Home
Jobs
Companies
Resume

352 Qualys Jobs - Page 3

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

40.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

JOB DESCRIPTION Technology Deployment and Management Service (TDMS) organization is a critical arm of Oracle FLEXCUBE consulting group. TDMS delivers Oracle Technology services for FSGBU product customer, while the applications team focusses on the application customization and setup. We are looking for a highly capable, self-motivated and independent Linux Administrators experts based in India. If you are passionate about Oracle technology as well as cloud computing, this is the ideal role you’ve been waiting for. Our team supports technology which are available both on-premise and on Cloud. The Admin needs to have deep technical domain expertise, and will work closely with the Solution Architect team to help craft the solution and then continue to collaborate with the customer on Key Responsibilities: Installing, configuring and maintaining Linux Servers / Virtualization. Installation and configuration of HA environment using Linux cluster or Veritas Cluster. Configuration and administration of LVM and Veritas logical volume manager. Strong background and understanding of Linux and scripting. Daily maintenance/administration of multiple Unix systems Strong technical problem solving skills and experience in IP networking and static routing FTPSSH, SMTP, DNS, HTTP/S, DHCP, Syslog logging facility. Installation, set up, configuration and maintenance of Java Application Servers, Apache Web Servers, Cisco Firewalls, and Database Servers Assists with Veritas Backups and recovery. Configuration and maintenance of the monitoring system Experience in a high availability and mission critical environment. Experience with Firewalls (IPTABLES/IPCHAINS) Experience with SNMP/Nagios based Monitoring Experience in visualization and network attached storage Solid verbal and written communication skills. Team player and ability to work independently and effectively under pressure in a high paced and energetic environment Strong understanding of TCPIP, UDP and Multicast traffic. Understanding of SAN and NAS storage. Experience in System Fault Tolerance Design, Business continuity and Disaster recovery planning. Performance Management & fine tuning. Patch and Package administration Extensive experience in kernel patching and firmware upgradation. Troubleshooting Hardware and Operating system related issue Able to handle most of basic to advanced calls in User, group management, system start-up, service modification, crontab entries, ACL modifications, file system management, root & OS backups Experience in Server Experience on following will be added advantage Samba, DNS, NIS, Send mail / Exim / Postfix / Qmail, LDAP Knowledge on Vulnerability remediation Understanding of Qualys Proactively monitoring the Server s health and taking preventive or corrective action as required. NIC bonding using bonding kernel module. Sound experience in Linux LVM, VxVM and Solaris SVM Skills Needed Experience with RHEL Systems Manager and Subscription Manager Experience with virtualization of RHEL servers on ESX Hands-on experience with Bash Scripting and writing automation scripts for Operational tasks Hands-on experience with scripting tools, Ansible, Satellite and other automation tools Experience on AIX or Solaris OS would be an added advantage Well versed with ITIL framework Career Level - IC2 RESPONSIBILITIES Technology Deployment and Management Service (TDMS) organization is a critical arm of Oracle FLEXCUBE consulting group. TDMS delivers Oracle Technology services for FSGBU product customer, while the applications team focusses on the application customization and setup. We are looking for a highly capable, self-motivated and independent Linux Administrators experts based in India. If you are passionate about Oracle technology as well as cloud computing, this is the ideal role you’ve been waiting for. Our team supports technology which are available both on-premise and on Cloud. The Admin needs to have deep technical domain expertise, and will work closely with the Solution Architect team to help craft the solution and then continue to collaborate with the customer on Key Responsibilities: Installing, configuring and maintaining Linux Servers / Virtualization. Installation and configuration of HA environment using Linux cluster or Veritas Cluster. Configuration and administration of LVM and Veritas logical volume manager. Strong background and understanding of Linux and scripting. Daily maintenance/administration of multiple Unix systems Strong technical problem solving skills and experience in IP networking and static routing FTPSSH, SMTP, DNS, HTTP/S, DHCP, Syslog logging facility. Installation, set up, configuration and maintenance of Java Application Servers, Apache Web Servers, Cisco Firewalls, and Database Servers Assists with Veritas Backups and recovery. Configuration and maintenance of the monitoring system Experience in a high availability and mission critical environment. Experience with Firewalls (IPTABLES/IPCHAINS) Experience with SNMP/Nagios based Monitoring Experience in visualization and network attached storage Solid verbal and written communication skills. Team player and ability to work independently and effectively under pressure in a high paced and energetic environment Strong understanding of TCPIP, UDP and Multicast traffic. Understanding of SAN and NAS storage. Experience in System Fault Tolerance Design, Business continuity and Disaster recovery planning. Performance Management & fine tuning. Patch and Package administration Extensive experience in kernel patching and firmware upgradation. Troubleshooting Hardware and Operating system related issue Able to handle most of basic to advanced calls in User, group management, system start-up, service modification, crontab entries, ACL modifications, file system management, root & OS backups Experience in Server Experience on following will be added advantage Samba, DNS, NIS, Send mail / Exim / Postfix / Qmail, LDAP Knowledge on Vulnerability remediation Understanding of Qualys Proactively monitoring the Server s health and taking preventive or corrective action as required. NIC bonding using bonding kernel module. Sound experience in Linux LVM, VxVM and Solaris SVM Skills Needed Experience with RHEL Systems Manager and Subscription Manager Experience with virtualization of RHEL servers on ESX Hands-on experience with Bash Scripting and writing automation scripts for Operational tasks Hands-on experience with scripting tools, Ansible, Satellite and other automation tools Experience on AIX or Solaris OS would be an added advantage Well versed with ITIL framework QUALIFICATIONS Career Level - IC2 ABOUT US As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less

Posted 5 days ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Bangalore/ Gurgaon, India A security analyst role within the Global Technology Transversal Application Services (TAS) function, supporting the provision of a robust and consistent security scanning, remediation, and guidance service within the TAS Application Operations team. The team provides a global, centralized Operations, Governance, Audit, Risk & Security service across Application Delivery. What You’ll Be DOING What will your essential responsibilities include? Support the Application Operations (Security) team in all security related activities, forums and discussions. Perform application scanning across the Application Delivery estate using tools such as SonarQube, Checkmarx, JFrog Xray, CAST Highlight, Defender and Qualys. Assist in setting up Jenkins pipeline integration to CI/CD lifecycle. Perform Static Application Security Testing (SAST) and Software Composition Analysis (SCA), including analysis of components in applications to detect vulnerabilities and compliance issues. Work with Application Delivery teams to communicate the outcome of scanning and analysis, and agree remediation actions including target dates for completion, in alignment with Information Security Policy requirements. Assist in Risk Assessments, evaluating the severity of identified vulnerabilities and prioritizing remediation efforts based on potential impact to the organization. Assist in Policy development, contributing to the development and implementation of vulnerability management policies and procedures. Manage the production of reporting and metrics to both internal and external stakeholders. You will report to the Operations Lead. What You Will BRING We’re looking for someone who has these abilities and skills: Required Skills And Abilities Security First mindset. Understanding of vulnerability analysis, scanning and remediation processes. Understanding of CVEs, CVSS. Understanding of security industry compliancy benchmarks and standards i.e. CIS. Understanding of security best practices/standards i.e. OWASP, NIST. Preferable experience with at least 2 coding languages i.e. Java, .NET, C++, Python etc. Desired Skills And Abilities Outstanding analytical, critical thinking and organizational skills, ability to multitask and work to deadlines. Proficiency in Power BI, MS Work and MS Excel: We maintain and continually develop a number of Power BI Dashboards to support provision of critical data and use Excel to support our data capture and analysis and reporting. Excellent communication, interpersonal and relationship building skills (verbal and written) Who WE are AXA XL, the P&C and specialty risk division of AXA, is known for solving complex risks. For mid-sized companies, multinationals and even some inspirational individuals we don’t just provide re/insurance, we reinvent it. How? By combining a comprehensive and efficient capital platform, data-driven insights, leading technology, and the best talent in an agile and inclusive workspace, empowered to deliver top client service across all our lines of business − property, casualty, professional, financial lines and specialty. With an innovative and flexible approach to risk solutions, we partner with those who move the world forward. Learn more at axaxl.com What we OFFER Inclusion AXA XL is committed to equal employment opportunity and will consider applicants regardless of gender, sexual orientation, age, ethnicity and origins, marital status, religion, disability, or any other protected characteristic. At AXA XL, we know that an inclusive culture and a diverse workforce enable business growth and are critical to our success. That’s why we have made a strategic commitment to attract, develop, advance and retain the most diverse workforce possible, and create an inclusive culture where everyone can bring their full selves to work and can reach their highest potential. It’s about helping one another — and our business — to move forward and succeed. Five Business Resource Groups focused on gender, LGBTQ+, ethnicity and origins, disability and inclusion with 20 Chapters around the globe Robust support for Flexible Working Arrangements Enhanced family friendly leave benefits Named to the Diversity Best Practices Index Signatory to the UK Women in Finance Charter Learn more at axaxl.com/about-us/inclusion-and-diversity. AXA XL is an Equal Opportunity Employer. Total Rewards AXA XL’s Reward program is designed to take care of what matters most to you, covering the full picture of your health, wellbeing, lifestyle and financial security. It provides competitive compensation and personalized, inclusive benefits that evolve as you do. We’re committed to rewarding your contribution for the long term, so you can be your best self today and look forward to the future with confidence. Sustainability At AXA XL, Sustainability is integral to our business strategy. In an ever-changing world, AXA XL protects what matters most for our clients and communities. We know that sustainability is at the root of a more resilient future. Our 2023-26 Sustainability strategy, called “Roots of resilience”, focuses on protecting natural ecosystems, addressing climate change, and embedding sustainable practices across our operations. Our Pillars Valuing nature: How we impact nature affects how nature impacts us. Resilient ecosystems - the foundation of a sustainable planet and society - are essential to our future. We’re committed to protecting and restoring nature - from mangrove forests to the bees in our backyard - by increasing biodiversity awareness and inspiring clients and colleagues to put nature at the heart of their plans. Addressing climate change: The effects of a changing climate are far reaching and significant. Unpredictable weather, increasing temperatures, and rising sea levels cause both social inequalities and environmental disruption. We're building a net zero strategy, developing insurance products and services, and mobilizing to advance thought leadership and investment in societal-led solutions. Integrating ESG: All companies have a role to play in building a more resilient future. Incorporating ESG considerations into our internal processes and practices builds resilience from the roots of our business. We’re training our colleagues, engaging our external partners, and evolving our sustainability governance and reporting. AXA Hearts in Action: We have established volunteering and charitable giving programs to help colleagues support causes that matter most to them, known as AXA XL’s “Hearts in Action” programs. These include our Matching Gifts program, Volunteering Leave, and our annual volunteering day - the Global Day of Giving. For more information, please see axaxl.com/sustainability. Show more Show less

Posted 5 days ago

Apply

40.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

JOB DESCRIPTION Technology Deployment and Management Service (TDMS) organization is a critical arm of Oracle FLEXCUBE consulting group. TDMS delivers Oracle Technology services for FSGBU product customer, while the applications team focusses on the application customization and setup. We are looking for a highly capable, self-motivated and independent Linux Administrators experts based in India. If you are passionate about Oracle technology as well as cloud computing, this is the ideal role you’ve been waiting for. Our team supports technology which are available both on-premise and on Cloud. The Admin needs to have deep technical domain expertise, and will work closely with the Solution Architect team to help craft the solution and then continue to collaborate with the customer on Key Responsibilities: Installing, configuring and maintaining Linux Servers / Virtualization. Installation and configuration of HA environment using Linux cluster or Veritas Cluster. Configuration and administration of LVM and Veritas logical volume manager. Strong background and understanding of Linux and scripting. Daily maintenance/administration of multiple Unix systems Strong technical problem solving skills and experience in IP networking and static routing FTPSSH, SMTP, DNS, HTTP/S, DHCP, Syslog logging facility. Installation, set up, configuration and maintenance of Java Application Servers, Apache Web Servers, Cisco Firewalls, and Database Servers Assists with Veritas Backups and recovery. Configuration and maintenance of the monitoring system Experience in a high availability and mission critical environment. Experience with Firewalls (IPTABLES/IPCHAINS) Experience with SNMP/Nagios based Monitoring Experience in visualization and network attached storage Solid verbal and written communication skills. Team player and ability to work independently and effectively under pressure in a high paced and energetic environment Strong understanding of TCPIP, UDP and Multicast traffic. Understanding of SAN and NAS storage. Experience in System Fault Tolerance Design, Business continuity and Disaster recovery planning. Performance Management & fine tuning. Patch and Package administration Extensive experience in kernel patching and firmware upgradation. Troubleshooting Hardware and Operating system related issue Able to handle most of basic to advanced calls in User, group management, system start-up, service modification, crontab entries, ACL modifications, file system management, root & OS backups Experience in Server Experience on following will be added advantage Samba, DNS, NIS, Send mail / Exim / Postfix / Qmail, LDAP Knowledge on Vulnerability remediation Understanding of Qualys Proactively monitoring the Server s health and taking preventive or corrective action as required. NIC bonding using bonding kernel module. Sound experience in Linux LVM, VxVM and Solaris SVM Skills Needed Experience with RHEL Systems Manager and Subscription Manager Experience with virtualization of RHEL servers on ESX Hands-on experience with Bash Scripting and writing automation scripts for Operational tasks Hands-on experience with scripting tools, Ansible, Satellite and other automation tools Experience on AIX or Solaris OS would be an added advantage Well versed with ITIL framework Career Level - IC2 RESPONSIBILITIES Technology Deployment and Management Service (TDMS) organization is a critical arm of Oracle FLEXCUBE consulting group. TDMS delivers Oracle Technology services for FSGBU product customer, while the applications team focusses on the application customization and setup. We are looking for a highly capable, self-motivated and independent Linux Administrators experts based in India. If you are passionate about Oracle technology as well as cloud computing, this is the ideal role you’ve been waiting for. Our team supports technology which are available both on-premise and on Cloud. The Admin needs to have deep technical domain expertise, and will work closely with the Solution Architect team to help craft the solution and then continue to collaborate with the customer on Key Responsibilities: Installing, configuring and maintaining Linux Servers / Virtualization. Installation and configuration of HA environment using Linux cluster or Veritas Cluster. Configuration and administration of LVM and Veritas logical volume manager. Strong background and understanding of Linux and scripting. Daily maintenance/administration of multiple Unix systems Strong technical problem solving skills and experience in IP networking and static routing FTPSSH, SMTP, DNS, HTTP/S, DHCP, Syslog logging facility. Installation, set up, configuration and maintenance of Java Application Servers, Apache Web Servers, Cisco Firewalls, and Database Servers Assists with Veritas Backups and recovery. Configuration and maintenance of the monitoring system Experience in a high availability and mission critical environment. Experience with Firewalls (IPTABLES/IPCHAINS) Experience with SNMP/Nagios based Monitoring Experience in visualization and network attached storage Solid verbal and written communication skills. Team player and ability to work independently and effectively under pressure in a high paced and energetic environment Strong understanding of TCPIP, UDP and Multicast traffic. Understanding of SAN and NAS storage. Experience in System Fault Tolerance Design, Business continuity and Disaster recovery planning. Performance Management & fine tuning. Patch and Package administration Extensive experience in kernel patching and firmware upgradation. Troubleshooting Hardware and Operating system related issue Able to handle most of basic to advanced calls in User, group management, system start-up, service modification, crontab entries, ACL modifications, file system management, root & OS backups Experience in Server Experience on following will be added advantage Samba, DNS, NIS, Send mail / Exim / Postfix / Qmail, LDAP Knowledge on Vulnerability remediation Understanding of Qualys Proactively monitoring the Server s health and taking preventive or corrective action as required. NIC bonding using bonding kernel module. Sound experience in Linux LVM, VxVM and Solaris SVM Skills Needed Experience with RHEL Systems Manager and Subscription Manager Experience with virtualization of RHEL servers on ESX Hands-on experience with Bash Scripting and writing automation scripts for Operational tasks Hands-on experience with scripting tools, Ansible, Satellite and other automation tools Experience on AIX or Solaris OS would be an added advantage Well versed with ITIL framework QUALIFICATIONS Career Level - IC2 ABOUT US As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less

Posted 5 days ago

Apply

2.0 - 10.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Job Title: Consultant / Manager / Senior Manager – VAPT Location: Gurgaon Experience Required: 2 to 10 years Work Mode: Onsite (Gurgaon) Certification: OSCP – Mandatory Role Overview: We are looking for skilled cybersecurity professionals across levels ( Consultant to Senior Manager ) to join our Vulnerability Assessment & Penetration Testing (VAPT) team in Gurgaon . You will play a critical role in executing and leading security assessments across applications, infrastructure, network, and source code to identify vulnerabilities and recommend effective remediation. Key Responsibilities: For All Levels: Perform end-to-end VAPT on web applications, mobile applications, network, infrastructure, cloud, and source code . Identify, exploit, and document vulnerabilities with clear technical and business impact. Use both manual and automated tools to conduct deep-dive penetration testing. Prepare and present technical reports with actionable recommendations. Ensure adherence to OWASP, NIST, ISO 27001, PCI-DSS, and RBI cybersecurity guidelines . Additional Responsibilities Based on Experience Level: Manager / Senior Manager: Lead a team of consultants and guide them through complex assessments. Oversee project timelines, quality, and client deliverables. Engage with senior stakeholders (CIOs, CISOs, Security Heads) to discuss findings and mitigation strategies. Support practice development, training initiatives, and RFP support. Consultants / Senior Consultants: Execute hands-on penetration testing under guidance from seniors. Maintain high-quality documentation and assist in tool integration. Continuously upgrade skills through research and certification prep. Required Skills & Qualifications: 2 to 10 years of hands-on experience in penetration testing and vulnerability assessment . Strong knowledge of manual testing techniques beyond automated scanners. Expertise with tools such as Burp Suite, Metasploit, Nmap, Nessus, Qualys, AppScan, Fortify, Wireshark , etc. OSCP certification is mandatory. Familiarity with secure coding , scripting, and one or more programming languages (e.g., Python, Java, JavaScript). Good understanding of cloud security testing (AWS, Azure, GCP) is a plus. Strong analytical, communication, and report-writing skills. Show more Show less

Posted 5 days ago

Apply

2.0 - 4.0 years

0 Lacs

Kalyan Dombivli, Maharashtra, India

Remote

Linkedin logo

Cybersecurity - Project Management Officer (PMO) Dombivli, Mumbai Note: Looking only for candidates who can join within 30 days . Outstation candidates must be willing to relocate. Candidate for this role will be working on client project at the client’s office in Dombivli, Mumbai. 5 days WFO, Saturday WFH . Job Overview: The PMO will be responsible for overseeing & streamlining delivery of security testing engagements— specifically for Payment Gateway (PG) clients. Ensuring timely delivery, resource optimization, effective coordination with stakeholders and adherence to compliance & quality standards. This role bridges the gap between the technical testing team & business stakeholders to ensure smooth execution of projects. Qualifications: MBA or BBA with 2-4 years ’ experience working in project management for IT/ software industry. Hands on experience with project management tools such as Zoho helpdesk or Zoho Projects, is a must. Candidate should have project management certifications such as PMI-ACP or CAPM or PMP or similar (mandatory). Background in cybersecurity would be preferred. Job description: Project Planning & Tracking Maintain and update project trackers for multiple PG security testing engagements. Monitor project milestones, deadlines, and deliverables. Track actual vs. planned timelines and raise alerts on delays or deviations. Ensure daily/weekly status reporting from security consultants is accurate and up to date. Track daily utilization, workload distribution, and resource conflicts. Maintain visibility into pipeline projects to plan for resource ramp-up/down. Serve as a point of contact for internal and external stakeholders for project-related queries and escalations. Set up governance calls, circulate agendas, track MOMs, and follow up on action items. Communicate progress, risks, and dependencies to clients in a structured and timely manner. Ensure projects follow standardized security testing workflows (web, API, mobile, infra). Track closure of client queries, validations, and retesting requests. Own the preparation and maintenance of client-facing dashboards (project status, vulnerability metrics, SLA adherence). Track daily task sheet updates from consultants and prepare weekly/monthly performance summaries. Highlight red flags and recommend corrective actions proactively. Analyze project data to identify trends, insights, and areas for improvement Establish and maintain effective communication channels with stakeholders to ensure alignment and transparency. Facilitate stakeholder meetings, and presentations to gather requirements and provide project updates. Manage stakeholder expectations and address stakeholder concerns in a timely manner. Technical Skills: Project Tools: Jira, MS Project, Smartsheet, ServiceNow (GRC module) Security Tools (basic familiarity): Qualys, Nessus, Rapid7, Tenable Documentation & Reporting: MS Excel (pivot, charts), PowerPoint, Power BI or similar. Requirements and skills Proven work experience as a Project Management Officer or similar role Strong leadership skills and stakeholder management skills Strong analytical and problem-solving skills Good written and verbal communication skills Strong attention to details and technicalities Excellent organizational and technical abilities Good interpersonal and multi-tasking skills Relevant training and/or certification Show more Show less

Posted 5 days ago

Apply

8.0 years

5 - 9 Lacs

Noida

On-site

At Pitney Bowes, we do the right thing, the right way. As a member of our team, you can too. We have amazing people who are the driving force, the inspiration and foundation of our company. Our thriving culture can be broken down into four components: Client. Team. Win. Innovate. We actively look for prospects who: Are passionate about client success. Enjoy collaborating with others. Strive to exceed expectations. Move boldly in the quest for superior and best in market solutions. Job Description: Join Pitney Bowes as an Intune & Citrix Administrator Years of experience: 8+ years Job Location – Pune/Noida Impact We are looking for SRE - Desktop Engineering Technician to join our Desktop Engineering Team. As SRE – Desktop Engineer, you will flex your creativity and engineering skills to support and improve End User experience by making IT easy, simple, and reliable. As part End User Computing team, you will be exploring the latest technologies and work collaboratively with various teams and experts to deliver value. The Job Manage Autopilot Pre-Provision configuration to keep it up to date and provide L2 support for device enrollment issues. Manage Mobile Device policy , MAM Policy, Restriction , Enrollments, Profile, and compliance configuration. Deploy monthly Windows Operating system patches and Vulnerability remediation through Intune , SCCM , and Qualys tools. Create and deploy applications through Intune, SCCM, JAMF and Qualys Manage Kiosk devices configuration and deployment. Overseeing VDI support team during daily operations. Defining/Coordinating application package creation for deployment via PB Software Center Improving new hire VDI provisioning as well as equipment for established employees Collaborate with the Service Desk and Desk Side Support team to identify the most repeated issues to automate the fix. Create observability dashboards for services offered by EUC to identify the gaps proactively. Create Synthetic monitoring for all EUC services to proactively monitor infrastructure issues/outages. Contribute to the development of automation tools for provisioning, configuration management, and deployment using DevOps tools. Collaborate with the SRE team to design, implement, and improve monitoring, alerting, and incident response processes leveraging tools like Grafana, Splunk, etc. Create automated fixes for failed App and patch deployment devices to increase deployment success rate. Engage in and improve the whole lifecycle of services. Qualifications & Skills required. Bachelor’s degree in computer science or related field and established technologist with 8+ years of related experience. Experience - Previous Citrix admin-level role in desktop virtualization management. Experience - Citrix CVAD and Cloud offerings Experience - Citrix MCS, WEM, and related technologies Experience – Must have: Microsoft Intune, SCCM, JAMF Pro, Azure AD, Active Directory. Experience – Must have: Microsoft security patching, software packaging & deployment. Experience – Must have: Mobile device management (iOS & Android) Experience – Must have: Operating System build and hardening. Experience – Must have: Managing hybrid cloud environments. Experience – Must have: SRE and Observability – Proactive, Automation and Synthetic Monitoring implementation. Experience – Must have: Programming scripting language, e.g., PowerShell , Python and other programing languages will be added advantage to the position. Knowledge of EDR tools (CrowdStrike) and Perimeter security tools (Zscaler) Knowledge in DevOps tools like Ansible, Git and Grafana. Knowledge in Zero Trust Implementation Familiarity with Agile development practices and good software engineering practices Strong organizational skills with high attention to detail Excellent oral and written communication skills About Pitney Bowes Pitney Bowes (NYSE: PBI) is a global technology company providing commerce solutions that power billions of transactions. Clients around the world, including 90 percent of the Fortune 500, rely on the accuracy and precision delivered by Pitney Bowes solutions, analytics, and APIs in the areas of ecommerce fulfillment, shipping and returns; cross-border ecommerce; office mailing and shipping; presort services; and financing. For 100 years Pitney Bowes has been innovating and delivering technologies that remove the complexity of getting commerce transactions precisely right. For additional information visit Pitney Bowes at https://www.pitneybowes.com/in . Only Talent Matters at Pitney Bowes Pitney Bowes is an equal opportunity workplace. To remove unconscious biases from our hiring process, we encourage ‘Blind Applications’ from candidates applying for jobs at Pitney Bowes. This means that details such as gender, caste, religion, nationality, and age are omitted from applications. And candidates can choose to reveal only their first or last name on the application. Watch the video here: https://www.youtube.com/watch?v=dNB-K5KFU78 Watch the videos below for more information about Life at Pitney Bowes: Who we are Pitney Bowes All Stars Pitney Bowes named a Great Place to Work® Pitney Bowes Gratitude Video Pitney Bowes COVID Care We will: Provide the will: opportunity to grow and develop your career Offer an inclusive environment that encourages diverse perspectives and ideas Deliver challenging and unique opportunities to contribute to the success of a transforming organization Offer comprehensive benefits globally ( P B Live Well ) Pitney Bowes is an equal opportunity employer that values diversity and inclusiveness in the workplace. All interested individuals must apply online.

Posted 5 days ago

Apply

8.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

At Pitney Bowes, we do the right thing, the right way. As a member of our team, you can too. We have amazing people who are the driving force, the inspiration and foundation of our company. Our thriving culture can be broken down into four components: Client. Team. Win. Innovate. We Actively Look For Prospects Who Are passionate about client success. Enjoy collaborating with others. Strive to exceed expectations. Move boldly in the quest for superior and best in market solutions. Job Description Join Pitney Bowes as an Intune & Citrix Administrator Years of experience: 8+ years Job Location – Pune/Noida Impact We are looking for SRE - Desktop Engineering Technician to join our Desktop Engineering Team. As SRE – Desktop Engineer, you will flex your creativity and engineering skills to support and improve End User experience by making IT easy, simple, and reliable. As part End User Computing team, you will be exploring the latest technologies and work collaboratively with various teams and experts to deliver value. The Job Manage Autopilot Pre-Provision configuration to keep it up to date and provide L2 support for device enrollment issues. Manage Mobile Device policy, MAM Policy, Restriction, Enrollments, Profile, and compliance configuration. Deploy monthly Windows Operating system patches and Vulnerability remediation through Intune, SCCM, and Qualys tools. Create and deploy applications through Intune, SCCM, JAMF and Qualys Manage Kiosk devices configuration and deployment. Overseeing VDI support team during daily operations. Defining/Coordinating application package creation for deployment via PB Software Center Improving new hire VDI provisioning as well as equipment for established employees Collaborate with the Service Desk and Desk Side Support team to identify the most repeated issues to automate the fix. Create observability dashboards for services offered by EUC to identify the gaps proactively. Create Synthetic monitoring for all EUC services to proactively monitor infrastructure issues/outages. Contribute to the development of automation tools for provisioning, configuration management, and deployment using DevOps tools. Collaborate with the SRE team to design, implement, and improve monitoring, alerting, and incident response processes leveraging tools like Grafana, Splunk, etc. Create automated fixes for failed App and patch deployment devices to increase deployment success rate. Engage in and improve the whole lifecycle of services. Qualifications & Skills Required. Bachelor’s degree in computer science or related field and established technologist with 8+ years of related experience. Experience - Previous Citrix admin-level role in desktop virtualization management. Experience - Citrix CVAD and Cloud offerings Experience - Citrix MCS, WEM, and related technologies Experience – Must have: Microsoft Intune, SCCM, JAMF Pro, Azure AD, Active Directory. Experience – Must have: Microsoft security patching, software packaging & deployment. Experience – Must have: Mobile device management (iOS & Android) Experience – Must have: Operating System build and hardening. Experience – Must have: Managing hybrid cloud environments. Experience – Must have: SRE and Observability – Proactive, Automation and Synthetic Monitoring implementation. Experience – Must have: Programming scripting language, e.g., PowerShell, Python and other programing languages will be added advantage to the position. Knowledge of EDR tools (CrowdStrike) and Perimeter security tools (Zscaler) Knowledge in DevOps tools like Ansible, Git and Grafana. Knowledge in Zero Trust Implementation Familiarity with Agile development practices and good software engineering practices Strong organizational skills with high attention to detail Excellent oral and written communication skills About Pitney Bowes Pitney Bowes (NYSE:PBI) is a global technology company providing commerce solutions that power billions of transactions. Clients around the world, including 90 percent of the Fortune 500, rely on the accuracy and precision delivered by Pitney Bowes solutions, analytics, and APIs in the areas of ecommerce fulfillment, shipping and returns; cross-border ecommerce; office mailing and shipping; presort services; and financing. For 100 years Pitney Bowes has been innovating and delivering technologies that remove the complexity of getting commerce transactions precisely right. For additional information visit Pitney Bowes at https://www.pitneybowes.com/in. Only Talent Matters at Pitney Bowes Pitney Bowes is an equal opportunity workplace. To remove unconscious biases from our hiring process, we encourage ‘Blind Applications’ from candidates applying for jobs at Pitney Bowes. This means that details such as gender, caste, religion, nationality, and age are omitted from applications. And candidates can choose to reveal only their first or last name on the application. Watch the video here: https://www.youtube.com/watch?v=dNB-K5KFU78 Watch the videos below for more information about Life at Pitney Bowes: Who we are Pitney Bowes All Stars Pitney Bowes named a Great Place to Work® Pitney Bowes Gratitude Video Pitney Bowes COVID Care We Will Provide the will: opportunity to grow and develop your career Offer an inclusive environment that encourages diverse perspectives and ideas Deliver challenging and unique opportunities to contribute to the success of a transforming organization Offer comprehensive benefits globally (PB Live Well) Pitney Bowes is an equal opportunity employer that values diversity and inclusiveness in the workplace. All interested individuals must apply online. Show more Show less

Posted 5 days ago

Apply

0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Req ID: 328054 NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now. We are currently seeking a Application Operations Lead to join our team in Noida, Uttar Pradesh (IN-UP), India (IN). Daily Tasks Review of SOD checks for CBA and Site 24x7 dashboard VLS report and EOD notification mails for all 3 zones. Monitor CBA SFDC queue for tickets that are yet to be assigned. Monitor emails for any followups/pending tasks for CBA BAU. Monitor new incidents raised as part of events/alerts in SNOW. Monitor NTT Infra / LCS changes scheduled for the day. Review email comms / SFDC comments if required. CBA Handover from 1st to 2nd and 2nd to 3rd - review tickets, comms, tasks, learning progress. Take stock of issues with CS / Products and ask for updates wherever required. Health check of calendar for scheduled meetings. Review of PIR documents wherever required. CBA Vulnerabilities Take stock of all vulnerabilities reported in Qualys Split by category and period of open and split by AppOps and Infra related. Rey Montero to set up bi-weekly review call of Vulnerabilities. Certificate Renewal Planning Take stock of all active certificates across PROD and NON PROD and impacted systems both in CBA and Finastra Infra. Populate the 2026 renewal planned week as per recommendation provided. Consolidate with CBA if all impact analysis is completed. Access Control & PAM Resource wise required access poplated based on daily BAU tasks performed. Workshop with NTT Infra on access control layers that can be applied on the server, database and application. Conduct an impact analysis of implemention - new user creation, password resets for admin users, etc. LoanIQ Gold Configuration Review the process of updating the LoanIQ configuration in both PROD and NON-PROD. Gather feedback from AppVal on process prepared. Review with SDMs on the process and prepare for CBA demo. Utility Script for PROD DB Dumps Development in progress by Saquib - 4 components identified Individual component development. Review utility with Jan and Rachelle. Testing to be conducted - Test when PPD refresh request comes through & bank has approved Change Management LCS changes review every Monday of all ADB and CBA changes. Checks to include: Change ticket review - Risk, Change type, Schedule, Attachments which includes Runbook Non PROD testing results and Bank approval. Runbook review of steps, schedule, testing, rollback, checklist and 4-eye checker. Bank approval in line with change schedule. Take stock of changes to be reviewed in Tuesday CAB which includes ADB + CBA + TechOps. Change owner to present during Tuesday LCS CAB. Any actions/changes to be noted. MoM to be sent out for the approved changes. All changes to be approved 4 hours prior to scheduled deployment. Review changes scheduled by NTT Infra if AppOps support is required and share the alligned weekend support. Approve DB related changes during change deployment. If required perform 4-eye checker based on availablity. Ensure on-call support during weekend change deployment. Monthly KPI Report for ADB and CBA Extract valid P1 / P2 SFDC cases for ADB and CBA and derive MTTR time. Change success rate of LCS + NTT Infra changes. Remediation % of application vulnerabilities. Backlog of all open incidents. Stock of repeat incidents with same RCA. BAU Review Calls NTT Infra + NTT AppOps internal process call every Monday to discuss issues/improvements. Fornightly governance call every Tuesday with NTT Infra to review critical BAU items and progress update. LoanIQ Squad Sprint planning every Wednesday. New format of sending BAU updates by Tuesday COB. BAU to Green call with Steve every weekday. CBA dashboard reviewed of critical / ageing tickets. NTT Service Improvement and Governance call to review SFDC housekeeping, Service Improvements plan. About NTT DATA NTT DATA is a $30 billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long term success. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure and connectivity. We are one of the leading providers of digital and AI infrastructure in the world. NTT DATA is a part of NTT Group, which invests over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. Visit us at us.nttdata.com NTT DATA endeavors to make https://us.nttdata.com accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact us at https://us.nttdata.com/en/contact-us . This contact information is for accommodation requests only and cannot be used to inquire about the status of applications. NTT DATA is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. For our EEO Policy Statement, please click here . If you'd like more information on your EEO rights under the law, please click here . For Pay Transparency information, please click here . Show more Show less

Posted 5 days ago

Apply

4.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Summary Position Summary Position: Cyber Security Senior BISO Analyst (L3.5) Location: USI Job Summary Cyber Security BISO Team works with the Deloitte Function Specific Subsidiaries (FSS) & Chief Information Security Officer (CISO) organization directly supporting Deloitte’s Enabling Areas functions. The role involves close integration with various internal and external client-service leaders, technical and non-technical stakeholders to drive widespread cyber security program adoption. The Business Information Security Officer (BISO) Analyst will work closely with the Application teams of various lines of businesses (LOB), including the Office of Chief Information Officer (OCIO). In this role, you will support a group/team to develop a deep understanding of the business to facilitate specialized information security risk-based discussions. This role requires a proactive individual with a keen eye for detail and a strong understanding of cybersecurity frameworks such as, ISO, NIST, CIS. This fast-paced multi-faceted environment requires a highly motivated, self-driven, strong team player who demonstrates an intrinsic desire for continuous personal and professional growth. Key Responsibilities: Oversight & Alignment: Partner with Deloitte’s central Cyber Security organization to ensure consistent adoption of security frameworks, policies, and controls within business units and client teams. Security Strategy Development: Collaborate with business leaders to develop and implement information security strategies that align with business goals and regulatory requirements. Risk Management: Identify, assess, and prioritize information security risks within the enabling areas. Develop and implement risk mitigation strategies. Policy and Compliance: Ensure compliance with relevant information security policies, standards, and regulations (e.g., ISO 27001, NIST, SOC 2, HIPAA). Maintain ongoing audit readiness. Incident Response: Lead the response to security incidents within the enabling areas, including investigation, containment, and remediation efforts. Vulnerability Management: Monitor cyber threats relevant to the business domain. Support risk assessments, issue management, and incident response coordination. Stakeholder Engagement: Serve as the primary point of contact for information security matters within the enabling areas. Build strong relationships with business leaders and other stakeholders. Mitigation Projects: Lead or support projects involving third-party risk, vulnerability remediation, data protection, secure application development, and identity & access governance Security Architecture: Work with IT and business teams to design and implement secure systems and processes that support business operations. Continuous Improvement: Stay current with emerging security threats and trends. Recommend and implement improvements to the organization's security posture Qualifications: Education: Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field. Experience: Minimum of 4 years of experience in information security 2-4 years of risk management experience or direct participation in risk management processes, including application risk classification and application control assessments. 2-4 years of experience in vulnerability management, cybersecurity, or a related field. Experience with vulnerability assessment tools (e.g., Nessus, Qualys, Rapid7). Experience with GRC platforms (e.g., ServiceNow, Archer, or similar). Certifications: Relevant certifications such as CISSP, CISM, CISA, or equivalent. Technical Skills: Strong understanding of information security principles, technologies, and best practices. Experience with risk management, incident response, and security architecture. Business Acumen: Ability to understand business operations and align security strategies with business objectives. Communication: Excellent verbal and written communication skills. Ability to effectively communicate complex security concepts to non-technical stakeholders. Leadership: Proven ability to lead cross-functional teams and manage multiple projects simultaneously. Soft Skills: Excellent analytical and problem-solving skills. Strong communication skills, both written and verbal. Ability to work independently and as part of a team. Detail-oriented with a strong focus on accuracy and quality. Ability to work in a fast-paced environment and manage multiple tasks simultaneously. This role is ideal for a motivated individual who is passionate about cybersecurity and eager to contribute to the organization's security posture. If you have a strong background in vulnerability management and a commitment to continuous improvement, we encourage you to apply. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Benefits At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Professional development From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career. Requisition code: 301153 Show more Show less

Posted 5 days ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Job Description Must-Have Skills : Professional experience working with public cloud platforms (AWS) Expertise in Infrastructure as Code (IaC) tools such as Terraform Hands-on experience with CI/CD tools like GitLab CI/CD, GitHub Actions, or Jenkins Strong coding and scripting skills (PowerShell, Bash, Python, or equivalent) Proficiency in Configuration Management tools like Ansible, Puppet, or Chef Experience managing and troubleshooting Linux servers Strong analytical and troubleshooting skills Exposure to security best practices and remediation Familiarity with security-related tools such as Wiz and Qualys Hands-on experience in Static/Dynamic Security Testing s Penetration Testing using tools like SonarQube, CheckMarx, AppScan, BurpSuite, OWASP ZAP Proxy, WebInspect, Fortify, Veracode, Nessus, etc. Good-to-Have Skills Knowledge of System and Application Monitoring tools (Prometheus, Grafana, CloudWatch) Experience with Log Management tools (Elastic Stack, Graylog, Splunk) Working experience with relational databases (MySQL, MS SQL Server, or similar) Use of Secret Management services like HashiCorp Vault Understanding of Change Control procedures Main Responsibilities Deliver resilient application stacks via Infrastructure as Code and DevOps practices Monitor and support critical, high-revenue business applications Diagnose and resolve complex system and application issues Implement and maintain security best practices and remediation strategies Work with cross-functional teams including Development, QA, IT Operations, and Project Management Write and maintain technical and non-technical documentation (ref:hirist.tech) Show more Show less

Posted 6 days ago

Apply

3.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Background Hapag-Lloyd CISO is accountable on keeping the business secure and to safeguard customer trust by predicting, preventing, identifying, and responding to threats and make sure a quick recovery from cyber-related incidents. Whilst assisting Hapag-Lloyd management, business, and other areas, we enable our employees by providing usable and secure services and ensuring that security is part of our DNA. Our mission is to enable the company to continue doing business securely and efficiently. Hapag-Lloyd is operating in an increasingly complex environment were disruptive technologies, new types of threats and new cyber security regulations create additional cyber risks for organizations. Digitization is a top priority as customer preferences are changing towards mobile and digital and is part of Hapag-Lloyd values: “We care, We move, We deliver” , which are the heart of everything we do. Summary Of The Role We are currently seeking a dedicated and analytical Vulnerability Management Analyst to join our Cyber Resilience Fusion Center team. This role is essential for protecting our Information Technology (IT) and Operational Technology (OT) environments from potential threats and vulnerabilities. The ideal candidate will be responsible for identifying, evaluating, and reporting on security vulnerabilities within our systems and networks. Working in the Attack Surface Management (ASM) area, the Vulnerability Management Analyst plays a crucial role in maintaining the integrity, confidentiality, and availability of our IT and OT infrastructures by ensuring our systems are safeguarded against the latest threats. Responsibilities And Tasks Conduct regular scans of IT and OT systems to identify vulnerabilities and assess their potential impact. Perform thorough risk assessments on identified vulnerabilities, considering both the technical aspects and the business context. Collaborate with IT and OT teams to prioritize and facilitate the timely patching of vulnerabilities. Prepare detailed reports on vulnerability findings, including risk assessments, recommended actions, and patch management status. Develop and maintain Vulnerability Management policies, procedures, and related documentation to ensure consistent and effective practices. Stay abreast of the latest cybersecurity threats and vulnerabilities, incorporating this intelligence into Vulnerability Management processes. Communicate effectively with various stakeholders, including IT and OT teams, management, and external partners, to ensure a comprehensive understanding of vulnerabilities, impacts, and mitigation strategies. Provide expertise and support during cybersecurity incidents related to vulnerabilities. Assist in compliance efforts and audits, ensuring that Vulnerability Management practices meet industry standards and regulatory requirements. Regularly review and recommend improvements to the Vulnerability Management program to enhance security posture. Requirements And Qualifications Master’s or bachelor’s degree or equivalent technical training in Information Technology, Information Systems Security, Cybersecurity, or related field. Minimum of 3 years of experience in Cybersecurity, specifically in Vulnerability Management, risk assessment, or a similar role. Strong understanding of both Information Technology (IT) and Operational Technology (OT) systems and their unique security challenges. Proficiency with vulnerability scanning tools (e.g., Nessus, Qualys, Rapid7) and familiarity with security frameworks (e.g., NIST, ISO 27001). Ability to analyze vulnerability data, assess risks, and prioritize responses based on potential impact. Excellent written and verbal communication skills, with the ability to explain technical details to non-technical stakeholders. Relevant certifications such as CEH, Security+, PenTest+, GSEC are desired. Good understanding of Windows, UNIX and Linux operating systems functions and security. Ability to clearly convey results in formal technical reports and deliver briefings to senior staff, technical specialists, and management, including CISO and C-Suite. Excellent soft skills – team building, conflict resolution, empathy, motivation, creativity, flexibility. Experience working in Supply Chain, Logistics, Shipping/Transport sectors is a plus. Creative and flexible mindset. Responsive and able to take responsibility for actions & deliverables. Stick to commitments and hold each other accountable. Ability to work collaboratively in a team environment and with employees from various departments. Excellent oral and written English communication skills. Show more Show less

Posted 6 days ago

Apply

5.0 years

0 Lacs

Thiruvananthapuram, Kerala, India

On-site

Linkedin logo

The world's top banks use Zafin's integrated platform to drive transformative customer value. Powered by an innovative AI-powered architecture, Zafin's platform seamlessly unifies data from across the enterprise to accelerate product and pricing innovation, automate deal management and billing, and create personalized customer offerings that drive expansion and loyalty. Zafin empowers banks to drive sustainable growth, strengthen their market position, and define the future of banking centered around customer value. Qualifications Required . Bachelor's or Master's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Equivalent professional experience is acceptable. Minimum 5+ years of experience in Azure cloud operations, with a demonstrated focus on security and vulnerability management. Proven track record of managing and securing large-scale Azure environments in production. Hands-on experience with vulnerability scanning, remediation, and compliance in enterprise cloud environments. Extensive experience in responding to and managing security incidents and threat mitigation in Azure. Technical Skills Azure Expertise : In-depth knowledge of Azure services, including but not limited to: Azure Security Center Azure Defender Azure Key Vault Azure Policy Azure Sentinel (SIEM) Azure Active Directory (Azure AD) Security and Vulnerability Tools : Proficiency with vulnerability scanning and management tools like Qualys, Tenable Nessus, or Rapid7. Experience with Azure-native security tools for threat detection and remediation. Infrastructure Hardening : Strong knowledge of security best practices for securing virtual machines, storage accounts, AKS, and network components. Familiarity with zero-trust architecture principles and implementation in Azure. Automation & Scripting : Advanced skills in scripting languages such as PowerShell, Azure CLI, Python, or other automation tools to remediate vulnerabilities and improve operational efficiency. Experience in integrating security checks into CI/CD pipelines. Certifications (Preferred or Mandatory) Azure Cloud Certifications: Microsoft Certified: Azure Administrator Associate (AZ-104) Microsoft Certified: Azure Security Engineer Associate (AZ-500) Microsoft Certified: Cybersecurity Architect Expert (SC-100) Security Certifications: Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) CompTIA Security+ GIAC certifications (e.g., GCIH, GSEC, or GCED) Other Requirements Familiarity with regulatory and compliance standards, such as ISO 27001, SOC 2, GDPR, or HIPAA. Experience in performing and supporting audits related to cloud security. Proven ability to stay current with evolving cloud and cybersecurity trends. What's in it for you Joining our team means being part of a culture that values diversity, teamwork, and high-quality work. We offer competitive salaries, annual bonus potential, generous paid time off, paid volunteering days, wellness benefits, and robust opportunities for professional growth and career advancement. Want to learn more about what you can look forward to during your career with us? Visit our careers site and our openings: zafin.com/careers Zafin welcomes and encourages applications from people with disabilities. Accommodations are available on request for candidates taking part in all aspects of the selection process. Zafin is committed to protecting the privacy and security of the personal information collected from all applicants throughout the recruitment process. The methods by which Zafin contains uses, stores, handles, retains, or discloses applicant information can be accessed by reviewing Zafin's privacy policy at https://zafin.com/privacy-notice/. By submitting a job application, you confirm that you agree to the processing of your personal data by Zafin described in the candidate privacy notice. Show more Show less

Posted 6 days ago

Apply

4.0 - 9.0 years

0 Lacs

India

Remote

Linkedin logo

Job Title: Sr. SecOps Engineer Experience: 4 - 9 Years Location: Remote Contract Duration: Long Term Work Time: 1 PM - 10 PM or 2 PM - 11 PM IST Job Summary We seek innovative professionals who adapt to change and thrive in fast-paced environments. You will join an engineering team that builds scalable systems, secures infrastructure, and applies advanced technologies to protect and transform financial services. If you are passionate about cybersecurity, infrastructure design, and proactive defense, we encourage you to apply. Responsibilities Gain deep understanding of the company’s tech stack to assess vulnerabilities and propose security solutions Monitor IT control environments to identify key risks, control gaps, and report findings Support third-party vulnerability testing processes and document results Collaborate with internal stakeholders to address systemic security concerns Perform monitoring using security tools and oversee remediation efforts Identify and analyze threats and vulnerabilities, ensuring timely resolution Implement and maintain consistent, cost-effective security controls and procedures Track and document security-related incidents for efficient resolution Support audits and risk assessments with documentation and evidence Assist management in corrective action planning based on audit findings Lead or participate in implementation of new security initiatives Stay updated on technology and security trends to recommend improvements Help develop company-wide IT and information security best practices Primary Skills 4–6 years of experience in design, testing, development, migration, and integration within mid to large organizations Experience in conducting vulnerability scans across various environments Hands-on with vulnerability scanning, incident response, endpoint detection, monitoring, and logging Strong understanding of current security threats, tools, and network technologies Practical knowledge of AWS core services such as VPC, EC2, S3, RDS, ELB, ALB, WAF, Lambda Proficiency in programming languages such as Python, Java, or Go Experience with both Windows and Linux operating systems Proficient in using scanning tools like Qualys, Rapid7 Nexpose, or Tenable Nessus Familiarity with EDR tools such as Tanium, Crowdstrike, Cisco AMP, or McAfee Skilled in monitoring tools like Splunk, Loggly, or Kibana Experience with automation and configuration tools like Jenkins, Puppet, Chef, CloudFormation, Terraform, or Ansible Knowledge of version control and CI/CD tools: Git, Nexus, Gradle, Groovy, YML Understanding of AWS security capabilities: WAF, GuardDuty, Security Groups, IAM Familiar with baseline configuration standards (CIS Benchmarks or DISA STIGs) Strong communication and presentation skills Security certifications such as CISSP, GSEC, CEH are a plus Show more Show less

Posted 6 days ago

Apply

5.0 - 7.0 years

7 - 12 Lacs

Mumbai

Hybrid

Naukri logo

Your day at NTT DATA The Security Platform Engineer is a seasoned subject matter expert, responsible for facilitating problem resolution and mentoring for the overall Global Data Centers Office of Information Security (GDC-OIS) team. This role performs important tasks specialized at threat hunting, Crowdstrike, Network Security and other operational security tasks such as performance and availability monitoring, log monitoring, security incident detection and response, security event reporting, and content maintenance (tuning). The Security Platform Engineer is responsible for detecting and monitoring escalated threats and suspicious activity affecting the organization's technology domain (servers, networks, appliances and all infrastructure supporting production applications for the enterprise, as well as development environments). What you'll be doing KEY RESPONSIBILITIES Works as part of a 24/7 global team in IT/OT environment. ICS and SCADA knowledge preferred. Administers the organization's security tools to gather security logs from the environment and performs lifecycle management, including break-fix, patching, and live updates. Performs security incident handling and response from various vectors, including endpoint protection, enterprise detection and response tools, attack analysis, malware analysis, network forensics, and computer forensics. Conducts vulnerability assessments using automated scanning tools and manual techniques to identify security vulnerabilities in systems, networks, applications, and infrastructure components. Analyzes scan results, prioritizes vulnerabilities based on severity, impact, and exploitability, and provides detailed remediation recommendations to system owners, administrators, and IT teams. Monitors security alerts and maintains awareness of new threats and vulnerabilities to identify potential risks. Reads reports, makes risk assessments, works to detect the source of attacks, and tests current defenses against threats. Collaborates to develop practical mitigation strategies, configuration changes, and patch management processes to address identified vulnerabilities. Identifies opportunities to make automations that will help the incident response team. Ensures usage of knowledge articles in incident diagnosis and resolution and assists with updating as required. Investigates causes of incidents, seeks resolution, and escalates unresolved incidents, following up until resolved. Provides service recovery following the resolution of incidents and documents and closes resolved incidents according to agreed procedures. Maintains knowledge of specific , provides detailed advice regarding their application, and ensures efficient and comprehensive resolution of incidents. Logs all incidents in a timely manner with the required level of detail and cooperates with all stakeholders, including client IT environments, vendors, and carriers, to expedite diagnosis of errors and problems and identify a resolution. Analyzes data from various sources, including network traffic, email logs, malware files, web server logs, and DNS records, to identify potential risks and improve security measures Leads projects, self-starter, and performs any other related task as required. KNOWLEDGE & ATTRIBUTES Seasoned working knowledge on implementation and monitoring of any SIEM or security tools/technologies. ICS and SCADA knowledge preferred Seasoned knowledge on security architecture, worked across different security technologies. Customer service orientated and pro-active thinking. Problem solver who is highly driven and self-organized. Great attention to detail. Good analytical and logical thinking. Excellent spoken and written communication skills. Team leader with the ability to work well with others and in group with colleagues and stakeholders. ACADEMIC QUALIFICATIONS & CERTIFICATIONS Bachelor's degree or equivalent in Information Technology or related field. Relevant level of Security certifications such as CySA+, PenTest+, CCSP, GCIH, OSCP, etc. preferred. Relevant level of IT certifications such as GRID, GICSP, AZ-500, SC-200, etc. will be added advantage. REQUIRED EXPERIENCE Seasoned experience in Security technologies like (SIEM, PAM, IAM, PenTest, Threat Hunting, Firewall, Proxy etc.) preferably within a global IT services organization. Prior experience of working into Security Operation centers of a Data Center will be an added advantage. ICS and SCADA knowledge preferred. Seasoned experience in technical support to clients. Seasoned experience in diagnosis and troubleshooting. Seasoned experience providing remote support in Security Technologies. Seasoned experience in SOC/CSIRT Operations. Seasoned experience in handling security incidents end to end. Seasoned experience in Security Engineering. Knowledge on networking, Windows, Linux and security concepts. Seasoned experience in configuring/managing security controls such as RBAC, IAM, Zero Trust, UTM, Proxy, SOAR, etc.. Knowledge on log collection mechanism such as Syslog, Log file, DB API. Knowledge in security architecture. Prior experience of working on platforms like Crowd strike, Qualys, Palo Alto, Splunk, QRADAR, Cisco, VMWare and Ubuntu PHYSICAL REQUIREMENTS Primarily sitting with some walking, standing, and bending. Able to hear and speak into a telephone. Close visual work on a computer terminal. Dexterity of hands and fingers to operate any required to operate computer keyboard, mouse, and other technical instruments. WORK CONDITIONS & OTHER REQUIREMENTS This position is expected to be Hybrid for the foreseeable future with an occasional need to be onsite in a shared work environment. Must be comfortable with flexible working schedules across regions and their standard Time zones other than the base location. (US, EMEA & APAC) Extensive daily usage of workstation or computer. Must be comfortable working in a highly critical, fast paced environment with shifting priorities. Some domestic and/or international travel required, up to 25% of time. Perform work from a remote location with stable internet connection.

Posted 6 days ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

Hyderabad

Hybrid

Naukri logo

Your day at NTT DATA The Vulnerability Assessment Specialist is a seasoned subject matter expert, responsible for conducting advanced vulnerability assessments, identifying vulnerabilities, and provides expert recommendations to mitigate security risks to ensure the security and integrity of the organization's systems and infrastructure. This role requires collaboration with cross-functional teams, and they lead/perform vulnerability assessments, analyze findings, and provide recommendations to mitigate security risks and contributes to the improvement of vulnerability management practices. What you'll be doing Key Responsibilities: Conducts vulnerability assessments using automated scanning tools and manual techniques to identify security vulnerabilities in systems, networks, applications, and infrastructure components. Conducts penetration tests using automated tools and manual techniques to identify security vulnerabilities in systems, networks, applications, and infrastructure components. Analyzes scan results and prioritizes vulnerabilities based on severity, impact, and exploitability. Assesses the potential risks associated with identified vulnerabilities. Analyzes the business impact, likelihood of exploitation, and potential attack vectors to prioritize remediation efforts based on risk severity. Provides detailed remediation recommendations to system owners, administrators, and IT teams. Collaborates to develop practical mitigation strategies, configuration changes, and patch management processes to address identified vulnerabilities. Utilizes vulnerability scanning tools such as Nessus, OpenVAS, Qualys, or similar tools to conduct scans, configure scan policies, and fine-tune scan parameters for accurate and comprehensive assessments. Utilizes penetration testing tools such as Metasploit, Burp Suite, and similar tools to conduct tests, configure test policies, and fine-tune test parameters for accurate and comprehensive assessments. Prepares vulnerability assessment reports, documenting assessment findings, risk analysis, and recommended actions. Communicates assessment results to stakeholders, including technical and non-technical audiences, in a clear and concise manner. Collaborates with cross-functional teams, including IT operations, development teams, and security stakeholders, to ensure effective communication, coordination, and alignment on vulnerability management efforts. Communicates technical concepts and recommendations to non-technical stakeholders. Participates in security awareness programs and provides training to end-users and stakeholders on vulnerability management best practices, secure coding, and security hygiene. Promotes a culture of security awareness within the organization. Collaborates with incident response teams to identify and address vulnerabilities associated with security incidents. Provides support during incident response efforts and contribute to post-incident analysis and remediation. Stays updated with the latest security trends, emerging vulnerabilities, and industry best practices. Contributes to the enhancement of vulnerability assessment processes, methodologies, and tools. Shares knowledge and provides guidance to improve vulnerability management practices. Shares knowledge and provides guidance to improve penetration testing practices. Contributes to open source security projects and the security community. Performs any other related task as required. Knowledge and Attributes: Seasoned understanding of vulnerability assessment methodologies, tools, and industry best practices. Seasoned understanding of penetration testing methodologies, tools, and industry best practices. Seasoned understanding of networking concepts, operating systems, and common software vulnerabilities. Solid proficiency in using vulnerability assessment tools such as Nessus, OpenVAS, Qualys, or similar tools. Solid proficiency in using penetration testing tools such as Metasploit, Burp Suite, and similar tools. Seasoned knowledge of risk analysis principles and the ability to assess the business impact of vulnerabilities. Solid knowledge of vulnerability management frameworks, such as CVE, CVSS, and common vulnerability databases. Strong analytical and problem-solving skills to analyze scan results, prioritize vulnerabilities, and recommend effective remediation actions. Excellent written and verbal communication skills to prepare vulnerability assessment reports and effectively communicate technical information to diverse stakeholders. Excellent collaboration and teamwork skills to work effectively with cross-functional teams and stakeholders. Seasoned familiarity with security frameworks, standards, and regulatory compliance requirements. Academic Qualifications and Certifications: Bachelor's degree or equivalent in Computer Science, Information Security, or a related field. Relevant certifications such as Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP)GIAC Penetration Tester (GPEN) or GIAC Certified Vulnerability Assessor (GCVA) are beneficial. Required Experience: Seasoned demonstrated experience in information security or related roles, with a focus on conducting vulnerability assessments and providing remediation recommendations. Seasoned demonstrated experience in conducting advanced vulnerability assessments, including application security assessments, network security assessments, penetration testing, or code review. Experience in bug bounty programs and identifying zero-day vulnerabilities is a plus.

Posted 6 days ago

Apply

2.0 - 4.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

What Success Looks Like In This Role Vulnerability Management: Experience with vulnerability management tools (e.g., Tenable, Qualys), including actions to remediate identified vulnerabilities Experience in working at “responsibility without authority” engagements for vulnerability remediation Threat Analysis: Perform in-depth analysis of security events and provide actionable intelligence to prevent future incidents. Root Cause Analysis: Conduct post-incident analysis to determine the root cause of incidents and assist in developing mitigation strategies to prevent recurrence. Collaboration: Work closely with other internal teams, such as IT, legal, and compliance, to mitigate and remediate security incidents and provide necessary incident reporting. Security Tools Support: Support the installation and management of security tools such as SIEM, IDS/IPS, endpoint detection & response (EDR), and firewall systems. Continuous Improvement: Contribute to the development and refinement of incident response processes, playbooks, and security protocols. Expected Knowledge And Experience Incident Response: experience in security incident response and resolution, including malware outbreaks, network intrusions, and data breaches alerts monitoring and root-cause analysis. Cybersecurity Frameworks: Familiarity with security frameworks such as NIST, MITRE ATT&CK, and SANS. Tools & Technologies: Familiarity with security technologies and platforms (e.g., SIEMs like Splunk, Tenable; EDR tools like CrowdStrike; firewalls, IDS/IPS systems). Network & Systems: Understanding of network protocols, operating systems (Windows, Linux), and web applications, and how they can be exploited in attacks. Threat Intelligence: Familiarity with threat intelligence feeds and using them to inform incident response and proactively detect threats. Incident Response: Support the analysis and documentation of security incidents, including timelines, actions taken, and outcomes. Reporting: Provide clear and concise incident reports and updates to senior management and relevant stakeholders. Cloud Security: Understanding of cloud platforms (AWS, Azure, GCP) and security implications within cloud environments. Regulatory Compliance: Knowledge of relevant regulatory requirements (e.g., GDPR, ISO27001, PCI-DSS) and how they relate to incident management and reporting. Preferred Qualifications Certifications: Relevant cybersecurity and/or privacy certifications are expected. Scripting Skills: Familiarity with scripting or automation (Python, Bash, PowerShell) for incident investigation and response tasks. Forensics: Understanding of digital forensics, including evidence collection, chain of custody, and data analysis techniques. Skills & Competencies Strong analytical and problem-solving skills. Solid knowledge of MS Excel. Excellent verbal and written communication skills. Ability to handle high-pressure situations and make quick decisions. Ability to work both independently and as part of a collaborative team. Detail-oriented with strong organizational and documentation skills. You will be successful in this role if you have: BA/BS degree and 2-4 years’ relevant experience OR equivalent combination of education and experience Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law. This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise complete your expression of interest, without additional assistance and would like to discuss a request for reasonable accommodation, please contact our Global Recruiting organization at GlobalRecruiting@unisys.com or alternatively Toll Free: 888-560-1782 (Prompt 4). US job seekers can find more information about Unisys’ EEO commitment here. Show more Show less

Posted 6 days ago

Apply

3.0 - 6.0 years

0 Lacs

Mumbai, Maharashtra

On-site

Indeed logo

Category: Infrastructure/Cloud Main location: India, Maharashtra, Mumbai Position ID: J0525-0774 Employment Type: Full Time Position Description: Company Profile: At CGI, we’re a team of builders. We call our employees members because all who join CGI are building their own company - one that has grown to 72,000 professionals located in 40 countries. Founded in 1976, CGI is a leading IT and business process services firm committed to helping clients succeed. We have the global resources, expertise, stability and dedicated professionals needed to achieve. At CGI, we’re a team of builders. We call our employees members because all who join CGI are building their own company - one that has grown to 72,000 professionals located in 40 countries. Founded in 1976, CGI is a leading IT and business process services firm committed to helping clients succeed. We have the global resources, expertise, stability and dedicated professionals needed to achieve results for our clients - and for our members. Come grow with us. Learn more at www.cgi.com. This is a great opportunity to join a winning team. CGI offers a competitive compensation package with opportunities for growth and professional development. Benefits for full-time, permanent members start on the first day of employment and include a paid time-off program and profit participation and stock purchase plans. We wish to thank all applicants for their interest and effort in applying for this position, however, only candidates selected for interviews will be contacted. No unsolicited agency referrals please. Job Title: Database Analyst + SDP Admin Position: Systems Engineer/ Senior Systems Engineer Experience:3 - 6 Years Category: Software Development/ Engineering Main location: Mumbai Position ID: J0525-0774 Employment Type: Full Time Job Description : Must Have: Minimum 2+ years of experience in Oracle database & of 1+ years as IBM SDP Admin using the application (Thick/Web Client, Manager).. Good knowledge in SQL/PLSQL, DB Tools (export/import/sqlloader). Good knowledge on shell scripting (ksh/bash). Knowledge on Business Intelligence 4.x platform will be an added advantage. Knowledge of Atlas2 & usage IV2 Marketplace will be an added advantage Up to date technical stack covering all assets used by Core Banking the environments (with different technologies) to develop, test & deliver the Atlas2 product to different sites. The frameworks used for Java & Angular developments The CI/CD Pipelines Direct Responsibilities Tools and Frameworks(T&F) team is a unit working under the Core Banking Build Department. The Build team is responsible for the development of Atlas2 CIB applications that are deployed across sites. The responsibility of T&F is to provide the build team with o Up to date technical stack covering all assets used by Core Banking o the environments (with different technologies) to develop, test & deliver the Atlas2 product to different sites. o The frameworks used for Java & Angular developments o The CI/CD Pipelines o Internal Tools So, T&F is a transversal team in charge of servers, environments, defining their technical stacks, fully responsible for CI-CD platform across technologies from Java to Cobol to IBM SDP, provides technical support & studies on different technologies to the needs of build team. T&F also owns many applications as GDI, PCK-B/M /Viewer, Env-viewer, Polaris, BCTT. The current role will be part of Unix Pole under T&F team focusing on DB tasks but also as SDP Admin In the scope of all Database related actions& SDP application for Atlas2: Maintaining databases, writing complex SQL queries for data retrieval & manipulation. Installation & Administration of IBM SDP application (Thick/Web Client, Manager). Ability to develop Cobol programs. Technical Support, Troubleshooting & resolving database/SDP-related issues. Ability to create/maintain tools via scripts or via automation to facilitate the different inputs that are necessary for development of atlas application. Should be able to handle different type of requests from build team and provide solution. Contributing Responsibilities Should learn, work across technologies (Linux, SDP, Unikix, Autosys, Jenkins, Ansible, Oracle) & across number of atlas tools (PCK, listGDI, mporacle, …) with the different resources in T&F team & should ensure to act as a backup of other resources within ISPL team. Must Have: OWASP methodologies application is a mandatory. 2 – 4-year experience in IT Security minimum University degree, preferably in Computer Science with spec. in IT Security Experience working in an international and complex financial environment, dealing with both business constraints and IT users across countries. Good knowledge of Security scanning tools like Qualys, Nexpose, Appspider is highly appreciated along with good understanding of Kubernetes. Experience in a multi-cultural environment is appreciated. CEH or Any Security certifications are appreciated. Good To Have: Experience in Development languages and scripting is appreciated. Note: This job description is a general outline of the responsibilities and qualifications typically associated with the Virtualization Specialist role. Actual duties and qualifications may vary based on the specific needs of the organization. CGI is an equal opportunity employer. In addition, CGI is committed to providing accommodations for people with disabilities in accordance with provincial legislation. Please let us know if you require a reasonable accommodation due to a disability during any aspect of the recruitment process and we will work with you to address your needs. Your future duties and responsibilities Required Skills & Qualifications: Minimum 2+ years of experience in Oracle database & of 1+ years as IBM SDP Admin. Good knowledge in SQL/PLSQL, DB Tools (export/import/sqlloader). Good knowledge on shell scripting (ksh/bash). Knowledge on Business Intelligence 4.x platform will be an added advantage. Knowledge of Atlas2 & usage IV2 Marketplace will be an added advantage Required qualifications to be successful in this role Bachelor’s degree in Computer Science, Engineering, or related field preferred. Skills: ITIL Oracle MS SQL Server Shell Script What you can expect from us: Together, as owners, let’s turn meaningful insights into action. Life at CGI is rooted in ownership, teamwork, respect and belonging. Here, you’ll reach your full potential because… You are invited to be an owner from day 1 as we work together to bring our Dream to life. That’s why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our company’s strategy and direction. Your work creates value. You’ll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas, embrace new opportunities, and benefit from expansive industry and technology expertise. You’ll shape your career by joining a company built to grow and last. You’ll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons. Come join our team—one of the largest IT and business consulting services firms in the world.

Posted 1 week ago

Apply

5.0 - 10.0 years

10 - 20 Lacs

Noida, Bengaluru

Work from Office

Naukri logo

Job Title: Vulnerability Engineer Experience: 5 - 12 Years Location: Bengaluru / Noida Employment Type: Full-time About the Role: We are hiring a Vulnerability Engineer to join our Managed Security Services team. You will be responsible for identifying, analyzing, and tracking security vulnerabilities across enterprise environments. The role involves working with scanning tools, coordinating with stakeholders, and ensuring timely remediation to minimize security risk. Key Responsibilities: Perform vulnerability scans using tools like Tenable Nessus, Qualys, IBM AppScan , etc. Analyze scan results, identify false positives, and prioritize risks Track and support remediation efforts with technical teams Register and manage assets in scanning platforms and maintain scan schedules Prepare reports and metrics for leadership and stakeholders Coordinate with customers on scan schedules and mitigation plans Contribute to automation and process optimization Required Skills: Strong knowledge of vulnerability management processes and tools Solid understanding of network, system, and application-level security Experience in report writing and communicating technical findings Familiarity with enterprise IT environments and TCP/IP networking Excellent problem-solving, collaboration, and communication skills Willingness to participate in on-call support rotation Preferred: Experience with scripting/automation for scanning and reporting Security certifications (e.g., CEH, CompTIA Security+, OSCP)

Posted 1 week ago

Apply

8.0 - 13.0 years

15 - 30 Lacs

Noida, Bengaluru

Work from Office

Naukri logo

Job Title: SIEM Engineer Experience: 5 - 15 Years Location: Bengaluru / Noida Employment Type: Full-time About the Role: We are seeking a skilled SIEM Engineer to join our Managed Security Services team. You will be responsible for designing, implementing, managing, and supporting cybersecurity solutions, with a focus on SIEM tools and incident response. This is a hands-on technical role working with internal teams, customers, and third-party vendors to ensure robust security practices. Key Responsibilities: Design, deploy, and manage SIEM tools (e.g., QRadar, ArcSight, Splunk, McAfee ESM) and log integrations Create, tune, and maintain detection rules and dashboards Investigate and respond to security incidents and alerts Participate in security audits, threat hunting, and compliance checks Research emerging threats and enhance detection capabilities Support configuration management, system hardening, and network defense strategies Collaborate across teams to improve security operations and automation Required Skills: Strong hands-on experience with SIEM platforms & SIEM tools (e.g., QRadar, ArcSight, Splunk, McAfee ESM) and log integrations Deep understanding of security operations , incident response , and network/system security Experience with scanning tools (e.g., Nessus, Qualys ) and PAM solutions (e.g., CyberArk, BeyondTrust ) Solid knowledge of Linux/Windows environments and enterprise networks Familiar with encryption, security controls, and system hardening best practices Excellent analytical, troubleshooting, and communication skills Preferred: Security certifications (e.g., CEH, CISSP, GCIA, GCIH) Experience in automation and scripting for SOC workflows Willingness to participate in on-call support rotation

Posted 1 week ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Rockwell Automation is a global technology leader focused on helping the world’s manufacturers be more productive, sustainable, and agile. With more than 28,000 employees who make the world better every day, we know we have something special. Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that’s you we would love to have you join us! Job Description Job Summary: The vulnerability analyst identifies vulnerabilities in systems using vulnerability scanning tools, interpreting the results, and developing remediation guidance for team members. You will research, identify, assess, and prioritize vendor and third-party security advisories and then advise system owners in completing patching and mitigation activities. Also, the vulnerability analyst also performs an important role in identifying areas to improve security posture resulting from security incidents. The vulnerability analyst works within the CISO organisation, which protects Rockwell Automation's security globally across a mix of cloud and on-premises networks. You will report to the Cyber Security Manager. Your Responsibilities Need to be updated on the latest vulnerabilities that may affect Rockwell Automation systems. Conduct triage of vulnerabilities based on criticality. Contribute to vulnerability management process development. Conduct remediation activities with company partners in response to detected vulnerabilities. Develop, research, and maintain proficiency in tools, techniques, and trends related to vulnerability analysis. Identify root cause of cybersecurity incidents. Develop base statistical methods to display cybersecurity risk. Hunt for new vulnerabilities. Perform security penetration tests on networks, web-based applications, and computer systems. Create findings and reports to application owners and management. Consult application owners on best practices for remediation. Demonstrated commitment to valuing diversity and contributing to an inclusive working and learning environment. The Essentials - You Will Have Basic knowledge of Software Development Lifecycle is required. An understanding of Windows and Linux-based systems are recommended. An understanding of common networking protocols, such as HTTP, DNS, and TLS is expected from the candidate. An understanding of common exploitation vectors are required. Describe vulnerabilities and technical concepts to all levels is recommended. Familiar with vulnerability scanners such as Qualys or Rapid7 are considered. The Preferred - You Might Also Have Understanding of packaging and deployment tools such as SCCM and Intune are preferrable. Experience with scripting, either Python, Powershell or another languageCertification is also an added advantage. What We Offer Our benefits package includes … Comprehensive mindfulness programmes with a premium membership to Calm. Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching programme – Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program. Personalised wellbeing programmes through our OnTrack programme. On-demand digital course library for professional development. and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. Rockwell Automation’s hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office. Show more Show less

Posted 1 week ago

Apply

3.0 - 6.0 years

5 - 9 Lacs

Hyderabad

Work from Office

Naukri logo

Ability to understand the technical implications and impact of various types of vulnerabilities on servers and applications including remote code execution, elevation of privilege, information disclosure. Ability to assess the risk associated with vulnerabilities, including impact and exploitability Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 3 plus years of experience Experience in vulnerability management, security operations, or a related field with a proven track record of identifying and mitigating vulnerabilities. Practical experience with vulnerability scanning, risk assessment, and patch management processes. Proficiency with vulnerability scanning tools such as Nessus, Qualys, Rapid7 Preferred technical and professional experience Vulnerability AssessmentExperience in conducting vulnerability assessments and penetration testing Application Hands-on experience withTenable.SC (or an equivalent VM platform) including administration of Nessus remote and agent-based scans, profile creation and maintenance Skills in prioritizing vulnerabilities based on their severity, potential impact, and the organization’s risk profile, experience with ASM solution

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

As one of the world’s leading asset managers, Invesco is dedicated to helping investors worldwide achieve their financial objectives. By delivering the combined power of our distinctive investment management capabilities, we provide a wide range of investment strategies and vehicles to our clients around the world. If you're looking for challenging work, smart colleagues, and a global employer with a social conscience, come explore your potential at Invesco. Make a difference every day! Job Description JOB DESCRIPTION Job Title: Sr. Analyst I - VAPT Job Code: Department: Offensive Security Location: Hyderabad Report To: Manager VAPT Direct Reports: No Job Purpose (Job Summary): This role will perform vulnerability assessments against risk-prioritized infrastructure and applications. This position will serve as a security subject matter expert working with technology, and business partners in managing vulnerabilities and implementing adequate security controls to protect Invesco data and network. Key Responsibilities / Duties: Perform vulnerability assessment on various types of technologies and infrastructure using tools (preferably Qualys). This may include: Network infrastructure and wireless networks Servers, platforms, containers, hosting infrastructure and services Application technologies (APIs, middleware, database, enterprise service bus, etc.) Cloud security controls and applications High value assets and critical infrastructure Review and analyze security vulnerability data to identify applicability and false positives. Assist with ongoing assessment of Invesco perimeter assets to identify exposures and weaknesses. Assist with red team assessments to identify security exposures and to evaluate effectiveness of security controls and response. Assist with producing high-quality papers, presentations, recommendations, and findings for Senior Level Management and Enterprise Technology Leaders Execute vulnerability triaging, escalation, and management workflows through innovation and continuous improvement. Provide internal remediation support through the design, implementation and integration of network infrastructure and information security controls. Participate in vulnerability management projects. Track deliverables and provide periodic updates to the leadership team. Escalate security and projects risk timely. Respond appropriately to cyber risk incident, the related investigations, managing situations with discretion, sensitivity, and objectivity, and with due consideration of chain-of-custody. Have a thorough understanding of technological requirements for Invesco’s systems and provide guidelines to effectively mitigate security risks. Have understanding on security compliance and can perform compliance scans through various tools on the IVZ Infrastructure. Review/Analyze the compliance scan reports and help the teams in the remediation activities. Respond timely to ServiceNow tickets as needed. Keep current with industry best practices. Other duties as assigned. Work Experience / Knowledge: Five plus years of Information Security or relevant experience Three plus years of Pen Testing or Vulnerability Assessment experience. Experience in the tool Splunk for vulnerability management automation capabilities. Cloud vulnerability assessment or pen testing experience preferred Experience with security issues in large networks Able to demonstrate experience, knowledge and skills in utilizing common penetration testing and vulnerability assessment tools and techniques Hands on experience with firewalls, routers, bridges, switches and gateway devices, appliances and software Knowledge of security industry best practices (e.g. SANS, NIST, CIS) Technical Skills Required: Good understanding of security controls and common threats and vulnerabilities Knowledge of penetration testing frameworks Knowledge of security industry best practices (e.g. SANS, NIST, CIS) Understanding of common penetration testing methodologies (e.g. OSSTMM, OWASP) Ability to write scripts/tools to assist in automation is preferred Understanding of encryption technologies and common network protocols Ability to review and analyze security vulnerability data to identify applicability and false positives Patch management technologies and processes Wireless protocols and services Sound understanding of security principles, such as infrastructure security, identity and access management, vulnerability management, and secure coding. A keen analytical mind for problem solving, abstract thought, and offensive security tactics. Other Skills Required: Good interpersonal skills (written and oral communication) and ability to articulate complex issues to executives and customers Make fact-based decisions using individual judgement and problem solving. Ability to communicate technical information clearly and concisely, commensurate with the audience Strong analytical skills with ability to define, collect, analyze data, establish facts, draw valid conclusions, and make fact-based decisions. Conceptual thinking and communication skills — the ability to conceptualize complex business and technical requirements into comprehensible models and templates. Good communicator (written and verbal) and listener. Must be a team player and motivated self-starter with ability to work independently and remotely with limited supervision. Possesses diplomacy and cooperative style necessary to interface effectively with all personalities and across functional disciplines. Must be assertive, methodical and detail oriented Maintain strict confidentiality of all security issues including legal investigations, Compliance, and HR data requests License / Registration / Certification: Preferred certification: Security +, Qualys VM certification, Pentest +, AWS Cloud Practitioner Full Time / Part Time Full time Worker Type Employee Job Exempt (Yes / No) No Workplace Model At Invesco, our workplace model supports our culture and meets the needs of our clients while providing flexibility our employees value. As a full-time employee, compliance with the workplace policy means working with your direct manager to create a schedule where you will work in your designated office at least three days a week, with two days working outside an Invesco office. Why Invesco In Invesco, we act with integrity and do meaningful work to create impact for our stakeholders. We believe our culture is stronger when we all feel we belong, and we respect each other’s identities, lives, health, and well-being. We come together to create better solutions for our clients, our business and each other by building on different voices and perspectives. We nurture and encourage each other to ensure our meaningful growth, both personally and professionally. We believe in diverse, inclusive, and supportive workplace where everyone feels equally valued, and this starts at the top with our senior leaders having diversity and inclusion goals. Our global focus on diversity and inclusion has grown exponentially and we encourage connection and community through our many employee-led Business Resource Groups (BRGs). What’s in it for you? As an organization we support personal needs, diverse backgrounds and provide internal networks, as well as opportunities to get involved in the community and in the world. Our benefit policy includes but not limited to: Competitive Compensation Flexible, Hybrid Work 30 days’ Annual Leave + Public Holidays Life Insurance Retirement Planning Group Personal Accident Insurance Medical Insurance for Employee and Family Annual Health Check-up 26 weeks Maternity Leave Paternal Leave Adoption Leave Near site Childcare Facility Employee Assistance Program Study Support Employee Stock Purchase Plan ESG Commitments and Goals Business Resource Groups Career Development Programs Mentoring Programs Invesco Cares Dress for your Day In Invesco, we offer development opportunities that help you thrive as a lifelong learner in a constantly evolving business environment and ensure your constant growth. Our AI enabled learning platform delivers curated content based on your role and interest. We ensure our manager and leaders also have many opportunities to advance their skills and competencies that becomes pivotal in their continuous pursuit of performance excellence. To Know More About Us About Invesco: https://www.invesco.com/corporate/en/home.html About our Culture: https://www.invesco.com/corporate/en/about-us/our-culture.html About our D&I policy: https://www.invesco.com/corporate/en/our-commitments/diversity-and-inclusion.html About our CR program: https://www.invesco.com/corporate/en/our-commitments/corporate-responsibility.html Apply for the role @ Invesco Careers : https://careers.invesco.com/india/ Show more Show less

Posted 1 week ago

Apply

140.0 years

6 - 7 Lacs

Gurgaon

On-site

About NCR VOYIX NCR VOYIX Corporation (NYSE: VYX) is a leading global provider of digital commerce solutions for the retail, restaurant and banking industries. NCR VOYIX is headquartered in Atlanta, Georgia, with approximately 16,000 employees in 35 countries across the globe. For nearly 140 years, we have been the global leader in consumer transaction technologies, turning everyday consumer interactions into meaningful moments. Today, NCR VOYIX transforms the stores, restaurants and digital banking experiences with cloud-based, platform-led SaaS and services capabilities. Not only are we the leader in the market segments we serve and the technology we deliver, but we create exceptional consumer experiences in partnership with the world’s leading retailers, restaurants and financial institutions. We leverage our expertise, R&D capabilities and unique platform to help navigate, simplify and run our customers’ technology systems. Our customers are at the center of everything we do. Our mission is to enable stores, restaurants and financial institutions to exceed their goals – from customer satisfaction to revenue growth, to operational excellence, to reduced costs and profit growth. Our solutions empower our customers to succeed in today’s competitive landscape. Our unique perspective brings innovative, industry-leading tech to all the moving parts of business across industries. NCR VOYIX has earned the trust of businesses large and small — from the best-known brands around the world to your local favorite around the corner. Information Security Consultant II This role is part of NCR’s Global Information Security team. This team is responsible for developing and implementing NCR’s corporate information security program. The primary goal of the program is to protect the confidentiality, integrity, and availability of information resources. Key information security functions and activities include architecture and design for NCR information security controls, developing and enforcing policies and standards, security awareness training, risk management, assessment, and testing, monitoring and metrics, incident management, and threat and vulnerability management. The Information Security Consultant shall be responsible for the day-to-day activities required to respond for both routine and high severity vulnerabilities and security incidents. The Information Security Consultant shall work in a collaborative manner with vulnerability coordinators, incident responders, key incident management team members, management, and other stakeholders to ensure vulnerabilities and security incidents are contained, eradicated, remediated and after-action review is held according to corporate policy. The Information Security Consultant is expected to contribute to weekly status calls and respond to ad-hoc requests as part of this position. The Information Security Consultant will work with stakeholders and team members to assist with improving incident response processes that are aligned with the mission of the office of the CISO. The individual should be highly skilled, motivated and detail-oriented security professional to join our dynamic team. The ideal candidate will be responsible for leading and managing our Vulnerability Management program along with Incident Management, ensuring the protection of our organization's digital assets. Key Responsibilities: Vulnerability Management: Lead the design, implementation, and continuous improvement of the enterprise-wide vulnerability management program. External attack surface management and technical remediation Run Vulnerability red team exercises and simulation for risk prioritization Oversee vulnerability assessments, scanning, and remediation efforts across all systems, networks, and applications. Collaborate with IT, GTM and product SRE teams to prioritize and remediate vulnerabilities based on risk and business impact. Develop and maintain metrics and dashboards to track vulnerability trends and remediation progress. Ensure compliance with internal policies, industry standards, and regulatory requirements (e.g., ISO 27001, NIST, CIS). Incident Management: Assist in the development and execution of the incident response plan and playbooks. Act as a key responder and advisor during cybersecurity incidents, ensuring timely containment, investigation, and recovery. Conduct post-incident reviews and root cause analyses to improve future response efforts. Provide guidance and training to internal teams on incident response best practices. Skills and Qualifications Bachelor’s or Master’s degree in Cybersecurity, Computer Science, Information Technology, or a related field. 10+ years of experience in cybersecurity, with a strong focus on vulnerability and incident management. Proven experience with vulnerability scanning tools (e.g., Qualys, Tenable, Rapid7) and SIEM/SOAR platforms. Deep understanding of threat landscapes, attack vectors, and mitigation strategies. Strong knowledge of security frameworks and standards (e.g., NIST, MITRE ATT&CK, OWASP). Excellent analytical, communication, and leadership skills. Preferred Certifications: CISSP, CISM, OSCP, CEH, or equivalent. GIAC certifications (e.g., GCIH, GCIA, GPEN) are a plus. Offers of employment are conditional upon passage of screening criteria applicable to the job EEO Statement Integrated into our shared values is NCR Voyix’s commitment to diversity and equal employment opportunity. All qualified applicants will receive consideration for employment without regard to sex, age, race, color, creed, religion, national origin, disability, sexual orientation, gender identity, veteran status, military service, genetic information, or any other characteristic or conduct protected by law. NCR Voyix is committed to being a globally inclusive company where all people are treated fairly, recognized for their individuality, promoted based on performance and encouraged to strive to reach their full potential. We believe in understanding and respecting differences among all people. Every individual at NCR Voyix has an ongoing responsibility to respect and support a globally diverse environment. Statement to Third Party Agencies To ALL recruitment agencies: NCR Voyix only accepts resumes from agencies on the preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Voyix employees, or any NCR Voyix facility. NCR Voyix is not responsible for any fees or charges associated with unsolicited resumes “When applying for a job, please make sure to only open emails that you will receive during your application process that come from a @ncrvoyix.com email domain.”

Posted 1 week ago

Apply

0 years

5 - 8 Lacs

Pune

On-site

Rockwell Automation is a global technology leader focused on helping the world’s manufacturers be more productive, sustainable, and agile. With more than 28,000 employees who make the world better every day, we know we have something special. Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that’s you we would love to have you join us! Job Description Job Summary: The vulnerability analyst identifies vulnerabilities in systems using vulnerability scanning tools, interpreting the results, and developing remediation guidance for team members. You will research, identify, assess, and prioritize vendor and third-party security advisories and then advise system owners in completing patching and mitigation activities. Also, the vulnerability analyst also performs an important role in identifying areas to improve security posture resulting from security incidents. The vulnerability analyst works within the CISO organisation, which protects Rockwell Automation's security globally across a mix of cloud and on-premises networks. You will report to the Cyber Security Manager. Your Responsibilities: Need to be updated on the latest vulnerabilities that may affect Rockwell Automation systems. Conduct triage of vulnerabilities based on criticality. Contribute to vulnerability management process development. Conduct remediation activities with company partners in response to detected vulnerabilities. Develop, research, and maintain proficiency in tools, techniques, and trends related to vulnerability analysis. Identify root cause of cybersecurity incidents. Develop base statistical methods to display cybersecurity risk. Hunt for new vulnerabilities. Perform security penetration tests on networks, web-based applications, and computer systems. Create findings and reports to application owners and management. Consult application owners on best practices for remediation. Demonstrated commitment to valuing diversity and contributing to an inclusive working and learning environment. The Essentials - You Will Have: Basic knowledge of Software Development Lifecycle is required. An understanding of Windows and Linux-based systems are recommended. An understanding of common networking protocols, such as HTTP, DNS, and TLS is expected from the candidate. An understanding of common exploitation vectors are required. Describe vulnerabilities and technical concepts to all levels is recommended. Familiar with vulnerability scanners such as Qualys or Rapid7 are considered. The Preferred - You Might Also Have: Understanding of packaging and deployment tools such as SCCM and Intune are preferrable. Experience with scripting, either Python, Powershell or another languageCertification is also an added advantage. What We Offer: Our benefits package includes … Comprehensive mindfulness programmes with a premium membership to Calm. Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching programme – Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program. Personalised wellbeing programmes through our OnTrack programme. On-demand digital course library for professional development. ... and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. #LI-Hybrid #LI-RS1 Rockwell Automation’s hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office.

Posted 1 week ago

Apply

3.0 years

3 - 3 Lacs

Bengaluru

On-site

Category: Administration Main location: India, Karnataka, Bangalore Position ID: J0625-0283 Employment Type: Full Time Position Description: Company Profile: Founded in 1976, CGI is among the largest independent IT and business consulting services firms in the world. With 94,000 consultants and professionals across the globe, CGI delivers an end-to-end portfolio of capabilities, from strategic IT and business consulting to systems integration, managed IT and business process services and intellectual property solutions. CGI works with clients through a local relationship model complemented by a global delivery network that helps clients digitally transform their organizations and accelerate results. CGI Fiscal 2024 reported revenue is CA$14.68 billion and CGI shares are listed on the TSX (GIB.A) and the NYSE (GIB). Learn more at cgi.com. Job Title: Cyber Security Engineer Position: Senior Systems Engineer/Lead Analyst Experience: 7+ yrs Category: IT Infrastructure Main location: Bangalore Position ID: J0625-0283 Employment Type: Full Time Qualification: Bachelor's degree in Computer Science or related field or higher with minimum 3 years of relevant experience. Job Description: At least 7+ years’ Experience in Vulnerability Assessment and Penetration testing of web applications, mobile applications, API and thick client applications. Good knowledge on web application security, OWASP, Application Security testing, Network Penetration testing, Code Review, Vulnerability Assessment and Appscan Experience in cyber security penetration testing (Manual, PT, VAPT, DAST, SAST, API) Hands on experience in setting up the network environment for VAPT Manual penetration testing skills and techniques are required besides automated tools and frameworks. Hands on experience in identifying false positives Hands on knowledge on tools: Burp Suite Professional, Qualys, Nmap, Kali Linux, Metasploit, Nessus, Wireshark, Sqlmap, Checkmarx etc Strong knowledge of tools for mobile application security, including but not limited to Appuse, MOBSF, Geny Motion, Kali Linux, BURP, PostMan, Appie, Mobisec, NowSecure, HP Fortify On Demand Good Understanding of OWASP Top 10 for web application security and Mobile application security. Perform mobile vulnerability assessment and Penetration testing. Good understanding of Microservice based architecture Experience working in a DevSecOps environment with knowledge of continuous integration, containers, DAST/SAST tools Good understanding of Database security requirements. Good knowledge of cloud environments and should be able to perform VAPT on AWS, Azure etc. Scripting and coding experience(good to have) Certifications: OSCP, CEH Must have Skills : Good knowledge on web application security, OWASP, Application Security testing, Network Penetration testing, Code Review, Vulnerability Assessment and Appscan Experience in cyber security penetration testing (Manual, PT, VAPT, DAST, SAST, API) Hands on experience in identifying false positives Hands on knowledge on tools: Burp Suite Professional, Qualys, Nmap, Kali Linux, Metasploit, Nessus, Wireshark, Sqlmap, Checkmarx etc Good to have Skills : Excellent customer interfacing skills. Excellent written and verbal communication skills. Participating in Daily Standups and weekly reviews Strong attention to detail and outstanding analytical and Problem-solving skills. Understanding of Business, emerging technologies in relevant industry (Banking/CIAM ) , strong understanding of trends (market and technology) in areas of specialization. CGI is an equal opportunity employer. In addition, CGI is committed to providing accommodations for people with disabilities in accordance with provincial legislation. Please let us know if you require a reasonable accommodation due to a disability during any aspect of the recruitment process and we will work with you to address your needs. Life at CGI: It is rooted in ownership, teamwork, respect and belonging. Here, you’ll reach your full potential because… You are invited to be an owner from day 1 as we work together to bring our Dream to life. That’s why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our company’s strategy and direction Your work creates value. You’ll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas, embrace new opportunities, and benefit from expansive industry and technology expertise You’ll shape your career by joining a company built to grow and last. You’ll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons Come join our team, one of the largest IT and business consulting services firms in the world Skills: Vulnerability Assessment(IAVA) What you can expect from us: Together, as owners, let’s turn meaningful insights into action. Life at CGI is rooted in ownership, teamwork, respect and belonging. Here, you’ll reach your full potential because… You are invited to be an owner from day 1 as we work together to bring our Dream to life. That’s why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our company’s strategy and direction. Your work creates value. You’ll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas, embrace new opportunities, and benefit from expansive industry and technology expertise. You’ll shape your career by joining a company built to grow and last. You’ll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons. Come join our team—one of the largest IT and business consulting services firms in the world.

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies