Jobs
Interviews

35 Rapid7 Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

20 - 35 Lacs

gurugram

Hybrid

Role & responsibilities 5+ years of solid, diverse experience in CSPM module and threat intelligence, or equivalent combination of education and work experience. • Basic understanding of ServiceNow platform. • Deploy, configure, and manage CSPM solutions to ensure optimal security posture for cloud infrastructure. • Monitor and analyse security alerts and incidents, providing timely and effective responses to mitigate risks. • Conduct regular security assessments and audits to identify misconfigurations and implement remediation strategies ensuring compliance with industry standards and best practices. • Proficiency in integrating security tools with DevOps pipelines. • Familiarity with compliance frameworks (e.g., CIS Benchmarks, NIST). • Collaborate with cross-functional teams to design and implement security policies and procedures tailored to cloud environments. • Provide technical expertise and guidance on cloud security to internal teams and stakeholders. • Understanding of containerized environments (e.g., EKS, ECS, Fargate, Lightsail, AKS, ACI, Azure App Service, Azure Red Hat OpenShift). • Stay up-to-date with the latest trends and advancements in cloud security technologies and threats. • Develop and deliver training sessions and documentation to enhance the security knowledge and capabilities of the organisation. Good to have: • AWS Certified Security - Specialty • Microsoft Certified: Azure Security Engineer Associate Preferred candidate profile We are seeking a highly skilled Technical Specialist with expertise in managing Cloud Security Posture Management (CSPM) solutions, such as Rapid7 InsightCloudSec or Checkpoint CloudGuard. This role requires a deep understanding of cloud security principles and the ability to implement and maintain robust security measures across various cloud environments.

Posted 6 days ago

Apply

5.0 - 8.0 years

6 - 12 Lacs

hyderabad

Work from Office

Expert in LAN/WAN/WLAN setup, firmware upgrades, and automation Skilled in VLANs, STP, routing (OSPF, EIGRP) firewall configs (NAT, IPsec), SDA, Cisco/APs/WLC/ISE, Aruba ClearPass, Meraki, and using tools like Rapid7, SolarWinds, and Cisco Total Care

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

As a Vulnerability Management Analyst at Bottomline, you will play a crucial role in enhancing the company's infrastructure and assets by collaborating with various technology teams. Your primary responsibility will revolve around executing day-to-day operations related to vulnerability management. This includes identifying, assessing, and remediating security vulnerabilities across the environment, covering areas such as infrastructure Vulnerability Management, External Attack Surface Management, Container Scanning, Cloud Security Compliance scanning, and Security Configuration Management. Your duties will include supporting the manager in developing policies, procedures, reporting, and best practices for vulnerability scanning, assessment, and remediation. Additionally, you will operate vulnerability scanning tools to conduct timely and comprehensive scans of systems, networks, and software. It will be your responsibility to ensure the timely distribution of vulnerability reports to key stakeholders for remediation, as well as to monitor and report on the progress of remediation efforts to stakeholders and leadership. Staying updated on emerging threats and vulnerabilities through threat intelligence sources will be essential for integrating threat intelligence into the vulnerability management process in a proactive manner. You will also need to ensure compliance with regulatory requirements and security frameworks such as SWIFT, NACHA, PCI, NIST, and GLBA. Furthermore, you will be required to support internal and external audits related to vulnerability management. To be successful in this role, you should have at least 3 years of experience in Cybersecurity, a Bachelor's degree, and hands-on experience with deploying and operating vulnerability management tools like Rapid7 and Qualys. A strong knowledge base across core domains such as Vulnerability Management, External Attack Surface Management, Container Scanning, Cloud Security Compliance scanning, and Security Configuration Management is crucial. Preferred qualifications include cyber certifications like CISM or CISSP. Bottomline welcomes talent at all career stages and is committed to fostering an inclusive and supportive environment for all individuals. As an equal opportunity employer, Bottomline values diversity and is dedicated to creating a workplace where everyone feels welcome and respected.,

Posted 1 week ago

Apply

4.0 - 8.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Vulnerability Management Specialist at frog, you will be an integral part of the cybersecurity team, responsible for overseeing and enhancing our vulnerability management program. Leveraging your extensive expertise with tools like Nessus, you will be instrumental in identifying, prioritizing, and mitigating security vulnerabilities within our clients" environments. Your role will involve leading the development and execution of the vulnerability management strategy, policies, and procedures. You will regularly conduct vulnerability assessments and penetration tests using industry-standard tools to pinpoint security weaknesses in networks, systems, and applications. Analyzing scan results, you will prioritize vulnerabilities based on severity, exploitability, and potential impact. Collaboration with cross-functional teams is paramount, as you will work together to devise and implement remediation plans promptly. Additionally, you will provide technical guidance and mentorship to junior team members within the vulnerability management team. Staying informed about emerging cyber threats, vulnerabilities, and industry best practices will be crucial in enhancing the effectiveness of the vulnerability management program. You will also be responsible for preparing and presenting reports on vulnerability assessment findings, remediation progress, and the overall program effectiveness to senior management and clients. Your primary skills should encompass Vulnerability Management & Assessment, Remediation, Reporting, Qualys, Rapid7, Nessus, Scanning, Patching, and False Positive Analysis. Secondary skills include Qualys, Nessus, and Rapid 7. Joining frog means becoming part of a global network of studios characterized by a vibrant culture. At frog, curiosity, collaboration, and courage are celebrated, with a focus on improving the human experience. Emphasizing positivity, humor, and community alongside performance, our culture is open, flexible, inclusive, and engaging. Working at frog empowers you to make a significant impact not only on projects but also in your studio, community, and the world at large.,

Posted 1 week ago

Apply

0.0 years

0 Lacs

pune, maharashtra, india

On-site

Job description Some careers shine brighter than others. If you're looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of a Senior Consultant Specialist. In this role, you will: As a Vulnerability Manager, you will be responsible for assessing, and mitigating vulnerabilities within our organization's IT infrastructure. You will play a critical role in enhancing our security posture by implementing effective vulnerability management processes and collaborating with various teams to ensure the protection of our systems and data. Conduct regular vulnerability assessments and review security weaknesses across the organization. Analyze and prioritize vulnerabilities based on risk, impact, and compliance requirements. Collaborate with IT, security, and development teams to develop and implement remediation plans for identified vulnerabilities. Monitor and report on the status of vulnerabilities and remediation efforts to stakeholders. Stay informed about the latest security threats, vulnerabilities, and industry best practices. Develop and maintain vulnerability management policies, procedures, and documentation. Provide training and guidance to staff on vulnerability management best practices and security awareness. Assist in compliance audits and ensure adherence to relevant security standards and regulations. Requirements To be successful in this role, you should meet the following requirements: Bachelor's degree in Computer Science, Information Technology, or a related field (preferred). Proven experience in vulnerability management, security assessments, or a related role. Strong understanding of security frameworks and standards (e.g., NIST, ISO 27001). Proficiency in vulnerability scanning tools and techniques (e.g., Nessus, Qualys, Rapid7). Excellent analytical and problem-solving skills with attention to detail. Strong communication and collaboration skills to work effectively with cross-functional teams. Creative thinking and the ability to approach challenges with innovative solutions. A strong team-oriented attitude, valuing collaboration and open-mindedness in a supportive environment. You'll achieve more when you join HSBC. www.hsbc.com/careers HSBC is committed to building a culture where all employees are valued, respected and opinions count. We take pride in providing a workplace that fosters continuous professional development, flexible working and opportunities to grow within an inclusive and diverse environment. Personal data held by the Bank relating to employment applications will be used in accordance with our Privacy Statement, which is available on our website. Issued by - HSBC Software Development India

Posted 1 week ago

Apply

5.0 - 7.0 years

0 Lacs

noida, uttar pradesh, india

Remote

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl We are always moving forward - always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role As a System Administrator at Kyndryl, you'll solve complex problems and identify potential future issues across the spectrum of platforms and services. You'll be at the forefront of new technology and modernization, working with some of our biggest clients - which means some of the biggest in the world. There's never a typical day as a System Administrator at Kyndryl, because no two projects are alike. You'll be managing systems data for clients and providing day-to-day solutions and security compliance. You'll oversee a queue of assignments and work directly with technicians, prioritizing tickets to deliver the best solutions to our clients. One of the benefits of Kyndryl is that we work with clients in a variety of industries, from banking to retail. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. You'll also get the chance to share your expertise by recommending modernization options, identifying new business opportunities, and cultivating relationships with other teams and stakeholders. Does the work get challenging at times Yes! But you'll collaborate with a diverse group of talented people and gain invaluable management and organizational skills, which will come in handy as you move forward in your career. Your future at Kyndryl Every position at Kyndryl offers a way forward to grow your career, from Junior System Administrator to Architect. We have opportunities for Cloud Hyperscalers that you won't find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. One of the benefits of Kyndryl is that we work with clients in a variety of industries, from banking to retail. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You're good at what you do and possess the required experience to prove it. However, equally as important - you have a growth mindset keen to drive your own personal and professional development. You are customer-focused - someone who prioritizes customer success in their work. And finally, you're open and borderless - naturally inclusive in how you work with others. Required Technical and Professional Expertise: Having 5 Years of Experience in Network and Security Remote Support. Analysis of alerts arising from Security Solution Tools Security experience with the following tools/platforms PaloAlto management platform Vulnerability Assessment (Qualys/Rapid7/Nessus) Risk and Compliance Knowledge Good understanding of cloud security Knowledge of Skybox firewall Assurance, Vulnerability control & Change Manager Knowledge of and ability to utilize tools, techniques and processes for gathering and reporting data in a particular department. Sound understanding of data correlation & data analysis. Generating reports for business managers to evaluate the efficacy of the security policies in place. Risk Assessment of network and processes in terms of exposure and threat. Transformation participation and adoption by teams for any automation/new tools introduction for Network Infrastructure Good understanding of tools and technology to determine emerging threat patterns and vulnerabilities Preferred Technical and Professional Experience: Investigate security alerts and provide incident response Generate reports for both technical and non-technical staff and stakeholders Thorough understanding of the latest technologies, security principles, and protocols. Coordination with OEM/partner for the resolution of incidents Network security best practices are executed through auditing: router, change control, switch, firewall configurations, and monitoring Being You Diversity is a whole lot more than what we look like or where we come from, it's how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we're not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you - and everyone next to you - the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That's the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter - wherever you are in your life journey. Our employee learningprograms give you access to the best learning in the industry to receive certifications, includingMicrosoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked How Did You Hear About Us during the application process, select Employee Referral and enter your contact's Kyndryl email address.

Posted 1 week ago

Apply

4.0 - 6.0 years

0 Lacs

noida, uttar pradesh, india

Remote

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl We are always moving forward - always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role As a System Administrator at Kyndryl, you'll solve complex problems and identify potential future issues across the spectrum of platforms and services. You'll be at the forefront of new technology and modernization, working with some of our biggest clients - which means some of the biggest in the world. There's never a typical day as a System Administrator at Kyndryl, because no two projects are alike. You'll be managing systems data for clients and providing day-to-day solutions and security compliance. You'll oversee a queue of assignments and work directly with technicians, prioritizing tickets to deliver the best solutions to our clients. One of the benefits of Kyndryl is that we work with clients in a variety of industries, from banking to retail. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. You'll also get the chance to share your expertise by recommending modernization options, identifying new business opportunities, and cultivating relationships with other teams and stakeholders. Does the work get challenging at times Yes! But you'll collaborate with a diverse group of talented people and gain invaluable management and organizational skills, which will come in handy as you move forward in your career. Your future at Kyndryl Every position at Kyndryl offers a way forward to grow your career, from Junior System Administrator to Architect. We have opportunities for Cloud Hyperscalers that you won't find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. One of the benefits of Kyndryl is that we work with clients in a variety of industries, from banking to retail. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You're good at what you do and possess the required experience to prove it. However, equally as important - you have a growth mindset keen to drive your own personal and professional development. You are customer-focused - someone who prioritizes customer success in their work. And finally, you're open and borderless - naturally inclusive in how you work with others. Required Technical and Professional Expertise Having 4 Years of Eperience in Network and Security Remote Support. Analysis of alerts arising from Security Solution Tools Security experience with the following tools/platforms PaloAlto management platform Vulnerability Assessment (Qualys/Rapid7/Nessus) Risk and Compliance Knowledge Good understanding of cloud security Knowledge of Skybox firewall Assurance, Vulnerability control & Change Manager Knowledge of and ability to utilize tools, techniques and processes for gathering and reporting data in a particular department. Sound understanding of data correlation & data analysis. Generating reports for business managers to evaluate the efficacy of the security policies in place. Risk Assessment of network and processes in terms of exposure and threat. Transformation participation and adoption by teams for any automation/new tools introduction for Network Infrastructure Good understanding of tools and technology to determine emerging threat patterns and vulnerabilities Preferred Technical and Professional Experience: Investigate security alerts and provide incident response Generate reports for both technical and non-technical staff and stakeholders Thorough understanding of the latest technologies, security principles, and protocols. Coordination with OEM/partner for the resolution of incidents Network security best practices are executed through auditing: router, change control, switch, firewall configurations, and monitoring Being You Diversity is a whole lot more than what we look like or where we come from, it's how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we're not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you - and everyone next to you - the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That's the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter - wherever you are in your life journey. Our employee learningprograms give you access to the best learning in the industry to receive certifications, includingMicrosoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked How Did You Hear About Us during the application process, select Employee Referral and enter your contact's Kyndryl email address.

Posted 1 week ago

Apply

9.0 - 12.0 years

22 - 25 Lacs

gurugram

Work from Office

1. Understanding of Vulnerability Management Program including Assessment and Remediation 2. Experience analyzing risk and prioritization of vulnerabilities, validating vulnerability reports and driving remediation. 3. Understanding of the overall threat and vulnerability management process, including metrics to measure performance 4. Working knowledge of compliance frameworks and security management standards (e.g., ISO 27001, NIST CSF. PCI-DSS etc.) 5. Thorough understanding of enterprise security controls, network protocols and operating system (Windows/Linux environments) 6. Strong knowledge in industry standard VAPT tools like Nessus, Rapid7, AWS Inspector and open source tools Competencies critical to the role 1. Stakeholder Management 2. Analytical ability 3. Innovation & Problem Solving 4. Market Awareness Qualification Bachelor of Engineering in Computer Science / Engineering, Masters in Computer Science Role & responsibilities Preferred candidate profile

Posted 1 week ago

Apply

9.0 - 12.0 years

15 - 25 Lacs

gurugram

Work from Office

Role Accountability Lead the Vulnerability Assessment, Penetration Testing & Patch Management Program in support of the functional & company strategy, goals, and performance objectives Manage development, implementation, and effectiveness of vulnerability management and security testing programs, initiatives, and capabilities Assist with planning, providing input on capabilities and methods used for vulnerability management and security testing, and driving improvements Develop Vulnerability management framework, support compliance and risk management activities, recommending security controls and corrective actions to mitigate vulnerability risks Provide technical expertise for information security policies and standards Conduct vulnerability assessments and penetration testing (application and/or infrastructure) and articulating security issues to technical and non-technical audience Perform vulnerability risk profiling and prioritization of vulnerabilities Identify, research, validate, and exploite various different known and unknown security vulnerabilities on server and client side Perform regular status reviews with IT asset owners & senior leadership to ensure compliance with InfoSec policies Coordinate patch management/Remediation activities for all IT assets (workstations, network, server, application, database etc.) Develop and Monitor patch deployment schedules for all Vulnerability assessments and penetration testing on an ongoing basis as well as auditing for completeness Provide communications across the organization, interfacing with senior leadership on vulnerability remediation, driving security hardening best practices, and representing the Vulnerability and Patch Management team Maintain relationship with managed security services vendor leadership to ensure effective implementation and operation of security programs, ongoing support and deployment of competent resources Oversee the development, implementation and maintenance of vendor standard operating procedures/ run book in line with SBI Card policies & standards Provide technical & program management expertise and oversight over vendor Preferred candidate profile

Posted 1 week ago

Apply

7.0 - 11.0 years

0 Lacs

navi mumbai, maharashtra

On-site

You will be responsible for maintaining the global backup environment including NAS, SAN, VMware, local OS, and SQL backups. Additionally, you will assist in building and managing the disaster recovery environment. Your role will involve providing mentoring and support for the service desk team. Excellent communication skills are crucial as you will be working in a global enterprise environment with diverse team members. Your work experience should include a good knowledge of Microsoft Active Directory, MS Windows 2016/2019, VMWare, Linux (Redhat, Ubuntu), and experience in patch management, backup, archival, and restoration. You will collaborate with the Cloud development group to support their current and future needs. Defining and implementing the compliance roadmap based on organizational requirements and ensuring adherence to InfoSec and regulatory standards are key aspects of this role. You will be involved in Infrastructure Security Vulnerability Management Operations, incident handling, evidence acquisition, digital forensics, endpoint and network security, and Cybersecurity incident management. Experience with vulnerability management tools such as Qualys, Rapid7, and Tenable is desirable. A strong understanding of industry security best practices and standards is important. Knowledge of Azure sizing calculator, hands-on experience in Azure Cloud projects, Cloud Migration/Transformation, Active Directory migration, and Hybrid Cloud setup are also required skills. The ideal candidate should have a Bachelor's Degree in Computer Science, Information Technology Engineering, or a related field, with a minimum of 7-8 years of hands-on experience. Proficiency in backup environments, VMware administration, Windows and Linux technologies, and Azure Cloud infrastructure is necessary for this role.,

Posted 2 weeks ago

Apply

0.0 years

0 Lacs

pune, maharashtra, india

On-site

Job description Some careers shine brighter than others. If you're looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of a Senior Consultant Specialist. In this role, you will: As a Vulnerability Manager, you will be responsible for assessing, and mitigating vulnerabilities within our organization's IT infrastructure. You will play a critical role in enhancing our security posture by implementing effective vulnerability management processes and collaborating with various teams to ensure the protection of our systems and data. Conduct regular vulnerability assessments and review security weaknesses across the organization. Analyze and prioritize vulnerabilities based on risk, impact, and compliance requirements. Collaborate with IT, security, and development teams to develop and implement remediation plans for identified vulnerabilities. Monitor and report on the status of vulnerabilities and remediation efforts to stakeholders. Stay informed about the latest security threats, vulnerabilities, and industry best practices. Develop and maintain vulnerability management policies, procedures, and documentation. Provide training and guidance to staff on vulnerability management best practices and security awareness. Assist in compliance audits and ensure adherence to relevant security standards and regulations. Requirements To be successful in this role, you should meet the following requirements: Bachelor's degree in Computer Science, Information Technology, or a related field (preferred). Proven experience in vulnerability management, security assessments, or a related role. Strong understanding of security frameworks and standards (e.g., NIST, ISO 27001). Proficiency in vulnerability scanning tools and techniques (e.g., Nessus, Qualys, Rapid7). Excellent analytical and problem-solving skills with attention to detail. Strong communication and collaboration skills to work effectively with cross-functional teams. Creative thinking and the ability to approach challenges with innovative solutions. A strong team-oriented attitude, valuing collaboration and open-mindedness in a supportive environment. You'll achieve more when you join HSBC. www.hsbc.com/careers HSBC is committed to building a culture where all employees are valued, respected and opinions count. We take pride in providing a workplace that fosters continuous professional development, flexible working and opportunities to grow within an inclusive and diverse environment. Personal data held by the Bank relating to employment applications will be used in accordance with our Privacy Statement, which is available on our website. Issued by - HSBC Software Development India

Posted 2 weeks ago

Apply

5.0 - 7.0 years

0 Lacs

bengaluru, karnataka, india

On-site

Job Title Endpoint Engineer, 2 Job Description The Endpoint Engineer Analyst 2 is responsible for deploying, maintaining, and troubleshooting a range of enterprise endpoints and desktop technologies. This role supports internal Dotdash Meredith employees by ensuring a seamless, efficient, and enjoyable end-user technology experience. The analyst works across platforms to implement best practices in system configuration, security, and performance, while also serving as a key point of contact for escalated technical issues. Key Responsibilities Provide L3 desktop support with effective and timely troubleshooting of complex issues in macOS and Windows OS, that can be related to (but not limited to): ? Networking and security ? OS migration, provisioning, and deployment ? Software deployment, packaging, and installation ? Hardware based issues ? Virtual environments Generate custom application packages and deployments. Assist in operating system and third-party patch management to ensure compliance with security standards. Continuously monitor the environment for issues, adoption rates, non-compliance, and generate detailed reports to share insights and findings. Manage certificate securities, including encryption and decryption, and privileged access management. Maintain clear and proactive communication with end users, keeping them informed on the progress, actions taken, and expected resolution timelines. Ensure all issues and changes are properly logged, while updating and maintaining process Documentation. Skills: Essentials : Bachelors degree in engineering (B.E./B.Tech.) with 57 years of relevant experience. Strong expertise in enterprise desktop technologies for both Windows and macOS environments. Extensive hands-on experience with endpoint management tools such as Microsoft Intune, Jamf Pro, Zoom MDM, and Logitech Sync. Proficient in application packaging tools including Patch My PC, Microsoft Win32 Content Prep Tool, AutoPkg, Packages.app, and Installomator. Familiar with security platforms such as Rapid7 and CrowdStrike. Strong scripting skills in PowerShell and shell (bash, zsh) for automation and system configuration. Experience interacting and developing with APIs. Experience managing virtual desktop infrastructures including AWS Workspaces, Google Cloud Platform (GCP), and Microsoft CloudPC. Excellent communication skills with the ability to clearly convey technical information. Strong analytical and problem-solving abilities to resolve complex technical issues efficiently. Skills: Good to Have Certification in modern desktop management (MD-101TOO-A) is preferred Certification in Jamf (Jamf 100, Jamf 200, Jamf 300, Jamf 400) Certification in ITIL v4 Shift Timings: 1 p.m. to 10 p.m. Work Location: Ecoworld, Bengalure It is the policy of Dotdash Meredith to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, the Company will provide reasonable accommodations for qualified individuals with disabilities. #INDIA# Show more Show less

Posted 2 weeks ago

Apply

6.0 - 10.0 years

12 - 22 Lacs

bengaluru

Hybrid

Role & responsibilities Provide and manage vulnerability scanning and assessment tools for traditional IT assets. 6 - 8 years of security analyst experience, preferably in a managed services environment Analyze scan results, prioritize findings using risk-based methodology. Deliver actionable remediation and mitigation recommendations. Maintain continuous visibility and reporting for servers, endpoints, and network infrastructure. Vulnerability Scanning: Tenable.io, Qualys, or Rapid7, Tanium (based on agreement) Vulnerability Scanning: Tenable.io, Qualys, or Rapid7, Tanium (based on agreement) Ticketing Integration: ServiceNow, Jira Reporting: Custom dashboards (Power BI/Tableau) or native tool reports Experience with cloud security, devops, cyber resiliency/incident management, Zero Trust, network/EDGE security, and emerging technologies such as IoT and AI. Experience threat hunting, proactively and iteratively searching to detect advanced threats that evade existing security solutions. Deep understanding of the current cyber threat landscape, the different tactics commonly used by adversaries and how you would investigate, contain and recover against their attacks Expertise with security incident response process.

Posted 4 weeks ago

Apply

7.0 - 11.0 years

0 Lacs

pune, maharashtra

On-site

As a Transition Specialist for the Threat Intelligence Platform & Advisory role, your primary responsibility will be to lead the transition processes associated with the Threat Intelligence Platform. Your aim should be to ensure minimal disruption to ongoing operations during this transitional phase. Additionally, you will be expected to provide expert advisory services on threat intelligence strategies and best practices to both internal and external stakeholders. Your role will also involve overseeing the integration of new threat intelligence tools and technologies into the existing infrastructure. Furthermore, you will be required to develop and deliver training programs for team members and clients to enhance their understanding and usage of the threat intelligence platforms. Collaboration is key in this role as you will work closely with cross-functional teams to ensure alignment and effective communication throughout the transition process. It will be essential for you to monitor the performance and effectiveness of the threat intelligence platform, identifying areas for improvement and implementing necessary changes. In addition to the transition management responsibilities, you will be involved in monitoring and analyzing cybersecurity events, incidents, and vulnerability reports from multiple sources. Proactively monitoring and analyzing the cyber threat landscape to assess risk and applicability to the firm will also be a crucial aspect of your role. Working closely with the internal research team, you will identify customer-specific threats and create customer-specific analytical reports based on the identified findings. You will also be responsible for creating regular security trend reports utilizing information from the internal threat repository and collaborating with customer points of contact to understand their threat landscape and deliver customized solutions. Furthermore, you will engage in monitoring, analyzing, and reporting on cybersecurity events, intrusion events, security incidents, and other threat indications, while following best practices of operational security to safeguard sources and methods. Engaging with external communities to share and contribute to threat intelligence exchange activities will also be part of your responsibilities. To excel in this role, you should have hands-on experience with tools such as Rapid7, Recorded Future, Cyble, Zerofox, and Anomaly. Proficiency in threat intelligence tools and platforms, along with a strong understanding of cybersecurity principles and cyber threat intelligence, will be vital. Your ability to create high-quality security analysis reports, understand and analyze various threat vectors effectively, and have knowledge of cyber threats, malware, APTs, and exploits will be essential. Familiarity with the DarkNet, DeepWeb, open-source, social media, and other sources of cyber-criminal activity is preferred. A willingness to learn new technologies and skills, experience in a SOC environment, any background in threat hunting, and programming/scripting knowledge will be advantageous. The desired experience for this role is 7 to 10 years.,

Posted 1 month ago

Apply

8.0 - 12.0 years

0 Lacs

karnataka

On-site

The Cyber Security Management position in Bangalore requires 8 to 10 years of relevant experience in protecting systems and networks from cyber threats and breaches. Responsibilities include identifying, evaluating, and mitigating security vulnerabilities. The role involves utilizing Lacework for cloud security and compliance automation and integrating Cisco Kenna's vulnerability management solutions to manage risk. Additionally, implementing Rapid7 tools for enhanced security analytics and automation is part of the job scope. Key Skills Required: - Vulnerability Management - Rapid7 - Cisco Kenna - Nessus - Tenable - Qualys The hiring process consists of: 1. Screening (HR Round) 2. Technical Round 1 3. Technical Round 2 4. Final HR Round Please note that the position has already been filled.,

Posted 1 month ago

Apply

2.0 - 4.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Role: S enior SOC Analyst, Alerts & Automation Standard Title: Senior Analyst, Cyber Defence (SOC) Location: Bangalore, India About Us Founded in 2014, Circles is a global technology company reimagining the telco industry with its innovative SaaS platform, empowering telco operators worldwide to effortlessly launch innovative digital brands or refresh existing ones, accelerating their transformation into techcos. Today, Circles partners with leading telco operators across multiple countries and continents, including KDDI Corporation, Etisalat Group (e&), AT&T, and Telkomsel, creating blueprints for future telco and digital experiences enjoyed by millions of consumers globally. Besides its SaaS business, Circles operates three other distinct businesses: Circles.Life: A wholly-owned digital lifestyle telco brand based in Singapore, Circles.Life is powered by Circles SaaS platform and pioneering go-to-market strategies. It is the digital market leader in Singapore and has won numerous awards for marketing, customer service, and innovative product offerings beyond connectivity. Circles Aspire: A global provider of Communications Platform-as-a-Service (CPaaS) solutions. Its cloud-based Experience Cloud platform enables enterprises, service providers and developers to deliver and scale mobile, messaging, IoT, and connectivity services worldwide. Jetpac: Specializing in travel tech solutions, Jetpac provides seamless eSIM roaming for over 200 destinations and innovative travel lifestyle products, redefining connectivity for digital travelers. Jetpac was awarded Travel eSIM of the Year. Circles is backed by renowned global investors, including Peak XV Partners (formerly Sequoia), Warburg Pincus, Founders Fund, and EDBI (the investment arm of the Singapore Economic Development Board), with a track record of backing industry challengers. What You&aposll Do As a Security Incident and SIEM Specialist , you will support Circles SOC team in areas such as cybersecurity incident response, SIEM alert creation, fine-tuning, and noise reduction. Your role includes managing threat intelligence, monitoring security events, investigating incidents, performing forensic analysis, and coordinating global incident response efforts. You will play a key role in enhancing SOC monitoring capabilities by optimizing alert quality and reducing false positives, thereby improving overall SOC efficiency and productivity. What Were Looking For Bachelor&aposs degree in Computer Science, Engineering, or related field (or equivalent experience). 2+ years of hands-on SOC or information security experience in a global IT environment. Experience with SIEM tools (Graylog, Splunk, ELK, Rapid7, LogRhythm, QRadar). Relevant certifications (GCIH, GCIA, Splunk/QRadar) are a plus. Key Responsibilities Triage and analyze security alerts, assess threats, and prioritize based on risk and impact. Execute incident response procedures and document findings clearly. Distinguish false positives from real threats using SIEM and security tools. Understand common attack vectors, TTPs, and apply contextual log analysis. Collaborate with cross-functional teams to ensure effective incident response. Stay updated on emerging threats and security trends. SIEM & Scripting Strong UNIX/Linux skills and proficiency in Bash or Python scripting. Skilled in RegEx, log parsing, pipeline creation, and data normalization. Experience in SIEM tuning, use case development, and alert optimization. Familiar with building and enhancing detection rules and threat analytics. Exposure to AI/ML for noise reduction and threat detection is a plus. Other Requirements Willingness to work in a hybrid setup and 24x7 environment. To all recruitment agencies: Circles will only acknowledge resumes shared by recruitment agencies if selected in our preferred supplier partnership program. Please do not forward resumes to our jobs alias, Circles employees or any other company location. Circles will not be held accountable for any fees related to unsolicited resumes not uploaded via our ATS. Circles is committed to a diverse and inclusive workplace. We are an equal opportunity employer and do not discriminate on the basis of race, national origin, gender, disability or age. Show more Show less

Posted 1 month ago

Apply

7.0 - 11.0 years

0 Lacs

pune, maharashtra

On-site

Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you'd like, supported and inspired by a collaborative community of colleagues around the world, and able to reimagine what's possible. Join us and help the world's leading organizations unlock the value of technology and build a more sustainable, more inclusive world. Assess organizational security posture and conduct risk analysis for IT projects and operations. Perform security reviews to identify architectural and policy gaps, and recommend corrective actions. Ensure compliance with security principles across applications, networks, and systems. Develop and test security baselines, build audit environments, and prepare compliance reports. Drive continuous security improvements and guide teams in remediating control gaps. 69 years of experience in network/system security, threat analysis, and risk mitigation. Strong knowledge of security architecture, principles, and compliance frameworks like ISO 27001, PCI-DSS. Proficient in vulnerability assessments, system hardening, and tools such as Qualys, Algosec, or Rapid7. Experienced in reviewing application/system configurations and aligning with OWASP, CIS, and NIST standards. Excellent communication and presentation skills, with a proven ability to engage executive stakeholders. Work on enterprise-scale security architecture, risk mitigation, and compliance using modern tools and frameworks. Collaborate with global teams to assess vulnerabilities, implement hardening guidelines, and ensure secure system/application configurations. Clear career progression paths from engineering roles to architecture and consulting. Be part of mission-critical projects that ensure security, compliance, and operational efficiency for Fortune 500 clients. Capgemini is a global business and technology transformation partner, helping organizations to accelerate their dual transition to a digital and sustainable world, while creating tangible impact for enterprises and society. It is a responsible and diverse group of 340,000 team members in more than 50 countries. With its strong over 55-year heritage, Capgemini is trusted by its clients to unlock the value of technology to address the entire breadth of their business needs. It delivers end-to-end services and solutions leveraging strengths from strategy and design to engineering, all fueled by its market-leading capabilities in AI, generative AI, cloud and data, combined with its deep industry expertise and partner ecosystem.,

Posted 1 month ago

Apply

6.0 - 10.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Youll be Responsible for Implement, configure, and maintain infrastructure and monitoring tools across on-prem Data Centers (Servers, Networks, Storage, Firewalls) and hybrid Cloud (Azure/AWS). Work closely with Security, Network, Server, and Cloud teams to strengthen overall IT infrastructure posture and align tool deployments with organizational policies. Deploy and manage enterprise monitoring platforms (SolarWinds, Grafana, NTT data) for proactive visibility and alerting. Assist in implementing server/network baselines, access controls, and integrations with Security platforms. Deploy and maintain vulnerability scanning tools (Qualys, Nessus, Rapid7) and coordinate with teams for patch compliance. Implement and maintain Privileged Access Management (PAM) tools such as CyberArk for critical server and network infrastructure. Configure and manage enterprise Antivirus/Endpoint Protection solutions and integrate with monitoring dashboards. Support firewall and network tool integrations, including rule-set monitoring, configuration backups, and device health checks. Provide logs, metrics, and dashboards during incident response and RCA, working alongside Security teams. Maintain documentation, runbooks, and SOPs for tool configurations, integrations, and operational procedures. Assist in automation and AIOps for tool deployment, alert correlation, and reporting. Youd have Bachelors degree in computer science, Information Technology, or a related field. 6 to 10 years of hands-on experience in IT Infrastructure (Servers, Networks, Storage) with a focus on tool implementation and monitoring. Practical exposure to CyberArk PAM deployments, enterprise Antivirus/Endpoint Protection platforms, and integration with DC and server environments. Hands-on experience with vulnerability scanning platforms (Qualys, Nessus, Rapid7) and remediation workflows. Familiarity with any of the Antivirus tools like Microsoft Defender for Servers, Defender for Cloud, Azure Sentinel, and AWS GuardDuty/Security Hub. Experience with Windows/Linux servers, VMware/Hyper-V virtualization, enterprise network devices, and storage systems. Understanding of network infrastructure tools (NetFlow analyzers, Wireshark, Cisco Prime, SNMP-based monitoring). Exposure to firewall platforms (Palo Alto, Fortinet, Cisco ASA) and ability to collaborate with network teams for tool alignment. Scripting/automation skills in PowerShell, Python, or Ansible for tool deployment and reporting automation. Ability to collaborate effectively with cross-functional teams for securing and monitoring enterprise infrastructure. Preferred Certifications: Tool-Focused: SolarWinds Certified Professional, Qualys/Nessus, CyberArk Defender/Trustee, Microsoft Defender Certifications. Cloud & Hybrid: Azure Security Engineer Associate / Administrator, AWS Security Specialty. Infrastructure: Data Center Certifications (Cisco CCNA/CCNP DC), Server/Storage (MCSE, VMware VCP-DCV, Dell EMC, HPE). Network: CCNA/CCNP (Routing & Switching or Security), Firewall vendor certs (Palo Alto, Fortinet). Foundational: CompTIA Security+, ITIL v4 Foundation. Tools & Technologies (Preferred Knowledge): Monitoring: SolarWinds, PRTG, Zabbix, Nagios, Azure Monitor Security & PAM: CyberArk, Microsoft Defender, Azure Sentinel, AWS GuardDuty Scanning: Qualys, Nessus, Rapid7 Antivirus/EDR: Symantec, CrowdStrike, Trend Micro, Microsoft Defender ATP Network: Cisco Prime, NetFlow analyzers, Wireshark, SNMP tools Automation: PowerShell, Ansible, Python Why join us Impactful Work : Play a pivotal role in safeguarding Tanla&aposs assets, data, and reputation in the industry. Tremendous Growth Opportunities : Be part of a rapidly growing company in the telecom and CPaaS space, with opportunities for professional development. Innovative Environment: Work alongside a world-class team in a challenging and fun environment, where innovation is celebrated. Tanla is an equal opportunity employer. We champion diversity and are committed to creating an inclusive environment for all employees. www.tanla.com Show more Show less

Posted 1 month ago

Apply

6.0 - 10.0 years

0 Lacs

hyderabad, telangana

On-site

At Capgemini Invent, you will play a crucial role in driving transformation by blending strategic, creative, and scientific capabilities to deliver cutting-edge solutions for our clients. Your expertise in Vulnerability Management tools such as Rapid7, Qualys, and Tenable will be instrumental in implementing and managing security vulnerabilities both on-premises and in the cloud. You will also be responsible for setting up vulnerability scanning profiles and demonstrating a strong understanding of the vulnerability management lifecycle. In addition, your role will entail in-depth knowledge across various core domains including Vulnerability Management, External Attack Surface Management, Container Scanning, Cloud Security Compliance scanning, and Security Configuration Management. It is essential for you to possess knowledge of system security vulnerabilities, remediation techniques, and tactics, as well as the ability to effectively communicate testing findings to managers and network administrators. Your proficiency in simplifying complex technology concepts for non-technical audiences will be highly valued. Your profile should showcase a good understanding of the risk score acceptance process for vulnerabilities, the ability to generate customized reports, and support in mitigating vulnerabilities. Automation knowledge in existing processes, familiarity with Zero Day Vulnerabilities, and understanding of TTPs, MITRE ATT&CK framework, CVSS, OSINT, and deception techniques are also important aspects of this role. Moreover, your comprehension of operating systems, applications, infrastructure, cloud computing services, OWASP, CVSS, MITRE ATT&CK framework, and the software development lifecycle will be beneficial. Strong oral, verbal, and written communication skills are essential for effective collaboration and sharing of insights. Working at Capgemini offers a supportive environment with flexible work arrangements that prioritize work-life balance. You will have access to career growth programs and diverse professional opportunities tailored to your development. Additionally, you can enhance your skills with valuable certifications in cutting-edge technologies like Generative AI. Capgemini is a global leader in business and technology transformation, empowering organizations to navigate the digital and sustainable world with tangible impact. With a diverse team of over 340,000 members in more than 50 countries, Capgemini leverages its 55-year heritage to unlock the value of technology for clients worldwide. From strategy and design to engineering, the company delivers end-to-end services and solutions driven by market-leading capabilities in AI, cloud, and data, complemented by deep industry expertise and a robust partner ecosystem. In 2023, Capgemini reported global revenues of 22.5 billion, reflecting its commitment to addressing the comprehensive business needs of its clients.,

Posted 1 month ago

Apply

6.0 - 10.0 years

0 Lacs

hyderabad, telangana

On-site

At Capgemini Invent, we believe difference drives change. As inventive transformation consultants, we blend our strategic, creative and scientific capabilities, collaborating closely with clients to deliver cutting-edge solutions. Join us to drive transformation tailored to our client's challenges of today and tomorrow. Informed and validated by science and data. Superpowered by creativity and design. All underpinned by technology created with purpose. Your role involves expertise in Vulnerability Management tools such as Rapid7, Qualys, and Tenable. You should have hands-on experience in implementing and managing security vulnerabilities both on-premises and in the cloud. Additionally, setting up vulnerability scanning profiles and a strong knowledge and understanding of the vulnerability management lifecycle are essential. It is crucial to have in-depth knowledge across all core domains including Vulnerability Management, External Attack Surface Management, Container Scanning, Cloud Security Compliance scanning, and Security Configuration Management. Understanding system security vulnerabilities, remediation techniques, and tactics is required. You should be able to comprehend vulnerability testing methodology and effectively communicate testing findings to managers and network administrators. Furthermore, the ability to communicate complex technology to non-tech audiences in a simple and precise manner is essential. Your Profile should include a good understanding of the risk score acceptance process of vulnerabilities, ability to create customized reports, support in the mitigation of vulnerabilities, and knowledge of automation in the existing process. Understanding of Zero Day Vulnerabilities and their process, TTPs, MITRE ATT&CK framework, CVSS, OSINT, and deception techniques are also important. You should have knowledge of operating systems, applications, infrastructure, and cloud computing services, along with an understanding of OWASP, CVSS, MITRE ATT&CK framework, and the software development lifecycle. Good oral, verbal, and written communication skills are necessary for this role. What you will love about working here is the recognition of the significance of flexible work arrangements to provide support. Whether it's remote work or flexible work hours, you will have an environment that allows for a healthy work-life balance. Career growth is at the heart of our mission, with an array of career growth programs and diverse professions crafted to support you in exploring a world of opportunities. Equip yourself with valuable certifications in the latest technologies such as Generative AI. Capgemini is a global business and technology transformation partner, helping organizations accelerate their dual transition to a digital and sustainable world while creating tangible impact for enterprises and society. With a responsible and diverse group of 340,000 team members in more than 50 countries, Capgemini is trusted by clients to unlock the value of technology to address the entire breadth of their business needs. The Group reported 2023 global revenues of 22.5 billion.,

Posted 1 month ago

Apply

0.0 years

0 Lacs

Bengaluru, Karnataka, India

Remote

Req ID: 330926 NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now. We are currently seeking a Systems Integration Advisor to join our team in Bengaluru, Karn?taka (IN-KA), India (IN). Pipeline RR - Wintel Manage and maintain Windows Server environments (2008/2012/2016/2019/2022) including Group Policy. Perform regular vulnerability assessments using tools like Rapid7. Analyze vulnerability scan results, prioritize remediation efforts, and coordinate patching activities. Apply security patches, hotfixes, and updates across Wintel infrastructure in a timely and controlled manner. Perform regular patching and updates using tools like Microsoft SCCM, Intune, or WSUS. Collaborate with security, application, and network teams to address vulnerabilities and reduce risk exposure. Maintain documentation of remediation activities, system configurations, and change management records. Automate routine tasks using PowerShell or other scripting tools. Monitor system performance and availability, and troubleshoot issues as needed. Participate in on-call rotation and support after-hours maintenance windows. About NTT DATA NTT DATA is a $30 billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long term success. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure and connectivity. We are one of the leading providers of digital and AI infrastructure in the world. NTT DATA is a part of NTT Group, which invests over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. Visit us at us.nttdata.com Whenever possible, we hire locally to NTT DATA offices or client sites. This ensures we can provide timely and effective support tailored to each clients needs. While many positions offer remote or hybrid work options, these arrangements are subject to change based on client requirements. For employees near an NTT DATA office or client site, in-office attendance may be required for meetings or events, depending on business needs. At NTT DATA, we are committed to staying flexible and meeting the evolving needs of both our clients and employees. NTT DATA recruiters will never ask for payment or banking information and will only use @nttdata.com and @talent.nttdataservices.com email addresses. If you are requested to provide payment or disclose banking information, please submit a contact us form, https://us.nttdata.com/en/contact-us . NTT DATA endeavors to make https://us.nttdata.com accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact us at https://us.nttdata.com/en/contact-us . This contact information is for accommodation requests only and cannot be used to inquire about the status of applications. NTT DATA is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. For our EEO Policy Statement, please click here . If you&aposd like more information on your EEO rights under the law, please click here . For Pay Transparency information, please click here . Show more Show less

Posted 1 month ago

Apply

6.0 - 8.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl We are always moving forward always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Kyndryls Security & Resiliency is one of our most critical practices, ensuring enterprises, regardless of their size and complexity, remain secure, available, reliable, and resilient. We take Cybersecurity seriously. We&aposre not just invested; we&aposre committed. We&aposre not just protecting data; we&aposre empowering. Kyndryl is committed to making the world safer, not only by investing in state-of-the-art services and technologies but also by empowering underserved communities with essential cyber skills. When you walk through our doors, you&aposre not only joining a team but you&aposre also becoming part of a legacy. Welcome to Kyndryl, where Cybersecurity isn&apost just a job its a passion; a commitment to designing, running, and managing the most modern and reliable technology infrastructure that the world depends on every day. As a Cybersecurity Defense professional at Kyndryl, you will encompass cybersecurity, incident response, security operations, vulnerability management, and the world of cyber threat hunting and security intelligence analysis all to protect the very heartbeat of organizations their infrastructure. In this role, you won&apost just monitor; you&aposll actively engage in the relentless hunt for cyber adversaries. In a world where every click and keystroke could be a potential gateway for attackers, your role will be nothing short of critical as you seek out advanced threats, attackers, and Indicators of Compromise (IOCs). Your expertise in endpoint detection and response (EDR) will be the shield that safeguards individual workstations, laptops, servers, and other devices from cybercrime. Your responsibilities go beyond vigilance. When it comes to network security, you&aposll utilize Network Detection and Response (NDR) to monitor the ever-flowing currents of network traffic. The incident management process will be used as you respond and manage to cybersecurity incidents. Cybersecurity Defense is all about information. You&aposll gather, analyze, and interpret data applying your own and external threat intelligence to uncover potential security threats and risks. These insights and your ability to analyze complex attack scenarios will be the foundation of our security strategy helping Kyndryl stay one step ahead of security breaches. In Cybersecurity Defense at Kyndryl, youre not just protecting the present youre shaping the future of digital security. Join us on this cybersecurity venture where your expertise and creativity will have a lasting impact in the world of digital defense. Your Future at Kyndryl When you join Kyndryl, you&aposre not just joining a company you&aposre entering a space of opportunities. Our partnerships with industry alliances and vendors mean you&aposll have access to skilling and certification programs needed to excel in Security & Resiliency, while simultaneously supporting your personal growth. Whether you envision your career path as a technical leader within cybersecurity or transition into other technical, consulting, or go-to-market roles were invested in your journey. Who You Are Youre good at what you do and possess the required experience to prove it. However, equally as important you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused someone who prioritizes customer success in their work. And finally, youre open and borderless naturally inclusive in how you work with others. Required Skills And Experience Provide and manage vulnerability scanning and assessment tools for traditional IT assets. 6 - 8 years of security analyst experience, preferably in a managed services environment Analyze scan results, prioritize findings using risk-based methodology. Deliver actionable remediation and mitigation recommendations. Maintain continuous visibility and reporting for servers, endpoints, and network infrastructure. Vulnerability Scanning: Tenable.io, Qualys, or Rapid7, Tanium (based on agreement) Vulnerability Scanning: Tenable.io, Qualys, or Rapid7, Tanium (based on agreement) Ticketing Integration: ServiceNow, Jira Reporting: Custom dashboards (Power BI/Tableau) or native tool reports Experience with cloud security, devops, cyber resiliency/incident management, Zero Trust, network/EDGE security, and emerging technologies such as IoT and AI. Experience threat hunting, proactively and iteratively searching to detect advanced threats that evade existing security solutions. Deep understanding of the current cyber threat landscape, the different tactics commonly used by adversaries and how you would investigate, contain and recover against their attacks Expertise with security incident response process. Preferred Skills And Experience Bachelors degree in Computer Science, Cybersecurity, Information Technology, or other related fields Preferred Certifications in Cyber Security: ECTHP (Certified Threat Hunting Professional) or?ECMAP (Malware Analysis Professional); other specialized security analyst certifications Experience in Cloud Security monitoring and in advanced analytics (UEBA) Being You Diversity is a whole lot more than what we look like or where we come from, its how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But were not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you and everyone next to you the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. Thats the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked How Did You Hear About Us during the application process, select Employee Referral and enter your contact&aposs Kyndryl email address. Show more Show less

Posted 1 month ago

Apply

8.0 - 12.0 years

0 Lacs

hyderabad, telangana

On-site

The Manager, Exposure Management plays a crucial role in identifying, analyzing, and mitigating cybersecurity exposures across enterprise systems. Your focus will be on vulnerability management, attack surface monitoring, and web application scanning to ensure timely detection and response to risks impacting the organization's digital footprint. It is essential to possess strong technical expertise, attention to detail, and the ability to collaborate across teams to influence remediation activities and enhance security posture. Key Responsibilities - Operate enterprise vulnerability scanning platforms, validate findings, and monitor remediation efforts effectively. - Continuously assess the organization's internal and external attack surface for untracked assets, misconfigurations, and exposed services. - Identify and manage asset ownership across business units, ensuring accurate data consistently reflected in the configuration management database (CMDB). - Collaborate with infrastructure, application, and business stakeholders for prompt and comprehensive updates to asset and ownership records. - Configure, execute, and analyze web application security scans, working closely with development teams to address identified issues. - Prioritize vulnerabilities based on exploitability, threat intelligence, and business impact using structured frameworks and tools. - Prepare detailed reports and dashboards tailored for various audiences, from technical teams to executive leadership. - Partner with IT, infrastructure, and cybersecurity stakeholders to facilitate risk-informed remediation activities. - Contribute to continuous process enhancements and tool optimization throughout the exposure management lifecycle. Basic Qualifications - A Bachelor's degree in Computer Science, Information Security, Engineering, or a related technical field, along with a minimum of 10 years of experience in cybersecurity, focusing on vulnerability or exposure management. - A Master's degree in Computer Science, Information Security, Engineering, or a related technical field, combined with at least 8 years of experience in cybersecurity, with a focus on vulnerability or exposure management. Preferred Qualifications - Hands-on experience with tools like Tenable, Qualys, Rapid7, or similar platforms. - Familiarity with web application scanning tools and techniques. - Experience in managing or supporting a CMDB and asset lifecycle processes in a large organization. - Understanding of frameworks such as CVSS, MITRE ATT&CK, and NIST CSF. - Strong communication and analytical skills to effectively communicate technical risks to business stakeholders. - Experience supporting compliance and regulatory programs within a global business context. In addition to competitive benefits programs, we offer health insurance, professional development opportunities, and an Employee Assistance Programme to help you achieve your personal goals. At our organization, we value the expertise, creativity, and passion of our employees and strive to create an inclusive environment that promotes growth, innovation, and diversity. Join us and be part of The Carrier Way, where you can make a difference. Apply now!,

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

bhopal, madhya pradesh

On-site

As a member of the Vulnerability Management Services team at Atos Group, you will play a crucial role in executing vulnerability scanning and managing VM programs for our clients. Your responsibilities will include completing projects within budgeted efforts and agreed timelines with high-quality deliverables. You will utilize various scanning solutions such as SAINT, Nessus, Tenable.io, Tenable.sc, Qualys, etc., to perform vulnerability scanning and gain a deep understanding of client network architecture and infrastructure to be scanned. Moreover, you will be involved in threat identification, vulnerability identification, and control analysis, as well as developing customized reports and dashboards based on client expectations. Proactiveness in project planning and execution, likelihood determination, impact analysis, and risk determination are key aspects of this role. You will also prioritize risks, provide solution recommendations, and document findings, identifying the business risks posed by weaknesses identified during assessments. Collaboration with both business and technical teams within and outside the organization will be essential for project scope definition, execution, and closure. The ideal candidate for this role should have at least 5 years of experience in Vulnerability Scanning, with expertise in tools like Qualys, Tenable, Rapid7, etc. Additionally, you should possess the ability to understand and explain vulnerabilities to stakeholders, knowledge of platforms such as Windows, Linux, Unix, Mac OS, Cisco, Juniper, as well as familiarity with standards like PCIDSS, CIS Benchmarks, etc. A flexible approach to working on challenging activities, creative problem-solving skills, strong communication, and writing abilities are crucial for success in this role. Join us at Atos Group to expand the possibilities of data and technology, now and for generations to come. Let's grow together.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

At Arctic Wolf, we are redefining the cybersecurity landscape with our global team of Pack members committed to setting new industry standards. Our achievements speak for themselves, from being recognized in prestigious lists like the Forbes Cloud 100, CNBC Disruptor 50, and winning awards like the CRN Products of the Year. We are proud to be named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services and to have earned the Customers" Choice distinction from Gartner Peer Insights. Arctic Wolf is not just leading but also shaping the future of security operations. Our mission is straightforward: End Cyber Risk. We are currently seeking a Security Developer to join us in achieving this goal. About The Role As a Security Developer at Arctic Wolf, you will work as a software developer focusing on enhancing the platforms threat, vulnerability, and configuration risk detection capabilities. Your primary objective will be to contribute to making security better for our clients daily. This role involves collaborating with team members, Product Management, Security Services, and other specialists to enhance the coverage and effectiveness of our Manage solution continuously. Your Responsibilities - Collaborate with team members to enhance coverage, efficiency, and deliver customer-facing and internal services. - Engage in the full software development lifecycle. - Develop well-designed, testable, efficient, and secure code for vulnerability and misconfiguration detection in areas such as Classic Endpoint Vulnerability And Config Management, Cloud Config And Posture Management. - Assist operational teams in resolving unexpected results, receiving feedback, and improving detection efficacy. Skills Requirements - Proficiency in at least one backend programming language like Go, Node.js, or Python. - Strong understanding and practical application of secure development practices. - Security-focused mindset with hands-on experience in operational security or security engineering. - Full understanding and use of DevOps methods and practices. - Familiarity with test-driven development (TDD) and robust testing strategies. - Experience with AWS, Docker, Kubernetes, IaC is an asset. Bonus Considerations For - Experience with 3rd Party Vulnerability Management tools, Cloud-based configuration and Security Posture Management tools, open-source vulnerability and pen-testing platforms. - IT Deployment backgrounds leveraging deployment automation tools like Salt or Ansible. Why Arctic Wolf At Arctic Wolf, we nurture a collaborative and inclusive work environment that values diversity of thought, background, and culture. Our commitment to growth and shaping the future of security operations is complemented by our dedication to customer satisfaction, with a vast customer base and global channel partners. We celebrate unique perspectives through our Pack Unity program and believe in corporate responsibility, giving back to the community. All employees at Arctic Wolf receive competitive compensation and benefits packages, including equity, flexible leave policies, training programs, comprehensive private benefits plan, fertility support, and more. Join us in our mission to End Cyber Risk and contribute to a safer digital world.,

Posted 1 month ago

Apply
Page 1 of 2
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies