams. Track key performance indicators (KPIs) related to vulnerability remediation SLAs and risk reduction Provide insights on security posture improvements based on trend analysis. Security Awareness & Collaboration: Conduct training sessions to educate teams on vulnerability risks and remediation best practices. Work closely with DevSecOps, SOC, and infrastructure teams to integrate security best practices into the development lifecycle Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Vulnerability Management Preferred technical and professional experience Qualys
Posted 1 month ago
5.0 years
0 Lacs
Gurugram, Haryana, India
Remote
Job Title: Business Development Manager – Cybersecurity Solutions (Zscaler, SailPoint, Okta, Tenable) Location: Gurugram (Remote) Job Type: Full Time Department: Sales / Business Development Note: This is a 100% remote opportunity. MUST be ready to support US EST Shifts About Us: At Serigor Inc , a leading provider of IT services and IT staffing solutions, we specialize in delivering innovative and scalable technology solutions to the U.S. federal government. As a growing Women-Owned Small Business (WOSB), CMMI L3, we leverage our diverse team to support critical missions across various government agencies. Our commitment to quality, customer satisfaction, and continuous improvement drives our success as we expand our federal presence. Position Overview: We are looking for a dynamic and experienced Business Development Manager (BDM) to lead growth efforts across our cybersecurity solution portfolio, including but not limited to Zscaler , SailPoint , Okta , Tenable , and other identity, access, and cloud security platforms. This role will focus on driving strategic client engagements and identifying opportunities to secure and modernize enterprise environments across various sectors in the U.S.The ideal candidate brings strong cybersecurity domain knowledge, a consultative sales approach, and a proven track record of growing solution-based revenue. Key Responsibilities: Identify, pursue, and close new business opportunities for cybersecurity solutions in areas such as: Identity & Access Management (IAM) – SailPoint, Okta, Zero Trust & SASE – Zscaler, Cloud Security & Vulnerability Management – Tenable, Qualys, etc. Engage with CISOs, security architects, and IT decision-makers to understand security challenges and propose tailored solutions. Build and manage a strong pipeline of qualified opportunities across enterprise and mid-market clients. Develop go-to-market strategies in collaboration with internal teams and vendor/channel partners. Work closely with product specialists and solution architects to present high-impact demonstrations and proof-of-concept engagements. Stay current on cybersecurity trends, compliance requirements (e.g., NIST, GDPR, HIPAA), and competitive offerings. Collaborate with marketing and vendor alliance teams to run targeted campaigns, webinars, and security workshops. Negotiate pricing, licensing models, and close complex multi-stakeholder deals. Required Qualifications: Bachelor’s degree in Business, Cybersecurity, Information Systems, or a related field. 5+ years of experience in B2B sales or business development , preferably in the cybersecurity or enterprise software space. Demonstrated experience with Zscaler, SailPoint, Okta, Tenable , or similar cybersecurity platforms. Strong understanding of cybersecurity concepts, including IAM, SASE, Zero Trust, SIEM, and vulnerability management. Experience selling to enterprise and mid-market clients, particularly in regulated industries (e.g., finance, healthcare, federal). Excellent communication, presentation, and negotiation skills. Ability to work independently and manage a full sales cycle. Willingness to travel up to 25% for client meetings, conferences, or partner events. Preferred Qualifications: Technical certifications (e.g., Zscaler Certified Sales Professional, Okta Sales/Presales Accreditation, SailPoint Partner Certification). Experience working for or with MSSPs, VARs, or cybersecurity consulting firms. Familiarity with frameworks such as NIST, ISO 27001, and Zero Trust Architecture. Exposure to cloud platforms (AWS, Azure, GCP) and hybrid security environments. Show more Show less
Posted 1 month ago
7.0 years
0 Lacs
Thiruvananthapuram, Kerala, India
On-site
The world's top banks use Zafin's integrated platform to drive transformative customer value. Powered by an innovative AI-powered architecture, Zafin's platform seamlessly unifies data from across the enterprise to accelerate product and pricing innovation, automate deal management and billing, and create personalized customer offerings that drive expansion and loyalty. Zafin empowers banks to drive sustainable growth, strengthen their market position, and define the future of banking centered around customer value. Job Description Qualifications Required . Bachelor's or Master's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Equivalent professional experience is acceptable. Minimum 7+ years of experience in Azure cloud operations, with a demonstrated focus on security and vulnerability management. Proven track record of managing and securing large-scale Azure environments in production. Hands-on experience with vulnerability scanning, remediation, and compliance in enterprise cloud environments. Extensive experience in responding to and managing security incidents and threat mitigation in Azure. Technical Skills Azure Expertise : In-depth knowledge of Azure services, including but not limited to: Azure Security Center Azure Defender Azure Key Vault Azure Policy Azure Sentinel (SIEM) Azure Active Directory (Azure AD) Security and Vulnerability Tools : Proficiency with vulnerability scanning and management tools like Qualys, Tenable Nessus, or Rapid7. Experience with Azure-native security tools for threat detection and remediation. Infrastructure Hardening : Strong knowledge of security best practices for securing virtual machines, storage accounts, AKS, and network components. Familiarity with zero-trust architecture principles and implementation in Azure. Automation & Scripting : Advanced skills in scripting languages such as PowerShell, Azure CLI, Python, or other automation tools to remediate vulnerabilities and improve operational efficiency. Experience in integrating security checks into CI/CD pipelines. Certifications (Preferred or Mandatory) Azure Cloud Certifications: Microsoft Certified: Azure Administrator Associate (AZ-104) Microsoft Certified: Azure Security Engineer Associate (AZ-500) Microsoft Certified: Cybersecurity Architect Expert (SC-100) Security Certifications: Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) CompTIA Security+ GIAC certifications (e.g., GCIH, GSEC, or GCED) Other Requirements Familiarity with regulatory and compliance standards, such as ISO 27001, SOC 2, GDPR, or HIPAA. Experience in performing and supporting audits related to cloud security. Proven ability to stay current with evolving cloud and cybersecurity trends. What's in it for you Joining our team means being part of a culture that values diversity, teamwork, and high-quality work. We offer competitive salaries, annual bonus potential, generous paid time off, paid volunteering days, wellness benefits, and robust opportunities for professional growth and career advancement. Want to learn more about what you can look forward to during your career with us? Visit our careers site and our openings: zafin.com/careers Zafin welcomes and encourages applications from people with disabilities. Accommodations are available on request for candidates taking part in all aspects of the selection process. Zafin is committed to protecting the privacy and security of the personal information collected from all applicants throughout the recruitment process. The methods by which Zafin contains uses, stores, handles, retains, or discloses applicant information can be accessed by reviewing Zafin's privacy policy at https://zafin.com/privacy-notice/. By submitting a job application, you confirm that you agree to the processing of your personal data by Zafin described in the candidate privacy notice. Show more Show less
Posted 1 month ago
5.0 years
0 Lacs
Thiruvananthapuram, Kerala, India
On-site
The world's top banks use Zafin's integrated platform to drive transformative customer value. Powered by an innovative AI-powered architecture, Zafin's platform seamlessly unifies data from across the enterprise to accelerate product and pricing innovation, automate deal management and billing, and create personalized customer offerings that drive expansion and loyalty. Zafin empowers banks to drive sustainable growth, strengthen their market position, and define the future of banking centered around customer value. Job Description Qualifications Required . Bachelor's or Master's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Equivalent professional experience is acceptable. Minimum 5+ years of experience in Azure cloud operations, with a demonstrated focus on security and vulnerability management. Proven track record of managing and securing large-scale Azure environments in production. Hands-on experience with vulnerability scanning, remediation, and compliance in enterprise cloud environments. Extensive experience in responding to and managing security incidents and threat mitigation in Azure. Technical Skills Azure Expertise : In-depth knowledge of Azure services, including but not limited to: Azure Security Center Azure Defender Azure Key Vault Azure Policy Azure Sentinel (SIEM) Azure Active Directory (Azure AD) Security and Vulnerability Tools : Proficiency with vulnerability scanning and management tools like Qualys, Tenable Nessus, or Rapid7. Experience with Azure-native security tools for threat detection and remediation. Infrastructure Hardening : Strong knowledge of security best practices for securing virtual machines, storage accounts, AKS, and network components. Familiarity with zero-trust architecture principles and implementation in Azure. Automation & Scripting : Advanced skills in scripting languages such as PowerShell, Azure CLI, Python, or other automation tools to remediate vulnerabilities and improve operational efficiency. Experience in integrating security checks into CI/CD pipelines. Certifications (Preferred or Mandatory) Azure Cloud Certifications: Microsoft Certified: Azure Administrator Associate (AZ-104) Microsoft Certified: Azure Security Engineer Associate (AZ-500) Microsoft Certified: Cybersecurity Architect Expert (SC-100) Security Certifications: Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) CompTIA Security+ GIAC certifications (e.g., GCIH, GSEC, or GCED) Other Requirements Familiarity with regulatory and compliance standards, such as ISO 27001, SOC 2, GDPR, or HIPAA. Experience in performing and supporting audits related to cloud security. Proven ability to stay current with evolving cloud and cybersecurity trends. What's in it for you Joining our team means being part of a culture that values diversity, teamwork, and high-quality work. We offer competitive salaries, annual bonus potential, generous paid time off, paid volunteering days, wellness benefits, and robust opportunities for professional growth and career advancement. Want to learn more about what you can look forward to during your career with us? Visit our careers site and our openings: zafin.com/careers Zafin welcomes and encourages applications from people with disabilities. Accommodations are available on request for candidates taking part in all aspects of the selection process. Zafin is committed to protecting the privacy and security of the personal information collected from all applicants throughout the recruitment process. The methods by which Zafin contains uses, stores, handles, retains, or discloses applicant information can be accessed by reviewing Zafin's privacy policy at https://zafin.com/privacy-notice/. By submitting a job application, you confirm that you agree to the processing of your personal data by Zafin described in the candidate privacy notice. Show more Show less
Posted 1 month ago
2.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Senior Associate Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. Those in penetration testing at PwC will focus on penetration testing (or pen testing) which is a security exercise where a cybersecurity consultant attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defences which attackers could take advantage of. *Why PWC At PwC , you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC , we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations Job Description & Summary: Job Description & Summary: We are seeking a highly skilled and experienced Cybersecurity/Risk Consulting Senior Associate to join our Risk Consulting team. As a Cybersecurity Senior Associate, you will be responsible for leading and managing a team of consultants to deliver high-quality cybersecurity and risk management services to our clients. Responsibilities: Key Responsibilities: · Good interpersonal skills (written and oral communication) and ability to articulate complex issues · Ability to communicate technical · information clearly and concisely, commensurate with the audience · Conceptual thinking and communication skills — the ability to conceptualize complex business and technical requirements into comprehensible models and templates. · Good communicator (written and verbal) and listener. · Must be a team player and motivated self-starter with ability to work independently with limited supervision. · Must be assertive, methodical and detail oriented Technical Experience: · Experience in Web and Mobile Application Security Testing, Vulnerability Assessment and Penetration testing · Analyze scan reports and suggest remediation / mitigation plan for security vulnerabilities · Should be aware of tools like Qualys, HP Fortify, IBM Appscan, Burpsuite, Kali Linux suite of tools · Expertise in mobile apps reverse engineering and in-depth knowledge of Android and iOS ecosystems. Knowledge of industry standard tools for mobile pentest. · Thorough understanding of OWASP Top 10 vulnerabilities and their mitigations. Knowledge of Network Security technology in areas of Firewall, IPS, VPN, Gateway security solutions (proxy, web filtering) · Conduct penetration test and launch exploits using Nessus, Metaspoilt, kali linux penetration testing distribution tools sets · Conduct Vulnerability Assessments of Network Devices using various open source and commercial tools · Map out a network, discover ports and services running on the different exposed network and security devices · Research and maintain proficiency in computer network exploitation, tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption. · In-depth understanding on Common Vulnerability Exposure (CVE)/ CERT advisory database. Broad background of networks, operating systems (Window, Unix, Linux), firewalls and security engineering concepts. · Knowledge of scripting languages (Perl, Python, Shell etc) will be added advantage · Knowledge of Open-Source Security Testing Methodology Manual (OSSTMM) Mandatory skill sets: CEH, ECSA, LPT (any one) Preferred skill sets: OSCP, OSWE Years of experience required: 2-10 Years Education qualification: B.Tec Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Technology Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Bash (Programming Language), Common Vulnerability Scoring System (CVSS), Communication, Creativity, Cybersecurity, Embracing Change, Emotional Regulation, Empathy, Encryption, Ethical Hacking, Firewall (Network Security), Inclusion, Information Security, Information Security Management System (ISMS), Information Security Risk Assessments, Intellectual Curiosity, Intrusion Detection System (IDS), IT Infrastructure, Kali Linux, Learning Agility, Microsoft Active Directory {+ 25 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date Show more Show less
Posted 1 month ago
2.0 years
0 Lacs
Greater Kolkata Area
On-site
Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Manager Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively. *Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a highly skilled and experienced Cybersecurity/Risk Consulting Senior Associate to join our Risk Consulting team. As a Cybersecurity Senior Associate, you will be responsible for leading and managing a team of consultants to deliver high-quality cybersecurity and risk management services to our clients. Responsibilities: Key Responsibilities: · Good interpersonal skills (written and oral communication) and ability to articulate complex issues · Ability to communicate technical · information clearly and concisely, commensurate with the audience · Conceptual thinking and communication skills — the ability to conceptualize complex business and technical requirements into comprehensible models and templates. · Good communicator (written and verbal) and listener. · Must be a team player and motivated self-starter with ability to work independently with limited supervision. · Must be assertive, methodical and detail oriented Technical Experience: · Experience in Web and Mobile Application Security Testing, Vulnerability Assessment and Penetration testing · Analyze scan reports and suggest remediation / mitigation plan for security vulnerabilities · Should be aware of tools like Qualys, HP Fortify, IBM Appscan, Burpsuite, Kali Linux suite of tools · Expertise in mobile apps reverse engineering and in-depth knowledge of Android and iOS ecosystems. Knowledge of industry standard tools for mobile pentest. · Thorough understanding of OWASP Top 10 vulnerabilities and their mitigations. Knowledge of Network Security technology in areas of Firewall, IPS, VPN, Gateway security solutions (proxy, web filtering) · Conduct penetration test and launch exploits using Nessus, Metaspoilt, kali linux penetration testing distribution tools sets · Conduct Vulnerability Assessments of Network Devices using various open source and commercial tools · Map out a network, discover ports and services running on the different exposed network and security devices · Research and maintain proficiency in computer network exploitation, tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption. · In-depth understanding on Common Vulnerability Exposure (CVE)/ CERT advisory database. Broad background of networks, operating systems (Window, Unix, Linux), firewalls and security engineering concepts. · Knowledge of scripting languages (Perl, Python, Shell etc) will be added advantage · Knowledge of Open-Source Security Testing Methodology Manual (OSSTMM) Mandatory skill sets: CEH, ECSA, LPT (any one) Preferred skill sets: OSCP, OSWE Years of experience required: 2-10 Years Education qualification: B.Tech Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Technology Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills SoCs Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Coaching and Feedback, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Learning Agility, Managed Services, Optimism, Privacy Compliance, Professional Courage {+ 13 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date Show more Show less
Posted 1 month ago
12.0 years
0 Lacs
Gurugram, Haryana, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cybersecurity Enterprise Solution Architect Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of over 900 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team help protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting, and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Security Technology Services (STS) group is a division of Information Security that ensures secure access to systems and information for more than 390,000 people in over 150 countries. A Solution Architect focused on Data and Application protection on the STS team is responsible for turning strategic plans into reality by producing architectural designs, leading the development and implementation of solutions, and offering security advice to project teams. This person will also oversee experimental projects to determine the best technology choices for integration into EY's infrastructure. Your Key Responsibilities Connect with key stakeholders, cybersecurity experts, and operational teams within the information security department to help create security solutions that work well on a large scale. Collaborate with Enterprise Architects to make sure solutions are in line with the company's long-term goals, follow design guidelines, and contribute to the direction of projects when necessary. Turn business requirements into technical specifications for solutions, considering risks, dependencies, costs, and the overall risk of the technical solution. Lead the technical side of evaluating and choosing technologies through Requests for Information (RFI) and Requests for Proposal (RFP), which includes: Defining the criteria that will influence technology choices and solution development. Recommending technologies while engaging with key people. Oversee experimental projects, designs, and the actual building of solutions from an architectural standpoint. Create and update documents that describe solution architecture to guide the planning, design, and implementation of the chosen solution. Keep up with the latest in the industry, research thoroughly, and continuously learn about new security technologies. Share expertise with project teams, governance groups, and other audiences as required. Stay informed about the latest trends, developments, and driving factors in the industry and incorporate them into architectural work. Propose standards and reuse solutions for security technology. Travel requirements Skills And Attributes For Success Skilled in guiding the development and strategic direction of solution architecture. Profound knowledge in Security Technologies, including: Cloud Application Security Solutions – Integration with AppSec, DevOps (IDE/CI/CD), and Software Composition Analysis (SCA). Vulnerability Management tools such as AquaSec, Qualys, Wiz, CheckMarx, and MS Defender (VM/XDR/AV/FW) Data Protection technologies like Thales, Microsoft Purview solutions such as DLP, eDiscovery, etc. Proficiency in data services such as Azure Data Factory, Synapse, SQL, Machine Learning, and PowerBI Analytics. Deep expertise in Security Capabilities, encompassing: Mastery of encryption algorithms, key management, and cryptographic protocols for data security. Securing databases through access controls, encryption, monitoring, and vulnerability management. Application security tools expertise, including web application firewalls (WAF), intrusion detection/prevention systems (IDS/IPS), and vulnerability scanners. Risk identification, evaluation, prioritization, and mitigation for data and application security. Data Loss Prevention (DLP) strategies and tools to safeguard sensitive data. Extensive hands-on experience with Application Security, Data Architecture, Security Analytics, and Threat Intelligence solutions. Familiarity with application security frameworks and standards, such as NIST and ISO 27001. Knowledge of secure software development lifecycle (SSDLC) processes. Practical experience in applying security controls across various programming languages and frameworks. Quick learner, able to gain expertise in new technology areas swiftly. Flexible and capable of adapting to the ever-changing landscape of technology and global complexities. Proven track record in fostering client-service relationships and valuing internal customers. Exceptional communication and presentation abilities, with effectiveness in engaging executive leadership. Consideration for the perspectives of diverse audiences, both technical and non-technical. Experience in crafting security architecture documentation, including vision statements and Solution Architecture (SA) Design documents. Well-versed in common Information Security practices and the domains covered by the CISSP certification. Aptitude for identifying and implementing opportunities for cybersecurity improvements and transformations. To qualify for the role, you must have Degree in Computer Science, Engineering or equivalent work experience 12+ years of experience in the Information Technology field 2+ years of senior architecture experience, exposure to enterprise architecture teams. 3+ years working with network protection technologies Ideally, you’ll also have one or more Security certification such as CISSP or CISM TOGAF and/or SABSA architecture framework SANS Certifications including: GSEC, ECSA, ECSP What We Look For Deep critical thinking skills demonstrating analytical and systematic approach to problem solving Experience working in a global virtual environment Excellent written & verbal communication skills, including preparation & delivery of presentations Good judgment, tact, and decision-making ability Ability to understand and integrate cultural differences and motives and to work with cross cultural teams. Ability to deal with ambiguity and change, and exercise appropriate time management to meet objectives Ability to work autonomously but also within a team environment where necessary What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial, and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
12.0 years
0 Lacs
Kochi, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cybersecurity Enterprise Solution Architect Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of over 900 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team help protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting, and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Security Technology Services (STS) group is a division of Information Security that ensures secure access to systems and information for more than 390,000 people in over 150 countries. A Solution Architect focused on Data and Application protection on the STS team is responsible for turning strategic plans into reality by producing architectural designs, leading the development and implementation of solutions, and offering security advice to project teams. This person will also oversee experimental projects to determine the best technology choices for integration into EY's infrastructure. Your Key Responsibilities Connect with key stakeholders, cybersecurity experts, and operational teams within the information security department to help create security solutions that work well on a large scale. Collaborate with Enterprise Architects to make sure solutions are in line with the company's long-term goals, follow design guidelines, and contribute to the direction of projects when necessary. Turn business requirements into technical specifications for solutions, considering risks, dependencies, costs, and the overall risk of the technical solution. Lead the technical side of evaluating and choosing technologies through Requests for Information (RFI) and Requests for Proposal (RFP), which includes: Defining the criteria that will influence technology choices and solution development. Recommending technologies while engaging with key people. Oversee experimental projects, designs, and the actual building of solutions from an architectural standpoint. Create and update documents that describe solution architecture to guide the planning, design, and implementation of the chosen solution. Keep up with the latest in the industry, research thoroughly, and continuously learn about new security technologies. Share expertise with project teams, governance groups, and other audiences as required. Stay informed about the latest trends, developments, and driving factors in the industry and incorporate them into architectural work. Propose standards and reuse solutions for security technology. Travel requirements Skills And Attributes For Success Skilled in guiding the development and strategic direction of solution architecture. Profound knowledge in Security Technologies, including: Cloud Application Security Solutions – Integration with AppSec, DevOps (IDE/CI/CD), and Software Composition Analysis (SCA). Vulnerability Management tools such as AquaSec, Qualys, Wiz, CheckMarx, and MS Defender (VM/XDR/AV/FW) Data Protection technologies like Thales, Microsoft Purview solutions such as DLP, eDiscovery, etc. Proficiency in data services such as Azure Data Factory, Synapse, SQL, Machine Learning, and PowerBI Analytics. Deep expertise in Security Capabilities, encompassing: Mastery of encryption algorithms, key management, and cryptographic protocols for data security. Securing databases through access controls, encryption, monitoring, and vulnerability management. Application security tools expertise, including web application firewalls (WAF), intrusion detection/prevention systems (IDS/IPS), and vulnerability scanners. Risk identification, evaluation, prioritization, and mitigation for data and application security. Data Loss Prevention (DLP) strategies and tools to safeguard sensitive data. Extensive hands-on experience with Application Security, Data Architecture, Security Analytics, and Threat Intelligence solutions. Familiarity with application security frameworks and standards, such as NIST and ISO 27001. Knowledge of secure software development lifecycle (SSDLC) processes. Practical experience in applying security controls across various programming languages and frameworks. Quick learner, able to gain expertise in new technology areas swiftly. Flexible and capable of adapting to the ever-changing landscape of technology and global complexities. Proven track record in fostering client-service relationships and valuing internal customers. Exceptional communication and presentation abilities, with effectiveness in engaging executive leadership. Consideration for the perspectives of diverse audiences, both technical and non-technical. Experience in crafting security architecture documentation, including vision statements and Solution Architecture (SA) Design documents. Well-versed in common Information Security practices and the domains covered by the CISSP certification. Aptitude for identifying and implementing opportunities for cybersecurity improvements and transformations. To qualify for the role, you must have Degree in Computer Science, Engineering or equivalent work experience 12+ years of experience in the Information Technology field 2+ years of senior architecture experience, exposure to enterprise architecture teams. 3+ years working with network protection technologies Ideally, you’ll also have one or more Security certification such as CISSP or CISM TOGAF and/or SABSA architecture framework SANS Certifications including: GSEC, ECSA, ECSP What We Look For Deep critical thinking skills demonstrating analytical and systematic approach to problem solving Experience working in a global virtual environment Excellent written & verbal communication skills, including preparation & delivery of presentations Good judgment, tact, and decision-making ability Ability to understand and integrate cultural differences and motives and to work with cross cultural teams. Ability to deal with ambiguity and change, and exercise appropriate time management to meet objectives Ability to work autonomously but also within a team environment where necessary What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial, and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
12.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cybersecurity Enterprise Solution Architect Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of over 900 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team help protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting, and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Security Technology Services (STS) group is a division of Information Security that ensures secure access to systems and information for more than 390,000 people in over 150 countries. A Solution Architect focused on Data and Application protection on the STS team is responsible for turning strategic plans into reality by producing architectural designs, leading the development and implementation of solutions, and offering security advice to project teams. This person will also oversee experimental projects to determine the best technology choices for integration into EY's infrastructure. Your Key Responsibilities Connect with key stakeholders, cybersecurity experts, and operational teams within the information security department to help create security solutions that work well on a large scale. Collaborate with Enterprise Architects to make sure solutions are in line with the company's long-term goals, follow design guidelines, and contribute to the direction of projects when necessary. Turn business requirements into technical specifications for solutions, considering risks, dependencies, costs, and the overall risk of the technical solution. Lead the technical side of evaluating and choosing technologies through Requests for Information (RFI) and Requests for Proposal (RFP), which includes: Defining the criteria that will influence technology choices and solution development. Recommending technologies while engaging with key people. Oversee experimental projects, designs, and the actual building of solutions from an architectural standpoint. Create and update documents that describe solution architecture to guide the planning, design, and implementation of the chosen solution. Keep up with the latest in the industry, research thoroughly, and continuously learn about new security technologies. Share expertise with project teams, governance groups, and other audiences as required. Stay informed about the latest trends, developments, and driving factors in the industry and incorporate them into architectural work. Propose standards and reuse solutions for security technology. Travel requirements Skills And Attributes For Success Skilled in guiding the development and strategic direction of solution architecture. Profound knowledge in Security Technologies, including: Cloud Application Security Solutions – Integration with AppSec, DevOps (IDE/CI/CD), and Software Composition Analysis (SCA). Vulnerability Management tools such as AquaSec, Qualys, Wiz, CheckMarx, and MS Defender (VM/XDR/AV/FW) Data Protection technologies like Thales, Microsoft Purview solutions such as DLP, eDiscovery, etc. Proficiency in data services such as Azure Data Factory, Synapse, SQL, Machine Learning, and PowerBI Analytics. Deep expertise in Security Capabilities, encompassing: Mastery of encryption algorithms, key management, and cryptographic protocols for data security. Securing databases through access controls, encryption, monitoring, and vulnerability management. Application security tools expertise, including web application firewalls (WAF), intrusion detection/prevention systems (IDS/IPS), and vulnerability scanners. Risk identification, evaluation, prioritization, and mitigation for data and application security. Data Loss Prevention (DLP) strategies and tools to safeguard sensitive data. Extensive hands-on experience with Application Security, Data Architecture, Security Analytics, and Threat Intelligence solutions. Familiarity with application security frameworks and standards, such as NIST and ISO 27001. Knowledge of secure software development lifecycle (SSDLC) processes. Practical experience in applying security controls across various programming languages and frameworks. Quick learner, able to gain expertise in new technology areas swiftly. Flexible and capable of adapting to the ever-changing landscape of technology and global complexities. Proven track record in fostering client-service relationships and valuing internal customers. Exceptional communication and presentation abilities, with effectiveness in engaging executive leadership. Consideration for the perspectives of diverse audiences, both technical and non-technical. Experience in crafting security architecture documentation, including vision statements and Solution Architecture (SA) Design documents. Well-versed in common Information Security practices and the domains covered by the CISSP certification. Aptitude for identifying and implementing opportunities for cybersecurity improvements and transformations. To qualify for the role, you must have Degree in Computer Science, Engineering or equivalent work experience 12+ years of experience in the Information Technology field 2+ years of senior architecture experience, exposure to enterprise architecture teams. 3+ years working with network protection technologies Ideally, you’ll also have one or more Security certification such as CISSP or CISM TOGAF and/or SABSA architecture framework SANS Certifications including: GSEC, ECSA, ECSP What We Look For Deep critical thinking skills demonstrating analytical and systematic approach to problem solving Experience working in a global virtual environment Excellent written & verbal communication skills, including preparation & delivery of presentations Good judgment, tact, and decision-making ability Ability to understand and integrate cultural differences and motives and to work with cross cultural teams. Ability to deal with ambiguity and change, and exercise appropriate time management to meet objectives Ability to work autonomously but also within a team environment where necessary What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial, and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
4.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Qualys, Inc is a pioneer and leading provider of disruptive cloud-based IT, security and compliance solutions with over 10,000+ active customers in more than 130 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes, and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance, and protection for IT systems and web applications across on premises, endpoints, cloud, containers, and mobile environments. As a BI ETL Developer, you’ll be responsible for designing data solutions, optimizing our data pipeline architecture, as well as developing infrastructure for data collection to support cross functional teams in the BI & Analytics Organization. You will also contribute towards building reports, dashboards and analytics for the entire organization including Product, Pricing, Finance, Sales and Marketing Teams. Your ability to creatively collaborate and execute team goals will affect scalability and directly contribute to the company growth and profitability. Responsibilities Plan, design, develop, test, implement, and maintain BI ETL pipeline in DWH environment. Build the data model for optimal extraction, transformation, and loading of data from a wide variety of data sources. Analyze source data using complex SQL queries to come up with best possible data model design and development. Debug and tune ETLs, reports and dashboards by analyzing relevant SQL queries. Optimize data systems to support our data initiatives, increase operational efficiency, improve collaboration and knowledge sharing. Gather, analyze, and document business requirements and translate into technical specifications, prototypes, and end state products. Work closely with Executive Management, Software Engineers, Data Engineers, Quality Engineers, and various cross functional team members to design, build, test, and maintain analytics solutions. Requirements 4-7 years of proven experience in Data Warehousing, ETL and Business Intelligence. Highly proficient in data analysis and troubleshooting skills with ability to write complex SQL queries. Advanced SQL knowledge and in-depth ETL development experience. Strong knowledge of Data Warehousing and Multidimensional Data Modeling. Tableau or other reporting tool experience preferred. Cloud based DWH & ETL Tool experience good to have Strong ability to multi-task and meet deadlines. Excellent verbal and written communication skills. Work independently and self-learning without much guidance. Experience in gathering and understanding requirements from executive management. A successful history of integrating source systems and delivering self-serve Business Intelligence. Education: BE, B.Tech, MCA in Computer Science, Engineering, Information Technology/Systems or another related discipline. Additional technical certifications are a plus. Show more Show less
Posted 1 month ago
7.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! We are seeking a talented Lead Software Engineer to develop features for our EDR Product. Working with a team of engineers and architects, you will be responsible for prototyping, designing, developing, and supporting a highly scalable SaaS based EDR product. This is a great opportunity to be an integral part of a team building Qualys’ next generation Micro-Services based technology platform and work on challenging and business-impacting projects. Responsibilities: You will be designing and developing EDR Product in the cloud. You will be building highly scalable microservices and data processing pipelines. You will be working on Java based microservices with clean, extensible code adopting suited design principles and patterns. You will be responsible to design, develop, maintain products to process events and serve REST APIs. Researching and implementing for code design, adoption of new technologies and skills. Qualifications: Bachelors/Masters/Doctorate in Computer Science or equivalent 7+ years of experience with Java 8. 3+ years of experience in Spring/Spring-Boot, microservices 2+ years of experience in Kafka Hands on experience on Spring Boot, Hibernate. Strong logical skills for code design and implementation. Writing high-performance, reliable, and maintainable code. Experience in designing streaming applications, developing, and delivering scalable solutions. Good knowledge of SQL, advanced data structures, design patterns, object-oriented principles. Should be well versed with Java 8. Good to have: Experience in Docker, Kubernetes. Experience in NO-SQL databases like Elastic Search, Cassandra etc. Experience in stream processing with Kafka and related open-source tools/technologies. Experience in Apache Flink, Siddhi queries. Knowledge of Security log sources. Show more Show less
Posted 1 month ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
Qualys is looking for a Recruiting Intern to join our Talent Acquisition team. Responsibilities Create an exceptional experience for all candidates and interviewers throughout the interview process. Schedule phone interviews, video interviews, and onsite interviews. Act as primary contact and host to candidates and interviewers, communicate interview details, and adjust interview schedule as needed. Maintain accurate data in the applicant tracking system (Workday). Collaborate and assist the recruiting team in ongoing process improvement initiatives Qualifications Bachelor’s Degree Proficiency with Outlook, Word, Excel Strong written and verbal communication skills Ability to thrive in a fast-paced environment Show more Show less
Posted 1 month ago
4.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Company Description About CyberArk : CyberArk (NASDAQ: CYBR), is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit our CyberArk blogs or follow us on X, LinkedIn or Facebook. Job Description Responsibilities: Collaborate with engineering teams on architecting, implementing technologies, processes, and improvements around product security by performing threat models, penetrations tests, and sharing security expertise. Develop security testing plans to identify misconfigurations, vulnerabilities, and visibility shortfalls. Assist, mentor, and educate about internal secure development methodologies and CyberArk "Security Champions" program. Critical skills: 4+ years of experience working in the software development industry as a test engineer or an engineer with responsibilities relating to security. Background in Whitebox penetration testing. Bachelor’s degree in Computer Science, Computer Information Systems, Software Engineering, or Mathematics or a related field, or its equivalent. Programming experience in one or more languages (Java, JavaScript, Python, Shell/BASH, C/C, C#). Qualifications Desirable skills: OSCP certification a huge plus. Experience with web application scanning tools (e.g. Static / Dynamic, Interactive, etc.) including Qualys WAS, Appspider, Acutenitx, Veracode, Burp Suite, Netsparker, OWASP Zap, Checkmarx, Whitesource, Snyk or similar. Past development expertise or operational or consultative experience supporting application security teams. Threat modeling experience. Experience using source code management tools such as Perforce, GIT or equivalent. Strong debugging skills and experience performing security code reviews. Experience with Active Directory and/or LDAP. Understanding of PKI, Certificate security, encryption, HTTPS. Strong written and oral communication and collaboration skills, ability to collaborate effectively in team, across team and with management and other disciplines. Experience working with product management, engineering and ops to help them buy into a potentially disruptive, but important, security update/change. Demonstrated security research activities (e.g. participation in bug bounties or credit for reporting CVEs). Show more Show less
Posted 1 month ago
2.0 years
0 Lacs
Nagaland
On-site
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. ͏ We are looking for an experienced ServiceNow developer to join our ServiceNow Risk and Security Operations practice as a senior consultant to support client implementation projects. The ideal candidate will have a strong background in ServiceNow implementation projects, with at least one project involving ServiceNow Risk solutions (i.e., Integrated Risk Management, Third Party Risk Management, Business Continuity Management). Our team brings technical expertise, real-world experience, strong executive engagement skills, and an inspirational mindset to help our customers understand the opportunities of the “platform of platforms” vision. We act as Trusted Partners for our customers’ most complex solutions, designed to ensure that they can rapidly realize the value they need. We do this by leveraging best practices and industry standards to build customer trust and architect best-in-class solutions. While collaborating with customers, and the wider ServiceNow Risk and Security Operations delivery team, the right candidate will be able to implement ServiceNow solutions based on requirements and architectural designs approved by the client. The candidate will also lead and participate in the delivery of demonstrations, workshops, best practice overviews, and educational sessions for customers. KEY RESPONSIBILITIES: Gather and document client requirements as part of a ServiceNow implementation project. Configure and test ServiceNow Risk solutions. Be a technical delivery resource, ensuring delivery excellence, aligned to ServiceNow Risk practice expectations. Stay current with new developments in the ServiceNow platform and apply that knowledge to client solutions REQUIRED QUALIFICATIONS: Minimum of 2 years of ServiceNow developer experience. Strong understanding of ServiceNow platform, including experience with custom development, integrations, and workflows. Strong problem-solving and analytical skills. ServiceNow Certified System Administrator certification. Experience working in a consulting environment. PREFERRED QUALIFICATIONS: ServiceNow Certified Implementation Specialist certification in one or more of the following: Risk and Compliance. Third-party Risk Management (TPRM) Implementer. Micro-Certification - Business Continuity Management. ServiceNow Certified Application Developer certifications. Experience in working with an integrated global practice. Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and/or Certified Information Security Manager (CISM) Experience working with industry-leading security operations tools (e.g., CyberXM, Rapid7, Qualys, Tenable, Prisma, Snyk, Veracode, Wiz, Orca, Tanium, Splunk, QRadar. Carbon Black, CrowdStrike, ProofPoint, Cisco, etc). ͏ Mandatory Skills: ServiceNow - GRC. Experience: 8-10 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
12.0 years
0 Lacs
Bengaluru
On-site
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. Job Description Job Summary: Experienced Vulnerability Management and penetration testing Governance lead will manage a team to oversee the identification, assessment, and remediation of security vulnerabilities across enterprise systems. This role will focus on establishing a proactive security posture, ensuring compliance with industry standards, and driving governance initiatives to mitigate risks effectively along with strong leadership and project management skills. Vulnerability Assessment: Lead regular vulnerability scans and penetration testing across infrastructure, cloud environments and outside-In. Security Baseline: Lead development and implementation of Security Baseline using CIS Benchmarks by determining the systems, applications, and network devices to be secured (e.g., Windows, Linux, Cloud, Docker, Kubernetes). Risk Analysis & Prioritization: Evaluate identified vulnerabilities based on severity, exploitability, and potential business impact. Remediation Planning: Collaborate with IT, security, engineering and entity teams to ensure timely remediation of high-risk vulnerabilities. Governance & Compliance: Develop and enforce security governance frameworks in line with industry standards (e.g., NIST, CIS, ISO 27001, PCI-DSS). ͏ Threat Intelligence Integration : Leverage global threat intelligence feeds to stay ahead of emerging security threats and vulnerabilities. Security Policy Development: Define policies and best practices for vulnerability management, reporting, and remediation. Automation & Continuous Monitoring: Implement automated vulnerability scanning tools and ensure ongoing security assessments. Incident Response Support: Provide technical guidance in vulnerability-related security incidents and audits. Reporting & Metrics: Establish key risk indicators and provide executive reports on vulnerability trends and remediation progress. ͏ Experience: 12+ years in cybersecurity, vulnerability management, or Penetration testing roles. Technical Expertise: Hands-on experience with vulnerability scanning tools (e.g., Qualys, Tenable, Rapid7, Nessus, OpenVAS), penetration testing and threat intelligence platforms. Penetration Testing & Ethical Hacking : Experience with tools like Metasploit, Burp Suite, Nmap, and Wireshark for real-world security assessments. Security Framework Knowledge: Strong understanding of NIST, CIS benchmarks, OWASP Top 10, and CVSS scoring models. Compliance Awareness: Familiarity with regulatory standards affecting security risk management. Leadership & Communication: Ability to coordinate with multiple stakeholders, drive security improvements, and articulate risks effectively. Certifications such as CISSP, CISM, CEH, OSCP or equivalent. Experience in cloud vulnerability management (AWS, Azure, GCP). Knowledge of DevSecOps practices and security automation. ͏ ͏ Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
0 years
0 Lacs
Bengaluru East, Karnataka, India
On-site
Bangalore/ Gurgaon, India A security analyst role within the Global Technology Transversal Application Services (TAS) function, supporting the provision of a robust and consistent security scanning, remediation, and guidance service within the TAS Application Operations team. The team provides a global, centralized Operations, Governance, Audit, Risk & Security service across Application Delivery. What You’ll Be DOING What will your essential responsibilities include? Support the Application Operations (Security) team in all security related activities, forums and discussions. Perform application scanning across the Application Delivery estate using tools such as SonarQube, Checkmarx, JFrog Xray, CAST Highlight, Defender and Qualys. Assist in setting up Jenkins pipeline integration to CI/CD lifecycle. Perform Static Application Security Testing (SAST) and Software Composition Analysis (SCA), including analysis of components in applications to detect vulnerabilities and compliance issues. Work with Application Delivery teams to communicate the outcome of scanning and analysis, and agree remediation actions including target dates for completion, in alignment with Information Security Policy requirements. Assist in Risk Assessments, evaluating the severity of identified vulnerabilities and prioritizing remediation efforts based on potential impact to the organization. Assist in Policy development, contributing to the development and implementation of vulnerability management policies and procedures. Manage the production of reporting and metrics to both internal and external stakeholders. You will report to the Operations Lead. What You Will BRING We’re looking for someone who has these abilities and skills: Required Skills And Abilities Security First mindset. Understanding of vulnerability analysis, scanning and remediation processes. Understanding of CVEs, CVSS. Understanding of security industry compliancy benchmarks and standards i.e. CIS. Understanding of security best practices/standards i.e. OWASP, NIST. Preferable experience with at least 2 coding languages i.e. Java, .NET, C++, Python etc. Desired Skills And Abilities Outstanding analytical, critical thinking and organizational skills, ability to multitask and work to deadlines. Proficiency in Power BI, MS Work and MS Excel: We maintain and continually develop a number of Power BI Dashboards to support provision of critical data and use Excel to support our data capture and analysis and reporting. Excellent communication, interpersonal and relationship building skills (verbal and written) Who WE are AXA XL, the P&C and specialty risk division of AXA, is known for solving complex risks. For mid-sized companies, multinationals and even some inspirational individuals we don’t just provide re/insurance, we reinvent it. How? By combining a comprehensive and efficient capital platform, data-driven insights, leading technology, and the best talent in an agile and inclusive workspace, empowered to deliver top client service across all our lines of business − property, casualty, professional, financial lines and specialty. With an innovative and flexible approach to risk solutions, we partner with those who move the world forward. Learn more at axaxl.com What we OFFER Inclusion AXA XL is committed to equal employment opportunity and will consider applicants regardless of gender, sexual orientation, age, ethnicity and origins, marital status, religion, disability, or any other protected characteristic. At AXA XL, we know that an inclusive culture and a diverse workforce enable business growth and are critical to our success. That’s why we have made a strategic commitment to attract, develop, advance and retain the most diverse workforce possible, and create an inclusive culture where everyone can bring their full selves to work and can reach their highest potential. It’s about helping one another — and our business — to move forward and succeed. Five Business Resource Groups focused on gender, LGBTQ+, ethnicity and origins, disability and inclusion with 20 Chapters around the globe Robust support for Flexible Working Arrangements Enhanced family friendly leave benefits Named to the Diversity Best Practices Index Signatory to the UK Women in Finance Charter Learn more at axaxl.com/about-us/inclusion-and-diversity. AXA XL is an Equal Opportunity Employer. Total Rewards AXA XL’s Reward program is designed to take care of what matters most to you, covering the full picture of your health, wellbeing, lifestyle and financial security. It provides competitive compensation and personalized, inclusive benefits that evolve as you do. We’re committed to rewarding your contribution for the long term, so you can be your best self today and look forward to the future with confidence. Sustainability At AXA XL, Sustainability is integral to our business strategy. In an ever-changing world, AXA XL protects what matters most for our clients and communities. We know that sustainability is at the root of a more resilient future. Our 2023-26 Sustainability strategy, called “Roots of resilience”, focuses on protecting natural ecosystems, addressing climate change, and embedding sustainable practices across our operations. Our Pillars Valuing nature: How we impact nature affects how nature impacts us. Resilient ecosystems - the foundation of a sustainable planet and society - are essential to our future. We’re committed to protecting and restoring nature - from mangrove forests to the bees in our backyard - by increasing biodiversity awareness and inspiring clients and colleagues to put nature at the heart of their plans. Addressing climate change: The effects of a changing climate are far reaching and significant. Unpredictable weather, increasing temperatures, and rising sea levels cause both social inequalities and environmental disruption. We're building a net zero strategy, developing insurance products and services, and mobilizing to advance thought leadership and investment in societal-led solutions. Integrating ESG: All companies have a role to play in building a more resilient future. Incorporating ESG considerations into our internal processes and practices builds resilience from the roots of our business. We’re training our colleagues, engaging our external partners, and evolving our sustainability governance and reporting. AXA Hearts in Action: We have established volunteering and charitable giving programs to help colleagues support causes that matter most to them, known as AXA XL’s “Hearts in Action” programs. These include our Matching Gifts program, Volunteering Leave, and our annual volunteering day - the Global Day of Giving. For more information, please see axaxl.com/sustainability. Show more Show less
Posted 1 month ago
0 years
0 Lacs
Ahmedabad, Gujarat, India
On-site
Position SecOps Engineer Job Description Good Experience with AWS Prior experience of CloudOps / DevOps is preferred Exposure to Production Cloud infrastructure. Vulnerability Management Working on Wiz Cloud Security – Handling cloud security posture using Wiz. PCI Scanning & Reporting (Qualys) – Conducting PCI scans, generating reports, and ensuring compliance. Weekly Reporting & Coordination – Creating vulnerability reports and collaborating with respective teams (Dev, Eng, Infra) for remediation. Cloud Security & Native Services – Familiar with cloud security concepts and services like EKS, ECS, and Docker. Qualifications And Experience Bachelor’s degree in Software Engineering, Computer Science, Computer Engineering, or related Engineering discipline; Master’s degree or higher from IIT/IISc or other premier institutes preferred. In depth knowledge and experience of AWS (Amazon Web Service) IoT platform and services. Hands-on experience about build and deployment for Nodejs, reactjs, react native, GO, typescript and python code based. Having good experience in AWS Security, Identity, & Compliance services. Having good experience in AWS Management & Governance services. Having good experience in deployment framework. (GitHub, Gitlab, Jenkins). Having good experience in Configuring and deploying Android and IOS application CI/CD platforms like Bitrise. AWS Professional Certified will get weightage. Exposure to Kibana and have experience in Red hat. Knowledge of code promotion workflow where promotion/rollback of code should be integrated with any tool like Jira. Handled stack auto scaling for any incident raised. Also have depth knowledge of python and CloudFormation. Having good experience in AWS DevOps tools services. Must be experience in creation and assignment of IAM roles and policy’s. Must have experience in IaC (AWS cli and AWS Boto lib). Strong understanding of techniques such as Continuous Integration, Continuous Delivery, Test Driven Development, Cloud Development, resiliency, security AWS Cost optimization. AWS Monitoring and Scaling. Having excellent knowledge in GIT workflow with staging environment using AWS devops tools. Experience in containerized deployments & container orchestration Experience in provisioning environments, infrastructure management & monitoring Experience in designing the HA Architecture and DC-DR setup. Experience in agile development, stage gate process, minimum viable product development, and DevOps tools. Location: IN-GJ-Ahmedabad, India-Ognaj (eInfochips) Time Type Full time Job Category Engineering Services Show more Show less
Posted 1 month ago
3.0 years
0 Lacs
Chennai, Tamil Nadu, India
Remote
About Us: Barry-Wehmiller is a diversified global supplier of engineering consulting and manufacturing technology for the packaging, corrugating, sheeting and paper-converting industries. By blending people-centric leadership with disciplined operational strategies and purpose-driven growth, Barry-Wehmiller has become a $3 billion organization with nearly 12,000 team members united by a common belief: to use the power of business to build a better world. Job Description: About Barry Wehmiller: - Barry Wehmiller Companies is a global supplier of manufacturing technology and services based in St. Louis Missouri. Although it was founded in 1885 as a maker of machinery for the brewing industry, since 1987 Barry-Wehmiller has acquired more than 80 companies that provide equipment and services for a variety of industries: packaging, paper converting, sheeting, corrugating, engineering, and IT consulting. In 2016 it was ranked no. 10 on the St. Louis Business Journal's list of the city's Top 150 Privately Held Companies. We believe our culture differentiates us from other firms. In India, Barry-Wehmiller operates as a hub of innovation and collaboration, housing our Global Competency Center (GCC) and other strategic functions. The GCC, based in Chennai, is an Engineering Center of Excellence that supports all Barry-Wehmiller divisions globally. The center focuses on areas such as design and development in mechanical, electrical, and controls engineering, software development, and additive manufacturing. We believe in: Ownership – You’ll drive features end-to-end, from design to deployment. Flexibility – A friendly, results-oriented culture that respects your time. Empowerment – Your insights are valued, and your work makes a visible difference. Learning & Growth – You’ll work on complex challenges with smart, passionate peers—and have the support to level up continually. If you’re ready to bring your best thinking to the table and grow in a high-impact, future-focused environment, we’d love to hear from you. Job Description: The Enterprise IT Service Desk Workstation Vulnerability Analyst’s role is to help secure the company’s workstations against vulnerabilities. This will be done through analyzing scan data, researching vulnerabilities, and providing mitigation for said vulnerabilities within SLA timelines. Additionally, deployment of mitigations may be required. The Workstation Vulnerability Analyst will also need to present findings to IT leadership. Job Specifications: Proven analytical and problem-solving abilities. Ability to effectively prioritize and execute tasks in a fast-paced environment. Ability to shift between tasks as priorities change Strong written and oral communication skills. Strong troubleshooting skills and knowledge of IT hardware and software. Ability to conduct research into software issues and products as required. Strong organizational skills with keen attention to detail. Basic understanding of security principles, protocols, and technologies. Familiarity with vulnerability assessment tools (e.g., Nessus/Tenable, Qualys, OpenVAS) is a plus. Principal Duties and Responsibilities (Essential Functions): Analyze the results of vulnerability scans Understand business criticality of various systems Prioritize work based on risk Complete work within deadlines Assist in identifying and assessing vulnerabilities in the organization's systems, networks, and applications. Support the development and implementation of remediation plans to address identified vulnerabilities. Participate in regular vulnerability assessments and penetration tests to identify new security risks. Monitor security alerts and incidents and assist in determining the impact and necessary response. Assist with rollback if necessary Document and report on remediation activities, including progress and outcomes. Investigate and remediate malfunctioning security agents Function and communicate in a global support team. Analyze root cause and implement corrective solutions. Collaborate with IT, security, and development teams to ensure timely and effective remediation. When necessary, contact third-party software and PC equipment vendors. Maintain knowledge of current IT trends and advancements. Stay informed about the latest security threats, vulnerabilities, and mitigation techniques. Provide support to other teams on vulnerability management best practices. Required Education and Experience: An associate degree in the field of computer science or management information systems, and/or 3-5 years of related work experience is preferred. 3-5 years of vulnerability remediation preferred; experience with patch management and scripting is a plus. Experience working in a team-oriented, collaborative environment. Relevant certifications (e.g., CompTIA Security+, CEH) are a plus but not required. Travel: Travel could be up to 15% (in the country) as needed for remote support. What is it for you? This role is more than just a job. It’s an opportunity to be part of a global team that values people excellence, innovative solutions, and operational excellence. Barry-Wehmiller provides a unique environment where you can grow your skills, work on impactful projects, and collaborate with some of the brightest minds in the industry. In addition, we are deeply committed to your personal and professional growth, fostering a culture that helps you achieve your full potential. To understand more about our people-first philosophy, you may like to watch this short video by our CEO, Mr. Bob Chapman , on Truly Human Leadership : Watch the video At Barry-Wehmiller we recognize that people come with a wealth of experience and talent beyond just the technical requirements of a job. If your experience is close to what you see listed here, please still consider applying. We know that our differences often can bring about innovation, excellence and meaningful work—therefore, people from all backgrounds are encouraged to apply to our positions. Please let us know if you require reasonable accommodations during the interview process. Company: BW Corporate US Show more Show less
Posted 1 month ago
0 years
0 Lacs
Bengaluru
On-site
Bangalore,Karnataka,India Job ID 768426 Join our Team About the Role: We are hiring a Vulnerability Engineer to join our Managed Security Services team. You will be responsible for identifying, analyzing, and tracking security vulnerabilities across enterprise environments. The role involves working with scanning tools, coordinating with stakeholders, and ensuring timely remediation to minimize security risk. Key Responsibilities: Perform vulnerability scans using tools like Tenable Nessus, Qualys, IBM AppScan , etc. Analyze scan results, identify false positives, and prioritize risks Track and support remediation efforts with technical teams Register and manage assets in scanning platforms and maintain scan schedules Prepare reports and metrics for leadership and stakeholders Coordinate with customers on scan schedules and mitigation plans Contribute to automation and process optimization Required Skills: Strong knowledge of vulnerability management processes and tools like Tenable Nessus, Qualys, IBM AppScan etc Solid understanding of network, system, and application-level security Experience in report writing and communicating technical findings Familiarity with enterprise IT environments and TCP/IP networking Excellent problem-solving, collaboration, and communication skills Willingness to participate in on-call support rotation Preferred: Experience with scripting/automation for scanning and reporting Security certifications (e.g., CEH, CompTIA Security+, OSCP) Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply?
Posted 1 month ago
0 years
0 Lacs
India
On-site
Job Role : Computer and Information Systems Managers For Workflow Annotation Specialist Project Type: Contract-based / Freelance / Part-time – 1 Month Job Overview: We are seeking domain experts to participate in a Workflow Annotation Project . The role involves documenting and annotating the step-by-step workflows of key tasks within the candidate’s area of expertise. The goal is to capture real-world processes in a structured format for AI training and process optimization purposes. Domain Expertise Required : Plan and deliver IT projects on time and within scope Supervise technical and project staff Oversee IT infrastructure and operations Enforce information security policies and protocols Manage vendor contracts and service agreements Align technology strategy with overall business objectives . Tools & Technologies You May have Worked: Project & task management: Jira, Microsoft Project, Smartsheet Monitoring & analytics: Datadog, Splunk Security tools: Nessus, Qualys Service management: ServiceNow, Zendesk Cloud platforms: AWS Console, Azure Portal, Google Cloud Console Enterprise systems: SAP, Oracle ERP Collaboration tools: Slack, Microsoft Teams Open Source / Free Software Experience Project management: OpenProject, Taiga, Kanboard Monitoring & visualization: Zabbix, Prometheus + Grafana Security tools: OpenVAS Version control & DevOps: GitLab Community Edition (CE) Collaboration & support: Rocket.Chat, osTicket ERP systems: Odoo Community Edition Show more Show less
Posted 1 month ago
5.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Role Description Role Proficiency: Act creatively to develop applications and select appropriate technical options optimizing application development maintenance and performance by employing design patterns and reusing proven solutions account for others' developmental activities Outcomes Interpret the application/feature/component design to develop the same in accordance with specifications. Code debug test document and communicate product/component/feature development stages. Validate results with user representatives; integrates and commissions the overall solution Select appropriate technical options for development such as reusing improving or reconfiguration of existing components or creating own solutions Optimises efficiency cost and quality. Influence and improve customer satisfaction Set FAST goals for self/team; provide feedback to FAST goals of team members Measures Of Outcomes Adherence to engineering process and standards (coding standards) Adherence to project schedule / timelines Number of technical issues uncovered during the execution of the project Number of defects in the code Number of defects post delivery Number of non compliance issues On time completion of mandatory compliance trainings Code Outputs Expected: Code as per design Follow coding standards templates and checklists Review code – for team and peers Documentation Create/review templates checklists guidelines standards for design/process/development Create/review deliverable documents. Design documentation r and requirements test cases/results Configure Define and govern configuration management plan Ensure compliance from the team Test Review and create unit test cases scenarios and execution Review test plan created by testing team Provide clarifications to the testing team Domain Relevance Advise Software Developers on design and development of features and components with a deep understanding of the business problem being addressed for the client. Learn more about the customer domain identifying opportunities to provide valuable addition to customers Complete relevant domain certifications Manage Project Manage delivery of modules and/or manage user stories Manage Defects Perform defect RCA and mitigation Identify defect trends and take proactive measures to improve quality Estimate Create and provide input for effort estimation for projects Manage Knowledge Consume and contribute to project related documents share point libraries and client universities Review the reusable documents created by the team Release Execute and monitor release process Design Contribute to creation of design (HLD LLD SAD)/architecture for Applications/Features/Business Components/Data Models Interface With Customer Clarify requirements and provide guidance to development team Present design options to customers Conduct product demos Manage Team Set FAST goals and provide feedback Understand aspirations of team members and provide guidance opportunities etc Ensure team is engaged in project Certifications Take relevant domain/technology certification Skill Examples Explain and communicate the design / development to the customer Perform and evaluate test results against product specifications Break down complex problems into logical components Develop user interfaces business software components Use data models Estimate time and effort required for developing / debugging features / components Perform and evaluate test in the customer or target environment Make quick decisions on technical/project related challenges Manage a Team mentor and handle people related issues in team Maintain high motivation levels and positive dynamics in the team. Interface with other teams designers and other parallel practices Set goals for self and team. Provide feedback to team members Create and articulate impactful technical presentations Follow high level of business etiquette in emails and other business communication Drive conference calls with customers addressing customer questions Proactively ask for and offer help Ability to work under pressure determine dependencies risks facilitate planning; handling multiple tasks. Build confidence with customers by meeting the deliverables on time with quality. Estimate time and effort resources required for developing / debugging features / components Make on appropriate utilization of Software / Hardware’s. Strong analytical and problem-solving abilities Knowledge Examples Appropriate software programs / modules Functional and technical designing Programming languages – proficient in multiple skill clusters DBMS Operating Systems and software platforms Software Development Life Cycle Agile – Scrum or Kanban Methods Integrated development environment (IDE) Rapid application development (RAD) Modelling technology and languages Interface definition languages (IDL) Knowledge of customer domain and deep understanding of sub domain where problem is solved Additional Comments Software Developer with proven industry experience to join our global engineering team. Experience and Education 5+ years of development experience using Java/J2EE, Spring Frameworks, Spring Boot, SQL and Restful Webservices. BS Engineering/Computer Science or equivalent experience required. Good handle on concepts of cyber security, cloud technologies, and agile methodology. Experience / familiarity of working with security related tooling such as Wiz, Qualys, Checkmarx and / or Mend. Experience with Spring Boot, Micro Services, Hibernate, JPA, Angular, Lucene, jQuery frameworks. Strong understanding of REST APIs Experience working with Relational and Non-relational databases. Hands on development experience in Python Nice to have – Experience working with more than 1 large projects to get a good view of architecture concepts and pitfalls. Key Responsibilities Interface with the product team and team members to finalize requirements. Form close relationship with DevOps teams in order to further harden our environments. Implement requirements while following SDLC best practices and assist others through code and design reviews. Operate in an Agile development environment while collaborating with key stakeholders. Resolve technical issues as necessary, including security vulnerabilities. Keep abreast of new technology developments. Technical Skills Hands on experience in designing and developing applications using Java platforms – Java, springboot, Rest API, Hibernate Experience working with Java 11 and above. Experience working with front end technologies like HTML, Java Script and Angular Excellent knowledge of Relational Databases, SQL and ORM technologies (JPA, Hibernate). Experience in using Agile DevOps tools Gradle, GIT, Bamboo, Jenkins, IntelliJ and Nexus. Knowledge of test-driven development. Nice to have - exposure to AWS services and docker containers Ability to work with an agile mindset and avoid an over-the-wall approach. Ability to work well with internal and external technology resources. Good oral and written communications skills. Skills Java/J2EE,springboot,Security,Microservices Show more Show less
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough