Home
Jobs

575 Security+ Jobs - Page 17

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Equal Opportunity Employer All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, protected veteran status, or disability status. EEO/AA/M/F/Disabled/Vets Job Description : Job Title: Analyst SOC About News Corp News Corp is a global diversified media and information services company focused on creating and distributing authoritative and engaging content to consumers and businesses throughout the world. The company comprises global businesses across a range of media, including news and information services, book publishing, digital real estate services, cable network programming in Australia, and pay-TV distribution in Australia. The Role : We are looking for SOC analysts who will be responsible for monitoring and working on active alerts on various security tools (SIEM/XSOAR). The individual in this role is expected to have meticulous attention to detail, outstanding problem-solving skills, work comfortably under pressure, and deliver on tight deadlines. This position demands someone willing to use a network of sensors, security tools, and monitoring equipment to proactively identify, evaluate, and remediate potential cybersecurity threats. Based on an understanding of “normal” network activity, SOC analysts use tools and processes to detect anomalous activity, providing 24/7/365 detection and response capabilities. The person can multitask, work independently, and work collaboratively with teams, some of which may be geographically distributed. Key Responsibilities Use SIEM technologies and other native tools to perform the monitoring of security events on a 24x5 basis. Monitor various infrastructure log sources and Escalate potential security incidents to client personnel. Notify the Client of the incident and required mitigation works. Track and update incidents and requests based on client’s updates and analysis results. Understand the structure and the meaning of logs from different log sources such as FW, IDS, Windows DC, Cisco appliances, AV and antimalware software, email security, etc. Must know about SIEM Solutions (Splunk (Preferred), Qradar, ArcSight) Good understanding of Phishing email analysis and its terminologies. Knowing EDR solutions (Preferred CrowdStrike). Ability to run and understand Sandbox Static Analysis. Proactively research and monitor security information to identify potential threats that may impact the organization. Provide 24x7 monitoring operations for security alerts Required Skills and Qualifications : Bachelors in Computer Science/IT/Electronics Engineering, M.C.A. or equivalent University degree. Minimum of 2-4 years of experience in the IT security industry, preferably working in a SOC/NOC environment. Certifications CCNA, CEH, Security+, CySA+ A degree in Computer Science, IT, Systems Engineering, or a related qualification 2-4 years of experience in Information Security. Cybersecurity best practices, techniques, and tools Understanding of tools like Crowdstrike, Qualys, Service Now, Splunk, and similar to these. Ability to work under pressure in a fast-paced environment Networking concepts, including TCP/IP, routing and switching Windows, Linux, and UNIX operating systems Communication skills, both verbal and written Location: Bangalore, IN Work Arrangement: Hybrid (3 days per week in office) Equal Opportunity Employer: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, protected veteran status, or disability status. EEO/AA/M/F/Disabled/Vets This job is posted with NTS Technology Services Pvt. Ltd. Job Category: Show more Show less

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Description for Defender M365 Consultant: Key Capabilities: Core experience in handling technical administration and troubleshooting activities related to M365 Defender suite. Needs to be able to design and implement architecture for the whole Defender M365 suite. Act as a security consultant for strategic, advisory and future state consultations on the Microsoft Defender Architecture Design the Defender M365 architecture across on-prem and multi-clouds. Experience in migration from legacy endpoint security technologies to Microsoft Security Stack and integration to current incident response processes Building and sharing knowledge assets through executed engagements, industry connects, research and development. Supporting presales initiatives with regards to Microsoft Security such as answering RFPs, client presentations, demos. Conducting maturity assessments and develop maturity model Qualification & Experience: 5-7 years of experience in Cyber Security Experienced in the below different Microsoft Defender M365 suite: Microsoft Defender for Endpoint Microsoft Defender Vulnerability Management Microsoft Defender for Office 365 Microsoft Defender for Identity Microsoft Defender for Cloud Apps Knowledge on Microsoft O365 Security, Microsoft Azure Security, Microsoft Azure AD Security Capable of leading security projects single handedly. Good business acumen to understand client requirements and build strong relationships. Strong oral, written and listening skills are an essential component to effective consulting. Good to have knowledge of Vulnerability Management, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting Good to have knowledge on Defender for Cloud Certification in any other SIEM Solution Certifications in a core security related discipline (CEH, Security+, etc.) will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Description for Defender M365 Consultant: Key Capabilities: Core experience in handling technical administration and troubleshooting activities related to M365 Defender suite. Needs to be able to design and implement architecture for the whole Defender M365 suite. Act as a security consultant for strategic, advisory and future state consultations on the Microsoft Defender Architecture Design the Defender M365 architecture across on-prem and multi-clouds. Experience in migration from legacy endpoint security technologies to Microsoft Security Stack and integration to current incident response processes Building and sharing knowledge assets through executed engagements, industry connects, research and development. Supporting presales initiatives with regards to Microsoft Security such as answering RFPs, client presentations, demos. Conducting maturity assessments and develop maturity model Qualification & Experience: 5-7 years of experience in Cyber Security Experienced in the below different Microsoft Defender M365 suite: Microsoft Defender for Endpoint Microsoft Defender Vulnerability Management Microsoft Defender for Office 365 Microsoft Defender for Identity Microsoft Defender for Cloud Apps Knowledge on Microsoft O365 Security, Microsoft Azure Security, Microsoft Azure AD Security Capable of leading security projects single handedly. Good business acumen to understand client requirements and build strong relationships. Strong oral, written and listening skills are an essential component to effective consulting. Good to have knowledge of Vulnerability Management, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting Good to have knowledge on Defender for Cloud Certification in any other SIEM Solution Certifications in a core security related discipline (CEH, Security+, etc.) will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Kanayannur, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Description for Defender M365 Consultant: Key Capabilities: Core experience in handling technical administration and troubleshooting activities related to M365 Defender suite. Needs to be able to design and implement architecture for the whole Defender M365 suite. Act as a security consultant for strategic, advisory and future state consultations on the Microsoft Defender Architecture Design the Defender M365 architecture across on-prem and multi-clouds. Experience in migration from legacy endpoint security technologies to Microsoft Security Stack and integration to current incident response processes Building and sharing knowledge assets through executed engagements, industry connects, research and development. Supporting presales initiatives with regards to Microsoft Security such as answering RFPs, client presentations, demos. Conducting maturity assessments and develop maturity model Qualification & Experience: 5-7 years of experience in Cyber Security Experienced in the below different Microsoft Defender M365 suite: Microsoft Defender for Endpoint Microsoft Defender Vulnerability Management Microsoft Defender for Office 365 Microsoft Defender for Identity Microsoft Defender for Cloud Apps Knowledge on Microsoft O365 Security, Microsoft Azure Security, Microsoft Azure AD Security Capable of leading security projects single handedly. Good business acumen to understand client requirements and build strong relationships. Strong oral, written and listening skills are an essential component to effective consulting. Good to have knowledge of Vulnerability Management, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting Good to have knowledge on Defender for Cloud Certification in any other SIEM Solution Certifications in a core security related discipline (CEH, Security+, etc.) will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Description for Defender M365 Consultant: Key Capabilities: Core experience in handling technical administration and troubleshooting activities related to M365 Defender suite. Needs to be able to design and implement architecture for the whole Defender M365 suite. Act as a security consultant for strategic, advisory and future state consultations on the Microsoft Defender Architecture Design the Defender M365 architecture across on-prem and multi-clouds. Experience in migration from legacy endpoint security technologies to Microsoft Security Stack and integration to current incident response processes Building and sharing knowledge assets through executed engagements, industry connects, research and development. Supporting presales initiatives with regards to Microsoft Security such as answering RFPs, client presentations, demos. Conducting maturity assessments and develop maturity model Qualification & Experience: 5-7 years of experience in Cyber Security Experienced in the below different Microsoft Defender M365 suite: Microsoft Defender for Endpoint Microsoft Defender Vulnerability Management Microsoft Defender for Office 365 Microsoft Defender for Identity Microsoft Defender for Cloud Apps Knowledge on Microsoft O365 Security, Microsoft Azure Security, Microsoft Azure AD Security Capable of leading security projects single handedly. Good business acumen to understand client requirements and build strong relationships. Strong oral, written and listening skills are an essential component to effective consulting. Good to have knowledge of Vulnerability Management, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting Good to have knowledge on Defender for Cloud Certification in any other SIEM Solution Certifications in a core security related discipline (CEH, Security+, etc.) will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Description for Defender M365 Consultant: Key Capabilities: Core experience in handling technical administration and troubleshooting activities related to M365 Defender suite. Needs to be able to design and implement architecture for the whole Defender M365 suite. Act as a security consultant for strategic, advisory and future state consultations on the Microsoft Defender Architecture Design the Defender M365 architecture across on-prem and multi-clouds. Experience in migration from legacy endpoint security technologies to Microsoft Security Stack and integration to current incident response processes Building and sharing knowledge assets through executed engagements, industry connects, research and development. Supporting presales initiatives with regards to Microsoft Security such as answering RFPs, client presentations, demos. Conducting maturity assessments and develop maturity model Qualification & Experience: 5-7 years of experience in Cyber Security Experienced in the below different Microsoft Defender M365 suite: Microsoft Defender for Endpoint Microsoft Defender Vulnerability Management Microsoft Defender for Office 365 Microsoft Defender for Identity Microsoft Defender for Cloud Apps Knowledge on Microsoft O365 Security, Microsoft Azure Security, Microsoft Azure AD Security Capable of leading security projects single handedly. Good business acumen to understand client requirements and build strong relationships. Strong oral, written and listening skills are an essential component to effective consulting. Good to have knowledge of Vulnerability Management, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting Good to have knowledge on Defender for Cloud Certification in any other SIEM Solution Certifications in a core security related discipline (CEH, Security+, etc.) will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 weeks ago

Apply

10.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

Job Description: About Us At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities, and shareholders every day. One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We’re devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being. Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization. Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us! Global Business Services Global Business Services delivers Technology and Operations capabilities to Lines of Business and Staff Support Functions of Bank of America through a centrally managed, globally integrated delivery model and globally resilient operations. Global Business Services is recognized for flawless execution, sound risk management, operational resiliency, operational excellence, and innovation. In India, we are present in five locations and operate as BA Continuum India Private Limited (BACI), a non-banking subsidiary of Bank of America Corporation and the operating company for India operations of Global Business Services. Process Overview The Global Information Security (GIS) is responsible for protecting Bank information systems, confidential and proprietary data, and customer information. The team develops the Bank’s Information Security strategy and policy, manages the Information Security program and identifies and addresses vulnerabilities, Develops, deploys and manages a risk-based controls portfolio, Manages and operates a global security operations center that monitors, detects and responds to cybersecurity incidents. Job Description The individual will be part of Security Event Management QA team and will be required to collaborate with both internal and external global teams across various locations for the project delivery. Responsibilities As a Member in Security Event Management QA, the individual will be focused in the following areas: Timeliness, meets established SLA Completeness, accomplishes all steps of the SOC Correctness, properly achieves desired end state of the Continual Improvement Requirements Education: B.E. / B. Tech/M.E. /M. Tech/B.Sc./M.Sc./BCA/MCA (prefer IT/CS specialization) Certifications, If Any: CEH, Security+, CCNA or any equivalent Experience Range: 10 + years Foundational skills: Experience in Information Security Experience in M&T all work types, at least 1 year exposure to same Experience in identifying threats and applying security controls to detect those users Experience and ability to quickly use open source tools to gather information on a domain or subject Self-motivated individual willing to learn new skills and accomplish goals within a short timeframe Good understanding of Security Event Management tools, techniques and processes Ability to leverage technical skills to correlate data to streamline analysis process Familiarity with and basic understanding of networking systems, firewalls, simple DNS & DHCP, security vulnerabilities, exploits, attacks and malware Ability to relate technical issues to non-technical associates / business owners understanding of vulnerabilities, exploitation, tools and techniques especially ArcSight (SIEM tool) Communication skills Microsoft Office applications Desired skills: Knowledge of SIEM, GRC tools DLP knowledge preferred. Experience detecting Insider Threats and placing controls within an organization to protect against these threats Network / Systems / Information Security Administration knowledge Work Timings: 7:30am to 8:30pm (9 hours rotational shift) Job Location: Gurugram/Mumbai Show more Show less

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Description for Defender M365 Consultant: Key Capabilities: Core experience in handling technical administration and troubleshooting activities related to M365 Defender suite. Needs to be able to design and implement architecture for the whole Defender M365 suite. Act as a security consultant for strategic, advisory and future state consultations on the Microsoft Defender Architecture Design the Defender M365 architecture across on-prem and multi-clouds. Experience in migration from legacy endpoint security technologies to Microsoft Security Stack and integration to current incident response processes Building and sharing knowledge assets through executed engagements, industry connects, research and development. Supporting presales initiatives with regards to Microsoft Security such as answering RFPs, client presentations, demos. Conducting maturity assessments and develop maturity model Qualification & Experience: 5-7 years of experience in Cyber Security Experienced in the below different Microsoft Defender M365 suite: Microsoft Defender for Endpoint Microsoft Defender Vulnerability Management Microsoft Defender for Office 365 Microsoft Defender for Identity Microsoft Defender for Cloud Apps Knowledge on Microsoft O365 Security, Microsoft Azure Security, Microsoft Azure AD Security Capable of leading security projects single handedly. Good business acumen to understand client requirements and build strong relationships. Strong oral, written and listening skills are an essential component to effective consulting. Good to have knowledge of Vulnerability Management, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting Good to have knowledge on Defender for Cloud Certification in any other SIEM Solution Certifications in a core security related discipline (CEH, Security+, etc.) will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 weeks ago

Apply

0.0 years

0 Lacs

Bokaro, Jharkhand

On-site

Indeed logo

IT Full-Time Job ID: DGC00512 Bokaro, Jharkhand 6-7 Yrs ₹07 - ₹09 Yearly Job description Key Responsibilities: Identify, develop, and manage new business opportunities in the cybersecurity domain. Promote and evangelize cybersecurity products and services to prospective clients. Collaborate with technical teams to develop tailored security solutions. Build and maintain strong client relationships, ensuring high levels of customer satisfaction. Implement effective recruitment and talent acquisition strategies to support project demands. Stay updated on the latest cybersecurity trends, threats, and technologies. Participate in industry events, seminars, and conferences to represent the company. Develop go-to-market strategies for cybersecurity offerings. Required Qualifications & Skills: Bachelors/masters degree in Computer Science, Information Technology, Cybersecurity, or a related field. 5+ years of experience in cybersecurity business development or related roles. Strong knowledge of IT security protocols, solutions, and emerging trends. Experience in talent acquisition and recruitment strategies for technical roles. Excellent communication, negotiation, and interpersonal skills. Proven ability to develop and implement cybersecurity strategies. Relevant certifications such as CISSP, CompTIA Security+, or equivalent are highly desirable. Demonstrated experience in technology evangelism and client engagement. Locations : Mumbai, Delhi / NCR, Bengaluru , Kolkata, Chennai, Hyderabad, Ahmedabad, Pune,

Posted 3 weeks ago

Apply

5.0 - 1.0 years

0 Lacs

Bengaluru, Karnataka

On-site

Indeed logo

Company Profile: Founded in 1976, CGI is among the largest independent IT and business consulting services firms in the world. With 94,000 consultants and professionals across the globe, CGI delivers an end-to-end portfolio of capabilities, from strategic IT and business consulting to systems integration, managed IT and business process services and intellectual property solutions. CGI works with clients through a local relationship model complemented by a global delivery network that helps clients digitally transform their organizations and accelerate results. CGI Fiscal 2024 reported revenue is CA$14.68 billion and CGI shares are listed on the TSX (GIB.A) and the NYSE (GIB). Learn more at cgi.com. Job Title: SOC Analyst with VEPT Position: Systems Engineer Experience: 1-2 years Category: Software Development/ Engineering Shift: Regular Main location: India, Karnataka, Bangalore & India, Chennai, Tamilnadu Position ID: J0525-0960 Employment Type: Full Time Education Qualification: Bachelor's degree in Computer Science or related field or higher with minimum 1 years of relevant experience. Job Summary : We are looking for an experienced SOC Analyst to join our cybersecurity team. The ideal candidate will have 5+ years of experience in security operations, threat detection, incident response, and vulnerability management. You will play a key role in protecting the organization from cyber threats by monitoring, analyzing, and responding to security events and incidents. Position Description:. Monitor security alerts and events from various sources (SIEM, EDR, firewalls, IDS/IPS, etc.) Analyze logs and investigate potential threats or anomalies Perform initial triage and escalate incidents as per defined SOPs Conduct root cause analysis and provide recommendations for mitigation Coordinate and lead incident response efforts Maintain and fine-tune detection rules in SIEM and EDR platforms Collaborate with IT and security teams on containment and remediation efforts Participate in threat hunting and threat intelligence analysis Document findings, incident reports, and process improvements Contribute to the development and refinement of playbooks and procedures Required Skills and Experience: Minimum 5 years of hands-on experience in a SOC or equivalent role Strong understanding of security monitoring tools (SIEM, EDR, IDS/IPS) Experience with tools like Splunk, Microsoft Sentinel, CrowdStrike, or similar Solid knowledge of network protocols, logs, and system administration Familiarity with MITRE ATT&CK, kill chain, and threat intelligence frameworks Experience handling real-world security incidents and investigations Scripting knowledge (Python, PowerShell, etc.) is a plus Relevant certifications (e.g., SC-200, CEH, CompTIA Security+, GCIH, etc.) Preferred Qualifications: Bachelor’s degree in Computer Science, Information Security, Engg or related field Strong analytical, communication, and documentation skills Ability to work independently and in a collaborative environment Willingness to work in shifts or on-call as needed Must-Have Skills: SOC, SIEM Tools, EDR, Firewalls Good-to-Have Skills: Shell scripting knowledge (Python, Powershells) CGI is an equal opportunity employer. In addition, CGI is committed to providing accommodation for people with disabilities in accordance with provincial legislation. Please let us know if you require reasonable accommodation due to a disability during any aspect of the recruitment process and we will work with you to address your needs. Life at CGI: It is rooted in ownership, teamwork, respect and belonging. Here, you’ll reach your full potential because… You are invited to be an owner from day 1 as we work together to bring our Dream to life. That’s why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our company’s strategy and direction Your work creates value. You’ll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas, embrace new opportunities, and benefit from expansive industry and technology expertise You’ll shape your career by joining a company built to grow and last. You’ll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons Come join our team, one of the largest IT and business consulting services firms in the world Your future duties and responsibilities Required qualifications to be successful in this role Together, as owners, let’s turn meaningful insights into action. Life at CGI is rooted in ownership, teamwork, respect and belonging. Here, you’ll reach your full potential because… You are invited to be an owner from day 1 as we work together to bring our Dream to life. That’s why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our company’s strategy and direction. Your work creates value. You’ll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas, embrace new opportunities, and benefit from expansive industry and technology expertise. You’ll shape your career by joining a company built to grow and last. You’ll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons. Come join our team—one of the largest IT and business consulting services firms in the world.

Posted 3 weeks ago

Apply

6.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Splunk, a Cisco company, is building a safer and more resilient digital world with an end-to-end full stack platform made for a hybrid, multi-cloud world. Leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable. Our customers love our technology, but it's our caring employees that make Splunk stand out as an amazing career destination. No matter where in the world or what level of the organization, we approach our work with kindness. So bring your work experience, problem-solving skills and talent, of course, but also bring your joy, your passion and all the things that make you, you. Come help organizations be their best, while you reach new heights with a team that has your back. Role Summary The Splunk Global Security (SGS) organization is seeking a Senior Service Delivery Manager (SDM) (working with the Senior Director of Strategy, Planning & Operations) to drive the perfect delivery of SGS's cybersecurity services! Meet the Team Our SGS organization is led by Splunk’s Chief Information and Security Officer (CISO). The team's purpose is to deliver a comprehensive set of services, crafted to successfully defend and protect Splunk and its customers. The Strategy, Planning and Operations (SPO) Team within the SGS organization consists of three functions - Technical Program Management, Service Delivery Management, and Service Operations. Learn more about SGS, meet our leaders, and hear more from our Splunk security experts at splunk.com/careers/splunk-global-security. Responsibilities Service Execution: Facilitate the delivery of cybersecurity services by coordinating across internal delivery teams. Ensure that all service activities (planning, resource allocation, scheduling) are aligned with customer requirements and strategic objectives. Handle dependencies and perform quality checks to meet or exceed service standards. Work closely with and act as the single point of contact for multi-functional teams (e.g., engineering, sales) to manage inter-team dependencies and to solve sophisticated service issues. SLA & Performance Management Define, track and report on service-level agreements (SLAs), key performance indicators, and (operational) metrics. Lead regular service reviews and produce reports to collaborators, driving continuous improvement in delivery processes. Define and use dashboards and reports that provide transparency into the health of the service, and risk areas. Tool And Process Oversight Leverage service management platforms, e.g., JIRA Service Management, ServiceNow) to log and track service requests. Ensure that documentation is in place and maintained and that ITIL-aligned processes are followed. Leadership And Improvement Promote continuous improvement by identifying process gaps, implementing standard operating procedures (SOPs), and fostering a culture of operational excellence! Guide service delivery teams on standard methodologies and processes. Drive and maintain attention to quality and detail and hold yourself accountable to the expectations and results. Lead difficult conversations in a professional way and apply judgment to assess criticality and prioritize efforts in alignment with organizational goals. Develop positive relationships with internal and external partners and multi-functional teams to ensure clarity and accountability for team(s) responsible for delivering respective SGS services. Must-have Qualifications Education & Experience: Demonstrated ability post bachelor (in Computer Science, Information Technology, Cybersecurity or related field) of at least 6 to 8 years experience in IT service delivery, technical program management, or operations in the cybersecurity industry. Proven track record of managing large service engagements or multi-functional projects with significant collaborator engagement. Cybersecurity certification: CompTIA Security+ or similar cybersecurity industry certifications. Service Management Expertise Solid understanding of service management principles and standard processes (ITIL/ITSM frameworks). Hands-on experience with ticketing and workflow tools. Proficiency in JIRA (Service Management) and ServiceNow is expected. Communication Skills Excellent verbal and written communication skills, with the ability to coordinate multi-functional with demonstrated ability to articulate technical concepts Experience building and maintaining relationships with customers and internal teams is essential Preferred Qualifications Background in global or matrixed organizations, with experience coordinating teams across regions and time zones. Experience with vendor contracts and financial oversight of service programs. Exposure to Splunk products (e.g., Enterprise, SOAR, or Splunk Cloud). Splunk is an Equal Opportunity Employer Splunk, a Cisco company, is an Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis. Show more Show less

Posted 3 weeks ago

Apply

1.0 years

0 Lacs

India

On-site

Linkedin logo

Role Overview: As a Cyber Security Analyst, you’ll play a crucial role in protecting our digital assets and ensuring the security of our systems and data. You’ll work closely with cross-functional teams to identify vulnerabilities, respond to incidents, and implement best-in-class security measures. Key Responsibilities: Monitor and analyze security events, logs, and alerts to identify potential threats or incidents. Perform vulnerability assessments and penetration testing to evaluate the security posture. Collaborate with IT and engineering teams to remediate vulnerabilities and ensure secure configurations. Develop and maintain security policies, procedures, and standards in line with industry best practices. Respond to security incidents, conduct root cause analysis, and implement corrective actions. Stay up to date on emerging threats, security trends, and technologies to recommend proactive security measures. Conduct periodic security training and awareness sessions for employees. Requirements: 1-2 years of experience in cybersecurity, information security, or a related field. Solid understanding of security principles, risk management, and common attack vectors. Hands-on experience with security tools such as SIEM (e.g., Splunk, ELK), IDS/IPS, endpoint protection, and vulnerability scanners. Familiarity with cloud security (AWS, Azure, GCP) and secure architecture principles. Strong analytical, problem-solving, and communication skills. Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are a plus. Why Join Us? Opportunity to work with cutting-edge technologies and a passionate security team. Competitive compensation and benefits package. Career growth and professional development opportunities. A culture that values diversity, innovation, and work-life balance. If you’re driven by the challenge of staying ahead of cyber threats and passionate about making an impact, we’d love to hear from you! Show more Show less

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

#hiring #hyderabad #hyderabadjob #immediatejoiner #opportunity #cybersecurity #technician #cybersecurityjobs Role - Cybersecurity Technician For a US Based Healthcare / Genetic Data analytics Client 5+ years of Relevant Experience For I mmediate joiners only ( Maximum 3o days) Location : Hyderabad/remote Skills: Maintain and Document Security Events and Records Incident response SOC Process Exp. with SIEM tools such as Crowdstrike, Proofpoint, and Splunk Preferred CompTIA Security+ or other relevant cybersecurity certifications (CEH, GSEC, etc.). Share resume with the required details: k.vyas@sidinformation.com 👉 Application directly sent to email will get response immediately . Required details: Applied for the position of : Full Name : Primary Contact Number : Primary Email ID : Educational Qualification : Certification if any : Current Location: Current Organization: Total Experience: Relevant Exp. : Current CTC : Expected CTC : Offer on Hand Details - If Any : Immediate Joiner?: Notice period: Ready to Relocate to Hyderabad? : LinkedIn Profile: Position Summary: The Cybersecurity Technician will be responsible for supporting the installation, maintenance, and troubleshooting of security systems across the organization while monitoring inbound threat detection. This role will involve assisting senior security staff with operational tasks, including monitoring network activity, resolving technical security issues, and documenting security events. The Cybersecurity Technician will also help with the vulnerability and patch management process and ensure the company’s security posture is maintained through accurate record-keeping and system updates. Essential Duties and Responsibilities: ● Install, configure, and maintain security systems such as antivirus software, email security, and monitoring tools. ● Troubleshoot technical issues with security systems to ensure minimal downtime and optimal performance. ● Monitor inbound threat detection queue for suspicious behavior or breaches, escalating issues when necessary. ● Assist in conducting vulnerability scans, system audits, and the analysis of potential security weaknesses. ● Log and document security events, incident responses, and maintain accurate security records. ● Participate in vulnerability and patch management, identifying necessary security updates for software, hardware, and operating systems. ● Maintain and update security documentation, including system configurations, network diagrams, and incident response protocols. ● Stay informed about cybersecurity trends, vulnerabilities, and emerging threats to improve organizational defenses. Qualifications ● Strong technical support experience, with a focus on security systems and tools. ● Basic knowledge of networking concepts (TCP/IP, DNS, VPNs) and operating systems (Windows, Linux, macOS). ● Familiarity with security software such as antivirus, firewalls, SIEM, and SOAR . ● Knowledge of information security principles and best practices. ● Excellent problem-solving skills and ability to troubleshoot security issues efficiently. ● Strong written and verbal communication skills for collaborating with team members and documenting security issues. ● Preferred: CompTIA Security+ or other relevant cybersecurity certifications (CEH, GSEC, etc.). ● Familiarity with security tools such as Crowdstrike, Proofpoint, and Splunk . ● Prior experience in a technical support or IT helpdesk role is a plus Keyura Vyas Talent Acquisition Manager Sid Information technology Show more Show less

Posted 3 weeks ago

Apply

4.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

Kyndryl Mumbai, Maharashtra, India Bengaluru, Karnataka, India Posted on May 26, 2025 Apply now Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you a tech-savvy problem-solver with a passion for ensuring optimal network performance. If so, look no further – Kyndryl is seeking a Network Support Specialist who will be the go-to expert for installing, maintaining, and troubleshooting computer networks. Key Responsibilities Firewall Management: Configure, manage, and troubleshoot firewalls to ensure network security and compliance. IPS Administration: Monitor and manage IPS systems to detect and prevent intrusions. Security Policy Implementation: Implement and enforce security policies, rules, and procedures. Work on Firewall rules and IPS signatures optimization for ensuring better performance and ease of management Network Traffic Analysis: Analyze network traffic to identify potential security threats. Incident Response: Respond to security incidents, perform root cause analysis, and implement fixes. Collaboration: Work with other teams to ensure seamless integration of security measures. Work with OEM's and ensure timely updates on Software upgrade/Fixes, Coordinate with OEM for TAC cases and track for Quick resolution. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical And Professional Expertise Basic understanding of firewalls: Familiarity with firewall concepts and configurations. 4+ Years of Experience Basic understanding of IPS: Knowledge of intrusion prevention systems and their role in network security. Network fundamentals: Understanding of network protocols (TCP/IP, DNS, DHCP, etc.). Basic security knowledge: Familiarity with security best practices and principles. Educational Qualification - Degree Preferred Technical And Professional Experience Familiarity with firewall platforms: Knowledge of firewall platforms like Cisco ASA/FTD, Fortinet, or Check Point. Basic scripting skills: Familiarity with scripting languages like Python or PowerShell. Certifications: Relevant certifications like CompTIA Security+ or Cisco CCNA/CCNP security will be added advantage Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address. Apply now See more open positions at Kyndryl Show more Show less

Posted 3 weeks ago

Apply

1.0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

Linkedin logo

Ahmedabad (Gujarat), Delhi (Delhi), Pune (Maharashtra) INR 5 LPA to 7.2 LPA Responsibilities About the Position Training Delivery: Conduct engaging and practical cyber security sessions across academic institutions and other centers. Content Development: Create and curate training material in various formats including PDFs, slide decks, assignments, quizzes, and hands-on labs. Curriculum Development: Design comprehensive training curricula that align with industry standards and learner needs. Technical Proficiency: Utilize tools and platforms like Kali Linux, Nmap, and others to demonstrate real-world cyber security practices. Current Threat Awareness: Continuously update content and training to reflect the latest threats, trends, and technologies in cyber security. Behavioral Training Focus: Emphasize behavioral aspects of cyber security such as digital hygiene, phishing awareness, and secure practices. Project Implementation: Support cyber security-related project rollouts including planning, execution, and reporting. Academic Engagement: Collaborate with educators and institutions to integrate cyber security education into academic settings. Travel: Willingness to travel across locations based on project demands. Mandatory Qualification And Experience Proven knowledge and hands-on experience in cyber security. Strong familiarity with Kali Linux, Nmap, network security fundamentals, and ethical hacking basics. Experience in curriculum design and content creation for technical subjects. Ability to translate technical concepts into practical, relatable training. Strong communication and interpersonal skills. Experience in training delivery, preferably in academic or community engagement contexts. Bachelor’s degree in Computer Science, IT, Cyber Security, or a related field (relevant certifications like CEH, CompTIA Security+, etc., are a plus). 1-2 Years of Experience in teaching Passion for capacity building and digital inclusion. Creative mindset for developing interactive and impactful learning content. Self-driven and adaptable to dynamic project environments. How to apply Please Send Your CV Along With a Cover Letter At Career@bharatcares.org With The Subject-line “Cyber Security Trainer- May- 2025’.Please Mention Following Details In The Email Body Current Location Preferred Location Notice Period Current Salary Expected Salary Why do you think yourself a good-fit for this role (at least 50 words, max 200 words) Note: After introductory rounds of conversation, you will be sent a pre work that has to be submitted in 72 hours , which would be followed by the interview with the senior management. Only short-listed candidates will be contacted. This role is for the candidates with relevant experience as per the details mentioned above. Job Summary Salary: INR 5 LPA to 7.2 LPA Location: Ahmedabad (Gujarat), Delhi (Delhi), Pune (Maharashtra) Deadline: 31 Jul, 2025 About CSRBOX BharatCares (SMEC Trust), the social impact arm of the CSRBOX Group stands tall amongst the Top 50 Social Impact Organizations in India.Specifically established and curated for program delivery, BharatCares commitment revolves around the principles of innovation, technology, and scalability, aiming to address societal challenges comprehensively. Functioning as a social solution bridge, BharatCares facilitates collaboration among communities, innovators, funders and government to implement the best impact solution for the last mile. Our flagship initiatives focus on improving education, employability, rural and healthcare infrastructure, entrepreneurship, environmental sustainability and road safety. For more information, visit: www.bharatcares.org Curious about what Life @ CSRBOX looks like? Explore: https://csrbox.org/Life-at-CSRBOX/ Show more Show less

Posted 3 weeks ago

Apply

0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Our Company Changing the world through digital experiences is what Adobe’s all about. We give everyone—from emerging artists to global brands—everything they need to design and deliver exceptional digital experiences! We’re passionate about empowering people to create beautiful and powerful images, videos, and apps, and transform how companies interact with customers across every screen. We’re on a mission to hire the very best and are committed to creating exceptional employee experiences where everyone is respected and has access to equal opportunity. We realize that new ideas can come from everywhere in the organization, and we know the next big idea could be yours! At Adobe, you will be immersed in an exceptional work environment that is recognized around the world . You will also be surrounded by colleagues who are committed to helping each other grow through our unique Check-In approach where ongoing feedback flows freely. If you’re looking to make an impact, Adobe's the place for you. Discover what our employees are saying about their career experiences on the Adobe Life blog and explore the meaningful benefits we offer. Our Company Changing the world through digital experiences is what Adobe is all about. We give everyone—from emerging artists to global brands—everything they need to design and deliver exceptional digital experiences. We’re passionate about empowering people to craft beautiful and powerful images, videos, and apps, and transform how companies interact with customers across every screen . We’re on a mission to hire the very best and are committed to building exceptional employee experiences where everyone is respected and has access to equal opportunity. We realize that new ideas can come from everywhere in the organization, and we know the next big idea could be yours. The Opportunity As a Senior Security Engineer, you will be a member of a global architecture and engineering team within Enterprise S ecurity focused on secur ing access to Adobe data using Zero Trust best practices . This includes an Adobe implementation of a Z ero Trus t Solution and delivering access controls based on a zero trust strategy . In addition, you will also provide support to other critical projects and services within the Enterprise Security (ES) o rganization focused on securing access and data . What You Will Do Research, analyse, troubleshoot and support the delivery of security solutions that are appropriate for the business and that align with team security strategies and key security requirements Support the on-going develop ment and maturity of security s ervices , policies and standards that improve the security posture for our employees and data. Responsibility i nclud es the creation of clear documentation , proposing architectural standards, and leading programs in support of those goals Partner with business units and vendor suppliers across Adobe researching, guiding, and enabling improvements in their security posture and service architecture , including assist ing in the review and implementation of suggested improvements and acting as a lead resource for partners located in the APAC region Help d rive the evaluation and selection of security technologies in conjunction with our business partners and customers What You Will Need To Succeed Bachelor's degree in MIS, Computer Science, or Engineering Familiarity with Zero Trust solutions an d concepts , Identity and Access Management technologies , and Public Cloud services Knowledge of Web Application Security platforms, Single Sign On, Authentication, Authorization, Federation Technologies, SAML, OAuth, OpenID, and f amiliarity with Python to improve and understand existing automation workflows Excellent work standards and highly motivated , including e xceptional oral and written communication skills (interpersonal and client-facing) directed towards all levels of an organization , including the creation of security reports based on findings Certifications in one or more Information Security and Cloud Technology relevant areas such as Security Professional (CISSP), Cloud Security (CCSP, CCSK), AWS Certified Solutions Architect – Associate, Security+ S trong interpersonal skills, ability to “win people over” and provide leadership within the organization Neutral toward technology, vendor and product choices; more interested in results than in personal preferences. Strong ability to work collaboratively and build consensus across the organization Ability to balance the long-term ("big picture") and short-term implications of individual decisions Job Summary We are looking for a highly skilled Senior Security Engineer to join our Global Enterprise Security Architecture team. The ideal candidate will have extensive experience leading large-scale security projects, driving Zero Trust initiatives, and advising on infrastructure security best practices. This role is critical for supporting our global enterprise security architecture efforts, enhancing corporate security authentication, and managing high-impact cybersecurity projects. Key Responsibilities Global Security Architecture Leadership Provide leadership within the Enterprise Security Architecture & Engineering team, setting the strategy and executing security initiatives across the organization. Develop and implement security solutions to address challenges in vendor security, corporate authentication, and cybersecurity risk management in high-risk regions. Zero Trust Security Strategy Act as a leader in advancing the organization’s Zero Trust security model, setting standards, and implementing frameworks to secure digital assets across diverse environments. Project and Stakeholder Management Oversee high-impact, cross-functional security projects that align with the company’s objectives , including vendor security management and global risk mitigation. Collaborate with stakeholders to ensure project alignment, clear communication, and adherence to security protocols. Technical Expertise and Advisory Role Serve as a Trusted Advisor on infrastructure security best practices, guiding teams on architecture decisions that align with our security roadmap. Knowledge of a broad range of security tools and technologies to reinforce the enterprise security infrastructure. Adobe is proud to be an Equal Employment Opportunity employer. We do not discriminate based on gender, race or color, ethnicity or national origin, age, disability, religion, sexual orientation, gender identity or expression, veteran status, or any other applicable characteristics protected by law. Learn more. Adobe aims to make Adobe.com accessible to any and all users. If you have a disability or special need that requires accommodation to navigate our website or complete the application process, email accommodations@adobe.com or call (408) 536-3015. Show more Show less

Posted 3 weeks ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Position Summary: This position will support Mphasis Cyber Defense Center/SOC. It requires to continuously monitor cyber security events, perform triages and provide response/remediation activities. Responsibilities:  Continuously monitor security alerts generated by SIEM and other security tools.  Perform initial triage to distinguish genuine security incidents from false positives and promptly escalate complex or confirmed threats to senior analysts or incident response teams.  Conduct in-depth analysis of potential security incidents by gathering and correlating data from various sources.  Identify indicators of compromise to determine the scope, impact, and root cause of incidents.  Develop and execute effective containment and remediation strategies in close coordination with incident response teams.  Engage in proactive threat hunting to uncover stealthy or sophisticated attacks that bypass standard monitoring mechanisms.  Maintain accurate and detailed incident logs and reports that capture the analysis, response actions, and lessons learned.  Communicate technical findings clearly to both technical and non-technical stakeholders.  Collaborate with fellow SOC analysts, incident responders, and IT teams to optimize detection rules and continuously improve the organization’s security posture.  Evaluate and implement new security technologies while contributing to the development of SOC playbooks, standard operating procedures, and best practices.  Continuously learn and keep abreast on latest trends in attack patterns and tools Desired Skills/Experience:  3-6 years of overall experience in area of Systems/Network/Information Security and minimum 2 years in SOC/MSS services  Experience SIEM Monitoring solutions [Qradar, ArcSight, Splunk, etc.,] and a variety of other security devices found in a SOC environment  Good understanding in Log formats of various security devices like Proxy, Firewall, IDS/IPS DNS,  Solid foundational understanding of networking concepts (TCP/IP, LAN/WAN, Internet, network topologies)  Experience in major operating systems (Windows, Linux)  Understanding of current trends in attacker and threat actor tools, techniques, and procedures (TTP) and mitigation steps  Strong analytical and problem-solving skills  Excellent communication and interpersonal skills  Professional/Technical Certifications (Security+, CCSE, CCSP, TICSA, MCSE, CISSP, etc.) desirable Show more Show less

Posted 3 weeks ago

Apply

6.0 years

0 Lacs

Bangalore Urban, Karnataka, India

On-site

Linkedin logo

What Success Looks Like In This Role Roles and Responsibilities (but not limited to): Oversee the management of security risks and mitigation plans. Ensure compliance with security policies Collaborate with various resolver team to mitigate identified risk Lead and coordinate response to security incidents and breaches Assist in the architecture and deployment of security tools Analyze threat landscapes and provide actionable intelligence Serve as the liaison for third-party audits and compliance evaluations. Work with various IT teams to prioritize and patch vulnerabilities. Work as a bridge between Resolver team and SOC for any security related issues Support in creation of the of Security Reports Create and maintain risk registers and regularly report on risk metrics. Provide recommendations for improving the security posture. Approving monthly patches for workstations and servers. Ability to develop and implement security policies and procedures. Desired Candidate Profile: Expertise in incident response, threat detection, and SOC operations. Excellent communication and reporting skills. Experience in vulnerability assessments Proficiency in using threat-hunting tools and techniques. Knowledge of key threat landscapes and attack vectors Strong knowledge of advanced persistent threats (APTs) and adversary techniques (e.g., MITRE ATT&CK framework). Ability to translate technical threat data into actionable insights. Ability to work independently and search for emerging threats in networks. Understanding of various security tools and platforms like Microsoft Defender ATP, Office ATP etc. Strong understanding of Cloud Security and Networking Concepts and practices. Work with Tactical Use Case Development team to assist in processing the more intricate use case development tickets from our customer request queue. Experience with methodologies and tools, for threat analysis of complex systems, such as threat modeling Ability to learn and retain new skills in a changing technical environment. You will be successful in this role if you have: University degree or equivalent education with relevant experience. Minimum 6 years of total experience in security domain with exposure to Security Products Excellent verbal and written communication skills. Ability to participate in on-call support Willingness to learn new technology platforms Preferred Qualifications: Vulnerability Management, SIEM Experience Recognized network and security certifications, Security+, CEH, ECIH, GCIH, GCIE etc. Certification on the respective tool is added advantage Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law. This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise complete your expression of interest, without additional assistance and would like to discuss a request for reasonable accommodation, please contact our Global Recruiting organization at GlobalRecruiting@unisys.com or alternatively Toll Free: 888-560-1782 (Prompt 4). US job seekers can find more information about Unisys’ EEO commitment here. Show more Show less

Posted 3 weeks ago

Apply

6.0 years

0 Lacs

New Delhi, Delhi, India

On-site

Linkedin logo

This role is for one of the Weekday's clients Min Experience: 6 years Location: Delhi NCR JobType: full-time We are seeking a highly skilled and proactive Senior IT Administrator to join our dynamic team. The ideal candidate will possess extensive experience in managing and maintaining enterprise IT infrastructure, ensuring seamless operations, security, and scalability. With 6-10 years of hands-on experience, you will take the lead in overseeing system administration, network management, user support, and the implementation of IT best practices. Your contributions will be pivotal in optimizing our technology ecosystem and supporting business continuity. Requirements Key Responsibilities: Infrastructure Management: Administer and maintain servers, storage, virtualization platforms (VMware/Hyper-V), and cloud environments (AWS/Azure), ensuring high availability and performance. Network Administration: Configure and manage LAN/WAN, VPN, firewall, routers, switches, and wireless networks. Troubleshoot network issues and optimize bandwidth utilization. System Monitoring and Performance: Utilize monitoring tools (e.g., Nagios, Zabbix) to track system health, performance, and capacity. Implement proactive measures to prevent downtime and performance bottlenecks. Security Management: Enforce robust security policies, manage endpoint protection, conduct vulnerability assessments, and support compliance initiatives (ISO 27001, GDPR). Administer identity and access management (IAM) solutions. Backup and Disaster Recovery: Develop and maintain comprehensive backup strategies and disaster recovery plans. Conduct regular testing to ensure data integrity and availability. User Support and Training: Provide advanced technical support to end-users, resolving hardware, software, and network issues. Conduct user training and create technical documentation for IT processes. Software and Patch Management: Oversee deployment of software updates, security patches, and system upgrades. Evaluate and implement new tools to enhance productivity and security. Vendor and Asset Management: Collaborate with vendors and service providers for procurement, maintenance, and support. Maintain accurate IT asset inventories and licensing compliance. Project Leadership: Lead or support IT infrastructure projects, including server migrations, network upgrades, and cloud adoption. Collaborate with cross-functional teams to ensure successful delivery. Key Skills and Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. Certifications such as Microsoft Certified: Azure Administrator, VMware Certified Professional (VCP), Cisco CCNA/CCNP, or CompTIA Security+ are desirable. 6-10 years of IT administration experience in medium-to-large enterprise environments. Proficiency in Windows Server, Linux, and cloud platforms (AWS, Azure, GCP). Strong knowledge of network protocols, DNS, DHCP, VPN, VLAN, firewalls, and routing. Hands-on expertise with virtualization technologies (VMware, Hyper-V) and backup solutions (Veeam, Commvault). In-depth understanding of IT security principles, including firewalls, encryption, endpoint protection, and multi-factor authentication. Excellent problem-solving skills with the ability to handle high-pressure situations. Strong communication skills to interact with both technical and non-technical stakeholders Show more Show less

Posted 3 weeks ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Job Description As a Security Analyst/Engineer, you will be responsible for supporting the security operations of our organization by assisting in the monitoring, detection, and response to security incidents. This role offers a blend of security analysis and engineering tasks. This position offers a progression from foundational knowledge to more advanced responsibilities, allowing you to contribute significantly to the organization's cybersecurity efforts. Key Responsibilities: Security monitoring and analysis You assist in monitoring security events and alerts from various sources such as SIEM, IDS/IPS, antivirus systems, and endpoint detection platforms You conduct initial analysis of security events to determine their nature and potential impact on the organization You collaborate with senior analysts to investigate and respond to security incidents, including malware infections, phishing attempts, and unauthorized access attempts. Incident response You contribute to incident response activities by providing technical assistance during security incidents, including containment, eradication, and recovery efforts You document incident response procedures, develop post-incident reports, and conduct lessons learned sessions to improve incident handling capabilities You implement proactive measures to enhance incident detection and response capabilities, such as developing playbooks for common attack scenarios. Vulnerability management You support the vulnerability management process by assisting in vulnerability scanning, assessment, and remediation efforts You help prioritize and track the resolution of identified vulnerabilities in systems and applications You collaborate with system owners and IT teams to ensure timely patching and mitigation of identified vulnerabilities, leveraging automation and orchestration where possible You conduct security assessments and penetration tests to identify weaknesses in systems, applications, and network infrastructure. Security tool You assist in the administration and configuration of security tools and technologies, such as firewalls, intrusion detection/prevention systems, and endpoint security solutions You participate in the evaluation and testing of new security technologies to enhance the organization's security posture You optimize the configuration and tuning of security tools and technologies to improve detection accuracy, reduce false positives, and enhance overall effectiveness You evaluate emerging security technologies and solutions, recommending and implementing enhancements to the security toolset based on industry best practices and organizational requirements. Security awareness and training You support security awareness and training initiatives by assisting in the development of educational materials and delivering security awareness briefings to staff. Qualifications and Skills: Bachelor's degree in computer science, Information Security, or related field 3-5 years of experience in a cybersecurity role with progressively increasing responsibilities Strong understanding of cybersecurity principles, threat landscape, and attack methodologies Proficiency in security tools and technologies such as SIEM, EDR, IDS/IPS, firewalls, and vulnerability scanners Excellent analytical, problem-solving, and decision-making skills Effective communication and stakeholder management abilities Certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), or equivalent are a plus. Experience Demonstrated experience in conducting security analysis, incident response, and vulnerability management in a complex environment Hands-on experience with security tool optimization, security assessments, and penetration testing Proven track record of incident response efforts and effectively managing security incidents from detection to resolution. Career development This role offers a valuable opportunity for career growth and development in the field of cybersecurity. As you gain experience and proficiency, you will have the opportunity to progress into more specialized roles such as Senior Security Analyst, Incident Responder, or Security Engineer. Continued learning and professional certifications will be encouraged to enhance your skills and knowledge in the cybersecurity domain. Your Team Global cyber security team has the mission to enable Carmeuse digitalization strategy without security compromises. The cyber team is composed of regional senior security managers, cyber architects based around the globe with major presence in US, Belgium & Romania. Global cyber team is in charge of security design, delivery and operations to safeguard Carmeuse digital IT & OT footprint. Working with our cybersecurity team, you'll be at the forefront of innovation designed to strengthen our operations. Your Manager Victor Alexandrescu, 45 years old, is the leader of the team. With more than 20 years' experience, he brings a wealth of practical knowledge to the role. Victor joined Carmeuse 1 year ago. His management style is direct and based on trust and support. He focuses on efficiency and continuous improvement, always looking for ways to optimize processes and enhance team performance. He promotes a mindset centered on proactive problem-solving and achieving tangible results. Why Should You Join? We truly believe that where you work matters and, as a family business, we know what makes our employees happy! Permanent contract Flexible working hours Home working policy Competitive salary package and benefits A lot of growing possibilities A strong HR and training policy to develop your skills Work life balance #Hybrid The Recruitment Process: If you apply for this great position, you could go through these different steps: Georges Mensah-Boateng, our Talent Acquisition Lead will analyze your Résumé and cover letter A first "Teams" interview will be scheduled with Georges. You will take 2 personality questionnaires. He will want to know more about you, as a person and as a professional. He will assess your motivations and answer to your questions You will have a second interview with Victor Alexandrescu (our Cybersecurity Delivery Manager) and Aurelie Mordant (our HRBP). The last interview will take place with Stavros Georgakopoulos (our Cyber Security Architect), Rusty Gavin (our OT Cyber Security Lead) and Eugene Marchenko (our IT Security Director). Show more Show less

Posted 3 weeks ago

Apply

0 years

0 Lacs

Patel Nagar, Delhi, India

Remote

Linkedin logo

The IT sector has been the backbone of Pune’s economy for decades, with major IT parks and multinational companies establishing strong roots in the city. In 2025, the shift towards remote work continues to gain traction, offering IT professionals in Pune the flexibility to work from home without compromising on job quality or career growth. If you’re an IT expert looking to break free from the office routine, this blog is your ultimate guide to the best Work from Home Jobs in Pune for IT Professionals. Why Pune is a Hotspot for IT Professionals? Pune Has Emerged As One Of India’s Leading IT Hubs, Second Only To Bangalore. Here’s Why The City Remains Attractive: Presence of top IT companies like Infosys, TCS, Cognizant, Wipro, and Tech Mahindra. A large talent pool from institutes like MIT, Symbiosis, and COEP. Cost-effective infrastructure and a good quality of life compared to metros like Mumbai or Delhi. Favorable startup ecosystem backed by government initiatives and venture capital. Benefits Of Remote IT Jobs In Pune Before diving into the list of jobs, here are the advantages of remote IT work in Pune: Work-life balance with more time for family, hobbies, and personal growth. Cost-saving on commuting, food, and formal wear. Flexibility to work from anywhere – not limited to city boundaries. Access to global opportunities while staying local. Top Work from Home Jobs in Pune for IT Professionals Here’s a curated list of the best remote jobs available for IT professionals in Pune, along with details on required skills, salary expectations, and top companies hiring. Software Developer (Full Stack, Backend, Frontend) Job Role: Build, test, and maintain web or mobile applications. Popular Technologies: Frontend: React.js, Angular, Vue.js Backend: Node.js, Python (Django/Flask), Java, PHP, Ruby on Rails Skills Required: Proficiency in coding languages Experience with RESTful APIs Understanding of CI/CD pipelines Salary: ₹6 LPA to ₹20 LPA Top Companies Hiring: Turing Accenture Cognizant Freelance platforms (Upwork, Toptal) Also Read: Top Companies in Noida Offering Work from Home Jobs in 2025 Data Scientist / Data Analyst Job Role: Analyze and interpret complex data to help businesses make informed decisions. Skills Required: Python/R, SQL Machine Learning, Deep Learning Data visualization (Power BI, Tableau) Statistical analysis Salary: ₹7 LPA to ₹25 LPA Top Companies Hiring: ZS Associates Fractal Analytics Mu Sigma Remote-first startups DevOps Engineer Job Role: Manage CI/CD pipelines, cloud infrastructure, and automate deployments. Skills Required: AWS, Azure, or GCP experience Docker, Kubernetes Jenkins, Terraform, Git Salary: ₹8 LPA to ₹22 LPA Top Companies Hiring: IBM ThoughtWorks GitLab (remote-first) Cloud-native startups Cybersecurity Analyst Job Role: Monitor systems for threats, perform vulnerability testing, and implement security protocols. Skills Required: Knowledge of firewalls, antivirus, and SIEM tools Ethical hacking, penetration testing Certifications: CEH, CISSP, CompTIA Security+ Salary: ₹6 LPA to ₹18 LPA Top Companies Hiring: Quick Heal TCS Cybersecurity division Remote fintech companies Cloud Solutions Architect Job Role: Design and implement cloud services tailored to business needs. Skills Required: Expertise in AWS, Azure, or GCP Experience with IaaS/PaaS/SaaS Architecture design and cost optimization Salary: ₹15 LPA to ₹35 LPA Top Companies Hiring: AWS Partners Microsoft Azure partners in Pune Remote roles from global companies Mobile App Developer Job Role: Create and maintain Android and iOS applications. Skills Required: Kotlin/Java for Android Swift for iOS Flutter or React Native for cross-platform apps Salary: ₹5 LPA to ₹15 LPA Top Companies Hiring: Mindbowser Y Media Labs Freelance mobile projects UI/UX Designer Job Role: Design user-friendly interfaces and enhance the digital user experience. Skills Required: Figma, Adobe XD, Sketch UX research and prototyping Basic HTML/CSS knowledge (preferred) Salary: ₹4 LPA to ₹12 LPA Top Companies Hiring: Zensar Remote design agencies Product-based startups QA Engineer / Automation Tester Job Role: Test applications for bugs and ensure software quality. Skills Required: Selenium, Appium Test planning and execution Manual and automated testing Salary: ₹4.5 LPA to ₹12 LPA Top Companies Hiring: Cognizant Capgemini Remote software product teams Technical Support Engineer Job Role: Offer technical helpdesk support to customers and internal teams. Skills Required: Strong communication skills Problem-solving with system and application knowledge Basic scripting and networking knowledge Salary: ₹3 LPA to ₹8 LPA Top Companies Hiring: Zoho Freshworks Remote SaaS companies AI/ML Engineer Job Role: Build intelligent algorithms to improve products using machine learning and AI. Skills Required: Python, TensorFlow, PyTorch Deep learning, NLP, computer vision Model training and deployment Salary: ₹10 LPA to ₹30 LPA Top Companies Hiring: Persistent Systems AI startups with remote teams Research-based companies Also Read: Best Work from Home IT Jobs in Bangalore for Tech Professionals Skills In Demand For Remote IT Jobs If you want to thrive in Pune’s remote IT job market, focus on upgrading the following skills: Technical Skills Programming languages (Python, JavaScript, Java) Cloud computing (AWS, Azure) DevOps and automation tools Data analytics and machine learning Soft Skills Time management Self-motivation and discipline Communication (especially over calls and Slack) Collaboration tools (Zoom, Trello, Asana, Jira) How to Find Work from Home IT Jobs in Pune Here’s how you can effectively search and land a remote job: Online Job Portals Naukri, Indeed, Monster India Remote job portals: We Work Remotely, Remote OK, AngelList Company Websites Visit career pages of IT companies and filter for “Remote” LinkedIn Set your job preferences to remote Network with recruiters and join Pune-based tech communities Freelancing Platforms Upwork, Freelancer, Toptal, Fiverr Ideal for project-based work or multiple clients Tech Communities GitHub, Stack Overflow, Reddit (r/remotejs, r/freelance) Remote Work Etiquette and Tools for Success Working from home doesn’t mean working less. To succeed, keep these points in mind: Best Practices: Create a dedicated workspace at home Stick to a fixed schedule Communicate regularly with your team Essential Tools: Communication: Slack, Microsoft Teams, Zoom Project Management: Jira, Trello, Asana Version Control: GitHub, GitLab Cloud Collaboration: Google Workspace, Notion Remote IT Job Salary Expectations in Pune Job Role Entry-Level (₹/annum) Mid-Level (₹/annum) Senior-Level (₹/annum) Software Developer ₹6-8 LPA ₹10-15 LPA ₹18-25 LPA Data Scientist ₹7-10 LPA ₹15-20 LPA ₹25-30 LPA DevOps Engineer ₹8-12 LPA ₹15-18 LPA ₹20-28 LPA Cybersecurity Analyst ₹6-10 LPA ₹12-16 LPA ₹18-22 LPA UI/UX Designer ₹4-6 LPA ₹7-10 LPA ₹12-15 LPA Conclusion – Work from Home Jobs in Pune for IT Professionals Pune offers a thriving environment for IT professionals who want to embrace the remote work lifestyle. Whether you’re a coder, data wizard, or cloud expert, the opportunities are vast and rewarding. With the right skills, mindset, and tools, working from home can lead to a fulfilling and successful tech career without leaving your comfort zone. FAQs: Best Work from Home Jobs in Pune for IT Professionals Are IT companies in Pune offering permanent remote jobs in 2025? Yes, many IT firms like TCS, Infosys, and startups have embraced hybrid or fully remote models permanently. What are the most in-demand tech skills for remote jobs in Pune? Skills in full-stack development, cloud computing, data science, and DevOps are highly sought after. Can freshers in Pune apply for remote IT jobs? Yes, several entry-level roles are open for freshers, especially in web development, testing, and technical support. Which platforms are best to find freelance IT work from Pune? Upwork, Freelancer, Toptal, and Fiverr are excellent platforms for finding freelance IT projects. Do remote jobs in Pune pay as much as in-office jobs? Generally, the pay is similar or sometimes even better, especially in international remote roles. What tools are essential for remote IT work? Common tools include Slack, Zoom, GitHub, Jira, Trello, and Google Workspace. Can I work for international companies from Pune remotely? Absolutely. Many international firms hire Indian IT professionals for fully remote roles. How can I stay productive while working from home? Set up a dedicated workspace, follow a schedule, and use productivity tools like Notion and Trello. Are remote jobs in Pune secure and stable? Yes, as long as you’re working for a legitimate company and deliver consistent results, remote jobs are secure. What certifications can boost my chances of getting remote IT jobs? Certifications in AWS, Azure, Google Cloud, Python, Data Science, and cybersecurity add great value. Related Posts: Top 10 Remote Customer Service Jobs You Can Start Today The Pros and Cons of Working Remote Data Entry Jobs How to Land Your First Remote Entry-Level Job: Tips and Tricks How to Thrive in Remote Customer Service Jobs: Tips for Success Best Remote Customer Success Jobs You Can Work From Anywhere Top Remote Front End Developer Jobs Hiring in 2025 Top 10 Work from Home Jobs in Delhi Hiring Now Legit Work From Home Jobs for Stepmoms: Real Opportunities & Flexible Roles in 2025 Show more Show less

Posted 3 weeks ago

Apply

6.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Position Summary... What you'll do... Job Description Summary: Responsible for coding, unit testing, building high performance and scalable applications that meet the needs of millions of Walmart-International customers, in the areas of supply chain management ; Customer experience. About Team: Our team collaborates with Walmart International, which has over 5,900 retail units operating outside of the United States under 55 banners in 26 countries including Africa, Argentina, Canada, Central America, Chile, China, India, Japan, and Mexico, to name a few. What you'll do: Architect, Design, build, test and deploy cutting edge solutions at scale, impacting millions of customers worldwide drive value from data at Walmart Scale Interact with Walmart engineering teams across geographies to leverage expertise and contribute to the tech community. Engage with Product Management and Business to drive the agenda, set your priorities and deliver awesome product features to keep platform ahead of market scenarios. Identify right open source tools to deliver product features by performing research, POC/Pilot and/or interacting with various open source forums Develop and/or Contribute to add features that enable customer analytics at Walmart scale Deploy and monitor products on Cloud platforms Develop and implement best-in-class monitoring processes to enable data applications meet SLAs What you'll bring: Min 6 -10 years of web based application development experience Demonstrates up-to-date expertise in building enterprise grade web based applications. Proficient in GUI technologies like React.js , JavaScript, HTML, CSS. End to end knowledge of full stack web application development using JAVA/ Springboot, Kafka, RESTFul services, API and other frameworks. Passionate about building user friendly, intuitive web applications to solve complex business problems. Extremely strong technical background, being hands-on and earn the respect and ability to mentor top individual technical talent. Good experience of working with globally distributed teams in a collaborative and productive manner. Excellent interpersonal skills, good with people, ability to negotiate. Retail experience is huge plus About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. Thats what we do at Walmart Global Tech. Were a team of software engineers, data scientists, cybersecurity experts and service professionals within the worlds leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Equal Opportunity Employer: Walmart, Inc. is an Equal Opportunity Employer By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting, and valuing unique styles, experiences, identities, ideas and opinions while being inclusive of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 3years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 5 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, GISF, CISSP, CCSP, or GSEC, Master’s degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 1 year’s experience leading information security or cybersecurity projects Information Technology - CISCO Certification - Certification Primary Location... Pardhanani Wilshire Ii, Cessna Business Park, Kadubeesanahalli Village, Varthur Hobli , India R-2096752 Show more Show less

Posted 3 weeks ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Position Summary... What you'll do... Job Description Summary: Responsible for coding, unit testing, building high performance and scalable applications that meet the needs of millions of Walmart-International customers, in the areas of supply chain management ; Customer experience. About Team: Our team collaborates with Walmart International, which has over 5,900 retail units operating outside of the United States under 55 banners in 26 countries including Africa, Argentina, Canada, Central America, Chile, China, India, Japan, and Mexico, to name a few. What you'll do: You are responsible for coding, unit testing, building high performance and scalable applications that meet the needs of millions of Walmart-International customers, in the areas of supply chain management ; Customer experience. You are expected to be more intellectually curious engineer who is passionate about domain/technology in general. What you'll bring: Expert knowledge of java, J2EE, Technologies. Demonstrated knowledge of Restful Web Services. Demonstrated knowledge of Design Patterns. Experience in API Development. Demonstrated knowledge of Data Structures and Algorithms. Demonstrated knowledge of SQL and no-SQL technologies such as Oracle, Kafka About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. Thats what we do at Walmart Global Tech. Were a team of software engineers, data scientists, cybersecurity experts and service professionals within the worlds leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Equal Opportunity Employer: Walmart, Inc. is an Equal Opportunity Employer By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting, and valuing unique styles, experiences, identities, ideas and opinions while being inclusive of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 3years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 5 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, GISF, CISSP, CCSP, or GSEC, Master’s degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 1 year’s experience leading information security or cybersecurity projects Information Technology - CISCO Certification - Certification Primary Location... Pardhanani Wilshire Ii, Cessna Business Park, Kadubeesanahalli Village, Varthur Hobli , India R-1642453 Show more Show less

Posted 3 weeks ago

Apply

3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

SOC Analyst Location: Pune(Aundh/Baner),India (On-site, In-House SOC) Department: Security Operations Center Experience: 1–3 Years Work Type: Full-time| Hybrid Model | 24x7 Rotational Shifts Role Overview: As a SOC Analyst, you will be part of our in-house 24x7 Security Operations Centre based in Pune. You will be responsible for monitoring, analyzing, and responding to security incidents and alerts using cutting-edge security technologies and platforms. This role is a great opportunity to grow in a fast-paced FinTech environment leveraging tools like QRadar SIEM, CrowdStrike XDR, Netskope DLP, AWS Cloud Security, Sysdig, Falco, Canary Tokens, and G-Suite Security and other security solutions. Key Responsibilities: Continuously monitor security alerts and events using QRadar SIEM , CrowdStrike , Falco , and other integrated tools. Perform initial triage and analysis to assess the nature and severity of potential security incidents. Escalate incidents in line with established procedures and severity levels. Create, update, and manage incident tickets throughout their lifecycle using ticketing systems. Analyze logs and security data from various sources, including AWS Cloud , G-Suite , and endpoint solutions. Assist in proactive threat hunting and detection of malicious activity across systems and applications. Technical experience working in a SOC and cybersecurity incident response. Generate daily, weekly, and ad-hoc reports detailing SOC operations and incident statistics. Support 24x7 operations by participating in rotational shifts, including nights and weekends. Understanding of AWS Services for security detection and mitigation. Follow standard operating procedures (SOPs), incident response runbooks, and recommend improvements where necessary. Understanding of network protocols (TCP/IP stack, SSL/TLS, IPSEC SMTP/IMAP, FTP, HTTP, etc.). Hands-on experience in security monitoring, Incident Response (IR), security tools configuration, and security remediation. Creation of reports, dashboards, metrics for SOC operations and presentation to Sr. Management. Understanding of Operating System, Web Server, database, and Security devices (firewall/NIDS/NIPS) logs and log formats. Ensure all actions are compliant with internal policies, security standards, and regulatory requirements. Required Skills & Experience: 1–3 years of hands-on experience in SOC operations or cyber security monitoring. Exposure to SIEM tools, preferably IBM QRadar . Experience with Endpoint Detection & Response (EDR) solutions such as CrowdStrike . Familiarity with DLP (preferably Netskope) and cloud-native security tools. Working knowledge of Linux/Unix command line and scripting basics. Understanding of AWS Cloud Security concepts . Knowledge of TCP/IP, DNS, HTTP, and other networking protocols. Familiarity with common attack vectors and threat landscape (MITRE ATT&CK framework is a plus). Good to Have: Experience with Falco , Sysdig , or other container security tools. Exposure to Canary tokens or deception technologies. Basic certifications such as CompTIA Security+, CEH, AWS Security Specialty, or CrowdStrike CCFA . What We Offer: Opportunity to work with modern cloud-native security stack. Learn and grow in an innovative FinTech environment. Mentorship and training on advanced threat detection and response practices. Strong team culture focused on collaboration and technical excellence. Competitive salary and shift allowances. Show more Show less

Posted 3 weeks ago

Apply

0 years

0 Lacs

Guindy, Tamil Nadu, India

Remote

Linkedin logo

Req ID: 126237 Remote Position: No Region: Asia Country: India State/Province: Chennai City: Guindy, Chennai General Overview Functional Area: Information Technology (ITM) Career Stream: IT Risk & Compliance (RAC) Role: Associate (AST) Job Title: Associate, Information Security Job Code: AST-ITM-SECR Job Level: Band 6 Direct/Indirect Indicator: Indirect Summary Position Summary: The Cybersecurity Fresher Hire will work alongside experienced cybersecurity professionals to gain practical experience in various aspects of information security. This role will provide hands-on training and mentorship, enabling the successful candidate to develop a strong foundation in cybersecurity principles and practices. The ideal candidate will be eager to learn, possess a strong work ethic, and demonstrate a genuine passion for cybersecurity. Detailed Description Responsibilities Assist in monitoring security systems and logs for potential security incidents. Participate in security assessments and vulnerability scans. Support the implementation and maintenance of security tools and technologies. Contribute to the development and maintenance of security documentation and procedures. Assist in incident response activities, including data collection and analysis. Stay up-to-date on the latest cybersecurity threats and trends. Collaborate with other IT teams to ensure security best practices are followed. Perform1 basic security configuration tasks as directed. Participate in security awareness training and initiatives. Assist in the creation of basic security reports. Knowledge/Skills/Competencies Required Skills And Qualifications Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field (or equivalent2 coursework/certifications). Basic understanding of networking concepts (TCP/IP, DNS, etc.). Familiarity with operating systems (Windows, Linux). Knowledge of cybersecurity principles and concepts (firewalls, intrusion detection, etc.). Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team.3 Strong work ethic and attention4 to detail. Eagerness to learn and adapt to new technologies. Basic scripting knowledge (e.g., Python, Bash) is a plus. Relevant certifications (e.g., CompTIA Security+, Network+) are a plus. Genuine interest in pursuing a career in cybersecurity. Preferred Skills (Optional) Experience with security tools (e.g., Wireshark, Nmap). Knowledge of security frameworks (e.g., NIST, ISO 27001). Understanding of cloud security concepts. Experience in a lab environment dealing with virtual machines. Training And Development On-the-job training and mentorship from experienced cybersecurity professionals. Opportunities to pursue relevant industry certifications. Access to internal and external training resources. Exposure to various cybersecurity domains. Benefits Competitive salary and benefits package. Opportunity to work in a dynamic and growing field. Career advancement opportunities. Supportive and collaborative work environment. To Apply: Please submit your resume, cover letter, and any relevant certifications or projects to [email address/application portal]. Note: This job description is intended to provide a general overview of the responsibilities and qualifications for this position. It is5 not intended to be an exhaustive list of all duties and responsibilities. The company reserves the right to modify this job description as needed. Physical Demands Duties of this position are performed in a normal office environment. Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required. Typical Experience Typical Education Bachelor's Degree or consideration of an equivalent combination of education and experience. Educational Requirements may vary by Geography Notes This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time. Celestica is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law). At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. Special arrangements can be made for candidates who need it throughout the hiring process. Please indicate your needs and we will work with you to meet them. Company Overview Celestica (NYSE, TSX: CLS) enables the world’s best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development – from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers. Celestica would like to thank all applicants, however, only qualified applicants will be contacted. Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services. Show more Show less

Posted 3 weeks ago

Apply

Exploring Security+ Jobs in India

Security+ is a highly sought-after certification in the IT industry, especially in the field of cybersecurity. In India, the demand for security+ professionals is on the rise as companies focus on enhancing their security measures to protect sensitive data and prevent cyber attacks. Job seekers with security+ certification have a competitive edge in the job market and can explore various opportunities in this field.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Mumbai
  5. Delhi

These cities are known for their thriving IT industries and offer numerous job opportunities for security+ professionals.

Average Salary Range

The average salary range for security+ professionals in India varies based on experience and expertise. Entry-level positions may offer salaries ranging from INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 10-15 lakhs per annum.

Career Path

A typical career progression in the security+ field may include roles such as: - Junior Security Analyst - Security Consultant - Security Architect - Chief Information Security Officer

As professionals gain experience and expertise, they can move up the career ladder and take on more challenging and rewarding roles.

Related Skills

In addition to security+, professionals in this field are often expected to have skills in: - Network Security - Information Security Management - Penetration Testing - Risk Assessment - Incident Response

Having a combination of these skills can enhance job prospects and open up more opportunities in the cybersecurity domain.

Interview Questions

  • What is the difference between symmetric and asymmetric encryption? (medium)
  • Explain the concept of a firewall and its importance in network security. (basic)
  • How do you handle a security breach in an organization? (advanced)
  • What is the role of encryption in data security? (basic)
  • Can you explain the concept of zero-day vulnerability? (medium)
  • How would you secure a wireless network from potential threats? (medium)
  • Describe the steps involved in a security risk assessment. (advanced)
  • What are the common types of cyber attacks and how can they be prevented? (medium)
  • Explain the concept of multi-factor authentication. (basic)
  • How do you stay updated with the latest security trends and technologies? (basic)
  • What is the importance of regular security audits in an organization? (medium)
  • How would you respond to a ransomware attack on a company's systems? (advanced)
  • Can you explain the concept of a VPN and its role in securing network communications? (basic)
  • Describe the process of conducting a penetration test on a system. (medium)
  • How do you ensure compliance with data protection regulations such as GDPR? (advanced)
  • What is the role of a Security Information and Event Management (SIEM) system in cybersecurity? (medium)
  • How would you secure an IoT (Internet of Things) device from potential security threats? (medium)
  • Explain the concept of social engineering in the context of cybersecurity. (basic)
  • What are the key elements of a cybersecurity policy for an organization? (basic)
  • How do you prioritize security vulnerabilities for remediation in a large-scale network? (advanced)
  • Can you explain the difference between white-box and black-box testing in security assessments? (medium)
  • Describe a recent security project you worked on and the challenges you faced. (advanced)
  • How would you educate employees in an organization about the importance of cybersecurity? (basic)
  • What steps would you take to secure a cloud-based infrastructure from cyber threats? (medium)
  • How do you handle sensitive data securely in a remote work environment? (basic)

Closing Remark

As you explore job opportunities in the security+ domain in India, remember to showcase your skills, knowledge, and experience confidently during interviews. Prepare well, stay updated with the latest trends in cybersecurity, and showcase your passion for securing digital assets. With dedication and perseverance, you can build a successful career in the dynamic field of cybersecurity. Good luck with your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies