Home
Jobs

571 Security+ Jobs - Page 12

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cyber Governance Risk and Compliance Consultant - Senior The opportunity This is a role where no two days are the same – so you’ll find yourself taking on plenty of new responsibilities as you go. You’ll work alongside clients and colleagues, balancing your time between developing security strategies, designing security and privacy controls, advising client stakeholders, facilitating workshops and supporting business development. Your Key Responsibilities As a Cyber GRC Professional in our Cyber Security practice, you will be occupied in the following domains: a) Strategy, b) Risk, c) Compliance. As part of our team strategy you will be expected to take on responsibility and initiative early, providing you with real experience working with a wide range of major clients in EY. You will be taking responsibility for the quality of your work, while continually developing your personal and professional skills through formal training, hands-on experience and coaching. Skills And Attributes For Success To qualify for the role, you must have: Degree, or equivalent, in Information Security, Cyber Security, Information Technology, Informatics, or other similar and technical areas Evidence of self-motivation to continuously develop in the areas of cybersecurity Good organizational and time management skills with the ability to prioritize and complete multiple complex projects under tight deadlines Ability to translate security issues into business risks Excellent interpersonal skills and ability to work effectively within a team at all hierarchical levels Willingness to research client inquiries and emerging issues, including regulations, industry practices, and new technologies Experience, knowledge and strong interest in information and cyber security domains are essential for this role Experience on Cyber Governance, Risk & Compliance (GRC), Cyber risk assessments & management methodologies Experience on assessing, designing and implementing security strategies, governance frameworks over processes and controls, allowing organisations to optimally manage cyber security Experience on design and implementation of security policies, procedures, standards and controls in line with regulation and/or current standards, such as ISO27001, NIST, SANS etc. Experience in data classification exercises and controls / mechanisms enforcement Working knowledge of control frameworks such as ISO 27001/27002, COBIT, NIST, ITIL, etc. Ability to conduct Security regulatory and compliance assessment independently Hands on with assessment report preparation and presenting to senior technical and business stakeholders Hand on knowledge of excel, PowerPoint and word Articulative and confident in presentation to senior stakeholders Ability to lead workstreams or dedicated portions of projects Cyber maturity assessments, recommendations, roadmap and strategy creation knowledge of use of and risks related to modern and emerging technologies Cybersecurity audit Ability to plan and deliver cyber security training and awareness Ideally, you’ll also have: Security-related qualifications / certifications such as CISSP, SSCP, CISM, ISO27001 lead implementer or auditor, CompTIA Security+, are desirable Experience in Third Party Risk Management (TPRM) and / or vendor risk assessment engagements Experience in design and implementation of Information Security Management Systems (i.e. security policies, procedures and guidelines) according to leading International Standards Security-related vendor / technology certifications are desirable EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 weeks ago

Apply

4.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security - DPP- Risk – Consulting – Senior As part of our EY-Cyber security in the Risk Consulting team, your role will be primarily responsible for the daily monitoring and/or maintenance of the enterprise Data Protection tools/solutions. The main duties of the person in this role will include proper care and administration of the Data Protection tools, monitoring and responding to the alerts that generate from the tool. This person will interface with IT Operations, Network Operations, Infrastructure teams, Legal, Risk Management, etc. The opportunity We’re looking for Security Analyst in the Risk Consulting team to work on various privacy/data protection related projects for our customers across the globe. In line with EY’s commitment to quality, consultant shall confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, consultant shall help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Build DATA PROTECTION solution concepts and deployment requirements Deploying DATA PROTECTION tools and implementation of endpoint protection. Work with vendors to support the DATA PROTECTION technology (troubleshooting, upgrades, etc.) Administration of the Data Protection tools which includes configuring policies, upgrading and patching, etc. Monitor and respond to alerts generated from the Data Protection systems and other technologies Understand and follow the incident response process through event escalations Respond to escalations by the Incident Response Team Follow processes to maintain the leading DATA LOSS PREVENTION/CASB system Assisting clients in privacy related incident response activities. Supporting the client’s team by acting as an interim team member (e.g., security officer, security manager, security analyst.) Skills And Attributes For Success Should be a good team player. Excellent verbal and written communication skill. Proficient Documentation and Power Point skills Good social, communication and technical writing skills Should interface with internal and external clients. Strong analytical/problem solving skills. Ability to prioritize tasks and work accurately under pressure to meet deadlines. Should understand and follow workplace policies and procedures. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. To qualify for the role, you must have Bachelor's or Master’s degree in Computer Science, Information Systems, Engineering or a related field. At least 4-6 years of experience in supporting Data Security Technology. At least 4-6 years of experience in two or more of the following: Information Security concepts related to Governance, Risk & Compliance Data Loss Prevention, CASB Technology support and Event Handling Experience of Administration of the DLP, CASB tools which includes configuring policies, upgrading and patching for leading vendors. (Digital Guardium, McAfee, Forcepoint, Netskope, Symantec CloudSOC, MCAS etc.) MS Purview/ CASB (Netskope/MS/Symantec). Knowledge of Digital Guardium is a Must. Technical/Vendor certification will be added advantage. Experience in utilizing and good knowledge of other data protection technology like Endpoint Security Suite, EDR, ATP will be added advantage. Maintain current data protection and privacy expertise, skills and competences. Ability to independently research and solve technical issues. Demonstrated integrity in a professional environment. Knowledge of core Information Security concepts related to Governance, Risk & Compliance. Ability to work in and adapt to a changing environment. Extend required support for any reported data protection and privacy incidents such as information breaches and leakages. Ability to communicate in a clear and concise manner. Ideally, you’ll also have Professional certificate or be actively pursuing related professional certifications such as the CompTia Security+, CEH, CISSP or Vendor/Technical certification. If not, certified candidates are expected to complete one of the business required certifications within 12 months of hire. To expect some weekend work and 20%-30% travel based on job requirement. What We Look For A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 weeks ago

Apply

0.0 - 78.0 years

0 Lacs

Gwalior Railway Station, Gwalior, Madhya Pradesh

On-site

Indeed logo

Company Overview: Jetking Gwalior Center is a premier IT training institute located in the heart of Gwalior, Madhya Pradesh. As an authorized training center of Jetking Infotrain Ltd., a renowned name in the IT education sector, we specialize in providing industry-relevant courses in areas such as Ethical Hacking, Cybersecurity, CCNA, Linux, Cloud Computing, and more. With over 78 years of legacy and more than 1.1 million students trained nationwide, Jetking stands as a testament to quality education and successful career placements. Our Gwalior center is committed to delivering hands-on training, real-time scenario-based learning, and a 100% job guarantee to our students. We pride ourselves on our state-of-the-art infrastructure, certified faculty, and a curriculum designed to meet the evolving demands of the IT industry. At Jetking Gwalior, we aim to empower individuals with the skills and knowledge necessary to excel in the ever-changing world of technology. Job Description: We are seeking a passionate and skilled Ethical Hacking & Cybersecurity Trainer to join our team. The ideal candidate will be responsible for delivering comprehensive training sessions, both online and in-person, covering various aspects of ethical hacking and cybersecurity. This role requires a deep understanding of networking, security protocols, and hands-on experience with industry-standard tools and certifications. Key Responsibilities: Design and deliver training modules on ethical hacking, penetration testing, and cybersecurity fundamentals. Conduct practical lab sessions to demonstrate real-world scenarios and solutions. Evaluate and assess student progress through assignments, quizzes, and practical exams. Stay updated with the latest trends, tools, and techniques in the cybersecurity field. Provide mentorship and guidance to students pursuing certifications like CEH, and CompTIA Security+. Collaborate with the curriculum development team to enhance training materials. Required Skills & Qualifications: Proficiency in networking concepts and protocols (TCP/IP, DNS, HTTP, etc.). Hands-on experience with Linux operating systems and command-line tools. Familiarity with Fortinet products and security solutions. Strong communication and presentation skills. Ability to explain complex concepts in a clear and understandable manner. Prior teaching or training experience is a plus. Certified Ethical Hacker (CEH) or equivalent certification. CompTIA A+ certification or equivalent. CompTIA Security+ certification or equivalent. Strong communication and presentation skills. Ability to explain complex concepts in a clear and understandable manner. Prior teaching or training experience is a plus. Preferred Skills: Experience with penetration testing tools like Metasploit, Burp Suite, and Wireshark. Knowledge of scripting languages such as Python or Bash. Understanding of security frameworks and compliance standards. Experience in setting up and managing virtual labs for training purposes. Job Type: Full-time Pay: ₹25,000.00 - ₹30,000.00 per month Schedule: Day shift Fixed shift Language: English (Preferred) Work Location: In person

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Sahibzada Ajit Singh Nagar, Punjab, India

On-site

Linkedin logo

About Us We are a global climate technologies company engineered for sustainability. We create sustainable and efficient residential, commercial and industrial spaces through HVACR technologies. We protect temperature-sensitive goods throughout the cold chain. And we bring comfort to people globally. Best-in-class engineering, design and manufacturing combined with category-leading brands in compression, controls, software and monitoring solutions result in next-generation climate technology that is built for the needs of the world ahead. Whether you are a professional looking for a career change, an undergraduate student exploring your first opportunity, or recent graduate with an advanced degree, we have opportunities that will allow you to innovate, be challenged and make an impact. Join our team and start your journey today! Job Title Security Analyst Reports to Sr. Manager Job Purpose As a Security Analyst , you will be a key member of our Global Cybersecurity Team, helping to strengthen Copeland’s cybersecurity posture. This role involves monitoring tools and dashboards, identifying and mitigating security vulnerabilities, and collaborating with teams to address risks effectively. You will also contribute to continuously improving our vulnerability management processes and play an active role in ensuring our IT systems remain secure. Key Responsibilities Monitor security tools and dashboards to identify vulnerabilities, assess risks, and propose compensating controls to reduce threats. Communicate findings to appropriate teams and track vulnerabilities through resolution. Create detailed vulnerability reports for technical teams and summary reports for management. Collaborate with IT and development teams to prioritize and remediate vulnerabilities. Maintain an up-to-date database of vulnerabilities, including their status and remediation progress. Contribute to the development and improvement of vulnerability management processes and tools. Duties And Responsibilities Support product security programs, projects, and initiatives to align with organizational security objectives. Lead small to medium-scale security initiatives, ensuring timely and successful execution. Collaborate with business units and engineering teams to implement security policies, establish sustainable processes, and enhance compliance while reducing risk. Identify and address gaps within the cybersecurity program, applying your expertise to strengthen the organization’s security posture. Conduct security scans, validate vulnerabilities through penetration testing, and retest fixes to ensure effectiveness. Recommend and participate in initiatives to prevent repeated vulnerability findings. Provide support for cybersecurity projects, technical discussions, and collaborative meetings. Respond to and assist in resolving outputs from security tools and engagement activities. Qualifications Bachelor’s degree in Engineering, Computer Science, or related discipline 3+ years of experience in vulnerability assessment, penetration testing, or cybersecurity. Hands-on experience with vulnerability scanning tools and remediation processes. Knowledge of networking, operating systems (Windows, Linux), and application security. Some experience with programming or scripting and familiarity with DevSecOps practices. Experience with vulnerability frameworks (NIST, CVSS, etc.) Proficient in MS Office (Word, Excel, PowerPoint, etc.) Strong communication skills, with the ability to deliver clear oral, written, and visual presentations. Strong organizational skills, with the ability to plan, prioritize, and align tasks effectively. Customer-focused mindset with a strong eagerness to learn and grow. SANS GIAC, Network+, Security+ or other industry certifications preferred Key Competencies Customer Focus, Tech Savvy, Action Oriented, Collaborates, Communicates Effectively, Instills Trust, Being Resilient Our Commitment to Our People Across the globe, we are united by a singular Purpose: Sustainability is no small ambition. That’s why everything we do is geared toward a sustainable future—for our generation and all those to come. Through groundbreaking innovations, HVACR technology and cold chain solutions, we are reducing carbon emissions and improving energy efficiency in spaces of all sizes, from residential to commercial to industrial. Our employees are our greatest strength. We believe that our culture of passion, openness, and collaboration empowers us to work toward the same goal - to make the world a better place. We invest in the end-to-end development of our people, beginning at onboarding and through senior leadership, so they can thrive personally and professionally. Flexible and competitive benefits plans offer the right options to meet your individual/family needs. We provide employees with flexible time off plans, including paid parental leave (maternal and paternal), vacation and holiday leave. Together, we have the opportunity – and the power – to continue to revolutionize the technology behind air conditioning, heating and refrigeration, and cultivate a better future. Learn more about us and how you can join our team! Our Commitment to Diversity, Equity & Inclusion At Copeland, we believe having a diverse, equitable and inclusive environment is critical to our success. We are committed to creating a culture where every employee feels welcomed, heard, respected, and valued for their experiences, ideas, perspectives and expertise. Ultimately, our diverse and inclusive culture is the key to driving industry-leading innovation, better serving our customers and making a positive impact in the communities where we live. Equal Opportunity Employer Copeland is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, age, marital status, political affiliation, sexual orientation, gender identity, genetic information, disability or protected veteran status. We are committed to providing a workplace free of any discrimination or harassment. Show more Show less

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Kochi, Kerala, India

On-site

Linkedin logo

SOTI is committed to providing its employees with endless possibilities; learning new things, working with the latest technologies and making a difference in the world. Job Title: Senior System Administrator Location: Kochi, India Who We Are At SOTI, we are committed to delivering best in class mobile and IoT device management solutions. We are looking for out of the box thinkers that appreciate the art of creating great software. To us, being visionary is more important than doing things the way they’ve always been done. What We’re Looking For Our people are our most important resource. The Systems Administrator works to support computing infrastructure and enterprise applications, which provide services to our Corporate, Call Center, QA and Development teams as well as external clients. This role will be responsible for design, planning, installing, configuring, maintaining and the ongoing support of the client server infrastructure. Including but not limited to physical and visualized servers, Microsoft/VMWARE technologies, Azure & AWS Cloud Computing Services, SSO architecture, O365 Admin, Exchange, file archiving, network file shares environment and Microsoft licensing. The incumbent will also provide technical expertise, advice, and guidance to projects to support the growth and evolving requirements of our business. The successful candidate must be able to work in a fast-paced, computer-intensive, deadline-driven environment with technical staff members of all levels. Being part of our growing team, you will get the chance to work with leading edge technologies and take on complex and interesting projects that offer innovative mobile device solutions to our enterprise clients across the world. You will be able to take part in brainstorming and bringing new ideas to the table, which will be rewarded by your professional growth and a motivating career advancement with SOTI. What You’ll Do Provides advice and recommendations to management to assist in technology directions, decisions, and roadmaps. Performs research and analysis in server infrastructure technology to identify, propose and implement cost effective and practical technology solutions. Engage and be part of the design team for the designated technologies and projects. Provides escalation level of support in the designated areas. Provides technical guidance, advice, and assistance to other members of the team when required. Performs installations and upgrades of server operating systems, system software, system patches and hot fixes as required. As required, provides day-to-day operational support and system administration tasks. Responds to assigned tickets and resolves problems in the designated technology areas. Ensure the security of information technology assets, data, network access, backup systems, and implement monitoring and alerting systems to verify the security of internal and external systems. Conducts hardware and software audits and review of server infrastructure to ensure compliance with established standards, policies, and configuration guidelines. Identify opportunities for automation to streamline repetitive tasks, improve efficiency, and reduce manual intervention in system administration processes. Develop and maintain technical documentation, diagrams, and procedures for the designated technology areas. Attend and contribute to team meetings. Special Conditions: Some evening and weekend work will be required (as required) Ability to provide 24-hour on-call and on-site emergency support (as required) Experience You’ll Bring University Degree or Diploma in Computer Science, Information Technology, Computer Networking, Engineering, or a related technical field 5+ years’ progressive experience in IT Systems Administration and Architecture Must have relevant Microsoft certifications. 5+ years of experience and knowledge of Linux and Windows Server and related services Active Directory, DNS, DHCP, NPS, Sites, etc. 5+ years of experience at a senior level for Technology stack including MS Exchange, Office 365, Skype for Business/Microsoft Teams, SharePoint), 5+ years of experience in virtualization technology, Hyper-V. Working experience of IAM platform OneLogin and standard SSO and SAML authentication technologies. Working experience of SAN technology and administration (Pure Storage, iSCSI, Fiber Channel). Expertise with monitoring tools like Zabbix/SCOM/PRTG, escalation processes, and procedures. 2+ years’ experience with cloud computing platforms (e.g., AWS, Azure, Google Cloud) Experience managing vulnerabilities, endpoint security, and patch management using tools like Qualys, Microsoft defender and Patch my PC. Proven strong analytical and troubleshooting skills is a must. Excellent report and documentation writing skills Nice to Have: Relevant certifications (Security+, AWS certified Solution Architect) What’s in it for you? The People - From our humble origins in our founder’s basement, to our industry leading position today, SOTI has worked hard to foster a company culture that we can all believe in. A culture that emphasizes personal growth, continuous innovation and fun. The Growth - Our environment fosters new ideas, fresh perspectives, and the ability to take them over the goal line. SOTI is a fast-paced environment with a global reach that encourages you to make your mark and be part of something big! The Technology - You’ll get the chance to work with leading edge technologies and take on complex and interesting projects, as part of highly collaborative and agile teams. You will work alongside SOTI’s partners which include leading tech giants that will keep you on the cusp of emerging technologies. About SOTI SOTI is the world's most trusted provider of mobile and IoT management solutions, with more than 17,000 enterprise customers and millions of devices managed worldwide. SOTI's innovative portfolio of solutions and services provide the tools organizations need to truly mobilize their operations and optimize their mobility investments. SOTI extends secure mobility management to provide a total, flexible solution for comprehensive management and security of all mobile devices and connected peripherals deployed in an organization. At SOTI, we celebrate the uniqueness of our global teams and are proud to be an equal opportunity workplace. We are curious problem solvers who are committed to bringing the best mobile and IoT management solutions to market. We offer careers with #EndlessPossibilities. What are you waiting for? Apply today! If you want to bring your ideas to life, apply at SOTI today. Please note that SOTI does not accept unsolicited resumes from recruiters or employment agencies. In the absence of a signed Services Agreement with agency/recruiter, SOTI will not consider or agree to payment of any referral compensation or recruiter fee. Show more Show less

Posted 2 weeks ago

Apply

4.0 years

6 - 7 Lacs

Hyderābād

On-site

GlassDoor logo

India - Hyderabad JOB ID: R-216701 LOCATION: India - Hyderabad WORK LOCATION TYPE: On Site DATE POSTED: Jun. 01, 2025 CATEGORY: Information Systems Join Amgen’s Mission of Serving Patients At Amgen, if you feel like you’re part of something bigger, it’s because you are. Our shared mission—to serve patients living with serious illnesses—drives all that we do. Since 1980, we’ve helped pioneer the world of biotech in our fight against the world’s toughest diseases. With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year. As a member of the Amgen team, you’ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you’ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. What you will do Let’s do this. Let’s change the world. In this vital role you will be an integral part in driving growth & innovation, improving efficiency and creating enterprise value – supporting our mission “To Serve Patients”. The Manager-Information Security will be responsible for the oversight and hands-on leadership of the Directory Services (AD and LDAP) team within the Digital Identity Access Services (DIAS) organization. This role involves developing, implementing, maintaining, and updating IAM strategies, policies and procedures to ensure the security and integrity of our systems and data. The ideal candidate will have extensive experience in Active Directory, Enterprise Unix LDAP and other Directory services. Candidate should have a deep understanding of security standard processes, and the ability to lead a team in a dynamic, global environment. Roles & Responsibilities: Manage Amgen's Internal and External PKI Technologies Manage External PKI vendors like Sectigo and Entrust Develop and maintain the Directory and LDAP standards and architecture, ensuring that it meets industry standards and best practices Assess and select IAM technologies and tools that align with Amgen’s IAM strategy Lead the information security team, providing guidance, support, and mentoring to ensure the effectiveness of security operations Develop and implement the IAM (Identity Access Management) strategy aligned with the organization's information security goals and regulatory requirements. Lead the design, implementation, and management of IAM solutions, including governance for Directory Services. Create, implement, and maintain IAM policies, standards, and procedures to manage user identities and access rights. Design and enforce access control mechanisms, including role-based access control (RBAC), to safeguard sensitive information. Manage IAM-related security incidents and vulnerabilities, coordinating with IT security teams to mitigate risks. Know the latest with industry trends, emerging threats, and standard methodologies in IAM. Collaborate with IT and security teams to integrate IAM solutions with other security and business systems. Develop and maintain key performance indicators (KPIs) to track service metrics and generate regular reports for management. Evaluate and implement IAM tools and technologies to enhance security and streamline processes. Participate in vendor proposals, contract negotiations, and support renewals. This role on occasion might have responsibilities outside of business hours. Travel: International and/or domestic travel up to 10% may be essential. What we expect of you We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Master’s degree with 4 to 6years of experience related field OR Bachelor’s degree with 6 to 8 years of experience in related field OR Diploma with 8 - 12 years of experience in related field. Preferred Qualifications: Must-Have Skills: Strong knowledge of Internal and External PKI (Public Key Infrastructure). Strong knowledge of Directory Services and LDAP Services. Solid understanding of Active Directory Domain structure and security, Windows Operating Systems and Domain Controllers, Azure AD and Microsoft Entra ID. Strong knowledge of LDAP directories and managing LDAP Structure. Knowledge of LDAP Schema and configuration changes. Create and modify Shell Scripts for bulk LDAP operations. Creation and implementation of LDAP Business Continuity plans. Familiarity with security standards and regulations (e.g., NIST, ISO). Experience with Authentication, Provisioning/De-provisioning, Role Management, Session Management and Directory Services. Experience in driving transformation initiatives using Scaled Agile methodology. Excellent verbal and written communication skills for technical and non-technical audiences of various levels in the organization. Good-to-Have Skills: Work experience in the biotechnology or pharmaceutical industry. Degree in Computer Science, Information Systems, or Engineering. Familiarity with GxP standards, Information Security standards and policies like ISO 27001/27002, NIST and others. Strong problem-solving and analytical skills. Demonstrated ability to work effectively in a fast-paced, dynamic environment. Understanding of ITIL processes and implementation. Proficiency in scripting and automation (e.g., Python, Bash) is a plus Professional Certifications CompTIA Security+ (preferred) Cloud Identity or Security Certification (preferred) Microsoft Azure Certification (preferred) Soft Skills: Excellent analytical and troubleshooting skills. Strong verbal and written communication skills. Ability to work effectively with global, virtual teams . High degree of initiative and self-motivation. Ability to manage multiple priorities successfully. Team oriented, with a focus on achieving team goals. Strong presentation and public speaking skills. What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. and make a lasting impact with the Amgen team. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment.

Posted 2 weeks ago

Apply

3.0 years

0 - 0 Lacs

India

Remote

GlassDoor logo

Job Summary: We are seeking a passionate and knowledgeable Ethical Hacking & Cybersecurity Trainer to deliver high-quality training to students and professionals. The ideal candidate will have hands-on experience in penetration testing, cybersecurity tools, and a strong ability to teach complex topics in an engaging and understandable manner. Key Responsibilities: Deliver training sessions on Ethical Hacking, Penetration Testing, Network Security, Web Application Security, etc. Design and update training materials, labs, assignments, and assessments. Conduct live demonstrations and hands-on lab exercises using industry-standard tools. Mentor and support students during and after sessions to clarify doubts and assist with projects. Stay updated with the latest cybersecurity trends, tools, and techniques. Prepare students for industry-recognized certifications (CEH, CompTIA Security+, OSCP, etc.). Evaluate student performance and provide constructive feedback. Coordinate with academic or corporate teams for scheduling and curriculum alignment. Key Topics to Cover: Ethical Hacking Fundamentals Footprinting and Reconnaissance Scanning Networks & Vulnerability Assessment System Hacking & Privilege Escalation Web Application Attacks (SQLi, XSS, CSRF) Wireless Network Security Malware Analysis Basics Social Engineering Techniques Security Tools: Nmap, Metasploit, Burp Suite, Wireshark, etc. Linux for Hackers Incident Response & Digital Forensics (optional) Requirements: Bachelor's degree in Computer Science, IT, Cybersecurity, or related field. 3–5 years of experience in cybersecurity, penetration testing, or a related role. Proven experience in teaching or training is highly desirable. Industry certifications (any of the following): CEH, OSCP, CompTIA Security+, CISSP, etc. Excellent communication, presentation, and mentoring skills. Strong knowledge of ethical hacking methodologies and tools. Preferred Qualifications: Experience with learning management systems (LMS). Ability to teach both beginner and advanced learners. Experience with live capture-the-flag (CTF) environments or lab simulations. Prior experience with EdTech or bootcamp-style training. Benefits: Competitive salary Access to premium cybersecurity tools and labs Opportunities to attend global cybersecurity conferences Flexible work environment (remote or hybrid options) Career growth opportunities in education and security leadership Interested Candidates Kindly Share your Mail on 8879505005 or Mail to hr@dcodetech.in Job Types: Full-time, Contractual / Temporary, Freelance Contract length: 24 months Pay: ₹25,000.00 - ₹40,000.00 per month Schedule: Morning shift Education: Bachelor's (Preferred) Experience: Cybersecurity: 3 years (Preferred) Language: English (Preferred) Work Location: In person Application Deadline: 10/06/2025 Expected Start Date: 02/06/2025

Posted 2 weeks ago

Apply

130.0 years

0 Lacs

Pune

On-site

GlassDoor logo

About Northern Trust: Northern Trust, a Fortune 500 company, is a globally recognized, award-winning financial institution that has been in continuous operation since 1889. Northern Trust is proud to provide innovative financial services and guidance to the world’s most successful individuals, families, and institutions by remaining true to our enduring principles of service, expertise, and integrity. With more than 130 years of financial experience and over 22,000 partners, we serve the world’s most sophisticated clients using leading technology and exceptional service. Responsibilities - Continuously monitor, detect & respond to security incident in real-time. Provide recommendations and steps for eradication of threats and system recovery. Assists in the incident response function with the analysis of malware and related security incidents as required. Provides recommendations for defining rules and malware signatures for enhanced detection and mitigation based on analysis. Develop new tools or enhance existing tools for advanced detection. Actively undertake personal development through enhancement of technical skills and actively participate in the performance management process. Research and understand emerging threats to increase knowledge base of the evolving threat landscape.  Ensure compliance with security policies and regulations. Collaborate with different technology team to communicate security incidents and risks to stakeholders. Always ensure the security and integrity of the organization information system and data. Qualification & Experience - Bachelor’s degree in computer science or other IT related field. Minimum of 5+ years of experience working in an information security monitoring & response role in a large, complex environment. CompTia Security+, GSEC or any other Cyber Security certification. Solid understanding of the Cyber Incident Response Process & Life Cycle. Intermediate knowledge of security monitoring tools such as SIEM, IDS/IPS, EDR/XDR, email security solutions, powershell/python, basic networking concepts. Self-motivated, proactive and able to work independently. Strong communication, analytical and technical skills. Working experience with different type of operation system like Windows, Linux & MacOS Working with Us: As a Northern Trust partner, greater achievements await. You will be part of a flexible and collaborative work culture in an organization where financial strength and stability is an asset that emboldens us to explore new ideas. Movement within the organization is encouraged, senior leaders are accessible, and you can take pride in working for a company committed to assisting the communities we serve! Join a workplace with a greater purpose. We’d love to learn more about how your interests and experience could be a fit with one of the world’s most admired and sustainable companies! Build your career with us and apply today. #MadeForGreater Reasonable accommodation Northern Trust is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation for any part of the employment process, please email our HR Service Center at MyHRHelp@ntrs.com . We hope you’re excited about the role and the opportunity to work with us. We value an inclusive workplace and understand flexibility means different things to different people. Apply today and talk to us about your flexible working requirements and together we can achieve greater.

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Noida

On-site

GlassDoor logo

Job Description: Essential Job Functions: Provide technical support in infrastructure services, responding to issues and assisting in tasks. Contribute to infrastructure projects and tasks under supervision. Participate in the monitoring and basic troubleshooting of infrastructure systems. Work with the team to address infrastructure-related challenges and meet departmental needs. Support the development of infrastructure documentation, including incident logs and records. Continue to develop and enhance technical skills. Apply problem-solving abilities to address infrastructure issues. Follow established best practices and standards in infrastructure service delivery. Basic Qualifications: Bachelor's degree in a relevant field or equivalent combination of education and experience Typically, 2+ years of relevant work experience Proven experience in infrastructure technology analysis Proficiencies in data analysis and problem-solving A continuous learner that stays abreast with industry knowledge and technology Other Qualifications: An advanced degree in a relevant field is a plus Relevant certifications, such as CompTIA Security+, Cisco CCENT, or AWS Certified Solutions Architect, are a plus Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Position Summary... What you'll do... About Team: Marketplace Engineering team is at the forefront of building core platforms and services to enable Walmart to deliver vast selection at competitive prices and with best in class post-order experience by enabling third-party sellers to list, sell and manage their products to our customers on walmart.com. We do this by managing the entire seller lifecycle, monitoring customer experience, and delivering high- value insights to our sellers to help them plan their assortment, price, inventory. The team also actively collaborates with partner platform teams to ensure we continue to deliver the best experience to our sellers and our customers. This role will be focused on the Marketplace What you will do: As a Senior Software Engineer for Walmart, you'll have the opportunity to Apply and/or develop ML solutions to develop efficient and scalable models at Walmart scale. Through this role you have an opportunity to develop intuitive software that meets and exceeds the needs of the customer and the company. You also get to collaborate with team members to develop best practices and requirements for the software. In this role it would be important for you to professionally maintain all codes and create updates regularly to address the customers and companys concerns. You will show your skills in analysing and testing programs/products before formal launch to ensure flawless performance. Troubleshooting coding problems quickly and efficiently will offer you a chance to grow your skills in a high-pace, high-impact environment. Software security is of prime importance and by developing programs that monitor sharing of private information, you will be able to add tremendous credibility to your work. You will also be required to seek ways to improve the software and its effectiveness. Adhere to Company policies, procedures, mission, values, and standards of ethics and integrity What you will bring: B.E./B. Tech/MS/MCA in Computer Science or related technical field. 5+ years of object-oriented programming experience in Java. Excellent computer systems fundamentals, DS/Algorithms and problem solving skills Hands-on experience in building web based J2EE services/applications and Kafka, Apache Camel, RESTful Web-Services, Spring, Hibernate, Splunk, Caching. Experience in systems design and distributed systems. Excellent organisation, communication and interpersonal skills Exposure to SQL/NoSQL data stores like Cassandra, Elastic, Mongo etc. Large scale distributed services experience, including scalability and fault tolerance. Exposure to cloud infrastructure, such as Open Stack, Azure, GCP, or AWS Exposure to build, CI/CD ; deployment pipelines and related technologies like Kubernetes, Docker, Jenkins etc. A continuous drive to explore, improve, enhance, automate and optimize systems and tools. About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. Thats what we do at Walmart Global Tech. Were a team of software engineers, data scientists, cybersecurity experts and service professionals within the worlds leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Belonging We aim to create a culture where every associate feels valued for who they are, rooted in respect for the individual. Our goal is to foster a sense of belonging, to create opportunities for all our associates, customers and suppliers, and to be a Walmart for everyone. At Walmart, our vision is "everyone included." By fostering a workplace culture where everyone isand feelsincluded, everyone wins. Our associates and customers reflect the makeup of all 19 countries where we operate. By making Walmart a welcoming place where all people feel like they belong, were able to engage associates, strengthen our business, improve our ability to serve customers, and support the communities where we operate. Equal Opportunity Employer Walmart, Inc., is an Equal Opportunities Employer By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing unique styles, experiences, identities, ideas and opinions while being welcoming of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 3years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 5 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, GISF, CISSP, CCSP, or GSEC, Master’s degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 1 year’s experience leading information security or cybersecurity projects Information Technology - CISCO Certification - Certification Primary Location... 4,5,6, 7 Floor, Building 10, Sez, Cessna Business Park, Kadubeesanahalli Village, Varthur Hobli , India R-2146498 Show more Show less

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Position Summary... What you'll do... About Team: Marketplace Engineering team is at the forefront of building core platforms and services to enable Walmart to deliver vast selection at competitive prices and with best in class post-order experience by enabling third-party sellers to list, sell and manage their products to our customers on walmart.com. We do this by managing the entire seller lifecycle, monitoring customer experience, and delivering high- value insights to our sellers to help them plan their assortment, price, inventory. The team also actively collaborates with partner platform teams to ensure we continue to deliver the best experience to our sellers and our customers. This role will be focused on the Marketplace What you will do: As a Senior Software Engineer for Walmart, you'll have the opportunity to Apply and/or develop ML solutions to develop efficient and scalable models at Walmart scale. Through this role you have an opportunity to develop intuitive software that meets and exceeds the needs of the customer and the company. You also get to collaborate with team members to develop best practices and requirements for the software. In this role it would be important for you to professionally maintain all codes and create updates regularly to address the customers and companys concerns. You will show your skills in analysing and testing programs/products before formal launch to ensure flawless performance. Troubleshooting coding problems quickly and efficiently will offer you a chance to grow your skills in a high-pace, high-impact environment. Software security is of prime importance and by developing programs that monitor sharing of private information, you will be able to add tremendous credibility to your work. You will also be required to seek ways to improve the software and its effectiveness. Adhere to Company policies, procedures, mission, values, and standards of ethics and integrity What you will bring: B.E./B. Tech/MS/MCA in Computer Science or related technical field. 5+ years of object-oriented programming experience in Java. Excellent computer systems fundamentals, DS/Algorithms and problem solving skills Hands-on experience in building web based J2EE services/applications and Kafka, Apache Camel, RESTful Web-Services, Spring, Hibernate, Splunk, Caching. Experience in systems design and distributed systems. Excellent organisation, communication and interpersonal skills Exposure to SQL/NoSQL data stores like Cassandra, Elastic, Mongo etc. Large scale distributed services experience, including scalability and fault tolerance. Exposure to cloud infrastructure, such as Open Stack, Azure, GCP, or AWS Exposure to build, CI/CD ; deployment pipelines and related technologies like Kubernetes, Docker, Jenkins etc. A continuous drive to explore, improve, enhance, automate and optimize systems and tools. About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. Thats what we do at Walmart Global Tech. Were a team of software engineers, data scientists, cybersecurity experts and service professionals within the worlds leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Belonging We aim to create a culture where every associate feels valued for who they are, rooted in respect for the individual. Our goal is to foster a sense of belonging, to create opportunities for all our associates, customers and suppliers, and to be a Walmart for everyone. At Walmart, our vision is "everyone included." By fostering a workplace culture where everyone isand feelsincluded, everyone wins. Our associates and customers reflect the makeup of all 19 countries where we operate. By making Walmart a welcoming place where all people feel like they belong, were able to engage associates, strengthen our business, improve our ability to serve customers, and support the communities where we operate. Equal Opportunity Employer Walmart, Inc., is an Equal Opportunities Employer By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing unique styles, experiences, identities, ideas and opinions while being welcoming of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 3years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 5 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, GISF, CISSP, CCSP, or GSEC, Master’s degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 1 year’s experience leading information security or cybersecurity projects Information Technology - CISCO Certification - Certification Primary Location... 4,5,6, 7 Floor, Building 10, Sez, Cessna Business Park, Kadubeesanahalli Village, Varthur Hobli , India R-2146485 Show more Show less

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Overview Experience:3-5 Years Location Hyderabad Analyst, Security Operations About Omnicom Global Solutions Omnicom Global Solutions is an integral part of Omnicom Group, a leading global marketing and corporate communications company. Omnicom’s branded networks and numerous specialty firms provide advertising, strategic media planning and buying, digital and interactive marketing, direct and promotional marketing, public relations, and other specialty communications services to over 5,000 clients in more than 70 countries. OGS India plays a critical role for our group companies and global agencies by providing stellar products, solutions, and services across Creative Services, Technology, Marketing Science (Data & Analytics), Advanced Analytics, Market Research, Business Support Services, Media Services, and Project Management. With over 4000 talented colleagues in India, we are growing rapidly and are looking for professionals like you to help build the next chapter of our journey. Responsibilities Role Overview We have an exciting opportunity for an Analyst, Security Operations at our Hyderabad office. This role is responsible for maintaining the confidentiality, integrity, and availability of personal information and company assets, ensuring compliance with Omnicom’s internal policies and standards. The Analyst will support the tools, technologies, and operational architecture that monitor and protect Omnicom’s physical and digital environments. This role plays a vital part in defending the organization’s infrastructure and data by executing daily operational security tasks and contributing to long-term strategic security initiatives. Key Responsibilities Manage and support cybersecurity tools and software that protect Omnicom’s digital and physical environments. Operate and maintain controls such as Web Access Firewall (WAF), Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Cloud Firewall (CFW), Endpoint Detection & Response (EDR), and Security Information and Event Management (SIEM) systems. Deploy and maintain software agents and intermediate nodes to facilitate secure operations across cloud and on-premises environments. Collaborate across internal Omnicom teams as well as with external support, accounting, and engineering teams from trusted security partners. Monitor environments for security threats and respond in accordance with incident response protocols. Support ongoing security posture improvement initiatives and assist in risk mitigation efforts. Qualifications Required Qualifications 3-5 years of experience in security operations, cybersecurity, or IT infrastructure. Working knowledge of security platforms such as WAF, CASB, ZTNA, CFW, EDR, and SIEM tools. Familiarity with incident detection, triage, and response processes. Experience in agent deployment and system integration for enterprise-wide security tools. Strong analytical and problem-solving skills with a proactive security mindset. Ability to coordinate across teams and manage third-party security service providers. Excellent communication skills and a detail-oriented approach to operational tasks. Preferred Qualifications Security certifications such as CompTIA Security+, GIAC, or equivalent. Experience with cloud security frameworks and zero trust architecture. Exposure to regulatory compliance environments (e.g., GDPR, HIPAA, ISO 27001). Show more Show less

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Introduction At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you've never thought possible. Are you ready to lead in this new era of technology and solve some of the world's most challenging problems? If so, lets talk. Your Role And Responsibilities We are looking for a skilled Network Security Analyst with 2-3 years of hands-on experience in managing and securing enterprise networks, with a strong emphasis on Guardicore Solutions. The ideal candidate will play a key role in monitoring, configuring, and supporting security tools and processes to ensure robust protection of network and endpoint environments. Monitor and manage firewalls, IDS/IPS, and network security tools to ensure optimal operation and protection. Assist in configuring and troubleshooting firewall rules, VPNs, and security policies. Conduct basic security monitoring, analyze logs, and escalate incidents as appropriate. Support network security assessments by identifying potential threats and vulnerabilities. Assist in incident handling by investigating alerts, identifying root causes, and responding to threats. Collaborate with IT teams to ensure network security best practices are implemented and maintained. Support and maintain endpoint security solutions including antivirus, EDR (Endpoint Detection and Response), and patch management tools. Maintain documentation for network security configurations, incident reports, and resolution steps. Monitor and manage firewalls, IDS/IPS, and working of network security tools . Assist in configuring and troubleshooting firewall rules, VPNs, and security policies. Conduct basic security monitoring, review logs, and escalate incidents as needed. Support network security assessments by identifying threats and vulnerabilities. Assist in handling security incidents, investigating alerts, and responding to threats. Work with the IT team to ensure network security best practices are followed. Support endpoint security solutions such as antivirus, EDR, and patch management. Document network security configurations, incidents, and resolutions. Preferred Education Master's Degree Required Technical And Professional Expertise 2 to 3 years of hands-on experience working with Guardicore Solution (now Akamai Guardicore Segmentation), including implementation, policy management, and monitoring. Strong knowledge of firewalls, VPNs, IDS/IPS, and network access controls. Familiarity with network protocols, routing, and segmentation. Experience with endpoint protection platforms and security patching practices. Understanding of incident response procedures and threat mitigation strategies. Good troubleshooting skills and attention to detail. Strong communicationn skills to collaborate across teams and document technical processes. Preferred Technical And Professional Experience One or more security certifications. (CEH, Security+, GSEC, GCIH, etc). High level of systems security compliance and provide technical mentorship and support to L1-L2 engineers Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work Intuitive individual with an ability to manage change and proven time management Proven interpersonal skills while contributing to team effort by accomplishing related results as needed Up-to-date technical knowledge by attending educational workshops, reviewing publications Show more Show less

Posted 2 weeks ago

Apply

130.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Northern Trust Northern Trust, a Fortune 500 company, is a globally recognized, award-winning financial institution that has been in continuous operation since 1889. Northern Trust is proud to provide innovative financial services and guidance to the world’s most successful individuals, families, and institutions by remaining true to our enduring principles of service, expertise, and integrity. With more than 130 years of financial experience and over 22,000 partners, we serve the world’s most sophisticated clients using leading technology and exceptional service. Responsibilities - Continuously monitor, detect & respond to security incident in real-time. Provide recommendations and steps for eradication of threats and system recovery. Assists in the incident response function with the analysis of malware and related security incidents as required. Provides recommendations for defining rules and malware signatures for enhanced detection and mitigation based on analysis. Develop new tools or enhance existing tools for advanced detection. Actively undertake personal development through enhancement of technical skills and actively participate in the performance management process. Research and understand emerging threats to increase knowledge base of the evolving threat landscape. Ensure compliance with security policies and regulations. Collaborate with different technology team to communicate security incidents and risks to stakeholders. Always ensure the security and integrity of the organization information system and data. Qualifications And Experience - Bachelor’s degree in Computer Science or other IT related field. Minimum of 5+ years of experience working in an information security monitoring & response role in a large, complex environment. CompTia Security+, GSEC or any other Cyber Security certification. Solid understanding of the Cyber Incident Response Process & Life Cycle. Intermediate knowledge of security monitoring tools such as SIEM, IDS/IPS, EDR/XDR, email security solutions, powershell/python, basic networking concepts. Self-motivated, proactive and able to work independently. Strong communication, analytical and technical skills. Working experience with different type of operation system like Windows, Linux & MacOS Working With Us As a Northern Trust partner, greater achievements await. You will be part of a flexible and collaborative work culture in an organization where financial strength and stability is an asset that emboldens us to explore new ideas. Movement within the organization is encouraged, senior leaders are accessible, and you can take pride in working for a company committed to assisting the communities we serve! Join a workplace with a greater purpose. We’d love to learn more about how your interests and experience could be a fit with one of the world’s most admired and sustainable companies! Build your career with us and apply today. #MadeForGreater Reasonable accommodation Northern Trust is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation for any part of the employment process, please email our HR Service Center at MyHRHelp@ntrs.com. We hope you’re excited about the role and the opportunity to work with us. We value an inclusive workplace and understand flexibility means different things to different people. Apply today and talk to us about your flexible working requirements and together we can achieve greater. Show more Show less

Posted 2 weeks ago

Apply

130.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Northern Trust Northern Trust, a Fortune 500 company, is a globally recognized, award-winning financial institution that has been in continuous operation since 1889. Northern Trust is proud to provide innovative financial services and guidance to the world’s most successful individuals, families, and institutions by remaining true to our enduring principles of service, expertise, and integrity. With more than 130 years of financial experience and over 22,000 partners, we serve the world’s most sophisticated clients using leading technology and exceptional service. Responsibilities - Continuously monitor, detect & respond to security incident in real-time. Provide recommendations and steps for eradication of threats and system recovery. Assists in the incident response function with the analysis of malware and related security incidents as required. Provides recommendations for defining rules and malware signatures for enhanced detection and mitigation based on analysis. Develop new tools or enhance existing tools for advanced detection. Actively undertake personal development through enhancement of technical skills and actively participate in the performance management process. Research and understand emerging threats to increase knowledge base of the evolving threat landscape.  Ensure compliance with security policies and regulations. Collaborate with different technology team to communicate security incidents and risks to stakeholders. Always ensure the security and integrity of the organization information system and data. Qualification & Experience - Bachelor’s degree in computer science or other IT related field. Minimum of 5+ years of experience working in an information security monitoring & response role in a large, complex environment. CompTia Security+, GSEC or any other Cyber Security certification. Solid understanding of the Cyber Incident Response Process & Life Cycle. Intermediate knowledge of security monitoring tools such as SIEM, IDS/IPS, EDR/XDR, email security solutions, powershell/python, basic networking concepts. Self-motivated, proactive and able to work independently. Strong communication, analytical and technical skills. Working experience with different type of operation system like Windows, Linux & MacOS Working With Us As a Northern Trust partner, greater achievements await. You will be part of a flexible and collaborative work culture in an organization where financial strength and stability is an asset that emboldens us to explore new ideas. Movement within the organization is encouraged, senior leaders are accessible, and you can take pride in working for a company committed to assisting the communities we serve! Join a workplace with a greater purpose. We’d love to learn more about how your interests and experience could be a fit with one of the world’s most admired and sustainable companies! Build your career with us and apply today. #MadeForGreater Reasonable accommodation Northern Trust is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation for any part of the employment process, please email our HR Service Center at MyHRHelp@ntrs.com. We hope you’re excited about the role and the opportunity to work with us. We value an inclusive workplace and understand flexibility means different things to different people. Apply today and talk to us about your flexible working requirements and together we can achieve greater. Show more Show less

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. About The Role We are seeking a skilled and passionate Red Team Security Consultant to join our cybersecurity team. The ideal candidate will specialize in simulating adversarial tactics, techniques, and procedures (TTPs) to identify vulnerabilities and improve the organization's security posture. This role involves performing advanced penetration tests, simulating real-world attacks, and working with teams to implement effective remediation strategies Key Responsibilities Plan, execute, and document Red Team exercises mimicking advanced threat actors for medium to large enterprises. Conduct network penetration testing (VAPT), system vulnerability assessments, and security configuration reviews. Perform manual security assessments for web applications, APIs, and client-server applications. Simulate sophisticated attack chains including lateral movement, privilege escalation, and data exfiltration. Develop and execute custom attack payloads using tools and scripts. Assess physical security controls and implement social engineering assessments when required. Create and maintain custom tools/scripts in languages like Python, Bash, or PowerShell. Utilize and adapt adversary emulation frameworks such as MITRE ATT&CK, Cobalt Strike, and Metasploit. Collaborate with Blue Teams to improve detection and response mechanisms through Purple Team engagements. Basic Qualifications Education: BE/B. Tech/ MCA/ M. Sc. (IT/Computers) Experience: Required: 2 - 5 years. Excellent communication and collaboration skills. Preferred Qualifications Preferred Certifications: OSCP, OSCE, CRTP, eWPTX, Security+, CREST, CRTO. Desired Skill Set: Red Teaming, VAPT, Application Security (Web/Mobile/API). 2-5 years of relevant domain experience in VAPT, Red Teaming, and Application Security domains. Proficient in Application Security concepts, including OWASP Top 10 and OSSTMM. Experience with vulnerability scanning tools such as BurpSuite Pro, Nessus, OWASP ZAP, Kali Linux, Cobalt Strike, Caldera etc. Basic ability to write automation scripts (Bash or Python). Understanding of threat modeling and secure coding practices. Strong understanding of TTPs, threat modeling, and secure coding practices. Hands-on experience in Active Directory exploitation, phishing campaigns, and endpoint bypass techniques.‍ Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. About The Role We are seeking a highly skilled Security Analyst (Level 2) to join our MSSP SOC team. The ideal candidate will have expertise in SIEM (Splunk, QRadar), XDR/EDR solutions, and security analysis with hands-on experience in investigating and responding to security alerts. This role requires proficiency in reviewing and analyzing Level 1 alerts, providing detailed recommendations, and engaging with customers for incident handling. The candidate should also have basic SIEM administration knowledge and Python scripting skills for troubleshooting and playbook development. Key Responsibilities Threat Detection & Response: Analyze and investigate security alerts, events, and incidents generated by SIEM, XDR, and EDR solutions. Incident Investigation & Handling: Conduct in-depth security incident investigations, assess impact, and take appropriate actions. Incident Escalation & Communication: Escalate critical incidents to Level 3 analysts or senior security teams while maintaining detailed documentation. Content Management: Develop and fine-tune correlation rules, use cases, and alerts in SIEM/XDR platforms to improve detection accuracy. Malware Analysis: Perform basic malware analysis and forensic investigation to assess threats. Customer Request Handling: Collaborate with customers to address security concerns, provide recommendations, and respond to inquiries. SIEM Administration: Assist in the administration and maintenance of SIEM tools like Splunk or QRadar, ensuring smooth operations. Automation & Playbooks: Utilize Python scripting for automation, troubleshooting, and playbook development to enhance SOC efficiency. Reporting & Documentation: Prepare detailed reports on security incidents, trends, and mitigation strategies. Basic Qualifications B.E/B. Tech degree in computer science, Information Technology, Masters in Cybersecurity 3+ years of experience in a SOC or cybersecurity operations role. Strong knowledge of SIEM tools (Splunk, QRadar) and XDR/EDR solutions. Hands-on experience in threat detection, security monitoring, and incident response. Knowledge of network security, intrusion detection, malware analysis, and forensics. Basic experience in SIEM administration (log ingestion, rule creation, dashboard management). Proficiency in Python scripting for automation and playbook development. Good understanding of MITRE ATT&CK framework, security frameworks (NIST, ISO 27001), and threat intelligence. Strong analytical, problem-solving, and communication skills. Ability to work in a 24x7 SOC environment (if applicable) Preferred Qualifications Certified SOC Analyst (CSA) Certified Incident Handler (GCIH, ECIH) Splunk Certified Admin / QRadar Certified Analyst CompTIA Security+ / CEH / CISSP (preferred but not mandatory Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

We are the leading provider of professional services to the middle market globally, our purpose is to instill confidence in a world of change, empowering our clients and people to realize their full potential. Our exceptional people are the key to our unrivaled, inclusive culture and talent experience and our ability to be compelling to our clients. You’ll find an environment that inspires and empowers you to thrive both personally and professionally. There’s no one like you and that’s why there’s nowhere like RSM. Under the direction of the Security Administration Manager, the Security Administration Engineer will manage and administer security technologies and provide security management services, requirements, direction, and support. The Security Administration Engineer is responsible for the quality control within the Security infrastructure and tools. This includes building and defending scalable, secure, and robust systems; defining security requirements for operational systems and networks; helping the organization understand advanced cyber threats; and helping to create strategies to protect networks. This role will be responsible for execution of the vulnerability management program and assist the Security Administration Manager with improving processes and reducing the time remediate vulnerabilities. This leader must be current and keep current with changing technology, industry best practices, and standard security frameworks. Assign remediation tasks and assist application owners and remediation teams by providing vulnerability analysis and remediation prioritization. Maintain the vulnerability scanning infrastructure, scan schedules, and risk scoring adjustments Participates in direct support of security systems and tools, including installation, configuration, security, and maintenance. Implements upgrades, enhancements, and fixes following established change management procedures. Maintains security tool disaster recovery and DEV/Test environments. Execute and improve vulnerability management processes (vulnerability scanning, remediation, exceptions, etc.) and maintain process documentation. Participates as a technical lead in the execution of the security program roadmap across the enterprise by providing expert guidance and solutions engineering services as part of initiatives and day-to-day operations. Stays current with emerging identity technologies, solutions and best practices. Advises Security Administration Manager on related risk and security posture. Performs troubleshooting and remediation of security tool issues. Participates in scheduled and unscheduled after-hours system maintenance and support. Performs rotational on-call duty. Provides implementation assistance for onboarding new security tools and processes. Updates team training documentation, technical processes, and testing plans. EDUCATION/CERTIFICATIONS Preferred: CompTIA Security+ Technical/Soft Skills Required: Thorough understanding of vulnerability management concepts and processes. Demonstrates strong problem solving, analytical, interpersonal and ownership skills. Proficiency with cloud, hybrid cloud, and on-prem Security Administration models. Thorough understanding of security protocols/methodologies and controls. Preferred: Knowledge of all aspects of the software development lifecycle Knowledge of web development technologies Experience Preferred: Microsoft Defender – Endpoint Vulnerability Management Delinea Privilege Manager 2+ years of experience in an information security role Leadership Skills Required: Strong leadership skills and the ability to work effectively with business managers, Enterprise Architecture, IT engineering and IT operations staff. Ability to break down technically complex and ambiguous concepts and rationalize into simple concepts and ideas. Ability to understand and articulate business imperatives as well as the business impact of security tools, technologies and policies. Ability to mentor and provide coaching to team members At RSM, we offer a competitive benefits and compensation package for all our people. We offer flexibility in your schedule, empowering you to balance life’s demands, while also maintaining your ability to serve clients. Learn more about our total rewards at https://rsmus.com/careers/india.html. RSM does not tolerate discrimination and/or harassment based on race; colour; creed; sincerely held religious beliefs, practices or observances; sex (including pregnancy or disabilities related to nursing); gender (including gender identity and/or gender expression); sexual orientation; HIV Status; national origin; ancestry; familial or marital status; age; physical or mental disability; citizenship; political affiliation; medical condition (including family and medical leave); domestic violence victim status; past, current or prospective service in the Indian Armed Forces; Indian Armed Forces Veterans, and Indian Armed Forces Personnel status; pre-disposing genetic characteristics or any other characteristic protected under applicable provincial employment legislation. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process and/or employment/partnership. RSM is committed to providing equal opportunity and reasonable accommodation for people with disabilities. If you require a reasonable accommodation to complete an application, interview, or otherwise participate in the recruiting process, please send us an email at careers@rsmus.com. Show more Show less

Posted 2 weeks ago

Apply

15.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

About Client: Our Client is a global IT services company headquartered in Southborough, Massachusetts, USA. Founded in 1996, with a revenue of $1.8B, with 35,000+ associates worldwide, specializes in digital engineering, and IT services company helping clients modernize their technology infrastructure, adopt cloud and AI solutions, and accelerate innovation. It partners with major firms in banking, healthcare, telecom, and media. Our Client is known for combining deep industry expertise with agile development practices, enabling scalable and cost-effective digital transformation. The company operates in over 50 locations across more than 25 countries, has delivery centers in Asia, Europe, and North America and is backed by Baring Private Equity Asia. Job Title: IAM Project Manager(Okta/Sailpoint/Saviynt IGA) Key Skills: IAM, Project Manager, Okta, Sailpoint Job Locations: Pan India Experience: 10 – 15 Years Budget: Based on Experience Education Qualification : Any Graduation Work Mode: Hybrid Employment Type: Contract Notice Period: Immediate - 15 Days Interview Mode: 2 Rounds of Technical Interview + Including Client round Job Description: Minimum of 10 years of progressive experience within the Identity & Access Management (IAM) domain. At least 8 years of experience in supporting and contributing to IAM transformation projects. Minimum of 2 years of proven experience in managing and leading a technical team. Strong hands-on experience with at least one leading Identity Governance and Administration (IGA) product such as SailPoint, Saviynt, Okta, or Oracle Identity Manager (OIM). Broad understanding and practical knowledge of Privileged Access Management (PAM) and Access Management (AM) principles and technologies. Development experience or scripting skills are considered a significant plus. Relevant cybersecurity certifications (e.g., CISSP, CISM, Security+) are a plus. Demonstrated experience in defining and effectively managing operational metrics, SLAs, comprehensive documentation, and insightful reporting. Excellent problem-solving, analytical, and communication skills. Strong stakeholder management and interpersonal skills. Ability to work independently and as part of a global team Interested Candidates please share your CV t o vamsi.v@people-prime.com Show more Show less

Posted 2 weeks ago

Apply

4.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Join Amgen’s Mission of Serving Patients At Amgen, if you feel like you’re part of something bigger, it’s because you are. Our shared mission—to serve patients living with serious illnesses—drives all that we do. Since 1980, we’ve helped pioneer the world of biotech in our fight against the world’s toughest diseases. With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year. As a member of the Amgen team, you’ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you’ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. What You Will Do Let’s do this. Let’s change the world. In this vital role you will be an integral part in driving growth & innovation, improving efficiency and creating enterprise value – supporting our mission “To Serve Patients”. The Manager-Information Security will be responsible for the oversight and hands-on leadership of the Directory Services (AD and LDAP) team within the Digital Identity Access Services (DIAS) organization. This role involves developing, implementing, maintaining, and updating IAM strategies, policies and procedures to ensure the security and integrity of our systems and data. The ideal candidate will have extensive experience in Active Directory, Enterprise Unix LDAP and other Directory services. Candidate should have a deep understanding of security standard processes, and the ability to lead a team in a dynamic, global environment. Roles & Responsibilities: Manage Amgen's Internal and External PKI Technologies Manage External PKI vendors like Sectigo and Entrust Develop and maintain the Directory and LDAP standards and architecture, ensuring that it meets industry standards and best practices Assess and select IAM technologies and tools that align with Amgen’s IAM strategy Lead the information security team, providing guidance, support, and mentoring to ensure the effectiveness of security operations Develop and implement the IAM (Identity Access Management) strategy aligned with the organization's information security goals and regulatory requirements. Lead the design, implementation, and management of IAM solutions, including governance for Directory Services. Create, implement, and maintain IAM policies, standards, and procedures to manage user identities and access rights. Design and enforce access control mechanisms, including role-based access control (RBAC), to safeguard sensitive information. Manage IAM-related security incidents and vulnerabilities, coordinating with IT security teams to mitigate risks. Know the latest with industry trends, emerging threats, and standard methodologies in IAM. Collaborate with IT and security teams to integrate IAM solutions with other security and business systems. Develop and maintain key performance indicators (KPIs) to track service metrics and generate regular reports for management. Evaluate and implement IAM tools and technologies to enhance security and streamline processes. Participate in vendor proposals, contract negotiations, and support renewals. This role on occasion might have responsibilities outside of business hours. Travel: International and/or domestic travel up to 10% may be essential. What We Expect Of You We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Master’s degree with 4 to 6years of experience related field OR Bachelor’s degree with 6 to 8 years of experience in related field OR Diploma with 8 - 12 years of experience in related field. Preferred Qualifications: Must-Have Skills: Strong knowledge of Internal and External PKI (Public Key Infrastructure). Strong knowledge of Directory Services and LDAP Services. Solid understanding of Active Directory Domain structure and security, Windows Operating Systems and Domain Controllers, Azure AD and Microsoft Entra ID. Strong knowledge of LDAP directories and managing LDAP Structure. Knowledge of LDAP Schema and configuration changes. Create and modify Shell Scripts for bulk LDAP operations. Creation and implementation of LDAP Business Continuity plans. Familiarity with security standards and regulations (e.g., NIST, ISO). Experience with Authentication, Provisioning/De-provisioning, Role Management, Session Management and Directory Services. Experience in driving transformation initiatives using Scaled Agile methodology. Excellent verbal and written communication skills for technical and non-technical audiences of various levels in the organization. Good-to-Have Skills: Work experience in the biotechnology or pharmaceutical industry. Degree in Computer Science, Information Systems, or Engineering. Familiarity with GxP standards, Information Security standards and policies like ISO 27001/27002, NIST and others. Strong problem-solving and analytical skills. Demonstrated ability to work effectively in a fast-paced, dynamic environment. Understanding of ITIL processes and implementation. Proficiency in scripting and automation (e.g., Python, Bash) is a plus Professional Certifications CompTIA Security+ (preferred) Cloud Identity or Security Certification (preferred) Microsoft Azure Certification (preferred) Soft Skills: Excellent analytical and troubleshooting skills. Strong verbal and written communication skills. Ability to work effectively with global, virtual teams . High degree of initiative and self-motivation. Ability to manage multiple priorities successfully. Team oriented, with a focus on achieving team goals. Strong presentation and public speaking skills. What You Can Expect Of Us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now and make a lasting impact with the Amgen team. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Show more Show less

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Greater Bengaluru Area

On-site

Linkedin logo

Redefine the future of customer experiences. One conversation at a time. We’re changing the game with a first-of-its-kind, conversation-centric platform that unifies team collaboration and customer experience in one place. Powered by AI, built by amazing humans. Our culture is forward-thinking, customer-obsessed and built on an unwavering belief that connection fuels business and life; connections to our customers with our signature Amazing Service®, our products and services, and most importantly, each other. Since 2008, 100,000+ companies and 1M+ users rely on Nextiva for customer and team communication. If you’re ready to collaborate and create with amazing people, let your personality shine and be on the frontlines of helping businesses deliver amazing experiences, you’re in the right place. Build Amazing - Deliver Amazing - Live Amazing - Be Amazing The AI Security and Compliance Engineer is responsible for working with development and compliance teams to ensure secure and compliant AI development throughout the product lifecycle. The engineer applies knowledge of AI and application security risks and threats to design and implement appropriate, cost-effective security controls during development, deployment, and operation of AI based applications. The engineer defines and promotes the implementation guidelines for data classification, segregation, and access controls to AI model inputs and training data to ensure data confidentiality and privacy for different data sources and user groups. The engineer performs audits and vulnerability assessments, penetration testing and supports mitigation of findings. Key Responsibilities Ensure AI products have security and privacy by design. Establish and document policies and guidelines for data classification and data used for training to prevent leaks of sensitive data. Work with development and compliance teams to ensure secure and compliant AI development throughout the product lifecycle to meet customer, regulatory, and contractual obligations. Monitor and audit AI systems and development processes for compliance with policies, regulations and contractual obligations. Monitor and respond to security incidents involving AI systems. Create AI-specific incident management procedures to address AI related security incidents. Enhance the resilience of AI systems against potential threats by implementing cyber security best practices, controls, and tools to protect AI models from threats such as those in the OWASP AI Top Ten, including supply chain and model poisoning threats and attempts to access, modify, and exfiltrate confidential information via the query interface. Establish policies and guidelines for access controls, limitations and guardrails on usage and prompts for AI inputs and API’s. Ensure proper access controls on API’s and processing pipelines, and segregation of data. Create, update, and maintain threat models for a wide variety of software projects. Provide AI security training for internal development teams. Maintain current knowledge of AI risks, threats, and AI testing tools and techniques. Perform other duties to support the technical and operational security of the organization as required. Qualifications Bachelor’s degree in an IT related field or equivalent experience and 2-5 years of experience in working in IT security, software development, or AI development. Desired certifications – one or more of the following: CISSP (Certified Information Systems Security Professional), Certified Information Security Manager (CISM), SSCP (Systems Security Certified Practitioner), CCSP (Certified Cloud Security Professional) or CompTIA Security+. Understanding of Application Security and Data Security for applications and AI, such as the OWASP Top 10 and the OWASP Top 10 for Generative AI. Proficiency in and strong working knowledge of AI technologies and models such as Llama and ChatGPT. Experience and understanding of threats and risks related to web applications and API’s, particularly with AI based applications. General knowledge of security implications of threats and vulnerabilities related to networks, servers, operating systems, applications, and databases. Experience with vulnerability management, patching, and mitigation assessment. Experience working within and implementing policies for a security framework such as ISO 27001 and NIST. Flexibility to work off-hours to support global project teams and maintenance windows. Ability to support 24x7 on-call for incident response on a rotating basis. Experience developing software, scripting and using SQL queries to automate controls, processes and reporting. Competencies Strong analytical problem-solving skills and attention to detail. Organization, Time Management & Prioritization - Self-starter that focuses on key priorities; plans, organizes, schedules and executes on tasks and projects in an efficient and productive manner. Ability to form productive relationships across the organization to accomplish information security objectives. Ability and willingness to learn all aspects of the information security field. Professional verbal and written communication skills in English. Expresses ideas using clear, effective and efficient language. Listens patiently and attentively. Adapts to the purpose of the communication with appropriate style, substance, detail, confidence and channel. Possess the ability to manage multiple channels of communication simultaneously; phone, email, tickets, and chat. Able to assess, document, and prioritize identified security flaws and vulnerabilities based on risk. Total Rewards Our Total Rewards offerings are designed to allow our employees to take care of themselves and their families so they can be their best, in and out of the office. Our compensation packages are tailored to each role and candidate's qualifications. We consider a wide range of factors, including skills, experience, training, and certifications, when determining compensation. We aim to offer competitive salaries or wages that reflect the value you bring to our team. Depending on the position, compensation may include base salary and/or hourly wages, incentives, or bonuses. Medical 🩺 - Medical insurance coverage is available for employees, their spouse, and up to two dependent children with a limit of 500,000 INR, as well as their parents or in-laws for up to 300,000 INR. This comprehensive coverage ensures that essential healthcare needs are met for the entire family unit, providing peace of mind and security in times of medical necessity. Group Term & Group Personal Accident Insurance 💼 - Provides insurance coverage against the risk of death / injury during the policy period sustained due to an accident caused by violent, visible & external means. Coverage Type - Employee Only Sum Insured - 3 times of annual CTC with minimum cap of INR 10,00,000 Free Cover Limit - 1.5 Crore Work-Life Balance ⚖️ - 15 days of Privilege leaves per calendar year, 6 days of Paid Sick leave per calendar year, 6 days of Casual leave per calendar year. Paid 26 weeks of Maternity leaves, 1 week of Paternity leave, a day off on your Birthday, and paid holidays Financial Security💰 - Provident Fund & Gratuity Wellness 🤸‍ - Employee Assistance Program and comprehensive wellness initiatives Growth 🌱 - Access to ongoing learning and development opportunities and career advancement At Nextiva, we're committed to supporting our employees' health, well-being, and professional growth. Join us and build a rewarding career! Established in 2008 and headquartered in Scottsdale, Arizona, Nextiva secured $200M from Goldman Sachs in late 2021, valuing the company at $2.7B.To check out what’s going on at Nextiva, check us out on Instagram, Instagram (MX), YouTube, LinkedIn, and the Nextiva blog. Show more Show less

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Saviynt is an identity authority platform built to power and protect the world at work. In a world of digital transformation, where organizations are faced with increasing cyber risk but cannot afford defensive measures to slow down progress, Saviynt’s Enterprise Identity Cloud gives customers unparalleled visibility, control and intelligence to better defend against threats while empowering users with right-time, right-level access to the digital technologies and tools they need to do their best work. We are seeking an experienced Java Developer to join our Saviynt Solutions Team. This role focuses on designing, developing, and implementing integrations between Saviynt’s Identity Governance and Administration (IGA) platform and various technology products. The ideal candidate will have 5-7 years of experience in product development and integration, with strong expertise in Core Java and Spring Framework. Candidates should have a solid understanding of security practices, including certificates, SSL communication, and secure coding. The role involves developing and presenting an integration framework to technology and integration partners, coaching their teams to build and extend Saviynt integrations. While knowledge of Saviynt and Identity Access Management (IAM) is a plus, candidates must be eager to learn and adapt to the identity and security landscape. You will collaborate with cross-functional teams to deliver secure, scalable, and innovative solutions that enhance the Saviynt ecosystem. WHAT YOU BRING Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent experience) 5-7 years of professional experience in Java development, with a strong focus on Core Java and Spring Framework (Spring Boot, Spring MVC, Spring Security, etc.) Strong knowledge of security practices, including certificate management, SSL/TLS communication, and secure coding principles Hands-on experience in building integrations with enterprise applications, APIs, and third-party systems (e.g., REST/SOAP APIs, OAuth, SAML, SPML) Experience developing products and integrations, ideally within enterprise software or security-related platforms Proficiency in database technologies (e.g., SQL, MySQL, PostgreSQL) and ORM frameworks (e.g., Hibernate) Excellent communication and presentation skills, with the ability to explain complex technical concepts to technology and integration partners and coach their teams Experience in developing and documenting integration frameworks for partner ecosystems Knowledge of software development lifecycle (SDLC) methodologies, including Agile/Scrum Strong problem-solving skills and the ability to work independently or in a collaborative team environment Eagerness to learn and adapt to the identity and security landscape, including IAM concepts and technologies Preferred Skills Knowledge of Saviynt’s IGA platform, including configuration, customization, and integration development, is a plus Familiarity with Identity Access Management (IAM) concepts, such as role-based access control (RBAC), single sign-on (SSO), and provisioning, is a plus Familiarity with cloud environments (AWS, Azure, or GCP) and developing secure, scalable applications in the cloud Knowledge of DevOps tools and practices, such as CI/CD pipelines, Docker, Kubernetes, or Jenkins Exposure to front-end technologies (e.g., HTML, CSS, JavaScript, Angular, or React) for full-stack development is a plus Certifications in Java, Spring, IAM platforms (e.g., Saviynt Certified Developer), or security (e.g., CISSP, CompTIA Security+) are a plus WHAT YOU WILL BE DOING Design, develop, and maintain integrations between Saviynt and external technology products, ensuring seamless connectivity and robust functionality Build and enhance custom solutions using Core Java and Spring Framework to meet client-specific requirements within the Saviynt platform Develop and maintain an integration framework for technology and integration partners to build and extend Saviynt integrations Present and explain the integration framework to partners, providing technical guidance and coaching to their teams as needed Implement security best practices, including certificate management, SSL/TLS communication, and secure coding to ensure robust application security Collaborate with product managers, architects, and stakeholders to identify integration needs and propose innovative solutions Explore opportunities to enhance the Saviynt framework, focusing on performance optimization, feature enhancements, and expanded integration capabilities Develop reusable, scalable, and secure code adhering to industry standards and best practices Troubleshoot and resolve integration and security issues, ensuring high availability and performance of solutions Participate in code reviews, testing, and documentation to maintain high-quality deliverables Stay updated on emerging trends in IAM, cloud integrations, Java development, and security practices, with a willingness to learn and share the identity and security landscape Work closely with the Saviynt Solutions Team to align development efforts with business objectives and client needs If required for this role, you will: - Complete security & privacy literacy and awareness training during onboarding and annually thereafter - Review (initially and annually thereafter), understand, and adhere to Information Security/Privacy Policies and Procedures such as (but not limited to): > Data Classification, Retention & Handling Policy > Incident Response Policy/Procedures > Business Continuity/Disaster Recovery Policy/Procedures > Mobile Device Policy > Account Management Policy > Access Control Policy > Personnel Security Policy > Privacy Policy Saviynt is an amazing place to work. We are a high-growth, Platform as a Service company focused on Identity Authority to power and protect the world at work. You will experience tremendous growth and learning opportunities through challenging yet rewarding work which directly impacts our customers, all within a welcoming and positive work environment. If you're resilient and enjoy working in a dynamic environment you belong with us! Saviynt is an equal opportunity employer and we welcome everyone to our team. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status. Show more Show less

Posted 2 weeks ago

Apply

2.0 years

4 - 6 Lacs

Bengaluru

On-site

GlassDoor logo

Job Description: Essential Job Functions: Provide technical support in infrastructure services, responding to issues and assisting in tasks. Contribute to infrastructure projects and tasks under supervision. Participate in the monitoring and basic troubleshooting of infrastructure systems. Work with the team to address infrastructure-related challenges and meet departmental needs. Support the development of infrastructure documentation, including incident logs and records. Continue to develop and enhance technical skills. Apply problem-solving abilities to address infrastructure issues. Follow established best practices and standards in infrastructure service delivery. Basic Qualifications: Bachelor's degree in a relevant field or equivalent combination of education and experience Typically, 2+ years of relevant work experience Proven experience in infrastructure technology analysis Proficiencies in data analysis and problem-solving A continuous learner that stays abreast with industry knowledge and technology Other Qualifications: An advanced degree in a relevant field is a plus Relevant certifications, such as CompTIA Security+, Cisco CCENT, or AWS Certified Solutions Architect, are a plus Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 2 weeks ago

Apply

Exploring Security+ Jobs in India

Security+ is a highly sought-after certification in the IT industry, especially in the field of cybersecurity. In India, the demand for security+ professionals is on the rise as companies focus on enhancing their security measures to protect sensitive data and prevent cyber attacks. Job seekers with security+ certification have a competitive edge in the job market and can explore various opportunities in this field.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Mumbai
  5. Delhi

These cities are known for their thriving IT industries and offer numerous job opportunities for security+ professionals.

Average Salary Range

The average salary range for security+ professionals in India varies based on experience and expertise. Entry-level positions may offer salaries ranging from INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 10-15 lakhs per annum.

Career Path

A typical career progression in the security+ field may include roles such as: - Junior Security Analyst - Security Consultant - Security Architect - Chief Information Security Officer

As professionals gain experience and expertise, they can move up the career ladder and take on more challenging and rewarding roles.

Related Skills

In addition to security+, professionals in this field are often expected to have skills in: - Network Security - Information Security Management - Penetration Testing - Risk Assessment - Incident Response

Having a combination of these skills can enhance job prospects and open up more opportunities in the cybersecurity domain.

Interview Questions

  • What is the difference between symmetric and asymmetric encryption? (medium)
  • Explain the concept of a firewall and its importance in network security. (basic)
  • How do you handle a security breach in an organization? (advanced)
  • What is the role of encryption in data security? (basic)
  • Can you explain the concept of zero-day vulnerability? (medium)
  • How would you secure a wireless network from potential threats? (medium)
  • Describe the steps involved in a security risk assessment. (advanced)
  • What are the common types of cyber attacks and how can they be prevented? (medium)
  • Explain the concept of multi-factor authentication. (basic)
  • How do you stay updated with the latest security trends and technologies? (basic)
  • What is the importance of regular security audits in an organization? (medium)
  • How would you respond to a ransomware attack on a company's systems? (advanced)
  • Can you explain the concept of a VPN and its role in securing network communications? (basic)
  • Describe the process of conducting a penetration test on a system. (medium)
  • How do you ensure compliance with data protection regulations such as GDPR? (advanced)
  • What is the role of a Security Information and Event Management (SIEM) system in cybersecurity? (medium)
  • How would you secure an IoT (Internet of Things) device from potential security threats? (medium)
  • Explain the concept of social engineering in the context of cybersecurity. (basic)
  • What are the key elements of a cybersecurity policy for an organization? (basic)
  • How do you prioritize security vulnerabilities for remediation in a large-scale network? (advanced)
  • Can you explain the difference between white-box and black-box testing in security assessments? (medium)
  • Describe a recent security project you worked on and the challenges you faced. (advanced)
  • How would you educate employees in an organization about the importance of cybersecurity? (basic)
  • What steps would you take to secure a cloud-based infrastructure from cyber threats? (medium)
  • How do you handle sensitive data securely in a remote work environment? (basic)

Closing Remark

As you explore job opportunities in the security+ domain in India, remember to showcase your skills, knowledge, and experience confidently during interviews. Prepare well, stay updated with the latest trends in cybersecurity, and showcase your passion for securing digital assets. With dedication and perseverance, you can build a successful career in the dynamic field of cybersecurity. Good luck with your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies