Jobs
Interviews

1059 Security+ Jobs - Page 24

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Job Summary This role involves designing, implementing, and maintaining security solutions across on-premise and cloud environments, responding to incidents, performing threat analysis, and ensuring compliance with internal and regulatory security requirements. The engineer collaborates with IT, Compliance, and Business teams to proactively mitigate risks and enforce security controls throughout the IT ecosystem, ensuring compliance with the Group’s cybersecurity framework and international standards such as CIS, NIST and ISO 27001. Main Responsibilities * Configure and manage security tools (e.g., firewalls, endpoint protection, email security, VPN, EDR/XDR, DLP, IPS/IDS, PAM). * Maintain and fine-tune SIEM systems and threat detection platforms. * Manage MFA, conditional access policies, and identify protection mechanisms. * Support patching, system hardening, and network segmentation activities. * Participate in IT projects by reviewing security requirements and contributing to secure implementation. * Perform and follow up on vulnerability scans and remediation actions. * Maintain an up-to-date threat landscape and proactively mitigate risks based on CVEs and zero-day disclosures. * Support incident response and root cause investigations. * Maintain technical documentation and update security configurations as needed. * Contribute to the ISO 27001 certification process, including control implementation and audit support. * Ensure all technical solutions align with Group IT security policies and standards. Job Requirements * Degree in IT, Cybersecurity, or related field. * 3+ years of experience in IT security * Familiarity with firewalls, endpoint protection, email security, VPN, EDR/XDR, DLP, IPS/IDS, PAM solutions * Exposure to ISO 27001 and/or regulatory compliance frameworks. * Experience with SIEM tools is an advantage * Certifications such as CEH, Security+, Fortinet NSE, Cloud Security or Cisco Security are an advantage. * Analytical thinking, technical troubleshooting, and good communication skills. * Self-motivated, able to deliver consistent results through problem solving. * Ability to work collaboratively with others and excellent team working skills. * A high sense of responsibility and service ownership * A can-do attitude Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job Description Who We Are Sureifys mission is to modernize the life insurance and annuity industry by helping carriers acquire, service, and engage their customers through any distribution channel. Sureifys products empower life insurance carriers, agents, employees, and customers to have the digital experiences that employees and consumers have come to expect in the rapidly advancing tech climate. Your Role as a Valued Team Member We are seeking a detail-oriented and proactive Vulnerability Remediation Engineer to join our growing Infosec team. The person will be responsible for reducing the risk exposure of security vulnerabilities from the scope of Sureify overall. This role entails monitoring ongoing security vulnerabilities, analyzing risk posture, collaborating with stakeholders/finding owners for managing resolutions, and acting as an SME to assess discovered vulnerabilities. You will also provide pragmatic solutions and be flexible in supporting emergency vulnerability remediations. The ideal candidate will possess a strong understanding of security protocols, vulnerability management, system administration, and software development lifecycle, as well as excellent communication skills to collaborate with cross-functional teams. This role does require some overlap of hours with a team based in San Jose, California. Your Key Responsibilities Review and assess security vulnerabilities, patches, and findings from internal audits, security scans, and penetration tests. Prioritize vulnerabilities based on risk and impact, and ensure timely patching or remediation. Enforce patch compliance by tracking deployments, addressing exceptions, and ensuring adherence to vulnerability remediation Service Level Agreements (SLAs). Collaborate with security and IT teams to develop and implement security patches for critical vulnerabilities. Work closely with developers and DevOps teams to understand the root cause of security vulnerabilities and propose appropriate fixes. Assist development teams in the integration of security features and secure coding practices throughout the software development lifecycle (SDLC). Develop and maintain scripts for automated patch deployment across various systems and applications. Automate vulnerability patching workflows using scripting languages such as Python, PowerShell, Bash, etc. Collaborate with the development team to create and test patches, ensuring that they do not disrupt the functionality of applications or systems. Maintain detailed records of patches, and remediation actions. Prepare and present reports on patch management progress, risks, and status to senior management. Flexibly support emergency response for 0-day vulnerability remediation. Automating processes of security from time to time when needed. Identify potential improvement areas for vulnerability remediation and share lessons learned. Continuously monitor for emerging vulnerabilities and maintain an up-to-date patching schedule. Role Requirements Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field (or equivalent work experience). Server administration experience (Windows/RHEL) with a solid understanding of industry best practices for Patch Management and Vulnerability Remediation. Experience in vulnerability management, security patching, or related security roles. Experience supporting vulnerability emergency response or security incidents, including coordinating with relevant stakeholders, implementing corrective/preventive actions, and guiding security patching of software or components. Strong knowledge of security vulnerabilities in software and infrastructure components (servers, clients, network devices, perimeter security technologies, protocols/services, middleware, databases, configurations, etc.). In-depth understanding of security processes related to vulnerability management, security patching, security configurations, and technical security validations. Strong understanding of common network protocols (TCP/IP, DNS, HTTP, HTTPS, SMTP, etc.) and how vulnerabilities in these protocols can affect system security. Strong experience in at least one scripting language such as Python, PowerShell, Bash, etc. Familiarity with cloud platforms (AWS) and their security models. Knowledge of Cloud & Vulnerability Security tools such as Qualys, SentinelOne, or Crowdstrike Good understanding of industry-standard regulations and risk management frameworks (e.g., ISO, SOC, HIPAA, GDPR, CCPA). Familiarity with security frameworks such as SANS Top 25, OWASP Top 10, and/or MITRE ATT&CK. Knowledge of secure coding practices and development environments. Familiarity with container security (Docker, Kubernetes) and securing microservices is a plus. Security certifications such as Security+, SSCP, CEH, or other equivalent recognized certifications are a plus. Excellent communication and interpersonal skills, with the ability to articulate complex technical vulnerabilities and remediation actions to both technical and non-technical stakeholders. Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

On-site

At Aspire, we’re more than just a FinTech company—we’re the leading all-in-one financial operating system built to empower the world’s innovators and entrepreneurs. We are on a mission to reinvent business finance, empowering startups and businesses to realise their full potential. Founded in 2018, Aspire has raised over USD 300M+ across equity and debt from world-class investors. In 2023, we successfully closed an oversubscribed USD 100 million Series C equity round led by Sequoia Capital and Lightspeed Ventures with participation of Tencent, Paypal Ventures, LGT Capital Partners, Picus Capital and MassMutual Ventures. To power our solutions, we have partnered with some of the best companies in the world such as Visa and Wise and empowered more than 50,000 businesses using our suite of products. Aspire has consistently been recognized for excellence, earning Best Employer and Startup of the Year by the Asia FinTech Awards in 2022 and 2023 , ranked as LinkedIn’s Top Startup in Singapore , and listed on CB Insights’ Top 100 Global Fintech in 2023 and 2024. You will be amazed by the energy and experience of our team! Aspire serves as an environment for you to innovate and drive change with our team of ex-entrepreneurs, ex-founders, and high-achievers with international and diverse backgrounds. Are you a top talent who is passionate about entrepreneurship? Join our rapidly growing team to make an impact in the fintech space! About the team: At Aspire, we recognize that data and infrastructure security are paramount to the success and trust of our customers. Our Security Team is at the forefront of protecting and securing our systems, ensuring compliance with industry best practices, and continuously learning and evolving to stay ahead of emerging threats. Our emphasis extends to data privacy, seamlessly integrating it into our security initiatives. About the role: As a Senior SOC Engineer at Aspire, you'll play a pivotal role in the administration of our IT systems, SOC development, and swift response to security alerts. Join a dynamic and rapidly growing security team, with minimal requirements for on-premise administration. Your expertise in cloud environments and Software as a Service (SaaS) will be indispensable. What You’ll Do: Build and improve our SOC: Use Azure Sentinel , Grafana , related monitoring systems and other tools you find useful (tell us what we should build better!). Monitor security events: Detect threats by analyzing logs, alerts, and unusual behavior. Automate responses: Create Python Logic Apps / playbooks to respond faster to incidents. Threat hunting: Search for threats proactively, using models like MITRE ATT&CK. Improve detection: Use threat modeling and behavioral analytics to build better alerts. Work with teams: Help product teams to log the right data and improve visibility. Support incidents: Jump into incident response, root cause analysis, and recovery planning. Write clear docs: Create SOPs, FAQs, user guides, security policies and procedures. Support day-to-day ops: Be involved in both security and IT operations. What We’re Looking For: Hands-on builder for SIEM/SOAR/EDR/Security automation tools — especially Sentinel and MS Defender . Experience with cloud environments — mostly Azure and AWS . Automation skills — you can script in Python , Bash , Powershell and use REST APIs, JSON, YAML or similar in Linux, Mac and Windows systems. Security analysis experience — logs, traffic, memory forensics, malware, etc. Frameworks-savvy — you know MITRE ATT&CK , Cyber Kill Chain , and how to use them. Problem-solver — you’re great at finding root causes and fixing things fast. Strong communicator — clear in both written and spoken English. Degree in IT or related field Willing to be on-call when an incident struck. Nice to Have: Certifications like Security+, CISSP, GCIH , etc. Knowledge of Microsoft 365 , Intune , Entra , Cloudflare , GitHub , or Google Workspace . Experience fixing or retesting offensive security . A tech blog , GitHub portfolio, or personal project to show your passion. Software development skills, especially in PHP, Go, Terraform and Ansible. Personal tech projects showcased on platforms like a blog or Github. What we offer Uncapped flexible annual leave. Hybrid work arrangement. Training subsidy for your professional growth. Wellness benefit. Team bonding budget to foster collaboration and sense of belonging. Flexibility to work from anywhere (for up to 90 days per annum). Culture is Key: We always strive to cultivate a special culture that brings special talents together - You can learn more about our culture on our careers site and LinkedIn Life page . Equal Opportunity Statement Aspire is an equal opportunity employer and is committed to providing equal employment opportunities to all qualified individuals without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or any other protected characteristic as outlined by applicable laws. Please note: by submitting your application, you acknowledge that you have read and understood Aspire’s Data Protection Policy for Employees, Freelancers, Contractors and Job Applicants (the “ Policy ”) , and consent to the collection, use and disclosure of your personal data by Aspire for the purposes set out in the Policy. You may withdraw consent for such collection, use and disclosure, and make an access or correction request in respect of your personal data, in accordance with the Policy by emailing people@aspireapp.com . Show more Show less

Posted 1 month ago

Apply

4.0 years

3 - 5 Lacs

Hyderābād

On-site

We are the leading provider of professional services to the middle market globally, our purpose is to instill confidence in a world of change, empowering our clients and people to realize their full potential. Our exceptional people are the key to our unrivaled, inclusive culture and talent experience and our ability to be compelling to our clients. You’ll find an environment that inspires and empowers you to thrive both personally and professionally. There’s no one like you and that’s why there’s nowhere like RSM. Position Description A Managed IT Back Office Engineer, within our Technology Consulting group, provides you with a unique opportunity to be a part of our dynamic practice. As our company continues to grow, we are looking for individuals who seek roles that expose them to multiple facets of technology including monitoring, security, and continuity services. Our team is composed of smart, self-motivated individuals who thrive in a cohesive and results-oriented environment and enjoy the challenge of real responsibility. As a Managed IT Back Office Engineer, you will work directly with our highly trained engineering team and have access to a large cross-section of technologies and environments that will develop your career. Profile : A Managed IT Back Office Engineer provides operational support to our service desk while configuring, maintaining, and improving efficiencies on several technology services. This position requires strong technical ability, self-motivation, and the desire to learn. These attributes will be used in a fast-paced, fun, team-oriented environment. Job Duties and Responsibilities: Support and maintain large complex technology solutions across multiple diverse client environments including: Monitoring Solutions Security Solutions Backup Solutions Patching Solutions Adopt and learn new technologies Interface with the service desk and consulting teams to resolve client issues. Maintain client security standards and confidentiality of information As a Managed IT Back Office Engineer, you will receive mentoring from our experienced team and have access to a variety of technology and training. You will be exposed to several aspects of our Technology Consulting Practices, including: Information Technology process, tools, and methodologies Security Solution architecture, design, and best practices Engaging with our internal teams and developing their solution knowledge. Basic Qualifications 4-7 years of experience working in Information Technology Security Solutions Preferred Qualifications Microsoft or Security+ Certification Expertise utilizing Wintel Bachelor's degree Experience with monitoring protocols, such as WMI and SNMP Experience with vulnerability remediation and feature updates Experience with Monitoring, Antivirus, Backup, and Patching Solutions Experience with Windows Server and Workstation Operating Systems Experience with Hyper V hosts and Hyper V manager for administration Fundamental understanding of Network and Domain operation Familiar with standard IT practices and policies Knowledge, Skills and Abilities: Excellent written and verbal communication skills Able to quickly assess situations to pinpoint the scope/source of technical issues in a complex solution Must be able to manage individual workload Must be a strong team player Shift : 2PM to 11PM & 3PM to 12PM At RSM, we offer a competitive benefits and compensation package for all our people. We offer flexibility in your schedule, empowering you to balance life’s demands, while also maintaining your ability to serve clients. Learn more about our total rewards at https://rsmus.com/careers/india.html . RSM does not tolerate discrimination and/or harassment based on race; colour; creed; sincerely held religious beliefs, practices or observances; sex (including pregnancy or disabilities related to nursing); gender (including gender identity and/or gender expression); sexual orientation; HIV Status; national origin; ancestry; familial or marital status; age; physical or mental disability; citizenship; political affiliation; medical condition (including family and medical leave); domestic violence victim status; past, current or prospective service in the Indian Armed Forces; Indian Armed Forces Veterans, and Indian Armed Forces Personnel status ; pre-disposing genetic characteristics or any other characteristic protected under applicable provincial employment legislation. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process and/or employment/partnership. RSM is committed to providing equal opportunity and reasonable accommodation for people with disabilities. If you require a reasonable accommodation to complete an application, interview, or otherwise participate in the recruiting process, please send us an email at careers@rsmus.com .

Posted 1 month ago

Apply

3.0 years

7 - 8 Lacs

Hyderābād

On-site

We are the leading provider of professional services to the middle market globally, our purpose is to instill confidence in a world of change, empowering our clients and people to realize their full potential. Our exceptional people are the key to our unrivaled, inclusive culture and talent experience and our ability to be compelling to our clients. You’ll find an environment that inspires and empowers you to thrive both personally and professionally. There’s no one like you and that’s why there’s nowhere like RSM. We are seeking analyst level individuals with experience working in the field of cybersecurity and a desire to help organizations improve their operations to join our team and help run the ongoing security operations for RSM clients in a variety of industries and geographic locations. Successful candidates will have working knowledge in some or all these areas – IT operations, security monitoring, active directory, IP networking and various cloud technologies. Position and Key Responsibilities At RSM, analysts work with large and small companies in variety of industries. They develop strong working relationships with their peers within the security operations center (SOC) while learning their clients’ businesses and challenges facing their organizations. Analysts work as part of a broader team under the direction of more senior analysts, threat hunters, shift leads, intelligence analysts and SOC managers in support of multiple clients. Working in a mutually respectful team environment helps our analysts perform at their best and integrate their career with their personal life. You will have the opportunity to: Role Responsibilities: Investigate security incidents using SIEM tools, automation, and other cybersecurity technologies (i.e. ServiceNow, Stellar Cyber, Hyas Insight and DNS Protect, sentinel One, ELK Stack, Virus total, Shodan, NetFlow, Passive DNS, Silobreaker, Tenable.io, Hatching Triage Sandbox) Analyze, escalate, and assist in remediation of critical security incidents. Improve and challenge existing processes and procedures in a very agile and fast-paced information security environment serving multiple clients Process IDS alerts and identifying incidents and events in customer data. Setup and execution and analysis of vulnerability scans Perform advanced analysis and investigation into alerts as they are identified Performing initial basic malware analysis utilizing automated means (static and dynamic sandbox analysis or other available tools) Incident intake, ticket updates and reporting of cyber events and threat intelligence Understanding, identifying, and researching indicators of compromise (IOCs) from a variety of sources such as threat intelligence reports and feeds Writing incident reports, process documentation, and interact with clients as required Transcribe and implement atomic indicators into a monitoring environment. Consume policy documentation and determine applicability in a network. Work with protocols at layers 2 and higher in the OSI model, to include ARP TCP, UDP, ICMP, DNS, Telnet, SSH, HTTP, SSL, SNMP, SMTP, and other common protocols that use well-known ports. Develops the playbooks to respond and recovery from various attacks/incidents. Drives the automation efforts focused on the closing cases, responding to Cyber events and analyzing data required to enable efficient response activities. Processing of Cyber Threat Intel that is used across RSM detection platforms to understand and prepare for potential threats. Threat intel is heavily used across RSM platforms drive issue prioritization. Open to working shifts in a 24x7 operations environment. Qualifications and Experience: Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences or prior relevant military / law enforcement experience. Computer science, information technology, information systems management, or other similar degrees preferably with a focus on information security 3-5 years’ experience working in a security operations center, networking operations center or threat intelligence capacity. Possess at least one security industry certification such as CYSA+, Security+, CISSP, SANS GIAC (GSOC, GCIA, GMON, CGCDA) Knowledge of security standards and information security and compliance frameworks, controls, and best practices, including SSAE 16, SOC 2 and SOC3, OWASP Top 10, SANS, NIST Must have a naturally curious mindset and approach to solving problems. Basic understanding of cloud technologies and their operations Experience supporting various operating systems such as Windows/Linux Understanding of IP network protocols At RSM, we offer a competitive benefits and compensation package for all our people. We offer flexibility in your schedule, empowering you to balance life’s demands, while also maintaining your ability to serve clients. Learn more about our total rewards at https://rsmus.com/careers/india.html . RSM does not tolerate discrimination and/or harassment based on race; colour; creed; sincerely held religious beliefs, practices or observances; sex (including pregnancy or disabilities related to nursing); gender (including gender identity and/or gender expression); sexual orientation; HIV Status; national origin; ancestry; familial or marital status; age; physical or mental disability; citizenship; political affiliation; medical condition (including family and medical leave); domestic violence victim status; past, current or prospective service in the Indian Armed Forces; Indian Armed Forces Veterans, and Indian Armed Forces Personnel status ; pre-disposing genetic characteristics or any other characteristic protected under applicable provincial employment legislation. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process and/or employment/partnership. RSM is committed to providing equal opportunity and reasonable accommodation for people with disabilities. If you require a reasonable accommodation to complete an application, interview, or otherwise participate in the recruiting process, please send us an email at careers@rsmus.com .

Posted 1 month ago

Apply

0 years

10 - 10 Lacs

Hyderābād

On-site

Who We Are: In today's work environment, employees use a myriad of devices to access IT applications and data over multiple networks to stay productive, wherever and however they work. Ivanti elevates and secures Everywhere Work so that people and organizations can thrive. While our headquarters is in the U.S., half of our employees and customers are outside the country. We have 36 offices in 23 nations, with significant offices in London, Frankfurt, Paris, Sydney, Shanghai, Singapore, and other major cities around the world. Ivanti's mission is to be a global technology leader enabling organizations to elevate Everywhere Work, automating tasks that discover, manage, secure, and service all their IT assets. Through diverse and inclusive hiring, decision-making, and commitment to our employees and partners, we will continue to build and deliver world-class solutions for our customers. Our Culture - Everywhere Work Centered Around You At Ivanti, our success begins with our people. This is why we embrace Everywhere Work across the globe, where Ivantians and our customers are thriving. We believe in a healthy work-life blend and act on it by fostering a culture where all perspectives are heard, respected, and valued. Through Ivanti's Centered Around You approach, our employees benefit from programs focused on their professional development and career growth. We align through our core values by locking arms in collaboration, being champions for our customers, focusing on the outcomes that matter most and fighting the good fight against cyber-attacks. Are you ready to join us on the journey to elevate Everywhere Work? What will you be doing Monitor and respond to security alerts and incidents. Support in the implementation and enforcement of security policies and procedures. Document security incidents and prepare incident reports. Help with internal audits and compliance checks. Research the latest cyber threats and mitigation strategies. To Be Successful in The Role, You Will Have: Bachelor's degree in cyber security, Computer science, Information Technology, or a related field. Strong academic performance. Completion of at least one industry-recognized cyber security certification (e.g., CompTIA Security+, CEH, CCNA, or equivalent). Basic knowledge of security principles, threats, and technologies. Familiarity with networking fundamentals and system administration concepts. Preferred Skills: Hands-on experience through internships, labs, or personal projects. Understanding of SIEM, firewalls, IDS/IPS, Cloud Security and Email security Solutions. Ability to work independently and in a team. Excellent communication and problem-solving skills. #L1-SHUBHANGI-JOSHI-42826549

Posted 1 month ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Who We Are In today’s work environment, employees use a myriad of devices to access IT applications and data over multiple networks to stay productive, wherever and however they work. Ivanti elevates and secures Everywhere Work so that people and organizations can thrive. While our headquarters is in the U.S., half of our employees and customers are outside the country. We have 36 offices in 23 nations, with significant offices in London, Frankfurt, Paris, Sydney, Shanghai, Singapore, and other major cities around the world. Ivanti’s mission is to be a global technology leader enabling organizations to elevate Everywhere Work, automating tasks that discover, manage, secure, and service all their IT assets. Through diverse and inclusive hiring, decision-making, and commitment to our employees and partners, we will continue to build and deliver world-class solutions for our customers. Our Culture - Everywhere Work Centered Around You At Ivanti, our success begins with our people. This is why we embrace Everywhere Work across the globe, where Ivantians and our customers are thriving. We believe in a healthy work-life blend and act on it by fostering a culture where all perspectives are heard, respected, and valued. Through Ivanti’s Centered Around You approach, our employees benefit from programs focused on their professional development and career growth. We align through our core values by locking arms in collaboration, being champions for our customers, focusing on the outcomes that matter most and fighting the good fight against cyber-attacks. Are you ready to join us on the journey to elevate Everywhere Work? What Will You Be Doing Monitor and respond to security alerts and incidents. Support in the implementation and enforcement of security policies and procedures. Document security incidents and prepare incident reports. Help with internal audits and compliance checks. Research the latest cyber threats and mitigation strategies. To Be Successful In The Role, You Will Have Bachelor’s degree in cyber security, Computer science, Information Technology, or a related field. Strong academic performance. Completion of at least one industry-recognized cyber security certification (e.g., CompTIA Security+, CEH, CCNA, or equivalent). Basic knowledge of security principles, threats, and technologies. Familiarity with networking fundamentals and system administration concepts. Preferred Skills Hands-on experience through internships, labs, or personal projects. Understanding of SIEM, firewalls, IDS/IPS, Cloud Security and Email security Solutions. Ability to work independently and in a team. Excellent communication and problem-solving skills. JOSHI-42826549 Show more Show less

Posted 1 month ago

Apply

1.0 years

0 Lacs

Calicut

On-site

We're Hiring: Cyber Security Faculty Location: Calicut Mode: Full Time Company: Blitz Academy Pvt Ltd Are you passionate about Cyber Security and love sharing your knowledge? Blitz Academy is looking for an experienced and dedicated Cyber Security Faculty to join our academic team. Responsibilities: Deliver engaging lectures on Cyber Security concepts, tools, and real-world applications Guide students in practical labs on ethical hacking, networking security, and incident handling Stay up to date with emerging cyber threats and technologies Prepare learning materials, assignments, and evaluation reports Mentor students in live projects, internships, and certifications Requirements: Bachelor’s or Master’s degree in Computer Science, Information Security, or related field Industry certifications such as CEH, CISSP, Cpent CompTIA Security+, etc. (preferred) Minimum 1–3 years of industry experience in Cyber Security Strong communication and presentation skills What We Offer: A collaborative and innovative teaching environment Opportunities for professional development Competitive compensation based on experience Interested? Send your resume to hr@blitzacademy.org Or WhatsApp us at 9946640307 Join us in shaping the next generation of Cyber Security professionals! Job Types: Full-time, Permanent Pay: Up to ₹30,000.00 per month Benefits: Health insurance Provident Fund Schedule: Day shift Experience: total work: 3 years (Preferred) Work Location: In person Expected Start Date: 20/06/2025

Posted 1 month ago

Apply

0 years

0 Lacs

India

Remote

Job Summary: We are seeking a proactive and skilled IT Support Specialist to join our ship management company’s IT team. This role involves managing and supporting our Microsoft O365 environment, maintaining the company website, ensuring cybersecurity protocols, and providing comprehensive IT hardware support to shore-based employees and the ships. The ideal candidate will have strong technical expertise, excellent problem-solving skills, and experience working in maritime or related industries is a plus. Key Responsibilities: • Microsoft O365 Administration: Manage and maintain Microsoft O365 tenant including user accounts, licenses, email systems (Exchange Online), SharePoint, Teams, and security configurations. • Website Management: Oversee the company’s website infrastructure, ensuring uptime, performance, regular updates, and security. Coordinate with web developers or vendors as needed. • Cybersecurity: Implement and monitor cybersecurity measures including firewalls, antivirus, email filtering, data encryption, access controls, and vulnerability management to protect company data and systems. Conduct regular security audits and compliance checks. • Employee IT Hardware Support: Provide technical support for employee desktops, laptops, mobile devices, and peripherals. Handle hardware procurement, setup, troubleshooting, and maintenance. • IT Support and Troubleshooting: Respond promptly to IT support requests from employees, resolving issues related to software, hardware, network connectivity, and email. Maintain a ticketing system for tracking and reporting. • Backup and Disaster Recovery: Ensure regular backups of critical data and systems, and assist in disaster recovery planning and testing. • Documentation and Training: Maintain up-to-date IT documentation including system configurations, policies, and procedures. Provide training and guidance to employees on IT best practices and security awareness. • Vendor Coordination: Liaise with external IT vendors and service providers for procurement, support, and maintenance of IT systems. Qualifications and Skills: • Bachelor’s degree in Information Technology, Computer Science, or related field preferred. • Proven experience managing Microsoft O365 environments including Exchange Online, SharePoint, and Teams. • Strong knowledge of website hosting, CMS platforms, DNS, and website security best practices. • Solid understanding of cybersecurity principles, tools, and frameworks. • Experience supporting IT hardware including desktops, laptops, and mobile devices. • Familiarity with IT support ticketing systems and remote support tools. • Excellent problem-solving skills and ability to work independently. • Strong communication skills with the ability to train and support non-technical users. • Experience in maritime or shipping industry IT support is an advantage but not mandatory. Preferred Certifications (optional): • Microsoft 365 Certified: Modern Desktop Administrator Associate • CompTIA Security+ or equivalent cybersecurity certification • ITIL Foundation certification #Hiring #IT # ITsupport #Remotejobs #Troubleshooting #MicrosoftOffice365 #webhosting #websecurity #sharepoint #teams Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

Remote

Associate Detection & Response Analyst - MDR We are seeking someone with a passion for cyber security to join our team. As a SOC Analyst with Rapid7 you will work with Rapid7’s advanced tools to investigate and triage high priority security events. Working with Rapid7’s Tactical Operations team (TACOPS) is an ideal opportunity to gain a deep understanding of threat detection and response. As part of this team you will be in the best position to develop the skills needed to build a career in cyber security. This is a hybrid role based in our Arlington, VA Security Operation Center. About The Team Rapid7 Managed Detection and Response (MDR) is built from the ground up to bring motivated and passionate security talent face to face with emerging threats, practical challenges, and evil at scale. Our MDR service uses an impact-driven mindset to focus efforts on effective solutions, encouraging personal and technical innovation within the SOC. MDR provides 24/7/365 monitoring, threat hunting, incident response, and more with a focus on endpoint detection and behavioral intelligence. About The Role Most days for Associate Analysts will consist of reviewing alert data to identify evil activity in customer environments. In these roles you will be empowered to steer investigations. Investigations include everything from evidence acquisition and analysis to figure out how the intrusion began to identify any malicious or unexpected activity related to the event. Based on this investigation you will be responsible for writing an incident report which includes your technical analysts, documented findings and remediation recommendations for customers. Your colleague, a Customer Advisor, will be responsible for direct communication with the customer. You will have fellow analysts who will be ready to help you if you encounter a problem or have a question, including Mid, Senior and Lead Analysts. In addition to live response, in the event of a security incident that rises to the level of a Remote Incident Response engagement, Associate Analysts may be tasked with performing investigation tasks related to the investigation. In this circumstance you will focus on helping a team track threat actor actions across an environment by examining forensic artifacts. Additional information about our team and culture can be found here: https://www.rapid7.com/resources/soc-analysts/ To watch an Associate Analyst in action, check out this webinar: https://www.ultimatewindowssecurity.com/webinars/register.aspx?id=3710 Our Associate Analysts have also contributed to the identification of Zero-Day vulnerabilities: https://www.rapid7.com/blog/post/2022/04/14/cve-2022-28810-manageengine-adselfservice-plus-authenticated-command-execution-fixed/ In This Role, You Will Deliver world-class threat detection services using traditional threat intelligence-based detection and user behavior analytics Conduct or assist with Rapid7 incident response investigations. Assist in capturing and deploying knowledge of attack methodologies Provide continuous input to Rapid7 product development teams The Skills You’ll Bring Include A passion for cybersecurity Problem solving, critical thinking, and ingenuity. A keen curiosity and excitement to learn Willingness to work on a shift schedule, including evenings and a Saturday or Sunday The Rapid7 MDR SOC has a shift rotation which requires associate analysts to work a 4:3 schedule from 10 AM - 8 PM after a 90 day onboarding and training period. The shifts are from Sunday-Wednesday and Wednesday-Saturday. Knowledge of Windows, Linux operating systems Fundamental knowledge of security concepts (lateral movement, privilege escalation, persistence methods, command and control, exfiltration, etc.) Security Certifications (GFACT, GSEC, GCIA, GCIH, CySA+, CASP+, Security+, etc.) Scripting/coding ability Participation in CTF events Participation in red team/blue team training tools such as HackTheBox, TryHackMe, and LetsDefend We know that the best ideas and solutions come from multi-dimensional teams. That’s because these teams reflect a variety of backgrounds and professional experiences. If you are excited about this role and feel your experience can make an impact, please don’t be shy - apply today. About Rapid7 At Rapid7, we are on a mission to create a secure digital world for our customers, our industry, and our communities. We do this by embracing tenacity, passion, and collaboration to challenge what’s possible and drive extraordinary impact. Here, we’re building a dynamic workplace where everyone can have the career experience of a lifetime. We challenge ourselves to grow to our full potential. We learn from our missteps and celebrate our victories. We come to work every day to push boundaries in cybersecurity and keep our 11,000+ global customers ahead of whatever’s next. Join us and bring your unique experiences and perspectives to tackle some of the world’s biggest security challenges. Show more Show less

Posted 1 month ago

Apply

14.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Your work days are brighter here. At Workday, it all began with a conversation over breakfast. When our founders met at a sunny California diner, they came up with an idea to revolutionize the enterprise software market. And when we began to rise, one thing that really set us apart was our culture. A culture which was driven by our value of putting our people first. And ever since, the happiness, development, and contribution of every Workmate is central to who we are. Our Workmates believe a healthy employee-centric, collaborative culture is the essential mix of ingredients for success in business. That’s why we look after our people, communities and the planet while still being profitable. Feel encouraged to shine, however that manifests: you don’t need to hide who you are. You can feel the energy and the passion, it's what makes us unique. Inspired to make a brighter work day for all and transform with us to the next stage of our growth journey? Bring your brightest version of you and have a brighter work day here. At Workday, we value our candidates’ privacy and data security. Workday will never ask candidates to apply to jobs through websites that are not Workday Careers. Please be aware of sites that may ask for you to input your data in connection with a job posting that appears to be from Workday but is not. In addition, Workday will never ask candidates to pay a recruiting fee, or pay for consulting or coaching services, in order to apply for a job at Workday. About The Team The Business Technology DevSecops team works in close partnership with our business partners to help fuel growth and build secure solutions at scale for Workday, along with driving outstanding Customer and employee experiences. The Devsecops team Integrate security practices into the software development lifecycle (SDLC), from design to deployment. Implement CI/CD pipelines with security controls (e.g., SAST, DAST, IAST, vulnerability scanning). Automate security testing and compliance checks. Establish and maintain secure infrastructure and configurations. About The Role This hands-on technical leadership position is critical in the development of innovative solutions and frameworks to solve business challenges and opportunities. This role will be responsible for leading development teams and supporting projects through the full software development lifecycle, including solution design phases. The Devsecops manager will facilitate communication and collaboration between development, security, and operations teams. Work with development teams to promote secure coding practices. Communicate security risks and mitigation strategies to stakeholders. Evaluate, select, and implement security tools and technologies to support DevSecOps practices. Manage and maintain security tools and infrastructure. Ensure the effective use of tools for vulnerability management, threat detection, and incident response. Manage and mentor DevSecOps engineers. Assign tasks, monitor performance, and provide feedback. Support team members' professional development. About You Basic Qualifications Bachelor's degree in computer science, information security, or a related field. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+, Certified DevSecOps Professional) are highly desirable At least 14+ years experience in the IT industry 8+ years in DevOps, security engineering, or a related role with at least 3 years in people management Proven experience in implementing DevSecOps practices Experience with cloud platforms (e.g., AWS, Azure, GCP) and containerization technologies (e.g., Docker, Kubernetes) Strong understanding of security principles and best practices Proficiency in security tools (e.g., SAST, DAST, vulnerability scanners, intrusion detection systems) Experience with CI/CD tools (e.g., Jenkins, GitLab CI, CircleCI) Knowledge of scripting and programming languages (e.g., Python, Bash) Familiarity with infrastructure as code (IaC) tools (e.g., Terraform, Ansible) Strong leadership and management skills Excellent communication and interpersonal skills Ability to collaborate effectively with cross-functional teams Problem-solving and analytical skills Ability to prioritize and manage multiple tasks Adaptability and a willingness to learn new technologies Our Approach to Flexible Work With Flex Work, we’re combining the best of both worlds: in-person time and remote. Our approach enables our teams to deepen connections, maintain a strong community, and do their best work. We know that flexibility can take shape in many ways, so rather than a number of required days in-office each week, we simply spend at least half (50%) of our time each quarter in the office or in the field with our customers, prospects, and partners (depending on role). This means you'll have the freedom to create a flexible schedule that caters to your business, team, and personal needs, while being intentional to make the most of time spent together. Those in our remote "home office" roles also have the opportunity to come together in our offices for important moments that matter. Are you being referred to one of our roles? If so, ask your connection at Workday about our Employee Referral process! , Show more Show less

Posted 1 month ago

Apply

4.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security - DPP- Risk – Consulting – Senior As part of our EY-Cyber security in the Risk Consulting team, your role will be primarily responsible for the daily monitoring and/or maintenance of the enterprise Data Protection tools/solutions. The main duties of the person in this role will include proper care and administration of the Data Protection tools, monitoring and responding to the alerts that generate from the tool. This person will interface with IT Operations, Network Operations, Infrastructure teams, Legal, Risk Management, etc. The opportunity We’re looking for Security Analyst in the Risk Consulting team to work on various privacy/data protection related projects for our customers across the globe. In line with EY’s commitment to quality, consultant shall confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, consultant shall help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Build DATA PROTECTION solution concepts and deployment requirements Deploying DATA PROTECTION tools and implementation of endpoint protection. Work with vendors to support the DATA PROTECTION technology (troubleshooting, upgrades, etc.) Administration of the Data Protection tools which includes configuring policies, upgrading and patching, etc. Monitor and respond to alerts generated from the Data Protection systems and other technologies Understand and follow the incident response process through event escalations Respond to escalations by the Incident Response Team Follow processes to maintain the leading DATA LOSS PREVENTION/CASB system Assisting clients in privacy related incident response activities. Supporting the client’s team by acting as an interim team member (e.g., security officer, security manager, security analyst.) Skills And Attributes For Success Should be a good team player. Excellent verbal and written communication skill. Proficient Documentation and Power Point skills Good social, communication and technical writing skills Should interface with internal and external clients. Strong analytical/problem solving skills. Ability to prioritize tasks and work accurately under pressure to meet deadlines. Should understand and follow workplace policies and procedures. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. To qualify for the role, you must have Bachelor's or Master’s degree in Computer Science, Information Systems, Engineering or a related field. At least 4-6 years of experience in supporting Data Security Technology. At least 4-6 years of experience in two or more of the following: Information Security concepts related to Governance, Risk & Compliance Data Loss Prevention, CASB Technology support and Event Handling Experience of Administration of the DLP, CASB tools which includes configuring policies, upgrading and patching for leading vendors. (Digital Guardium, McAfee, Forcepoint, Netskope, Symantec CloudSOC, MCAS etc.) MS Purview/ CASB (Netskope/MS/Symantec). Knowledge of Digital Guardium is a Must. Technical/Vendor certification will be added advantage. Experience in utilizing and good knowledge of other data protection technology like Endpoint Security Suite, EDR, ATP will be added advantage. Maintain current data protection and privacy expertise, skills and competences. Ability to independently research and solve technical issues. Demonstrated integrity in a professional environment. Knowledge of core Information Security concepts related to Governance, Risk & Compliance. Ability to work in and adapt to a changing environment. Extend required support for any reported data protection and privacy incidents such as information breaches and leakages. Ability to communicate in a clear and concise manner. Ideally, you’ll also have Professional certificate or be actively pursuing related professional certifications such as the CompTia Security+, CEH, CISSP or Vendor/Technical certification. If not, certified candidates are expected to complete one of the business required certifications within 12 months of hire. To expect some weekend work and 20%-30% travel based on job requirement. What We Look For A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 month ago

Apply

2.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job Title: IT Administrator with Networking & Server Administration Location : Hyderabad Experience : 6 months – 2 years Job Type: Paid Internship About Us: Instaresz Business Services Pvt Ltd is a forward-thinking, fast-growing technology company that thrives on innovative solutions. We are currently looking for an experienced IT Administrator who will take responsibility for managing and maintaining the network infrastructure, servers, and systems while ensuring smooth day-to-day IT operations across the organization. Key Responsibilities: Set up, configure, and maintain LAN/WAN networks, routers, switches, firewalls, and VPNs. Administer Windows/Linux servers, Active Directory, DNS, DHCP, and user access controls. Manage software and OS package installations using tools like apt, yum, dnf, and rpm. Monitor and troubleshoot network and system performance issues. Maintain web, file, mail, and database servers (Apache, Nginx, Postfix, MySQL, etc.). Implement and monitor IT security measures including firewalls, antivirus, and access policies. Perform system backups, restore processes, and support disaster recovery plans. Support virtualization platforms (VMware, Hyper-V) and assist with basic cloud infrastructure (AWS, Azure). Automate tasks using PowerShell or Bash scripting. Document IT procedures, configurations, and network diagrams. Required Skills & Qualifications: Proven Experience in IT system administration, networking, and server management. Hands-on Knowledge of networking protocols, IP addressing, subnetting, and VPNs. Experience with network devices such as routers, switches, and firewalls. Proficient in Windows Server (Active Directory, Group Policies, DNS, DHCP) and Linux administration (Ubuntu, CentOS, RHEL). In-depth knowledge of server administration , including web servers (Apache, Nginx), databases (MySQL, PostgreSQL), and mail servers (Postfix, Exchange). Experience with package management tools (apt, yum, dnf, rpm). Familiarity with cloud platforms (AWS, Azure) and virtualization tools (VMware, Hyper-V). Strong understanding of IT security practices , including firewalls, antivirus, VPNs, and access management. Scripting skills for automation (PowerShell, Bash). Excellent problem-solving and troubleshooting abilities. Preferred Certifications: CompTIA Network+ CompTIA Security+ Microsoft Certified: Windows Server / Azure Administrator Cisco Certified Network Associate (CCNA) Red Hat Certified System Administrator (RHCSA) ITIL Foundation (For IT Service Management) Additional Skills (Good to Have): Experience with containerization technologies (Docker, Kubernetes). Knowledge of Version Control Systems (Git). Why Join Us: Competitive salary and performance-based incentives Dynamic and collaborative work environment Opportunities for learning and growth Exposure to cutting-edge technologies and industry trends Show more Show less

Posted 1 month ago

Apply

130.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job Description Associate Specialist, Cybersecurity Operations The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company’s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. You will be tasked with identifying vulnerabilities, supporting the response to incidents, and ensuring that security protocols and controls are adhered to. Your role is vital in safeguarding critical assets and ensuring compliance with legal and regulatory standards. What Will You Do In This Role Collaborate with product teams to enforce application security best practices, conduct reviews, perform scans and assist in threat modeling to identify and mitigate security risks throughout the development lifecycle. Contribute with penetration testing efforts to evaluate the security posture of applications and containers, providing detailed reports on findings and working with development teams to remediate identified issues. Collaborate to the oversight of security-related bugs and vulnerabilities using tracking systems. Help prioritize security issues based on risk and impact and ensuring that reported issues are triaged and addressed in a timely manner. Contribute to the creation and delivery of training materials for the workforce to raise awareness and increase adoption of application security best practices, cloud security best practices, including secure usage of cloud applications and availability of compensating controls. Help maintain and monitor security tools and dashboards, ensuring that applications deployed in our environments adhere to organizational security standards and compliance requirements. Follow standard approaches and established design patterns to create new designs for systems or system components. Identify and resolve minor design issues. Monitor and log the actual service provided, compared to that required by service level agreements. Assist in maintaining security infrastructure and performing system updates. Investigate minor security breaches in accordance with established procedures. Assist users in defining their access rights and privileges and perform non-standard operational security tasks. Resolve security events and operational security issues. Work closely with cross-functional Infrastructure teams on Automation and Orchestration. Create and document detailed designs for simple software applications or components. Apply agreed modelling techniques, standards, patterns, and tools. Work within a matrix organizational structure, reporting to both the functional manager and the project manager. What Should You Have Bachelors’ degree in Information Technology, Computer Science or any Technology stream. 3+ years of hands-on experience working with network protocols, firewalls, intrusion detection systems, encryption technologies, and endpoint security solutions. Proficiency in security tools in the areas of cloud, application, endpoint, network or identity, vulnerability scanners, and malware analysis platforms. Understanding of OWASP most 10 security risks and mitigation strategies, relevant NIST standards, and Zero Trust principles. Working experience in cloud environments AWS must have and good to have Azure, or GCP. Familiarity with software development/delivery lifecycle and related technologies Familiarity with programming/scripting languages like Python, Bash, Terraform, Ansible, JSON, PowerShell, or JavaScript for automating tasks. Knowledge of authentication methods, identity management, and security access protocols (e.g., SSO, MFA, LDAP). Ideally AWS certified. Good interpersonal and communication skills (verbal and written). Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are often required or highly desirable. Proven record of delivering high-quality results. Product and customer-centric approach. Innovative thinking, experimental mindset. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who We Are We are known as Merck & Co., Inc., Rahway, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world. What We Look For Imagine getting up in the morning for a job as important as helping to save and improve lives around the world. Here, you have that opportunity. You can put your empathy, creativity, digital mastery, or scientific genius to work in collaboration with a diverse group of colleagues who pursue and bring hope to countless people who are battling some of the most challenging diseases of our time. Our team is constantly evolving, so if you are among the intellectually curious, join us—and start making your impact today. #HYDIT2025 Current Employees apply HERE Current Contingent Workers apply HERE Search Firm Representatives Please Read Carefully Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails. Employee Status Regular Relocation VISA Sponsorship Travel Requirements Flexible Work Arrangements Hybrid Shift Valid Driving License Hazardous Material(s) Required Skills Design Applications, Information Security, Security Operations, SLA Management, Software Development, Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Scanning Preferred Skills Job Posting End Date 07/2/2025 A job posting is effective until 11 59 59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID R342303 Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

India

Remote

🚨 Now Hiring: Cyber Security Trainer (CompTIA+, Security+, Red Hat) 📍 Location: [Insert Location or “Remote Available”] 🕒 Employment Type: Contract / Part-Time / Full-Time (customize as needed) Samech Solutions is looking for an experienced Cyber Security Trainer to join our growing training division. If you’re passionate about empowering learners with real-world cyber skills and hold certifications like CompTIA A+/Network+/Security+ and Red Hat , we’d love to hear from you. 🔐 Key Responsibilities: Deliver engaging and hands-on training sessions for: CompTIA A+, Network+, Security+ Red Hat Linux Administration and Certification Tracks Develop or enhance course materials, labs, and assessments. Guide learners through certification prep, practical labs, and project-based learning. Stay current with industry trends and certification updates. Provide mentorship and support to help students pass their exams. 🎓 Requirements: Current certifications in CompTIA A+/Network+/Security+ and Red Hat Certified System Administrator (RHCSA) or higher. Proven experience in delivering technical training (online or in-person). Strong knowledge of IT infrastructure, cybersecurity fundamentals, Linux systems. Excellent communication and interpersonal skills. Ability to simplify complex technical topics for beginners. 🌐 Bonus Points For: Prior experience with CompTIA-approved content delivery (CAI/TAA) Knowledge of cyber risk, governance, or ISO standards Experience in corporate training or bootcamp environments 💼 About Us: Samech Solutions is a trusted name in IT training and consulting, helping individuals and businesses navigate the fast-evolving digital world. Our trainers are industry leaders who are passionate about shaping the next generation of cyber talent. 📧 How to Apply: Send your resume, certifications, and a brief statement of your training experience to services@samech.com.au Train the Future. Secure the Digital World — with Samech Solutions. Show more Show less

Posted 1 month ago

Apply

10.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Job Description Job Description : Must have 10+ years of work experience and proficient in in endpoint security, compliance,Sailpoint, IAM Should have relevant certifications, such as CompTIA Security+, CISSP, or CISM Good to have strong knowledge of endpoint security technologies, including antivirus, firewall, intrusion detection/prevention systems, and endpoint detection and response (EDR) solutions Strong analytical and problem-solving skills, with the ability to analyze complex security data and provide actionable recommendations Excellent communication and collaboration skills, with the ability to work effectively with technical and non-technical stakeholders Strong attention to detail, with the ability to identify and remediate endpoint security vulnerabilities and compliance issues Skills Required RoleEndpoint Security Engineer Industry TypeIT/ Computers - Software Functional AreaIT-Software Required Education B Tech, B. Com Computers, B. Sc., BE Employment TypeFull Time, Permanent Key Skills END POINT SECURITY IAM TOOL SAIL POINT Other Information Job CodeGO/JC/165/2025 Recruiter NameKathiravan G Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

Greater Hyderabad Area

On-site

Who We Are: In today’s work environment, employees use a myriad of devices to access IT applications and data over multiple networks to stay productive, wherever and however they work. Ivanti elevates and secures Everywhere Work so that people and organizations can thrive. While our headquarters is in the U.S., half of our employees and customers are outside the country. We have 36 offices in 23 nations, with significant offices in London, Frankfurt, Paris, Sydney, Shanghai, Singapore, and other major cities around the world. Ivanti’s mission is to be a global technology leader enabling organizations to elevate Everywhere Work, automating tasks that discover, manage, secure, and service all their IT assets. Through diverse and inclusive hiring, decision-making, and commitment to our employees and partners, we will continue to build and deliver world-class solutions for our customers. Our Culture - Everywhere Work Centered Around You At Ivanti, our success begins with our people. This is why we embrace Everywhere Work across the globe, where Ivantians and our customers are thriving. We believe in a healthy work-life blend and act on it by fostering a culture where all perspectives are heard, respected, and valued. Through Ivanti’s Centered Around You approach, our employees benefit from programs focused on their professional development and career growth. We align through our core values by locking arms in collaboration, being champions for our customers, focusing on the outcomes that matter most and fighting the good fight against cyber-attacks. Are you ready to join us on the journey to elevate Everywhere Work? What will you be doing Monitor and respond to security alerts and incidents. Support in the implementation and enforcement of security policies and procedures. Document security incidents and prepare incident reports. Help with internal audits and compliance checks. Research the latest cyber threats and mitigation strategies. To Be Successful in The Role, You Will Have: Bachelor’s degree in cyber security, Computer science, Information Technology, or a related field. Strong academic performance. Completion of at least one industry-recognized cyber security certification (e.g., CompTIA Security+, CEH, CCNA, or equivalent). Basic knowledge of security principles, threats, and technologies. Familiarity with networking fundamentals and system administration concepts. Preferred Skills: Hands-on experience through internships, labs, or personal projects. Understanding of SIEM, firewalls, IDS/IPS, Cloud Security and Email security Solutions. Ability to work independently and in a team. Excellent communication and problem-solving skills. Show more Show less

Posted 1 month ago

Apply

0.0 years

0 Lacs

Bengaluru, Karnataka

On-site

Bangalore,Karnataka,India Job ID 768426 Join our Team About the Role: We are hiring a Vulnerability Engineer to join our Managed Security Services team. You will be responsible for identifying, analyzing, and tracking security vulnerabilities across enterprise environments. The role involves working with scanning tools, coordinating with stakeholders, and ensuring timely remediation to minimize security risk. Key Responsibilities: Perform vulnerability scans using tools like Tenable Nessus, Qualys, IBM AppScan , etc. Analyze scan results, identify false positives, and prioritize risks Track and support remediation efforts with technical teams Register and manage assets in scanning platforms and maintain scan schedules Prepare reports and metrics for leadership and stakeholders Coordinate with customers on scan schedules and mitigation plans Contribute to automation and process optimization Required Skills: Strong knowledge of vulnerability management processes and tools like Tenable Nessus, Qualys, IBM AppScan etc Solid understanding of network, system, and application-level security Experience in report writing and communicating technical findings Familiarity with enterprise IT environments and TCP/IP networking Excellent problem-solving, collaboration, and communication skills Willingness to participate in on-call support rotation Preferred: Experience with scripting/automation for scanning and reporting Security certifications (e.g., CEH, CompTIA Security+, OSCP) Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply?

Posted 1 month ago

Apply

5.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

About Netoyed Netoyed is a CMMI Maturity Level 5 digital engineering company delivering advanced digital transformation and product development services across Australia, New Zealand, the US, and India. We build future-ready platforms, intelligent products, and resilient architectures for enterprises across telecom, healthcare, banking, and education. Our teams comprise top-tier software engineers, automation specialists, and system architects dedicated to building and managing scalable, secure digital environments. Role Overview We are looking for a Senior Mac Support Engineer with deep expertise in macOS systems engineering, endpoint automation, and enterprise device management using JAMF Pro. This is a software-centric role focused on building automated workflows, scripting custom policies, and integrating endpoint infrastructure into our broader IT automation framework. The ideal candidate will have experience treating endpoint management as code, with an automation-first mindset, and the ability to integrate Apple ecosystems into a multi-OS enterprise environment. Key Responsibilities Architect, automate, and manage large-scale macOS deployments using JAMF Pro, scripting, and policy-based management. Build software-driven workflows to support provisioning, onboarding, compliance enforcement, patching, and telemetry collection. Write and maintain custom scripts (Bash, Python, PowerShell, etc.) to automate device configuration, policy enforcement, and system health checks. Lead Tier 2/3 support for macOS, focusing on root-cause analysis, configuration management, and remediation at scale. Design and enforce security baselines for Apple endpoints, including encryption (FileVault), EDR integration (e.g., SentinelOne), firewall rules, and compliance frameworks. Develop and maintain version-controlled infrastructure for Mac endpoint automation (e.g., via Git, CI/CD pipelines for scripts/policies). Collaborate with cross-platform engineers to integrate macOS support into enterprise device management platforms. Monitor device health and telemetry using data from JAMF, SentinelOne, and other endpoint monitoring tools; generate actionable insights. Required Skills & Qualifications 5+ years of experience in macOS support and automation in enterprise environments. Advanced proficiency in JAMF Pro (policies, smart groups, configuration profiles, patch policies, zero-touch deployment). Strong scripting skills in Bash, Shell, Python, or PowerShell to automate system tasks. Experience with modern endpoint security platforms (e.g., SentinelOne, CrowdStrike, Carbon Black). Deep understanding of macOS internals, device security, and policy enforcement mechanisms. Knowledge of CI/CD tools, Git workflows, and version-controlled infrastructure (desired). Familiarity with REST APIs for JAMF or MDM systems and experience integrating with ITSM tools (e.g., ServiceNow). Bonus: Working knowledge of Windows device automation and cross-platform MDM solutions (e.g., Intune, Kandji, Mosyle). Preferred Certifications JAMF 200/300/400 Certification Apple Certified IT Professional (ACiT / ACSP) CompTIA Security+ or similar (ref:hirist.tech) Show more Show less

Posted 1 month ago

Apply

5.0 years

0 Lacs

Thiruvananthapuram, Kerala, India

On-site

Job Description Qualifications Required . Bachelor’s or Master’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. Equivalent professional experience is acceptable. Minimum 5+ years of experience in Azure cloud operations, with a demonstrated focus on security and vulnerability management. Proven track record of managing and securing large-scale Azure environments in production. Hands-on experience with vulnerability scanning, remediation, and compliance in enterprise cloud environments. Extensive experience in responding to and managing security incidents and threat mitigation in Azure. Technical Skills Azure Expertise : In-depth knowledge of Azure services, including but not limited to: Azure Security Center Azure Defender Azure Key Vault Azure Policy Azure Sentinel (SIEM) Azure Active Directory (Azure AD) Security and Vulnerability Tools : Proficiency with vulnerability scanning and management tools like Qualys, Tenable Nessus, or Rapid7. Experience with Azure-native security tools for threat detection and remediation. Infrastructure Hardening : Strong knowledge of security best practices for securing virtual machines, storage accounts, AKS, and network components. Familiarity with zero-trust architecture principles and implementation in Azure. Automation & Scripting : Advanced skills in scripting languages such as PowerShell , Azure CLI , Python , or other automation tools to remediate vulnerabilities and improve operational efficiency. Experience in integrating security checks into CI/CD pipelines. Certifications (Preferred or Mandatory) Azure Cloud Certifications: Microsoft Certified: Azure Administrator Associate (AZ-104) Microsoft Certified: Azure Security Engineer Associate (AZ-500) Microsoft Certified: Cybersecurity Architect Expert (SC-100) Security Certifications: Certified Information Systems Security Professional ( CISSP ) Certified Ethical Hacker ( CEH ) CompTIA Security+ GIAC certifications (e.g., GCIH, GSEC, or GCED) Other Requirements Familiarity with regulatory and compliance standards, such as ISO 27001 , SOC 2 , GDPR , or HIPAA . Experience in performing and supporting audits related to cloud security. Proven ability to stay current with evolving cloud and cybersecurity trends. Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Job Description Your impact Intelsat’s Cyber Security Center Teamis focused on improving Intelsat’s security posture through security monitoring, vulnerability management, monitoring and analytic tools, and actively seeking out and addressing security concerns. An Information Security Analyst must be aware of the enterprise’s security goals, policies, procedures, and guidelines, and be actively working towards upholding those goals. What You Will Do Monitor and analyze security logs, system logs, and network traffic for security events. Assist various teams in configuring diverse devices for logging. Perform in-depth root cause investigation and analysis. Conduct incident response to security events and incidents. Address security concerns in a way that is consistent with applicable policies, plans, and processes. Analyze, triage, aggregate, escalate, and report on security events, including investigation of anomalous activity and responses to cyber incidents. Document security processes to create playbooks and other documentation based on best practices and policy. Research and suggest improvements for the corporate security posture. Present security-related material in meetings. Work to ensure assigned tasks and projects are completed on time. Your Required Experience/skills Two-year college degree in a technical field of study or equivalent work experience Technical knowledge and practical experience in networking, remote network access, network connected devices, network service software, and troubleshooting techniques. Experience working in a SOC or similar environment. Experience with reviewing IDS/IPS, EDR, firewall, OS, application, and other logs for security purposes. Competence in data sorting, manipulation, and correlation. Experience utilizing a Security Information and Event Management (SIEM) system to identify security issues for remediation, make rule modifications, make improvements in log handling, and perform data extraction for further analysis. Experience with threat and vulnerability management, penetration testing, vulnerability assessments, and vulnerability mitigation. Conduct comprehensive analysis of threat data obtained from proprietary and open-source threat intelligence resources for potential and known. Your success in this role will look like: Having good organizational skills and able to manage multiple tasks. A willingness to engage and coordinate with others in the Threat Management team. Employing good communication skills to coordinate with your team and others at Intelsat. Having a willingness to dig into details and seemingly unglamorous tasks. Have strong logical analysis skills focused on details. Strong critical thinking/analytic skills, creativity, and a personal desire for quality. It would be nice if you had: Experience in the with using various aspects of enterprise security architecture including SIEMs, EDR, and similar software. Familiarity with a variety of OSes including Microsoft Windows, Linux, and network appliance operating systems. Experience manipulating data with Microsoft Excel and document writing in Microsoft Word. Knowledge of a scripting language such as BASH, PowerShell, Python, etc. One or more of the following security certifications: Security+, CEH, CYSA+, GCIA, GSEC, GCIA, GMON and GCDA How we support you: Hybrid work environment offering up to two days per week work from home (for eligible positions) Development opportunities supporting professional growth championed by our dedicated Learning & Development team. 20-25% of our positions are hired internally! Ways to get involved: satellite launch parties, company connect events, charitable activities, team social events, recognition programs, and employee resource groups. Wide range of benefits and perks to help you stay healthy, happy, and productive. These include paid leave programs, medical, tuition reimbursement, and retirement benefits, employee wellness offerings, and more! These benefits are designed to support your overall well-being and help you succeed in your role. Equal Employment Opportunity Intelsat is an equal opportunity employer and does not discriminate based upon race, color, religion, sex, national origin, ethnicity, age, disability, pregnancy, veteran status, sexual orientation, gender identity or any other characteristic protected by applicable law. While it is important to note that meeting the minimum qualifications is a fundamental requirement for consideration, if you are enthusiastic about this role and are unsure how well your experience aligns with these requirements, we encourage you to apply. Our recruitment team will assess your application and determine if your skills and qualifications meet the essential criteria for this role or whether there might be another role within our organization that is a better match. Other Job Info: These statements are intended to describe the general nature and level of work being performed by employees assigned to this job. This is not intended to be an exhaustive list of all responsibilities, duties, and skills required of employees assigned to this job. About Us As the foundational architects of satellite technology, Intelsat applies our expertise to develop breakthrough solutions that advance and secure boundless applications for our customers and partners. At Intelsat, we increase human potential by connecting people, communities, businesses, and governments. Our employees enjoy a casual and collaborative environment, where we celebrate professional excellence in pursuit of the corporate mission. We hire skilled professionals who work in various areas such as: satellite engineering, network operations, cloud architecture, accounting, sales, legal, and more. Browse our current job openings or create a professional profile to stay informed about opportunities that match your interests and expertise. Intelsat is subject to regulation by certain U.S. Government national security agencies, which require that we collect and share certain Personally Identifiable Information (“PII”) with the U.S. Government to obtain permission to employ non-U.S. persons in certain roles. If selected for a role at Intelsat, we may collect and share your PII for these purposes. Intelsat is an Equal Opportunity Employer Show more Show less

Posted 1 month ago

Apply

16.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Saviynt is an identity authority platform built to power and protect the world at work. In a world of digital transformation, where organizations are faced with increasing cyber risk but cannot afford defensive measures to slow down progress, Saviynt’s Enterprise Identity Cloud gives customers unparalleled visibility, control and intelligence to better defend against threats while empowering users with right-time, right-level access to the digital technologies and tools they need to do their best work. WHAT YOU WILL BE DOING Provide thought leadership to customers for IGA in general and Saviynt in specific Provide industry wide best solution for the customer’s use cases meeting functional as well as non functional requirements Provide consulting and advisory skills, capable of addressing customer expectations Architect and deploy Saviynt Identity Governance solution to meet customer requirements Design, deploy, implement, and integrate Saviynt with critical applications and infrastructure Follow approved life cycle methodologies, create documentation for design and testing Interact/coordinate with customers as required Provide technical oversight and direction to mid-level and junior Engineers Train and Groom top talent to be experts in Saviynt technology and IAM in general Assist operations team as required, coordinate with the product engineering team to advocate for the new features in the product Resolve technical issues through debugging, research, and investigation Technical pre-sales support for direct and partner sales teams Provide technical expertise and real-life experience in creating solutions, designs, proof of concept, and implementation Conduct research and use knowledge of competitive solutions to effectively address and dispel customer objections Ensures delivery of high-quality product on time and within budget WHAT YOU BRING Bachelor’s/equivalent in Engineering 16+ years of industry experience in design, development, customization, configuration, deployment of any Identity Management and Governance products Thorough domain knowledge on User Lifecycle Management, Provisioning and Reconciliation, Auditing, Reporting, and user activity Monitoring, Access Certification, SOD, Cloud Security Direct customer interaction and management skills Strong technical presentation and communication skills, both verbal and written Knowledge of Java/J2EE, SQL, Web Services (REST/SOAP), Directories, etc Strong consulting and advisory experience Good problem solving and analytical skills Experience with RFP responses and proposals Good To Have: Cybersecurity certifications (CISSP, CISA, CISM, CompTIA Security+ and CEH etc.) Saviynt or any equivalent IGA product certification Show more Show less

Posted 1 month ago

Apply

3.0 years

0 Lacs

India

On-site

Overview: The Cloud Network Engineer will be part of the on-call support team for the new Fortinet IPS firewall system for SaaS production. The network engineer is part of the Cloud Security team supporting production endpoints, vulnerability scanning and firewall configurations. This role will work with internal Revvity teams across the organization to remediate and solve network and security vulnerability issues. Responsibilities include: Design, configure, deploy, and troubleshoot cloud network security solutions in AWS, ensuring high availability, security, and compliance. Demonstrate in-depth understanding of networking to include routing, switching, firewall (stateful/stateless), network monitoring and management. Expertise in designing, configuring, implementing, and troubleshooting these various technologies and protocols. Expertise with Amazon Web Services (AWS) demonstrating experience designing, configuring, provisioning, and deploying solutions specifically at the network layer. Monitor, detect, and respond to network security threats using IPS/SIEM, threat intelligence, and automated security controls. Excellent ability to collaborate with other IT disciplines (e.g. DevOps, Platform, Application) to troubleshoot and resolve complex problems. Create detailed, comprehensive, and well-structured test plans and test cases. Drive enhancements through full life cycle from network security concept to final implementation and support. Participate in disaster recovery development, exercises, and actual events. Participate in 24x7 on call rotation and assist in resolving issues outside normal business hours. Maintain systems and documentation as needed for audits and compliance. Stay updated on emerging threats, vulnerabilities, and cloud security best practices to enhance the organization's security posture. Strong desire to keep technical skills current and remain abreast of emerging technologies. Preferred Qualifications: Bachelor’s degree in Computer Science, Information Security, Engineering, or a related field with 3+ years of relevant experience in cloud network security. Certifications preferred: AWS Certified Advanced Networking – Specialty, AWS Security Specialty, Cisco CCNP/CCIE, Fortinet NSE, Juniper JNCIS/JNCIP, or Security+. Proficiency in automation and Infrastructure-as-Code (IaC) using Terraform, AWS CloudFormation, or Ansible for network and security configurations. Experience with network configuration protocols and tools such as NETCONF, YANG, and RESTCONF, and Wireshark. Experience with Software-Defined Networking (SDN) and Software-Defined WAN (SD-WAN) solutions, particularly in cloud-native environments. Knowledge of Fortinet, Palo Alto, or Check Point firewalls and cloud security best practices. Experience with network security monitoring and log analysis tools, including Fortinet Analyzer (FAZ),SIEM, AWS GuardDuty, and VPC Flow Logs. Show more Show less

Posted 1 month ago

Apply

5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Assystem Stup is a full-service project delivery consultancy company offering master planning, comprehensive building design, engineering and project management services. We serve many clients in decarbonised energy, transportation, cities & territories, buildings and commercial, institutional, recreational and manufacturing facility infrastructures. As part of Assystem Group, we combine strong expertise in engineering, project management and digitalisation to serve our clients worldwide. Job Description Leading efforts to counter security breaches and anticipating and reducing the likelihood of future security alerts, incidents, and disasters. Defining, planning, implementing, maintaining, and upgrading security measures, policies, and controls. Writing reports and providing insights on the efficacy of the current security policies, incident responses, disaster recovery plans, and other security-related information. Assisting with the creation of updates and training programs to secure the network and train the employees. Keeping the security systems up to date. Monitoring security access and maintaining the relevant data. Conducting vulnerability testing and risk analyses to assess security and performing internal and external security audits. Analyzing security breaches to identify the cause and to update incidence responses and disaster recovery plans. Verifying and coordinating security plans with outside vendors. Creating procedures for IT employees and training them in security awareness. Qualifications A Bachelor's degree in computer science, programming, or related field. 5-10 years' experience in the field, such as security administration. Advanced training certifications may be advantageous. Security+ CySA+ Certified Ethical Hacker (CEH) Certified in Risk and Information Systems Control (CRISC) Certified Information Systems Auditor (CISA) Certified Information Systems Security Professional (CISSP) The ability to work in a high-stress environment. Excellent verbal and written communication skills, interpersonal, and teaching skills. Good anticipation, analytical, and problem-solving skills. The ability to remain current on the latest technology and best practices in information security. Additional Information Threat Hunting Malware Analysis Threat Intelligence Ethical hacking Penetration testing Intrusion prevention Incident response Computer forensics Reverse engineering In addition, it is expected to have expertise in cyber security, firewalls, network security, information assurance, Linux, UNIX, security information and event management (SIEM), application security, security engineering, and security architecture. They must also keep up with the latest trends in cyber security. Knowledge of at least one of the following languages: C, C++, Python, Shell, etc. would be preferred. We are committed to equal treatment of candidates and promote, as well as foster all forms of diversity within our company. We believe that bringing together people with different backgrounds and perspectives is essential for creating innovative and impactful solutions. Skills, talent, and our people’s ability to dare are the only things that matter !. Bring your unique contributions and help us shape the future. Show more Show less

Posted 1 month ago

Apply

5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Assystem Stup is a full-service project delivery consultancy company offering master planning, comprehensive building design, engineering and project management services. We serve many clients in decarbonised energy, transportation, cities & territories, buildings and commercial, institutional, recreational and manufacturing facility infrastructures. As part of Assystem Group, we combine strong expertise in engineering, project management and digitalisation to serve our clients worldwide. Job Description Leading efforts to counter security breaches and anticipating and reducing the likelihood of future security alerts, incidents, and disasters. Defining, planning, implementing, maintaining, and upgrading security measures, policies, and controls. Writing reports and providing insights on the efficacy of the current security policies, incident responses, disaster recovery plans, and other security-related information. Assisting with the creation of updates and training programs to secure the network and train the employees. Keeping the security systems up to date. Monitoring security access and maintaining the relevant data. Conducting vulnerability testing and risk analyses to assess security and performing internal and external security audits. Analyzing security breaches to identify the cause and to update incidence responses and disaster recovery plans. Verifying and coordinating security plans with outside vendors. Creating procedures for IT employees and training them in security awareness. Qualifications A Bachelor's degree in computer science, programming, or related field. 5-10 years' experience in the field, such as security administration. Advanced training certifications may be advantageous. Security+ CySA+ Certified Ethical Hacker (CEH) Certified in Risk and Information Systems Control (CRISC) Certified Information Systems Auditor (CISA) Certified Information Systems Security Professional (CISSP) The ability to work in a high-stress environment. Excellent verbal and written communication skills, interpersonal, and teaching skills. Good anticipation, analytical, and problem-solving skills. The ability to remain current on the latest technology and best practices in information security. Additional Information Threat Hunting Malware Analysis Threat Intelligence Ethical hacking Penetration testing Intrusion prevention Incident response Computer forensics Reverse engineering In addition, it is expected to have expertise in cyber security, firewalls, network security, information assurance, Linux, UNIX, security information and event management (SIEM), application security, security engineering, and security architecture. They must also keep up with the latest trends in cyber security. Knowledge of at least one of the following languages: C, C++, Python, Shell, etc. would be preferred. We are committed to equal treatment of candidates and promote, as well as foster all forms of diversity within our company. We believe that bringing together people with different backgrounds and perspectives is essential for creating innovative and impactful solutions. Skills, talent, and our people’s ability to dare are the only things that matter !. Bring your unique contributions and help us shape the future. Show more Show less

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies