Jobs
Interviews

670 Qualys Jobs - Page 8

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

6.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Job Role : Information Security Engineer. Job Location : : 6+ Years. Job Roles & Responsibilities Conduct vulnerability assessments and policy compliance scanning using tools like Qualys across on-prem, cloud, container environments, databases, web services, and infrastructure. Validate scan results, eliminate false positives, and produce accurate, high-quality vulnerability reports. Act as technical SME to analyze findings, trace root causes, and recommend sustainable remediations to support teams. Maintain and share a knowledge base for vulnerability management, ensuring team-wide expertise. Research emerging vulnerabilities, trends, and improvements in the vulnerability management lifecycle. Communicate security policies, procedures, and compliance requirements clearly across all organizational levels. Provide leadership support by stepping in for the team lead when needed. Job Skills & Requirements Experience & Education : 6+ years in information security. Degree in Engineering, Computer Science, or related field. Industry certifications are a plus (e.g., CISSP, CISA, CISM, CRISC, CCNA/CCNP Security, CCIE). Technical Proficiency Expert in vulnerability scanning and compliance tools (e.g., Qualys). Skilled in assessing on-prem, cloud, container (Docker, Kubernetes), databases, and application stacks. Experience with security infrastructure: firewalls, routers, switches, load balancers, proxies. Strong analytical capabilities for root-cause analysis and risk assessment. Leadership & Communication Able to guide remediation efforts and influence infrastructure/application teams. Exceptional written and verbal communication, capable of clear reporting and policy articulation. Strong organizational, time-management, and team mentorship skills. Additional Attributes Proactive learner, adaptable to evolving threats and technologies. Hands-on risk assessment and threat modeling expertise. Ready to take on ad-hoc duties and support team leadership as needed. (ref:hirist.tech)

Posted 2 weeks ago

Apply

8.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Job Role : Senior Information Security Engineer. Job Location : : 8+ Years. Job Roles & Responsibilities Lead vulnerability assessments and policy compliance scans across on-prem, cloud, container (Docker/Kubernetes), database, and web environments using tools like Qualys. Validate scan results, eliminate false positives, and deliver accurate, actionable reports to stakeholders. Serve as technical SME : analyze findings, diagnose root causes, and guide remediation efforts. Develop and maintain a knowledge base to support continuous improvement and team expertise. Stay current on emerging threats, tools, and VM lifecycle advancements; recommend service enhancements. Communicate security requirements effectively across the organization and step in as interim team lead when necessary. Job Skills & Requirements Experience & Education : 8+ years in information security. Bachelor's in Engineering, CS, IT, or equivalent. Industry certifications preferred : CISSP, CISA, CISM, CRISC, CCNA/CCNP/CCIE Security. Technical Expertise Proficient with vulnerability scanning platforms (Qualys, Nessus, etc.), false-positive tuning, and compliance frameworks. Experience across cloud, on- prem systems, network devices (routers, firewalls, proxies), and infrastructure components. Skilled in risk/threat assessment and security policy enforcement. Familiar with containers, DDI (DNS/DHCP/IPAM), WAF/CDN/DDOS solutions (e.g., Infoblox, Zscaler, Imperva). Advantageous : scripting (Python), and use of monitoring tools like Spectrum, SevOne, ThousandEyes, CyberArk, MS Entra ID. Soft Skills & Leadership Excellent analytical, communication, and report-writing abilities. Strong organizational and time-management skills. Demonstrated leadership: capable of guiding teams, managing escalations, and fostering security culture. Adaptable self-starter with a commitment to continuous learning and proactive problem solving. (ref:hirist.tech)

Posted 2 weeks ago

Apply

5.0 - 10.0 years

22 - 35 Lacs

Hyderabad, Bengaluru, Delhi / NCR

Hybrid

Inviting Applications for the Role of Qualys Administrator Role Role: Consultant(3-6 yrs)/Lead Consultant(6-8 years)/ Principal consultant(8-10 yrs)/ Sr. Principal consultant (10+yrs) Experience: 4-15 years Location: Open Looking for immediate joiners (maximum notice period: 30 days). If interested, please share your updated resume with the following details to kirti.singh@genpact.com Focus Areas: Qualys tool end to end hands on knowledge on all modules ( patch module , patch module , asset view module , identity module , vulnerability management module ) Scripting experience in windows power shell and linux ssh scripting Cyber asset management both on prem and cloud Experience in running scans and patching vulnerabilities in windows and linux machines Experience with qualys query language Experience on how to schedule jobs Experience on handling asset purge rules Experience with connectors Knows how to enable patches when vulnerabilities are identified Knows how to install push patches and install/upgrade end point security tools in all servers. Highly skilled and experienced Qualys L3 Administrator to join our cybersecurity and infrastructure team. The ideal candidate will be responsible for managing and optimizing our Qualys environment, with a strong focus on patch management, asset management, agent deployment, and automation through scripting. This role requires deep technical expertise in Qualys and hands-on experience with PowerShell and Python scripting to streamline operations and enhance security posture. Responsibilities Serve as the subject matter expert (SME) for Qualys platform administration and troubleshooting. Manage and maintain Qualys modules including VMDR, Patch Management, Asset Inventory, and Policy Compliance. Perform advanced troubleshooting and root cause analysis for Qualys-related issues. Plan and execute large-scale agent deployments security agents (QCS Qualys, CrowdStrike, and Splunk) across diverse environments (Windows, Linux, Mac). Monitor agent health and ensure consistent coverage across all endpoints. Automate agent installation and configuration using scripting tools. Design and implement patch management strategies using Qualys Patch Management module. Coordinate with system owners to schedule and deploy patches across various environments. Monitor patch compliance and generate reports for stakeholders. Maintain accurate and up-to-date asset inventory using Qualys Asset View. Ensure proper tagging, grouping, and classification of assets. Integrate asset data with CMDB and other ITSM tools. Develop and maintain automation scripts using PowerShell and Python to support vulnerability scanning, patching, and reporting. Integrate Qualys APIs with internal tools and dashboards. Create custom reports and alerts to support security operations. Document findings, remediation plans, and lessons learned for continuous improvement. Support compliance audits by providing evidence of security controls and processes. Qualifications we seek in you! Minimum Qualifications / Skills Bachelors degree in computer science, Information Security, or a related field, or equivalent combination of education and experience required. Hands-on experience with Qualys platform at an L3 level. Strong knowledge of patch management processes and tools. Proficiency in PowerShell and Python scripting. Experience with Qualys API integration and automation. Familiarity with ITIL processes and CMDB integration. Excellent analytical and problem-solving skills Excellent communication and training skills to engage technical and non-technical audiences. Ability to collaborate effectively with cross-functional teams in a fast-paced environment Knowledge and experience in AI and machine learning technologies applied to cybersecurity. Preferred Qualifications/ Skills Qualys certifications (e.g., Qualys Certified Specialist). Experience with other vulnerability management tools. Knowledge of cloud environments (AWS, Azure) and securing cloud assets. Experience with SIEM tools and security orchestration platforms. Excellent business process and change management skills with ability to develop strategy, evaluate efficacy, influence stakeholders, drive implementation and measure success. Strong quantitative, analytical, problem-solving skills, including the ability to accumulate, organize, and assimilate large amounts of information. Ability to meet strict deadlines while managing multiple tasks with competing priorities. Thanks, Kirti Singh

Posted 2 weeks ago

Apply

6.0 - 10.0 years

17 - 20 Lacs

Hyderabad, Chennai

Work from Office

The Impact you will have in this role: Qualifications: Minimum of 6 years of related experience Bachelor's degree preferred or equivalent experience Talents Needed for Success:

Posted 2 weeks ago

Apply

5.0 - 10.0 years

0 - 1 Lacs

Pune, Mumbai (All Areas)

Work from Office

Need exp in Vulnerability Remediation, Patch, Active Directory, Incident response, Endpoint security, DLP, Qualys, Nexus Exp- 5+ years Loc- Pune- Akrudi Immediate - 15 days serving needed Apply/share preethi.kumar@harjai.com

Posted 2 weeks ago

Apply

9.0 - 12.0 years

5 - 7 Lacs

Bengaluru

On-site

Job Title SR SPECIALIST – INFORMATION SECURITY Responsibility & Key Result Areas: Represent CISO organization and in particular the Application Security Office, in Bangalore, relaying important security objectives, requirements, and information to R&D in BLR Should be from core application software development or DevSecOps background and should have extensive development, designing & DevSecOps skill. Should be leading the one or more development / implementation initiatives for Application Security Office. As DevSecOps & Secure SDL Senior Specialist, Lead build, implementation and deployment of the Secure Development Lifecycle activities in CI/CD pipeline, Assist in security assessments of new architecture and technology. Will have hands on experience in Secure SDLC including DevSecOps, Threat Modelling, Web Application Scan, Static & Binary Scan, Vulnerability assessment and triaging and Security Testing. Should provide expertise and consultancy on SCM like GitHub, BitBucket, Jenkins etc and security tools like Burpsuite, Qualys WebApp Scan, Blackduck, Prisma scanner, Fortify SSC, sonarcube, Checkmarx and other static/dynamic analysis tools Should have exposure or ability to learn application security concepts not limited to CIA triad, OWASP Top 10 Vulnerabilities, OAuth, SAML, JWT, Cryptography and other advanced security concepts Perform or assist in performing security assessments for new architectures and technologies, providing expert guidance on potential security risks. Analyse, support and validate Security requirements with the purpose of continuously improving our services. Support and help in conducting regularly MOCK PCI-DSS & GDPR compliance audits and provide consultancy as required in order to maintain certifications, compliance certificates and adherence to standards and compliancy requirements. Ensure Compliance loopback channel to the organization with excellent coordination and communication between stakeholders within the organization. Play the role of Security Product Owner/Scrum Master/Facilitator for App Security Agile Scrum / Kanban Team. Interface with the rest of the organization with the purpose to collect areas of improvement and transform/enrich them in a way meaningful to the expected providers. Understand the environment in sufficient details to solicit, suggest, validate and prioritize innovative ideas and/or requirements that will improve the Security services provided by the organization. Ensure project deliverables are delivered to the quality and schedule committed as per project management plan. Ensure accurate and effective communication and reporting of key security indicators (KSI) to all relevant stakeholders. Help animating R&D community of Security Whitehats and build internal security expertise. Assist in creating a security culture and provide input to HR Training for security trainings. Provide formalised but pragmatic security standards, guidelines and recommendations, in collaboration with other security offices Raise alerts and find solutions, communicate and report to internal and external stakeholders Competencies: The right candidate will have total 9 to 12 years of experience in software development design & development/coding and engineering practices along with extensive experience in DevSecOps and product secure development lifecycle (Secure SDL) and methodologies implementation & governance. Good knowledge of infrastructure as code, end-to-end fully-automated CI/CD pipelines, from code commits to production and security of repositories (like GitHub, BitBucket etc), pipelines, build/release tools (like Jenkins, GitHub actions etc) and methodologies in CI/CD pipelines. Proficiency in scripting, including Python, Groovy, Helm, shell scripts, Perl etc to support the automation and continuous improvement of processes Hands on experience in DevSecOps, Secure SDLC including Threat Modeling, Vulnerability assessment. Security Testing, Security Scans and Security compliance like PCI-DSS/GDPR/ISO. Exposure on Webservices( SOAP/ REST) security assessment will be a definite plus Experience in full DevSecOps CI/CD pipeline, Agile methodology, container security, APIs, and microservices. Knowledge of OWASP Top10, SANS Top25, CWE and CVE / Mitre, along with hands-on practical experience in development & testing for vulnerabilities and implementing remediation. Should have good exposure in Burpsuite, Qualys WebApp Scan, Blackduck, Prisma scanner, Fortify SSC and other static/dynamic analysis tool Good understanding on all security areas like CIA Triad, Authentication, Authorization, Session Management, Cryptography, Data Validation, Error Handling, Confidentiality /Integrity / Availability / Authentication / Authorization / Auditing / Logging etc... Should have good experience in other areas of Secure SDLC Investigate (potential) attacks, assess exploitability and risk exposure, and propose mitigation Security certifications such as CEH, CDP, CDE, CSSLP, CISSP, CCSP etc are a plus. Soft Skills: Multi-cultural approach, and ability to interface with all levels of the organization Strong analytical, conceptual and problem solving skills Accountability and reliability, personal involvement Pro-activity, initiative, and autonomy Independent work ethic Diversity & Inclusion Amadeus aspires to be a leader in Diversity, Equity and Inclusion in the tech industry, enabling every employee to reach their full potential by fostering a culture of belonging and fair treatment, attracting the best talent from all backgrounds, and as a role model for an inclusive employee experience. Amadeus is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to gender, race, ethnicity, sexual orientation, age, beliefs, disability or any other characteristics protected by law.

Posted 2 weeks ago

Apply

6.0 - 10.0 years

0 Lacs

Pune, Maharashtra, India

On-site

The Qualys SaaS platform is database centric and relies heavily on Oracle, Elasticsearch, Cassandra, Kafka, Redis, Ceph etc to deliver 24x7 service to our customers worldwide. We are looking for an individual who is proficient in NoSQL and SQL technologies in 2 or more above mentioned technologies. He must be enthusiastic in learning new technologies and automate day-2-day tasks. This individual is primarily responsible for keeping productions systems running across our many worldwide platforms. DBRE will be working closely with Development/Engineering, SRE, Infra, Networking, Support teams and Worldwide Customers to provide 24x7 Support for Qualys production applications to improve the service through database optimizations. This position will report to Manager DBRE. Responsibilities: Perform installation, configuration, performance tuning of Oracle/Elasticsearch/Cassandra/Kafka/Redis/Ceph in multi-DC environment. Identifying the bottlenecks and performance tuning. Responsible for integrity and security of the database. Monitoring performance and managing configuration parameters to provide fast query responses to front-end users. Installation and testing of new databases as well as patching of existing live databases. Ensuring that storage, archiving, back-up and recovery procedures are functioning correctly. Go extra-mile in understanding business application and suggest / perform necessary database or architecture changes. Qualifications: Minimum 6-10 years of extensive experience managing SQL & No-Sql technologies like Kafka,Cassandra,Opensearch,Redis,Ceph and some experience in oracle RAC. Should have extensive knowledge of diagnostic, monitoring and troubleshooting tools to identify performance bottlenecks, and take appropriate corrective actions to improve database performance. Knowledge of operating interrelationships between database, business applications and operating systems. Understand backup and recovery scenarios. Familiarity with real time data synchronization. Problem-solving and good analytical skills. Working knowledge on Oracle Cloud Infrastructure is a plus. Must be able to work with multiple groups to resolve data issues. Must have experience of working in mid to large size production environment Should have working knowledge on ansible/terraform/Jenkins/git/grafana

Posted 2 weeks ago

Apply

6.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Good day, We have immediate opportunity for Data Engineer Job Role: Data Engineer Job Location: Hyderabad Experience- 6 Years + Notice Period: Immediate to 30 days. About Company: At Synechron, we believe in the power of digital to transform businesses for the better. Our global consulting firm combines creativity and innovative technology to deliver industry-leading digital solutions. Synechron’s progressive technologies and optimization strategies span end-to-end Artificial Intelligence, Consulting, Digital, Cloud & DevOps, Data, and Software Engineering, servicing an array of noteworthy financial services and technology firms. Through research and development initiatives in our FinLabs we develop solutions for modernization, from Artificial Intelligence and Blockchain to Data Science models, Digital Underwriting, mobile-first applications and more. Over the last 20+ years, our company has been honoured with multiple employer awards, recognizing our commitment to our talented teams. With top clients to boast about, Synechron has a global workforce of 14,700+ and has 55 offices in 20 countries within key global markets. For more information on the company, please visit our website or LinkedIn community. Diversity, Equity, and Inclusion Diversity & Inclusion are fundamental to our culture, and Synechron is proud to be an equal opportunity workplace and an affirmative-action employer. Our Diversity, Equity, and Inclusion (DEI) initiative ‘Same Difference’ is committed to fostering an inclusive culture – promoting equality, diversity and an environment that is respectful to all. We strongly believe that a diverse workforce helps build stronger, successful businesses as a global company. We encourage applicants from across diverse backgrounds, race, ethnicities, religion, age, marital status, gender, sexual orientations, or disabilities to apply. We empower our global workforce by offering flexible workplace arrangements, mentoring, internal mobility, learning and development programs, and more. All employment decisions at Synechron are based on business needs, job requirements and individual qualifications, without regard to the applicant’s gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. Overall Objectives of Job: We are seeking a skilled and motivated Data Engineer / Data Scientist to join our team. The ideal candidate will have a strong background in data engineering and data science, with experience in building and maintaining scalable data pipelines, analyzing complex data sets, and deriving actionable insights to drive business decisions. This role also requires strong PostgreSQL, MongoDB, Python, and Ansible development skills to support automation and data integration tasks. Responsibilities: Data Engineering: Design, build, and maintain scalable and robust data pipelines to support data integration and data warehousing. Develop and optimize ETL processes to ingest, clean, and transform data from various sources like Qualys, CMDB, etc. Ensure the reliability, availability, and performance of data systems. Data Management: Manage and maintain data architecture, data models, and data schemas. Implement and maintain data governance and data quality standards. Work with relational and NoSQL databases, ensuring data integrity and security. Performance Monitoring and Optimization: Monitor database performance and optimize query execution for maximum efficiency. Troubleshoot and resolve database-related issues. Data Integrity and Security: Ensure data integrity and security, including managing user access and permissions. Develop and implement backup and recovery procedures to minimize data loss in the event of hardware or software failure. Cloud-Based Database Management: Manage cloud-based databases on platforms like AWS, Azure, and Google Cloud Platform. Keep up-to-date with the latest PostgreSQL/MongoDB releases, features, and patches. Collaboration and Documentation: Collaborate with developers and other IT staff to ensure database systems meet business requirements. Document database processes and procedures. Additional Responsibilities: Evaluate business needs and objectives. Interpret trends and patterns. Primary Skills: Proficiency in PostgreSQL and MongoDB. Strong skills in Python and Ansible for development and automation. Familiarity with cloud-based database management (AWS, Azure, Google Cloud Platform). Experience in creating and managing databases, tables, and indexes. Strong understanding of database performance monitoring and optimization. Secondary Skills: Excellent problem-solving and troubleshooting skills. Strong collaboration and communication skills. Ability to document database processes and procedures clearly. This job description provides a comprehensive overview of the expectations and requirements for the Data Engineer / Data Scientist role, ensuring clarity for potential candidates. If you find this opportunity interesting kindly share your below details (Mandatory) Total Experience Experience in SQL – Experience in Python– Experience in Azure Data Lake – Experience in Databricks– Current CTC – Expected CTC– Notice period– Current Location- If you had gone through any interviews in Synechron before? If Yes when Regards, Recruitment Team, Pune.

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

India

On-site

Cyber Security – Site Reliability Engineer Core Skills & Keywords for Screening • Site Reliability Engineering, Cyber Security SRE, AIOps, Self-Healing Systems • Automation: Python, PowerShell, Bash • Monitoring & Telemetry: AppDynamics, Splunk, ELK, Grafana • Security Tools: Qualys, Microsoft Defender, Exabeam, SIEM, Endpoint Agents • Cloud Platforms: Azure (must), AWS/GCP (nice-to-have) • Operating Systems: Windows, Linux • Incident Management, Resilience Engineering, Telemetry • Agile/DevOps, BigPanda, Data Analytics, Real-time Monitoring Must-Have Requirements • 5+ years of experience in large-scale production support or cybersecurity operations • Strong scripting and automation skills (Python, PowerShell, etc.) • Experience building and optimizing monitoring, alerting, and self-healing systems • Hands-on experience with Splunk, AppDynamics, and other observability tools • Knowledge of Windows/Linux internals, endpoint agents, and Azure cloud services • Experience working in incident resolution and telemetry analysis

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Job Description We are seeking a talented Senior Software Engineer to work on Qualys’ next-generation Platform & Middleware. Working with a team of engineers and architects, you will be responsible for prototyping, designing, developing and supporting a highly scalable SaaS based cloud security platform. This is a great opportunity to be an integral part of a team building Qualys’ next generation microservices based technology platform processing over a 100 million transactions and terabytes of data per day, leverage open source technologies, and work on challenging and business-impacting projects. Responsibilities Co-develop Qualys’ best-in-class next-generation platform and middleware products Create high-performance APIs, libraries and microservices that scale to meet/exceed the demands of processing over a 100 million transactions and terabytes of data per day Research, evaluate and adopt next generation technologies Produce high quality software following good architecture and design principles that you and your team will find easy to work with in the future Requirements 5+ years as a hands-on engineer developing SaaS based software products and solutions for service-oriented deployments in public (AWS, Azure, Rackspace, etc.) or private clouds. Have built scalable SaaS platforms utilizing microservices/distributed systems architecture using: RESTful API's consumed by internal and external partners Messaging middleware using JMS, Kafka etc. In-memory caching using Redis, Memcached, etc. Strong Java programming skills including object oriented design, prototyping, development, testing, profiling, etc. Understand data structures and algorithms Expertise with RDBMS systems (preferably Oracle) Experience with NoSQL databases (preferably Cassandra) Knowledge of Docker, Kubernetes, Jenkins and related CI/CD tools Bachelors/Masters/Doctorate in Computer Science or equivalent Location -Pune Notice Period -We are looking for candidates who can join us within 30 or 45 days.

Posted 2 weeks ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Join our digital revolution in NatWest Digital X In everything we do, we work to one aim. To make digital experiences which are effortless and secure. So we organise ourselves around three principles: engineer, protect, and operate. We engineer simple solutions, we protect our customers, and we operate smarter. Our people work differently depending on their jobs and needs. From hybrid working to flexible hours, we have plenty of options that help our people to thrive. This role is based in India and as such all normal working days must be carried out in India. Job Description Join us as a Security Analyst We’ll look to you to assess, triage, and respond proactively and effectively to security related threats, incidents, requests, and events The work you do will be vital in defending our assets, information, and systems from unauthorised access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction Collaborating with internal and external stakeholders including third party suppliers, you’ll ensure activities relating to incident response, user access, alert monitoring, root cause analysis, and scenario planning are completed in line with standard operating procedures and to a high standard This role is available at associate vice president level What you’ll do Working with an array of domains, stakeholders, and specialists, you’ll take a proactive role to anticipate and identify security events, incidents, and trends that could adversely impact the bank, our customers, employees, or assets. You’ll contribute to security operations including production support, incident response, and on-call rota, and you’ll carry out and contribute to root cause analysis on security incidents and events, conduct training and scenario planning to prepare for and anticipate future events. As such, you’ll minimise future reoccurrence, and prepare reports and briefings as needed and to a high quality. You’ll also develop and maintain response plans, procedures, and playbooks to increase consistency and effectiveness of response capability. As well as this, you’ll: Proactively identify and effectively manage risks to deliver key security related customer and compliance outcomes, escalating and driving actions as necessary Actively contribute to security operations such as production support, incident response and on-call rota Maintain the end-to-end security response as directed, and ensure that security related services are delivered in line with expectations and that process change is implemented smoothly Act with pace when responding to customer queries and complaints and when responding to security events, make sure that feedback loops are in place to learn how to improve service and response Interrogate and interpret large volumes of data and analyse and assess data to understand trends and causal factors The skills you’ll need We’re looking for someone with a passion for cloud security and automation using Agile and DevOps methodologies, as well as promoting shift-left culture, which integrates security analysis into each CI/CD stage. You’ll have experience with Azure Cloud and security stack including Defender, Azure Sentinel and Azure Security Centre. You’ll also have expertise in automated security assessments and familiarity with third-party security tools integration such as Qualys and Tenable and compliance standards like PCI-DSS. In addition to this, you’ll demonstrate: Experience and knowledge of security controls The ability to communicate technical issues in business terms to range of stakeholders Experience in penetration testing and vulnerability management An understanding of Agile methodologies with experience of working in an Agile team

Posted 3 weeks ago

Apply

7.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Netradyne harnesses the power of Computer Vision and Edge Computing to revolutionize the modern-day transportation ecosystem. We are a leader in fleet safety solutions. With growth exceeding 4x year over year, our solution is quickly being recognized as a significant disruptive technology. Our team is growing, and we need forward-thinking, uncompromising, competitive team members to continue to facilitate our growth. Job Title: Senior Cybersecurity Offensive Engineer Location: Netradyne, Bangalore About Netradyne Netradyne is a leader in AI-powered safety and fleet management technology. Our mission is to enhance driver safety, operational efficiency, and overall user experience through innovative and advanced solutions. We are dedicated to building a secure and connected future for the transportation industry by leveraging cutting-edge technology. We are seeking a Senior Cybersecurity Offensive Engineer with 7 to 10 years of hands-on experience in offensive security, penetration testing, and vulnerability assessments. The ideal candidate will play a critical role in strengthening our systems, identifying vulnerabilities, and enhancing our security posture. Roles & Responsibilities Offensive Security Operations Conduct vulnerability assessments and penetration testing on applications, networks, and cloud systems. Execute red team engagements to simulate real-world attacks and identify vulnerabilities and exploitation paths. Threat Analysis & Research Stay updated on the latest cybersecurity threats, vulnerabilities, and attack vectors. Proactively identify and mitigate risks relevant to the transportation and technology sectors. Security Audits & Incident Response Perform regular security audits, including code reviews and architecture assessments. Investigate potential security breaches, recommend corrective actions, and support incident response activities. Collaboration & Training Collaborate with product development, DevOps, and engineering teams to integrate secure practices. Lead internal training programs to promote a security-first culture across the organization. Requirements Experience 7 to 10 years of experience in offensive security, ethical hacking, penetration testing, or related roles. Proven expertise as a Cybersecurity Offensive Engineer or a similar position. Technical Skills Proficiency with security tools such as Burp Suite, Metasploit, Nessus, Nmap, Kali Linux, Qualys, SonarQube, and BlackDuck. Strong understanding of web, network, mobile, and IoT security. In-depth knowledge of OWASP Top 10 and common attack vectors (SQL injection, XSS, CSRF, buffer overflow, etc.). Familiarity with vulnerability management tools (e.g., Qualys, Tenable) and secure coding practices. Hands-on experience with reverse engineering, exploit development, and malware analysis (preferred). Familiarity with DevSecOps tools and processes (static/dynamic code analysis). Knowledge of security frameworks and compliance standards (e.g., OWASP, NIST, SOC, CIS, GDPR, HIPAA, PIPEDA). Programming & Problem-Solving Skills Proficiency in scripting languages like Python, Bash, Ruby, or PowerShell. Familiarity with programming languages such as C, C++, Java, or Go. Strong problem-solving and creative thinking abilities to simulate real-world attacks and devise effective mitigation strategies. Soft Skills Exceptional verbal and written communication skills for documentation and collaboration. Excellent organizational skills and attention to detail. Education & Certification Bachelor’s/Master’s degree in Computer Science, Information Security, or a related field (preferred). Relevant certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Cloud Security Certified Professional (CSCP). This role offers an exciting opportunity to work in a dynamic and fast-paced environment where you can make a significant impact on the security of next-generation technologies. We are committed to an inclusive and diverse team. Netradyne is an equal-opportunity employer. We do not discriminate based on race, color, ethnicity, ancestry, national origin, religion, sex, gender, gender identity, gender expression, sexual orientation, age, disability, veteran status, genetic information, marital status, or any legally protected status. If there is a match between your experiences/skills and the Company's needs, we will contact you directly. Netradyne is an equal-opportunity employer. Applicants only - Recruiting agencies do not contact. Recruitment Fraud Alert! There has been an increase in fraud that targets job seekers. Scammers may present themselves to job seekers as Netradyne employees or recruiters. Please be aware that Netradyne does not request sensitive personal data from applicants via text/instant message or any unsecured method; does not promise any advance payment for work equipment set-up and does not use recruitment or job-sourcing agencies that charge candidates an advance fee of any kind. Official communication about your application will only come from emails ending in ‘@netradyne.com’ or ‘@us-greenhouse-mail.io’. Please review and apply to our available job openings at Netradyne.com/company/careers. For more information on avoiding and reporting scams, please visit the Federal Trade Commission's job scams website.

Posted 3 weeks ago

Apply

0 years

0 Lacs

Noida

On-site

The Presales Consultant for our Cybersecurity Practice will be responsible for engaging clients to understand their security needs and providing tailored, innovative solutions. This role bridges the gap between sales and technical teams, ensuring seamless delivery of cybersecurity solutions while supporting business growth. Responsibilities 1. Solution Design & Technical Expertise: Consulting : Understanding customer requirements and pain points, offering tailored cybersecurity solutions to meet those needs. Technical Demonstrations : Presenting product demos, conducting proof-of-concept (PoC) sessions, and explaining the technical benefits and features of the cybersecurity solutions. Solution Architecture : Collaborating with technical teams to design and architect customized solutions, ensuring they align with the customer’s business needs and security goals. 2. Sales Support: Proposal Creation : Collaborating with the sales team to craft compelling proposals, RFP responses, and quotes that highlight the value of the cybersecurity offerings. Costing & Pricing : Providing input on pricing strategies, working with the sales team to ensure solutions are competitively priced while maintaining profitability. Customer Presentations : Delivering engaging presentations to prospects and clients, helping them understand the value proposition of the solutions offered. 3. Relationship Building: Stakeholder Engagement : Building strong relationships with key decision-makers, security architects, and other stakeholders within prospective customer organizations. Customer Education : Helping customers understand the risks, benefits, and compliance aspects related to cybersecurity solutions. Lead Qualification : Qualifying leads and opportunities for the sales team by identifying those with genuine cybersecurity needs that can be addressed by the company’s offerings. 4. Market & Competitor Analysis: Industry Trends : Staying updated on the latest trends, emerging threats, and innovations in cybersecurity to better position the company’s offerings in the market. Competitive Analysis : Understanding competitor products and differentiating the company’s solutions, helping to convey the unique value of your offering to potential customers. 5. Collaboration with Technical & Sales Teams: Cross-functional Collaboration : Working closely with technical delivery teams, consultants, and solution architects to ensure that the proposed solutions are viable and can be successfully delivered post-sale. Feedback Loop: Gathering feedback from customers and internal teams to refine and enhance the product offerings. Requirements 1. Technical Expertise: Strong knowledge of various OEM technologies, including features, use cases, and unique selling points (USPs) for at least three of the following, SOC is must. DLP (Data Loss Prevention) IAM (Identity and Access Management) Email Security EDR/XDR/SIEM VA and PM (Vulnerability Assessment and Patch Management) Cloud Security SASE (Secure Access Service Edge) SOC (Security Operations Center) Hands-on experience in demonstrating cybersecurity solutions, value propositions, and USPs to customers and stakeholders. In-depth understanding of the scope of Professional Services and Managed Services for each technology area. Familiarity with the cybersecurity threat landscape and relevant industry standards and frameworks (e.g., NIST, ISO 27001, CIS Controls). 2. Consultative and Solution-Oriented Skills: Strong ability to communicate technical concepts to non-technical audiences, ensuring clear understanding of product benefits, ROI, and long-term value. Experience in solution design, architecture, and customization based on customer requirements. Proven track record of successful pre-sales engagements, including addressing customer pain points, designing tailored solutions, and closing complex deals in the cybersecurity domain. 3. Certifications (Highly Recommended – Few Must-Have): IAM (Identity and Access Management): One Identity Certified Identity Governance and Administration Administrator (IGA) Vulnerability Assessment and Patch Management (VAPM): Qualys Certified Specialist DLP (Data Loss Prevention): Forcepoint Certified Security Expert Netwrix Certified Professional EDR/XDR (Endpoint Detection and Response/Extended Detection and Response): CrowdStrike Certified Falcon Endpoint Protection Engineer SASE (Secure Access Service Edge): Zscaler Certified Expert (ZCE) Netskope Certified Security Professional Versa Networks Certified Professional (VCP) Cloud Security: Certified Cloud Security Professional (CCSP) (ISC2) Microsoft Certified: Azure Security Engineer Associate AWS Certified Security – Specialty 4. Additional Skills and Traits: Excellent interpersonal and negotiation skills, with the ability to build rapport with stakeholders at all levels. Project management experience or certifications (e.g., PMP, Agile/Scrum) are beneficial for leading projects or initiatives involving multiple teams. Experience with security tools and platforms for the listed technologies, particularly in integration, customization, and scaling. Understanding of emerging cybersecurity trends (e.g., zero-trust architecture, AI/ML in security, ransomware protection) to stay ahead of the threat landscape. 5. Additional Key Competencies: Strategic thinking with the ability to anticipate customer needs and develop future-proof solutions. Collaboration and team-oriented mindset, working effectively with cross-functional teams (sales, engineering, support) to deliver comprehensive solutions. Adaptability in a fast-paced, ever-changing cybersecurity environment. Transforming Businesses through Digitalization Tata Tele Business Services (TTBS), belonging to the prestigious Tata Group of Companies, is the country’s leading enabler of connectivity and communication solutions for businesses. With services ranging from connectivity, collaboration, cloud, security, IoT, and marketing solutions, TTBS offers the largest portfolio of ICT services for businesses in India. With an unwavering focus on customer-centricity and innovation, TTBS continues to garner recognition from customers and peers alike. Our People Shape Our Journey Ahead We are India’s leading enabler of digital connectivity and technology solutions for businesses - a feat possible only because we are fueled by the dedication and passion of our people. We welcome the finest talent and believe in nurturing and mentoring them to rise into leadership roles, while standing tall on our ethics and values.

Posted 3 weeks ago

Apply

7.0 - 12.0 years

9 - 13 Lacs

Chennai, India

Work from Office

Hello Visionary! We empower our people to stay resilient and relevant in a constantly changing world. We’re looking for people who are always searching for creative ways to grow and learn. People who want to make a real impact, now and in the future. Does that sound like youThen it seems like you’d make a great addition to our vibrant team. We are looking for a Penetration Tester. This position is available for Chennai Location. You’ll make a difference by: Having experience in Leading and performing complex penetration testing engagements across enterprise networks, cloud infrastructures, web, mobile, APIs, thick clients, and IoT environments. Having understanding to Simulate sophisticated real-world attacks (e.g., APT scenarios, lateral movement, chained exploits). Conducting Red Team exercises and adversary emulation based on frameworks like MITRE ATT&CK. Identifying and exploiting vulnerabilities using both automated tools and advanced manual techniques. Reviewing, enhancing, and developing custom scripts, tools, and exploits to support internal testing capabilities. Providing expert-level guidance to business units on security risks, remediation strategies, and secure architecture. Actively participating in client discussions, executive briefings, and technical workshops. Delivering detailed and executive-level reports, including risk ratings, business impact, PoCs, and mitigation steps. Maintaining robust documentation of testing methodologies, custom tools, and process improvements. Ensuring all engagements align with internal policies, industry frameworks (e.g., OWASP, NIST, ISO), and client-specific compliance standards. Training and Development - Stay updated on the latest security trends, vulnerabilities, and technology advancements. - Provide training and guidance to the team and other departments on security best practices. Strategy and Planning - Plan and scope penetration testing engagements, ensuring comprehensive coverage and effectiveness. - Participate in the development of security policies and standards. Technical Expertise Deep hands-on experience in: - Web, API, Thick Client and mobile app security testing (e.g., OWASP Top 10 – Web, Mobile, API) - Internal/external network penetration, privilege escalation, and lateral movement - Active Directory assessments and exploitation (Kerb roasting, Pass-the-Hash etc.) - Familiarity with ICS, SCADA, BACnet protocols, and covert communication channels - Wireless, Bluetooth, IoT device, Embedded Security, Cloud (AWS/Azure/GCP), and container security testing - Working knowledge of Kali Linux and frameworks like MITRE ATT&CK - Basic understanding of AI/ML securityadversarial attacks, model poisoning, and secure deployment of AI systems Proficiency with tools such as: - OffensiveBurp Suite Pro, Metasploit, SQLMap, Cobalt Strike, Impacket, CrackMapExec, BloodHound, Sliver - ReconnaissanceNmap, Amass, Shodan, OSINT frameworks/tools - Vulnerability ScannersNessus, Qualys, Nexpose Programming/Scripting: - Skilled in scripting and exploit development using Python, Bash, PowerShell, and occasionally C/C++ or Go Soft Skills - Excellent written and verbal communication skills - Strong analytical and problem-solving capabilities - Ability to explain technical concepts clearly to non-technical stakeholders You’ll win us over by: Having An engineering degree B.E/B.Tech/M.E/M.Tech with good academic record. 6–7 years of proven experience in penetration testing and offensive security Certifications (Preferred): - Highly DesirableOSCP, OSWP, OSWE, GPEN, GWAPT, OSCE, OSEE, GXPN, CPTS, CWEE, CAPE - Other ConsideredEWPTXv2 or equivalent advanced offensive security certifications We’ll support you with: Hybrid working Opportunities. Diverse and inclusive culture. Great variety of learning & development opportunities. Join us and be yourself! We value your unique identity and perspective, recognizing that our strength comes from the diverse backgrounds, experiences, and thoughts of our team members. We are fully committed to providing equitable opportunities and building a workplace that reflects the diversity of society. We also support you in your personal and professional journey by providing resources to help you thrive. Come bring your authentic self and create a better tomorrow with us. Make your mark in our exciting world at Siemens. This role is based in Chennai and is an Individual contributor role. You might be required to visit other locations within India and outside. In return, you'll get the chance to work with teams impacting - and the shape of things to come. We're Siemens. A collection of over 319,000 minds building the future, one day at a time in over 200 countries. Find out more about Siemens careers at

Posted 3 weeks ago

Apply

2.0 - 5.0 years

4 - 8 Lacs

Noida

Work from Office

Job Track Description Performs tasks based on established procedures. Uses data organizing and coordination skills to perform business support or technical work. Requires vocational training, certifications, licensures, or equivalent experience. General Profile Expands skills within an analytical or operational process. Maintains appropriate licenses, training, and certifications. Applies experience and skills to complete assigned work. Works within established procedures and practices. Works with a moderate degree of supervision. Functional Knowledge Has developed skillset in a range of processes, procedures, and systems. Business Expertise Understanding of how teams integrate and work best together to support the achievement of company goals. Impact Impacts a team, by example, through the quality service and information provided. Follows standardized procedures and receives moderate supervision and guidance. Leadership Has no supervisory responsibilities. Manages own workload. Problem Solving Uses existing procedures to solve standard problems without supervisory approval. Interpersonal Skills Exchanges information and ideas effectively. Responsibility Statements Manages client employee data for recruitment records of potential employees, online tests, and travel expenses. Coordinates logistics for recruiting events with vendors and prepares event reports. Administers pre-employment screening checks in collaboration with other departments and vendors. Ensures proper paperwork for new candidates, including medical and fit reports. Ensures new hires have required information and instruction in preparation for their first day of work. Performs other duties as assigned. Complies with all policies and standards. Conduent is an Equal Opportunity Employer and considers applicants for all positions without regard to race, color, creed, religion, ancestry, national origin, age, gender identity, gender expression, sex/gender, marital status, sexual orientation, physical or mental disability, medical condition, use of a guide dog or service animal, military/veteran status, citizenship status, basis of genetic information, or any other group protected by law. People with disabilities who need a reasonable accommodation to apply for or compete for employment with Conduent may request such accommodation(s) by submitting their request through this form that must be downloaded:click here to access or download the form. Complete the form and then email it as an attachment toFTADAAA@conduent.com.You may alsoclick here to access Conduent's ADAAA Accommodation Policy. At Conduent we value the health and safety of our associates, their families and our community. For US applicants while we DO NOT require vaccination for most of our jobs, we DO require that you provide us with your vaccination status, where legally permissible. Providing this information is a requirement of your employment at Conduent.

Posted 3 weeks ago

Apply

1.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

The Information Security Analyst will play a critical role in safeguarding Greenway Health by focusing on vulnerability management. This position is responsible for identifying, assessing, prioritizing, and mitigating security vulnerabilities across our systems, applications, and infrastructure. The analyst will work closely with IT, development, and compliance teams to ensure the confidentiality, integrity, and availability of sensitive healthcare data in compliance with HIPAA and other regulatory standards. This role requires a proactive approach to staying ahead of emerging threats and maintaining a robust security posture for our EHR solutions. Essential Duties & Responsibilities Conduct regular vulnerability scans and assessments of EHR systems, applications, networks, and infrastructure (e.g., Rapid7). Analyze scan results, prioritize vulnerabilities based on risk severity, and develop remediation plans in collaboration with system owners and development teams. Track and manage vulnerabilities through their lifecycle, ensuring timely mitigation or acceptance of risks with proper documentation. Collaborate with DevOps and software development teams to integrate secure coding practices and address vulnerabilities in the software development lifecycle (SDLC). Maintain and update vulnerability management policies, procedures, and documentation to align with industry standards (e.g., NIST, HITRUST) and regulatory requirements (e.g., HIPAA). Monitor threat intelligence feeds to identify emerging vulnerabilities and threats relevant to EHR systems and recommend proactive measures. Assist in penetration testing efforts and coordinate with internal teams and external vendors to validate security controls. Provide regular reports and metrics on vulnerability management activities to leadership and compliance teams. Participate in incident response activities related to vulnerabilities and support the development of patch management strategies. Educate and train internal teams on vulnerability management best practices and secure development principles. Experience & Education High school diploma/GED. Associate degree in Technology/Computers preferred, ideally in Computer Engineering, Computer Science, or Information Systems Management or equivalent work experience in the field of Cybersecurity. Two (2) to four (4) years of experience in information security, cybersecurity, or a related role, preferably in the healthcare or technology sector. Possess current security certifications (e.g., CEH, CC, CISM, Security+) or be willing to obtain within 1 year of assignment. Experience with scripting (e.g., Python, PowerShell) for automating vulnerability management tasks is a plus. Experience working with Rapid7 InsightVM a plus. Demonstrated experience with vulnerability scanning tools (e.g., Rapid7, Nessus, Qualys) and interpreting scan results. Skills, Knowledge, And Abilities Knowledge of common vulnerability scoring systems (e.g., CVSS) and risk assessment methodologies. Understanding of secure software development practices and application security testing (e.g., SAST, DAST). Ability to work collaboratively in a cross-functional environment and communicate technical concepts to non-technical stakeholders. Ability to manage multiple priorities and meet deadlines in a fast-paced environment. Strong communication skills to convey complex security concepts to technical and non-technical audiences. Proficiency in vulnerability management processes, including identification, assessment, prioritization, and remediation. Familiarity with common security frameworks and standards (e.g., NIST 800-53, OWASP, CIS Controls). Knowledge of network protocols, operating systems (Windows, Linux), and cloud environments (e.g., AWS, Azure). Understanding of EHR system architecture and the unique security challenges in healthcare IT. Strong written and verbal communication skills for documenting findings and presenting recommendations. Ability to stay current with evolving cybersecurity threats, vulnerabilities, and mitigation techniques. Ability to recommend approaches for new or improved processes. Displays and promotes a positive attitude and possesses unwavering integrity and extraordinary adherence to high ethical standards. Ability and motivation to learn new skills as required by an evolving information security landscape. Working knowledge of and experience with the Linux operating system is a plus. Ability to perform professional tasks independently and to analyze and develop innovative solutions to complex problems. Work Environment/Physical Demands While at work, this position is primarily a sedentary job and requires that the associate can work in an environment where they will consistently be seated for the majority of the work day This role requires that one can sit and regularly type on a key board the majority of their work day This position requires the ability to observe a computer screen for long periods of time to observe their own and others’ work, as well as in-coming and out-going communications via the computer and/ or mobile devices. The role necessitates the ability to listen and speak clearly to customers and other associates The work environment is an open room with other associates and noise from others will be part of the regular work day At Greenway, we strive to imagine, empower, engage, and inspire. Join us! To learn more about Greenway, take a video tour of our office, and meet our employees, visit us at www.GreenwayHealth.com/careers. Disclaimer: This Job Summary indicates the general nature and level of work expected of the incumbent(s). It is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities required of the incumbent. Incumbent(s) may be asked to perform other duties as requested. Greenway Health, LLC is an Equal Opportunity Employer. We do not discriminate on the basis of race, religion, age, gender, national origin, sexual orientation, disability, or veteran status.

Posted 3 weeks ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Summary Position Summary USI T&I - Analyst – Infrastructure Operations Center - Deloitte Support Services India Private Limited Work you’ll do Responsibilities As a team member, you will be accountable for, but not limited to the responsibilities below. Operational Proactive Monitoring of SolarWinds, Dynatrace, HP OneView and action as per standard operating procedures. Apply both independent judgment and procedure driven approach to troubleshoot, isolate and diagnose common network, OS, and server issues. Work on Agent remediation tasks pertaining to SCCM Client/Qualys/Splunk Manage Windows and Linux Server Patching and security compliance Monitoring and resolving Cohesity and Veeam backup solutions Coordinating with Vendor’s in resolving Physical Server and Network issues Support and manage Virtual Machine through vSphere Client and Hyper-V Troubleshooting Database Server (MSSQL) alerts Provide Status updates on assigned tasks Engages with customers and other technical resources by phone and email to provide technical support and issue resolution Monitoring and troubleshoot AudioVideo equipment alerts Process daily task assigned by the shift leads. Create RFC’s and represent in the CAB calls Co-ordinate and be a part of the maintenance, upgrades, and server OS patching Participate in weekly team meetings Technical Responsibilities: Ensuring the infrastructure availability through use of proactive monitoring tools like Dynatrace, SolarWinds, XIO etc Manage and Monitor alerts from various tools: HP One View IT Expert Monitoring Cloud Nasuni Backup – Veeam/Cohesity Prepare the documentations/KB articles Handle Incident management within defined SLA’s Maintaining a log of all necessary information in a centralized location Prepare and share various IT infrastructure reports Support stakeholders during improvements, upgrades, and other maintenance activities as recommended and scheduled Coordinate with vendors to resolve physical server and network issues Education: Bachelor’s Degree. Experience: 1 -2.5 plus years of Network/Server monitoring in an ITIL environment with knowledge and awareness of Servers, Network Routers/Switches/Firewalls, DNS and DHCP and Security Patching Work Location : Hyderabad Shift Timings : 24*7 in Rotational shifts The Team At Deloitte, we’re all about collaboration. And nowhere is this more apparent than among our 2,000-strong internal services team. With our combined specialist skills, we provide all the essential support and advice our client-facing colleagues need, right across the firm. This enables them to focus all of their efforts on delivering the best service possible to their clients. Covering seven distinct areas; Human Resources, Clients & Industries, Finance & Legal, Practice Support Services, Quality & Risk Services, IT Services, and Workplace Services & Real Estate, together we live, breathe and deliver the Deloitte experience. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Professional development At Deloitte, professionals have the opportunity to work with some of the best and discover what works best for them. Here, we prioritize professional growth, offering diverse learning and networking opportunities to help accelerate careers and enhance leadership skills. Our state-of-the-art DU: The Leadership Center in India, located in Hyderabad, represents a tangible symbol of our commitment to the holistic growth and development of our people. Explore DU: The Leadership Center in India . Benefits To Help You Thrive At Deloitte, we know that great people make a great organization. Our comprehensive rewards program helps us deliver a distinctly Deloitte experience that helps that empowers our professionals to thrive mentally, physically, and financially—and live their purpose. To support our professionals and their loved ones, we offer a broad range of benefits. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Requisition code: 305181

Posted 3 weeks ago

Apply

8.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Job Role : -Senior Information Security Engineer Job Location : -Bangalore/Chennai Experience : - 8+ Years Job Roles & Responsibilities : - Lead vulnerability assessments and policy compliance scans across on?prem, cloud, container (Docker/Kubernetes), database, and web environments using tools like Qualys. Validate scan results, eliminate false positives, and deliver accurate, actionable reports to stakeholders. Serve as technical SME: analyze findings, diagnose root causes, and guide remediation efforts. Develop and maintain a knowledge base to support continuous improvement and team expertise. Stay current on emerging threats, tools, and VM lifecycle advancements; recommend service enhancements. Communicate security requirements effectively across the organization and step in as interim team lead when necessary. Job Skills & Requirements : - Experience & Education 8+ years in information security Bachelor?s in Engineering, CS, IT, or equivalent. Industry certifications preferred: CISSP, CISA, CISM, CRISC, CCNA/CCNP/CCIE Security. Technical Expertise Proficient with vulnerability scanning platforms (Qualys, Nessus, etc.), false-positive tuning, and compliance frameworks. Experience across cloud, on?prem systems, network devices (routers, firewalls, proxies), and infrastructure components. Skilled in risk/threat assessment and security policy enforcement. Familiar with containers, DDI (DNS/DHCP/IPAM), WAF/CDN/DDOS solutions (e.g., Infoblox, Zscaler, Imperva). Advantageous: scripting (Python), and use of monitoring tools like Spectrum, SevOne, ThousandEyes, CyberArk, MS?Entra?ID. Soft Skills & Leadership Excellent analytical, communication, and report-writing abilities. Strong organizational and time-management skills. Demonstrated leadership: capable of guiding teams, managing escalations, and fostering security culture. Adaptable self-starter with a commitment to continuous learning and proactive problem solving.

Posted 3 weeks ago

Apply

6.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Job Role : -Information Security Engineer Job Location : - Bangalore/Chennai Experience :- 6+ Years Job Roles & Responsibilities :- Conduct vulnerability assessments and policy compliance scanning using tools like Qualys across on-prem, cloud, container environments, databases, web services, and infrastructure. Validate scan results, eliminate false positives, and produce accurate, high-quality vulnerability reports. Act as technical SME to analyze findings, trace root causes, and recommend sustainable remediations to support teams. Maintain and share a knowledge base for vulnerability management, ensuring team-wide expertise. Research emerging vulnerabilities, trends, and improvements in the vulnerability management lifecycle. Communicate security policies, procedures, and compliance requirements clearly across all organizational levels. Provide leadership support by stepping in for the team lead when needed. Job Skills & Requirements : - Experience & Education 6+ years in information security Degree in Engineering, Computer Science, or related field. Industry certifications are a plus (e.g., CISSP, CISA, CISM, CRISC, CCNA/CCNP Security, CCIE). Technical Proficiency Expert in vulnerability scanning and compliance tools (e.g., Qualys). Skilled in assessing on-prem, cloud, container (Docker, Kubernetes), databases, and application stacks. Experience with security infrastructure: firewalls, routers, switches, load balancers, proxies. Strong analytical capabilities for root-cause analysis and risk assessment. Leadership & Communication Able to guide remediation efforts and influence infrastructure/application teams. Exceptional written and verbal communication, capable of clear reporting and policy articulation. Strong organizational, time-management, and team mentorship skills. Additional Attributes Proactive learner, adaptable to evolving threats and technologies. Hands-on risk assessment and threat modeling expertise. Ready to take on ad-hoc duties and support team leadership as needed.

Posted 3 weeks ago

Apply

15.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Role Summary: We are looking for dynamic and technically proficient professionals for CTI Analyst / Lead roles within our cybersecurity team. This is not a SOC analyst role — we are looking for individuals who can think like an attacker, connect the dots across TTPs, and strengthen our defensive capabilities with advanced analysis, automation, and strategic threat insights. The role requires deep understanding of cyber adversary behavior, use of threat intel platforms like MISP, and a strong grasp of MITRE ATT&CK and the Cyber Kill Chain. Key Responsibilities: Conduct threat intelligence gathering and enrichment from open-source and commercial feeds. Perform advanced threat hunting using IoCs, TTPs, and behavioral analytics across EDR, SIEM, and SOAR platforms. Utilize frameworks like MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain to map and predict adversary movements. Investigate suspicious activities and files using sandbox environments and generate intelligence reports. Execute vulnerability analysis and provide guidance to patch and mitigate known weaknesses. Coordinate blocking of IoCs across endpoints, web proxies, antivirus, and cloud tools. Use MISP (Malware Information Sharing Platform) for intelligence sharing, correlation, and operationalization of threat data. Contribute to monthly threat reports, KPIs, dashboards, and executive summaries. Support continuous improvement of internal detection logic and incident response processes. Required Skills & Qualifications: Bachelor’s Degree in Computer Science, Information Technology, Cybersecurity, or related fields. 3–15 years of relevant experience in cybersecurity analysis, threat intelligence, or cyber defense. Strong hands-on experience with: SIEM (e.g., QRadar) XDR/EDR (e.g., Cortex XDR, CrowdStrike Falcon) SOAR (e.g., Demisto) Azure Active Directory Proficient in MITRE ATT&CK mapping, Cyber Kill Chain, and detection use case development. Deep understanding of network protocols, log analysis, malware behavior, and incident response. Mandatory experience with MISP for threat intelligence management. Scripting or automation experience using Python and tools like Git and VSCode. Familiarity with vulnerability scanners like Qualys and threat investigation tools like Trellix, SafeNet is a plus. Preferred/Bonus Skills: Knowledge of containerization (e.g., Docker). Familiarity with Pandas (Python library) for data analysis. Security certifications like GCTI, CEH, or CTIA (optional but valued) Soft Skills & Attributes: Must be Mumbai-based. Excellent analytical and problem-solving skills. Clear written and verbal communication. Ownership mindset with the ability to work independently and collaboratively. Strong prioritization and decision-making capabilities under pressure Location: Andheri, Mumbai, Maharashtra

Posted 3 weeks ago

Apply

6.0 - 9.0 years

18 - 25 Lacs

Gurugram

Hybrid

Role: L3-Information Security Job Description: Primary Responsibility would be to manage the organizational practices for the following: Vulnerability Assessment Infrastructure(Cloud/Traditional DC) Penetration Testing Configuration Review Red Teaming Should be able to lead the team for delivery of Vulnerability Management operations. Conduct penetration testing as per the calendar activities and on demand request for Infrastructure Vulnerability Assessment. Conduct Vulnerability Assessment and Penetration Testing on Cloud Environment (AWS, GCP, Azure). Conduct configuration review as per the calendar activities and on demand request for server, database, network components. Identify and propose work around for critical vulnerabilities. Explain vulnerabilities to System owners and provide recommendations for mitigation Monitor progress of vulnerability mitigations and maintain track of remediation Provide advisory support to internal IT team for closure of identified vulnerability during the security testing Coordinate fixing of identified and accepted vulnerabilities with Airtel Payments Bank and Security Vendors. Stay abreast of newer trends in tools and technologies used for application security Develop POCs to demonstrate security issues Qualification: B.Tech, B.E, MCA or equivalent from a Recognized university At least 8 years of experience in similar role Certifications Preferred: OSCP, EC-council LPT. Hands on experience with popular security tools – Nessus, Metasploit, KALI Linux. Working knowledge of CIS Security benchmarks Has practical experience in auditing various OS , DB , Network and Security technologies

Posted 3 weeks ago

Apply

4.0 years

7 - 9 Lacs

Hyderābād

On-site

Line of Service Advisory Industry/Sector GPS X-Sector Specialism Operations Management Level Senior Associate Job Description & Summary At PwC, our people in software and product innovation focus on developing cutting-edge software solutions and driving product innovation to meet the evolving needs of clients. These individuals combine technical experience with creative thinking to deliver innovative software products and solutions. In business analysis at PwC, you will focus on analysing and interpreting data to provide strategic insights and recommendations for improving business performance. Your work will involve strong analytical skills and the ability to effectively communicate findings to stakeholders. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations Job Description & Summary: At PwC, our purpose is to build trust in society and solve important problems. We’re a network of firms in 157 countries with more than 300,000 people who are committed to delivering quality in Assurance, Advisory and Tax services. Within Advisory, PwC has a large team that focus on transformation in Government through Digital inclusion. The open position is for a candidate who desires to work with government clients and bring about a change in society. A successful candidate will be expected to work pro-actively and effectively on multiple client engagements over the period of time and take ownership of the entire project delivery he/she entrusted with. Responsibilities: · Lead the design, implementation and monitoring of cyber security strategies for government programs and infrastructure. · Conduct risk assessments, vulnerability assessments and threat modeling of existing and planned IT systems. · Coordinate and support the implementation of security controls as per national frameworks such as CERT-In, NISG and DPDP Act and global standards like ISO 27001, NIST, CIS Controls, etc. · Define security architecture requirements and ensure integration with IT systems (cloud/on-prem/hybrid). · Support drafting of cyber security policies, SOPs, compliance guidelines, incident response plans and data protection protocols. · Work with internal IT teams and third-party vendors to ensure compliance with security guidelines. · Perform gap analysis, prepare audit reports and recommend mitigation measures. · Provide expert guidance on emerging threats, vulnerabilities and compliance requirements. · Engage with stakeholders hand other agencies as required. · Monitor and respond to security incidents and support forensic analysis and remediation efforts. Mandatory skill sets: · Strong understanding of cyber security governance, risk and compliance (GRC). · Hands-on experience with security assessment tools (Nessus, Qualys, Burp Suite, etc.). · Experience with ISO 27001 implementation, audits and documentation. · Familiarity with firewalls, endpoint protection, SIEM, IAM and DLP solutions. · Proven experience in stakeholder management and working with government clients. · Excellent documentation and presentation skills. Preferred skill sets: · Certifications such as CISSP, CISA, CISM, ISO 27001 LA/LI, CEH, or equivalent. · Exposure to cloud security (AWS/Azure/GCP). · Experience in incident response and digital forensics. · Knowledge of data privacy regulations (DPDP, GDPR). Years of experience required: · 4 to 6 years of experience in cyber security, preferably with exposure to government or large-scale public sector projects. Education qualification: · Bachelor’s or Master’s degree in Engineering, Information Technology, Computer Science, or equivalent. · Additional qualifications in Cyber Security or Information Security are Desirable. Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering, Master of Business Administration Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Burp Suite Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Business Administration, Business Analysis, Business Case Development, Business Data Analytics, Business Process Analysis, Business Process Modeling, Business Process Re-Engineering (BPR), Business Requirements Analysis, Business Systems, Communication, Competitive Analysis, Creativity, Embracing Change, Emotional Regulation, Empathy, Feasibility Studies, Functional Specification, Inclusion, Intellectual Curiosity, IT Project Lifecycle, Learning Agility {+ 19 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date

Posted 3 weeks ago

Apply

4.0 years

6 - 8 Lacs

Hyderābād

On-site

Line of Service Advisory Industry/Sector GPS X-Sector Specialism Operations Management Level Senior Associate Job Description & Summary At PwC, our people in software and product innovation focus on developing cutting-edge software solutions and driving product innovation to meet the evolving needs of clients. These individuals combine technical experience with creative thinking to deliver innovative software products and solutions. In business analysis at PwC, you will focus on analysing and interpreting data to provide strategic insights and recommendations for improving business performance. Your work will involve strong analytical skills and the ability to effectively communicate findings to stakeholders. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. Job Description & Summary: At PwC, our purpose is to build trust in society and solve important problems. We’re a network of firms in 157 countries with more than 300,000 people who are committed to delivering quality in Assurance, Advisory and Tax services. Within Advisory, PwC has a large team that focus on transformation in Government through Digital inclusion. The open position is for a candidate who desires to work with government clients and bring about a change in society. A successful candidate will be expected to work pro-actively and effectively on multiple client engagements over the period of time and take ownership of the entire project delivery he/she entrusted with. Responsibilities: · Lead the design, implementation and monitoring of cyber security strategies for government programs and infrastructure. · Conduct risk assessments, vulnerability assessments and threat modeling of existing and planned IT systems. · Coordinate and support the implementation of security controls as per national frameworks such as CERT-In, NISG and DPDP Act and global standards like ISO 27001, NIST, CIS Controls, etc. · Define security architecture requirements and ensure integration with IT systems (cloud/on-prem/hybrid). · Support drafting of cyber security policies, SOPs, compliance guidelines, incident response plans and data protection protocols. · Work with internal IT teams and third-party vendors to ensure compliance with security guidelines. · Perform gap analysis, prepare audit reports and recommend mitigation measures. · Provide expert guidance on emerging threats, vulnerabilities and compliance requirements. · Engage with stakeholders hand other agencies as required. · Monitor and respond to security incidents and support forensic analysis and remediation efforts. Mandatory skill sets: · Strong understanding of cyber security governance, risk and compliance (GRC). · Hands-on experience with security assessment tools (Nessus, Qualys, Burp Suite, etc.). · Experience with ISO 27001 implementation, audits and documentation. · Familiarity with firewalls, endpoint protection, SIEM, IAM and DLP solutions. · Proven experience in stakeholder management and working with government clients. · Excellent documentation and presentation skills. Preferred skill sets: · Certifications such as CISSP, CISA, CISM, ISO 27001 LA/LI, CEH, or equivalent. · Exposure to cloud security (AWS/Azure/GCP). · Experience in incident response and digital forensics. · Knowledge of data privacy regulations (DPDP, GDPR). Years of experience required: · 4 to 6 years of experience in cyber security, preferably with exposure to government or large-scale public sector projects. Education qualification: · Bachelor’s or Master’s degree in Engineering, Information Technology, Computer Science, or equivalent. · Additional qualifications in Cyber Security or Information Security are desirable. Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering, Master of Engineering Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Burp Suite Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Business Administration, Business Analysis, Business Case Development, Business Data Analytics, Business Process Analysis, Business Process Modeling, Business Process Re-Engineering (BPR), Business Requirements Analysis, Business Systems, Communication, Competitive Analysis, Creativity, Embracing Change, Emotional Regulation, Empathy, Feasibility Studies, Functional Specification, Inclusion, Intellectual Curiosity, IT Project Lifecycle, Learning Agility {+ 19 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date

Posted 3 weeks ago

Apply

0 years

3 - 5 Lacs

Hyderābād

On-site

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Senior Associate Vulnerability Assessment Specialist is a developing subject matter expert, responsible for conducting vulnerability assessments, analyzing findings, and providing expert recommendations to mitigate security risks within the organization's systems and infrastructure. This role requires collaboration with cross-functional teams, and performs vulnerability assessments, analyzes findings, and provides recommendations to mitigate security risks. Key responsibilities: Conducts vulnerability scans using automated tools and manual techniques to identify vulnerabilities in systems, networks, applications, and infrastructure components. Analyzes scan results and determine the severity, exploitability, and potential impact of identified vulnerabilities. Assesses the potential risks associated with identified vulnerabilities. Collaborates with system owners, administrators, and IT teams to develop practical mitigation strategies, configuration changes, and patch management processes to address identified vulnerabilities. Conducts advanced vulnerability assessments, including application security assessments, penetration testing, and code review, to identify complex vulnerabilities and security weaknesses. Utilizes manual testing techniques and industry-standard methodologies. Utilizes and manages vulnerability assessment tools such as Nessus, OpenVAS, Qualys, or similar tools. Configures and fine-tunes scan policies and parameters to enhance assessment accuracy and coverage. Prepares comprehensive vulnerability assessment reports, documenting assessment findings, risk analysis, and recommended actions. Communicates assessment results to stakeholders, including technical and non-technical audiences, in a clear and concise manner. Participates in security awareness programs and provide training to end-users and stakeholders on vulnerability management best practices, secure coding, and security hygiene. Foster a culture of security awareness within the organization. Participates in incident response efforts related to vulnerabilities, collaborate with cross-functional teams, and contribute to post-incident analysis. Identifies root causes, provide recommendations for improvement, and drive preventive measures. Collaborates with cross-functional teams, including IT operations, development teams, and security stakeholders, to ensure effective communication, collaboration, and alignment on vulnerability management goals. Builds relationships and influence stakeholders to drive remediation efforts. Contributes to the enhancement of vulnerability assessment processes, methodologies, and tools. Stays updated with the latest security trends, emerging vulnerabilities, and industry best practices. Performs any other related task as required. To thrive in this role, you need to have: Understanding of vulnerability assessment methodologies, tools, and industry best practices. Good understanding of networking concepts, operating systems, and common software vulnerabilities. Proficiency in using vulnerability assessment tools such as Nessus, OpenVAS, Qualys, or similar tools. Knowledge of risk analysis principles and the ability to assess the business impact of vulnerabilities. Strong knowledge of vulnerability management frameworks, such as CVE, CVSS, and common vulnerability databases. Strong analytical and problem-solving skills to analyze scan results, prioritize vulnerabilities, and recommend effective remediation actions. Good written and verbal communication skills to prepare comprehensive reports and communicate technical information to diverse stakeholders. Familiarity with security frameworks, standards, and regulatory compliance requirements. Ability to collaborate and work effectively with stakeholders and cross-functional teams. Academic qualifications and certifications: Bachelor's degree or equivalent in Computer Science, Information Security, or a related field. Relevant certifications such as Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), or GIAC Certified Web Application Penetration Tester (GWAPT) are beneficial. Required experience: Moderate level of relevant experience in information security or related roles, with a focus on conducting vulnerability assessments and driving remediation efforts. Moderate level of demonstrated experience in conducting advanced vulnerability assessments, including application security assessments, penetration testing, or code review Workplace type : Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

Posted 3 weeks ago

Apply

70.0 years

0 Lacs

India

On-site

Cyber Defence Analyst About GKN Automotive GKN Automotive is a world-leading global automotive technology company at the forefront of innovation. Its origins date back to 1759 and for the last 70 years it has been putting key technologies into series production. We are the trusted partner for most of the world’s automotive companies, specialising in developing, building, and supplying market-leading drive systems and advanced ePowertrain technologies. GKN Automotive is part of Dowlais Group plc, a specialist engineering group focused on the automotive sector. What you’ll do: The Cyber Defence Analyst plays a meaningful role in improving the organisation’s security posture by bridging the gap between incident response and vulnerability management. Operating in a hybrid model, this role works closely with a supplier landscape that provides first-line monitoring and escalates incidents for further investigation. As such, the Cyber Defence Analyst is expected to operate at a level capable of handling complex investigations, leading response efforts, and driving remediation activities. This role supports both the Security Monitoring and Vulnerability Management functions, ensuring a cohesive, end-to-end approach to cyber defence. By responding to threats in real time and proactively reducing the organisation’s exposure to future risks, the Cyber Defence Analyst helps maintain a resilient and unified security operation. As this role operates within a dynamic Security Operations environment, there may be occasions where you will be required to provide surge capacity in response to emerging security incidents, emerging threats, or urgent vulnerability disclosures. This includes stepping in to support urgent investigations, remediation efforts, or other time-sensitive security activities that may arise to protect the business. Key responsibilities include: Serve between Security Monitoring and Vulnerability Management teams. Act as a key responder to security incidents, driving investigation, containment, and recovery activities. Assist in identifying, assessing, and tracking remediation of vulnerabilities across the organisation. Perform in-depth analysis of security alerts, logs, and telemetry from SIEM, EDR, and other security tools. Support scanning, reporting, and communication of vulnerability data to collaborators. Develop and refine detection logic to improve visibility and reduce false positives, using frameworks such as MITRE ATT&CK. Maintain and improve incident response playbooks, ensuring they reflect current threats and standard methodologies. Know the latest threat actor tactics, techniques, and procedures (TTPs) and apply them to improve defences. Find opportunities to automate repetitive tasks across security monitoring and vulnerability workflows. Promote a unified approach to cyber defence, avoiding siloed operations. Support initiatives that strengthen the organisation’s overall cyber resilience. What you’ll need: Demonstrable experience in information security, with a focus on security operations. Proven track record in stakeholder and partner/vendor management and collaboration across various groups. Experience handling incidents and supporting complex investigations. Hands-on experience with technical tools commonly used in Security Operations, including but not limited to SIEM platforms (e.g., Microsoft Sentinel), Endpoint Detection and Response (EDR) solutions, Threat Intelligence platforms (e.g., KELA), and Vulnerability Management tools (e.g., Qualys). Confident in analysing logs from various sources such as endpoints, networks & cloud services. Ability to apply threat intelligence to enrich investigations. Good understanding of relevant threat actors, relevant frameworks and CVSS scoring Ability to script or automate tasks. Familiarity with infrastructure, cloud, and application security principles. Able to write reports and tailor them to a mixture of collaborators. While certifications are not a strict requirement, they can improve a candidate’s profile by demonstrating relevant expertise. Any recognised security certifications will be considered, with value placed on those that demonstrate expertise in core blue team disciplines, as well as vulnerability and risk management. Why you’ll love working here: Market-leading company with lots of potential Opportunity to take part in brand-new company projects Attractive salary and benefits at a stable and financially healthy company An organisation where you can commit to the long-term Working in the OneIT team with colleagues around the globe How to apply: Please follow the link on our careers page and submit your resume in English because we are an international environment, and English is our business language. If you need any adjustments made to support your application, for example, if you require information in different formats, or if you have any accessibility issues, then we have a process in place to support you – please feel free to get in touch with us at accommodations@gknautomotive.com (mailto:accommodations@gknautomotive.com) Deadline: The closing date will be July 25th GKN Automotive is the market leader in conventional, all-wheel and electrified drive systems and solutions. With a comprehensive global footprint, we design, develop, manufacture and integrate an extensive range of driveline technologies for over 90% of the world’s car manufacturers. As a global engineering company, innovation is what differentiates us from our competitors and is central to our success. A balance of cultures, ethnicities and genders help bring new ideas and creativity to GKN Automotive. We need people of different backgrounds, with different skills and perspectives to spark originality, imagination and creativeness in our teams around the world. GKN Automotive is an equal opportunity employer. We treat all our employees and applicants fairly and are committed to ensuring that there is no discrimination or harassment against any employee or qualified applicant on the grounds of age, race, creed, colour, national origin, ancestry, marital status, affectional or sexual orientation, gender identity or expression, disability, nationality, sex, or veteran status or any other characteristic protected by law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process. Please contact us to request any such accommodation. #li-bf1 #LI-hybrid

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies