Jobs
Interviews

1050 Security+ Jobs - Page 27

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0.0 - 2.0 years

0 Lacs

Kochi, Kerala

On-site

The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Requirements Must-haves: 2-3 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Knowledge of creating and modifying the dashboards. Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows Deep Knowledge in SIEM, Ticketing tool, EDR, Vulnerability Management, MimeCast, DMARC tool. Excellent written and verbal communication skills. Good to have: · Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others Main Responsibilities Tier 1 SOC analysts are incident responders, remediating serious attacks escalated from junior analyst, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments(CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Leading efforts to counter SLA breaches and anticipating the likelihood of future security alerts,incidents. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone),based on the security event severity and suspicious activities, escalate to managed service support teams, tier 2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when newthreats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. · Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Keep updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats in security perspective. Other responsibilities and additional duties as assigned by the security management team or service delivery manager. Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting Job Types: Full-time, Permanent Pay: Up to ₹70,000.00 per month Benefits: Internet reimbursement Schedule: Day shift Supplemental Pay: Performance bonus Application Question(s): Do you have any experience in SIEM Tools? Experience: minimum: 2 years (Required) Language: English (Required) Location: Kochi, Kerala (Required) Work Location: In person

Posted 1 month ago

Apply

5.0 years

0 Lacs

Indore, Madhya Pradesh, India

On-site

Skills: SIEM TOOLS, VPN technologies, SPLUNK, IDS/IPS, SOC environment, XDR, Windows/Unix ports, EXPERIENCE: 5 8 Years Key Responsibilities RESPONSIBILITIES (INCLUDES TASKS AND AUTHORITIES): Detect, identify, and promptly alert on potential attacks, intrusions, anomalous activities, and misuse, distinguishing them from benign events. Conduct research, analysis, and correlation across diverse data sets to identify indications and warnings of threats. Analyze network alerts from multiple sources and determine their root causes and potential impact. Provide daily summary reports of relevant network and security events. Notify and coordinate with managers and incident responders, clearly articulating event history, status, and potential business impact as per the incident response plan. Analyze and report on system security posture trends. Assess access controls based on the principles of least privilege and need-to-know. Perform vulnerability management, including scanning, analysis, and follow-up on critical vulnerabilities. Lead and participate in incident response activities, including root cause analysis and remediation recommendations. Develop, review, and maintain SIEM correlation rules and incident response playbooks. Provide mentorship and guidance to L1 SOC analysts, reviewing and escalating tickets as needed. Stay current with emerging threats, vulnerabilities, and regulatory security requirements. Required Skills & Experience 24 years of experience in a SOC environment, with at least 1 year in a Level 2 (L2) role Proficiency in Splunk SIEM: log analysis, rule creation, dashboarding, and incident investigation1 Hands-on experience with Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms. Strong knowledge of network security protocols, intrusion detection/prevention systems (IDS/IPS), and firewall/VPN technologies Ability to perform packet-level analysis using tools such as Wireshark or tcpdump Experience in malware analysis, digital forensics, and threat intelligence platforms1 Familiarity with authentication, authorization, and access control methods. Strong understanding of incident response and handling methodologies. Experience interpreting data from network tools (e.g., nslookup, ping, traceroute). Knowledge of Windows/Unix ports, services, and operating system command-line tools. Understanding of key security management concepts (e.g., patch management, release management). Excellent analytical, problem-solving, and communication skills Experience in documenting and reporting security incidents and trends. CERTIFICATIONS(Any Three) Relevant certifications such as SPLUNK, Certified SOC Analyst (CSA) , CompTIA Security+: Technical Skills /Competencies MANDATORY Experience with SIEM (e.g. Splunk, XDR) SIEM tools (e.g., Splunk, QRadar) Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) Firewall and VPN technologies Threat intelligence platforms & Endpoint detection and response tools Hands-on experience with Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms. Strong knowledge of network security protocols, intrusion detection/prevention systems (IDS/IPS), and firewall/VPN technologies Show more Show less

Posted 1 month ago

Apply

4.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Job Description Essential Job Functions: Support security assessments, audits, and vulnerability scans, contributing to report generation and action items. Monitor security events and incidents, escalating as required and assisting in containment. Assist with the implementation of security policies and standards. Collaborate with the security team on documentation and process improvement. Participate in incident response activities, including investigations and reporting. Stay informed about emerging security threats and best practices. Contribute to security awareness training efforts. Seek opportunities for professional development in the security field. Basic Qualifications Bachelor's degree in a relevant field or equivalent combination of education and experience Typically, 4+ years of relevant work experience in industry, with a minimum of 1+ years in a similar role Proven experience in information security analysis Proficiencies in security technologies and risk assessment A continuous learner that stays abreast with industry knowledge and technology Other Qualifications Advanced degree in a relevant field is a plus Relevant certifications such as CompTIA Security+, CEH, or equivalent are a plus Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here . Show more Show less

Posted 1 month ago

Apply

7.0 years

3 - 4 Lacs

Bengaluru

On-site

We help the world run better At SAP, we enable you to bring out your best. Our company culture is focused on collaboration and a shared passion to help the world run better. How? We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences, values flexibility, and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative, caring team environment with a strong focus on learning and development, recognition for your individual contributions, and a variety of benefit options for you to choose from. Summary An SAP Global Cyber Incident Response and Recovery Investigator plays a critical role in safeguarding SAP’s digital enterprise. As a front-line defender, the Investigator is responsible for triaging security events identified by monitoring tools, analyzing data to assess severity and urgency, and conducting initial evaluations to determine whether a cyberattack is underway. When a potential incident is identified, the Investigator works closely with Global Security Operations to scope the impact, coordinate containment efforts, and support forensic investigations to uncover the nature and details of the attack. What you'll do Our Global Cyber Security Incident Response and Recovery Investigator are our first line of response for security event and incidents with a global scope. They are responsible for triaging security alerts detected by Enterprise Detection and SIEM, analyzing available data to determine scope, severity, and priority to determine follow on actions, which could include escalation to a IR Investigator. In escalation cases, they then work in a supportive capacity to further validate if a cyber-attack is occurring, scoping the extent of a suspected attack, coordinating efforts to contain attacks, supporting forensic investigations to determine the details around an attack, and providing guidance on remediation actions. In this role, you will: Conduct initial assessments and help drive root cause analysis. Contribute to the development of attack remediation and response strategies. Coordinate escalation handling and communication across teams. Triage operational security processes, including phishing response. Assist in maintaining and improving incident handling documentation—such as playbooks, runbooks, and standard operating procedures. Collaborate with Detection and SIEM teams to enhance detection logic and alert accuracy. Support forensic investigations with technical insights and evidence collection. Analysing cloud logs and telemetry for signs of compromise (e.g., CloudTrail, VPC Flow Logs, Azure Activity Logs). Leverage your offensive knowledge to identify gaps, simulate attacks, and drive improvements in detection, response, and hardening strategies. We value hands-on practitioners—our environment includes sandboxing, red vs. blue testing, or adversary emulation frameworks (e.g., MITRE ATT&CK, CALDERA, Atomic Red Team) and opportunities to build tooling or simulate attack chains. What you bring We are seeking analytical and detail-oriented critical thinkers who are solution-focused and thrive in dynamic environments. The ideal candidate should be a fast learner with the ability to adapt quickly and respond effectively to changing circumstances. Preferred Technical Skills and Experience: Experience: 7–10+ years in a cyber incident investigation role or equivalent combination of education, certifications, and relevant training. Certifications - Industry-recognized certifications such as Security+, GCIA, GCIH, CISSP (or equivalent). Strong understanding of Advanced Persistent Threat (APT) actors, their tools, techniques, and procedures (TTPs), as well as threat modelling frameworks. Proficiency in TCP/IP communications and knowledge of core network protocols and applications such as DNS, HTTP, and SMB. Operating Systems & Forensics: In-depth knowledge of forensic artifacts across one or more platforms: Windows/Active Directory (file systems, registry, memory artifacts) Unix/Linux (file systems, memory artifacts) macOS (file systems, memory artifacts) Specialized Domains (any of the following): Cyber incident response in cloud, mobile, web application, or database environments Cybersecurity automation and orchestration Web servers and web applications Cloud Platforms: Deep familiarity with AWS, Azure, and/or GCP — with an emphasis on security posture, logging, and IR tooling. Experience conducting incident response and post-incident forensics in cloud environments. Understanding of cloud-native service abuse and misconfigurations (IAM, serverless, container runtime attacks). Security Infrastructure Tools: (SIEM, IDS, EDR, DNS, other Deception technologies) Proficiency in scripting languages such as PowerShell, Python, or Bash . Bring out your best SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, you can bring out your best. We win with inclusion SAP’s culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone – regardless of background – feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world. SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team: Careers@sap.com For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program, according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training. EOE AA M/F/Vet/Disability: Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, age, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability. Successful candidates might be required to undergo a background verification with an external vendor. Requisition ID: 411769 | Work Area: Information Technology | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid.

Posted 1 month ago

Apply

2.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job Title: IT Administrator with Networking & Server Administration Location : Hyderabad Experience : 6 months – 2 years Job Type: Paid Internship About Us: Instaresz Business Services Pvt Ltd is a forward-thinking, fast-growing technology company that thrives on innovative solutions. We are currently looking for an experienced IT Administrator who will take responsibility for managing and maintaining the network infrastructure, servers, and systems while ensuring smooth day-to-day IT operations across the organization. Key Responsibilities: Set up, configure, and maintain LAN/WAN networks, routers, switches, firewalls, and VPNs. Administer Windows/Linux servers, Active Directory, DNS, DHCP, and user access controls. Manage software and OS package installations using tools like apt, yum, dnf, and rpm. Monitor and troubleshoot network and system performance issues. Maintain web, file, mail, and database servers (Apache, Nginx, Postfix, MySQL, etc.). Implement and monitor IT security measures including firewalls, antivirus, and access policies. Perform system backups, restore processes, and support disaster recovery plans. Support virtualization platforms (VMware, Hyper-V) and assist with basic cloud infrastructure (AWS, Azure). Automate tasks using PowerShell or Bash scripting. Document IT procedures, configurations, and network diagrams. Required Skills & Qualifications: Proven Experience in IT system administration, networking, and server management. Hands-on Knowledge of networking protocols, IP addressing, subnetting, and VPNs. Experience with network devices such as routers, switches, and firewalls. Proficient in Windows Server (Active Directory, Group Policies, DNS, DHCP) and Linux administration (Ubuntu, CentOS, RHEL). In-depth knowledge of server administration , including web servers (Apache, Nginx), databases (MySQL, PostgreSQL), and mail servers (Postfix, Exchange). Experience with package management tools (apt, yum, dnf, rpm). Familiarity with cloud platforms (AWS, Azure) and virtualization tools (VMware, Hyper-V). Strong understanding of IT security practices , including firewalls, antivirus, VPNs, and access management. Scripting skills for automation (PowerShell, Bash). Excellent problem-solving and troubleshooting abilities. Preferred Certifications: CompTIA Network+ CompTIA Security+ Microsoft Certified: Windows Server / Azure Administrator Cisco Certified Network Associate (CCNA) Red Hat Certified System Administrator (RHCSA) ITIL Foundation (For IT Service Management) Additional Skills (Good to Have): Experience with containerization technologies (Docker, Kubernetes). Knowledge of Version Control Systems (Git). Why Join Us: Competitive salary and performance-based incentives Dynamic and collaborative work environment Opportunities for learning and growth Exposure to cutting-edge technologies and industry trends Show more Show less

Posted 1 month ago

Apply

0 years

0 - 0 Lacs

India

Remote

Key Responsibilities Technical Support & Troubleshooting : Diagnose and resolve issues related to CCTV cameras, DVR/NVR systems, and associated software. Provide assistance to clients via phone, email, or remote access tools. pathsgroup.com Installation & Configuration : Set up and configure CCTV systems, including cameras and recording equipment, ensuring optimal coverage and functionality. expertia.ai System Maintenance : Conduct routine inspections and maintenance to ensure continuous operation of CCTV systems. Perform necessary repairs or upgrades as needed. expertia.ai Client Training & Documentation : Provide training to clients on system operation. Maintain detailed records of installations, maintenance activities, and technical issues. expertia.ai Collaboration : Work closely with sales and technical teams to identify and resolve system issues. Stay updated with the latest advancements in CCTV technology. expertia.ai Required Skills & Qualifications Technical Expertise : Proficiency in CCTV systems, including knowledge of cameras, recorders, and surveillance software. Familiarity with networking principles and IP camera systems. pathsgroup.comaceda.co.uk+2expertia.ai+2superworks.com+2 Problem-Solving Abilities : Strong analytical skills to diagnose and resolve technical issues efficiently. pathsgroup.com Communication Skills : Excellent verbal and written communication to effectively assist clients and document technical information. Educational Background : A degree or diploma in Electrical Engineering, Information Technology, or a related field is often preferred. expertia.ai Certifications : Certifications such as CompTIA Security+, CCNA, or vendor-specific credentials can be advantageous. Job Type: Full-time Pay: ₹20,000.00 - ₹30,000.00 per month Shift: Day shift Work Location: In person

Posted 1 month ago

Apply

3.0 years

0 Lacs

Navi Mumbai, Maharashtra, India

Remote

About TaskUs: TaskUs is a provider of outsourced digital services and next-generation customer experience to fast-growing technology companies, helping its clients represent, protect and grow their brands. Leveraging a cloud-based infrastructure, TaskUs serves clients in the fastest-growing sectors, including social media, e-commerce, gaming, streaming media, food delivery, ride-sharing, HiTech, FinTech, and HealthTech. The People First culture at TaskUs has enabled the company to expand its workforce to approximately 45,000 employees globally. Presently, we have a presence in twenty-three locations across twelve countries, which include the Philippines, India, and the United States. It started with one ridiculously good idea to create a different breed of Business Processing Outsourcing (BPO)! We at TaskUs understand that achieving growth for our partners requires a culture of constant motion, exploring new technologies, being ready to handle any challenge at a moment's notice, and mastering consistency in an ever-changing world. What We Offer: At TaskUs, we prioritize our employees' well-being by offering competitive industry salaries and comprehensive benefits packages. Our commitment to a People First culture is reflected in the various departments we have established, including Total Rewards, Wellness, HR, and Diversity. We take pride in our inclusive environment and positive impact on the community. Moreover, we actively encourage internal mobility and professional growth at all stages of an employee's career within TaskUs. Join our team today and experience firsthand our dedication to supporting People First. Taskus is seeking a highly skilled Team leader Remote Desktop Support Technician with a minimum of 3years of relevant experience supporting international clients. As a Team Leader Remote Desktop Support Technician, you will play a vital role in ensuring the seamless operation of our clients' IT systems by handling team, resolving technical issues and delivering exceptional customer service to a global user base. Key Responsibilities :- Handling team of Remote technical support engineers, you will manage the day-to-day planning and operations of your team. This includes making sure that each of your Teammates delivers on their Service Level Agreement (SLA) and achieve their Key Performance Indicators (KPIs). As Team Leader, you are in charge of managing the team and making sure everyone adheres to their schedules. You must be organized and be able to handle responsibility. To be able to train and help in the development of your team, by conducting team huddles, coaching sessions, and recognizing weaknesses - so you can offer solutions to help them improve and grow. Through that, your team will be able to deliver a superior customer experience - which is the main thrust of your department. Provide remote technical support to international clients via phone, email, chat, and remote desktop tools. Troubleshoot and resolve hardware and software issues related to desktops, laptops, printers, and peripherals. Install, configure, and maintain operating systems, software applications, and security patches. Set up and configure VPN connections for secure remote access. Implement and support multi-factor authentication (MFA) solutions, including Yubikey. Collaborate effectively with cross-functional teams across different time zones to escalate and resolve complex technical issues. Document support tickets, solutions, and troubleshooting procedures in Jira or similar ticketing systems. Provide training and guidance to international end-users on IT best practices and procedures. Stay updated on emerging technologies and industry trends to continuously improve service delivery and enhance client satisfaction. Requirements:- Minimum of 2 years of experience as a team leader in remote desktop support, preferably with international clients . Proficiency in using remote support tools and technologies. Strong troubleshooting skills with the ability to diagnose and resolve technical issues efficiently. Experience with MFA solutions, such as Yubikey, and VPN technologies. Excellent communication skills and cultural sensitivity to effectively interact with clients from diverse backgrounds. Ability to work independently and collaborate effectively in a remote team environment. Experience using collaboration tools like Slack for communication and Jira for ticket management. Preferred Qualifications:- Bachelor's degree in Computer Science, Information Technology, or related field. Certifications in relevant technologies (e.g., CompTIA A+, Network+, Security+). Experience supporting a diverse range of operating systems, including Windows, macOS, and Linux. How We Partner To Protect You: TaskUs will neither solicit money from you during your application process nor require any form of payment in order to proceed with your application. Kindly ensure that you are always in communication with only authorized recruiters of TaskUs. DEI: In TaskUs we believe that innovation and higher performance are brought by people from all walks of life. We welcome applicants of different backgrounds, demographics, and circumstances. Inclusive and equitable practices are our responsibility as a business. TaskUs is committed to providing equal access to opportunities. If you need reasonable accommodations in any part of the hiring process, please let us know. We invite you to explore all TaskUs career opportunities and apply through the provided URL https://www.taskus.com/careers/ . Show more Show less

Posted 1 month ago

Apply

7.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Role Description Role Overview: We are seeking an experienced SIEM Platform Support Engineer to ensure the reliability, performance, and continuous improvement of our cybersecurity platforms. In this key role, you will provide hands-on technical support, manage platform maintenance, and collaborate closely with cross-functional teams to strengthen our security infrastructure. Your efforts will directly contribute to maintaining a resilient, secure, and high-performing environment. Key Responsibilities Deliver expert-level technical support for cybersecurity platforms, diagnosing and resolving incidents and issues in a timely manner. Monitor system health and performance metrics; proactively identify and resolve bottlenecks and inefficiencies. Conduct routine platform maintenance, including patch management, version upgrades, and configuration updates. Collaborate with security analysts, engineers, and infrastructure teams to implement enhancements and align platform capabilities with organizational security goals. Maintain comprehensive documentation for troubleshooting processes, system configurations, and support knowledge bases. Ensure all systems adhere to internal security policies, compliance standards, and industry best practices. Participate in an on-call rotation to address critical incidents and ensure 24/7 operational continuity. Qualifications Minimum of 7 years of experience in platform support, systems administration, or a related technical support role. Proficient in administering and troubleshooting Windows and Linux operating systems, with a solid understanding of networking fundamentals. Hands-on experience with SIEM platforms (e.g., Splunk, IBM QRadar, or similar). Strong analytical and problem-solving skills with a methodical and detail-oriented approach. Excellent communication skills with the ability to convey technical information clearly and effectively. Proven ability to work independently as well as collaboratively in a team environment. Industry certifications such as CompTIA Security+, Microsoft Certified: Azure Administrator, or similar are highly desirable. Skills SIEM Platform Admin Show more Show less

Posted 1 month ago

Apply

8.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Hi , Please find attached the JD for both Cloud Security position . Cloud Security – 8+ years – Chennai/Hyderabad /Pune/Gurgaon Must-Have Skills 1. 5+ years in public cloud (AWS, Azure) 2. Strong cloud and network security knowledge 3. Experience with security tools (vulnerability scanners, IDS/IPS, firewalls, endpoint protection) 4. CI/CD and automated security testing 5. Proficient in scripting/programming (Python, Bash) 6. Experience with Unix/Linux and networking 7. Strong collaboration and communication skills Good-to-Have Skills 1. Cloud access provisioning & automation 2. Log management, SQL, dashboards, reporting 3. Security architecture review & recommendations 4. Database programming/administration 5. Experience with security process documentation 6. Ability to act as a security SME. Cloud Security+ Aws – 6 to 8 years – Pune – JD attached . whatsapp -- wa.me/+918757966669 Show more Show less

Posted 1 month ago

Apply

3.0 years

0 Lacs

Sahibzada Ajit Singh Nagar, Punjab, India

On-site

About Us We are a global climate technologies company engineered for sustainability. We create sustainable and efficient residential, commercial and industrial spaces through HVACR technologies. We protect temperature-sensitive goods throughout the cold chain. And we bring comfort to people globally. Best-in-class engineering, design and manufacturing combined with category-leading brands in compression, controls, software and monitoring solutions result in next-generation climate technology that is built for the needs of the world ahead. Whether you are a professional looking for a career change, an undergraduate student exploring your first opportunity, or recent graduate with an advanced degree, we have opportunities that will allow you to innovate, be challenged and make an impact. Join our team and start your journey today! Principal Functional Responsibilities Develop, implement, and maintain cybersecurity policies, standards, and procedures in alignment with industry frameworks and regulatory requirements. Conduct risk assessments, security control evaluations, and gap analyses to identify and mitigate risks. Support internal and external audits, ensuring compliance with frameworks such as NIST CSF, ISO 27001, CIS Controls, SOC 2, and regulatory obligations. Assist in the management of third-party risk assessments and vendor security evaluations. Track, monitor, and report on cybersecurity risks, controls, and compliance metrics. Work with cross-functional teams to ensure security controls are embedded in business processes and IT operations. Develop and maintain risk registers, compliance documentation, and audit evidence repositories. Provide cybersecurity awareness training and guidance to employees on security best practices and compliance requirements. Stay current with evolving cybersecurity threats, regulatory changes, and best practices to enhance the organization's security and compliance posture. Basic Requirements Bachelor’s degree in computer science, Information Systems, or related degree plus three (3+) years of experience or equivalent combination of education and experience. Strong knowledge of security and risk management frameworks like NIST CSF, CIS Critical Security Controls, ISO 27001, NIST 800-53, FAIR, and CIS Must possess excellent oral and written communication skills and the ability to communicate in technical and business terms. Additionally, must be comfortable developing presentations and delivering them to senior management. 3+ years of experience in cybersecurity, governance, risk, and compliance. Experience conducting risk assessments, control evaluations, and compliance audits. Strong knowledge of cybersecurity best practices, policies, and procedures. Excellent analytical, problem-solving, and communication skills. Ability to work independently and collaboratively in a dynamic environment. Professional certifications in IT and Cybersecurity a plus (e.g., Security+, GCRP, CGRC etc.). Preferred Requirements Bachelor’s degree in computer science, Information Systems, or related degree plus eight (3-4) years of experience or equivalent combination of education and experience 3-4 years of experience in Cybersecurity roles (i.e., incident response, security operations, application security, etc.) Ability to simultaneously handle multiple projects and adjust to changing priorities while multitasking effectively. Self-starter, strong initiative, critical thinker, self-directed with a proven track record to collaborate and inspire change. Experience designing and implementing cybersecurity reporting and metrics (i.e., KPI/KRI development) Fluent in English; additional languages are a plus. Competencies Tech Savvy: Anticipating and adopting innovations in business-building digital and technology applications. Optimizes Work Processes: Knowing the most effective and efficient processes to get things done, focusing on continuous improvement. Plans & Aligns: Planning and prioritizing work to meet commitments aligned with the interpersonal goals. Business Insight: Applying knowledge of business and the marketplace to advance the organization’s goals. Communicates Effectively: Developing and delivering multi-mode communications that clearly understand the different audiences' unique needs. Our Commitment to Our People Across the globe, we are united by a singular Purpose: Sustainability is no small ambition. That’s why everything we do is geared toward a sustainable future—for our generation and all those to come. Through groundbreaking innovations, HVACR technology and cold chain solutions, we are reducing carbon emissions and improving energy efficiency in spaces of all sizes, from residential to commercial to industrial. Our employees are our greatest strength. We believe that our culture of passion, openness, and collaboration empowers us to work toward the same goal - to make the world a better place. We invest in the end-to-end development of our people, beginning at onboarding and through senior leadership, so they can thrive personally and professionally. Flexible and competitive benefits plans offer the right options to meet your individual/family needs. We provide employees with flexible time off plans, including paid parental leave (maternal and paternal), vacation and holiday leave. Together, we have the opportunity – and the power – to continue to revolutionize the technology behind air conditioning, heating and refrigeration, and cultivate a better future. Learn more about us and how you can join our team! Our Commitment to Inclusion & Belonging At Copeland, we cultivate a strong sense of inclusion and belonging where individuals of all backgrounds, and with diverse perspectives, are embraced and treated fairly to enable a stronger workforce. Our employee resource groups play an important role in culture and community building at Copeland. Equal Opportunity Employer Copeland is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, age, marital status, political affiliation, sexual orientation, gender identity, genetic information, disability or protected veteran status. We are committed to providing a workplace free of any discrimination or harassment. Show more Show less

Posted 1 month ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Location: Bangalore, India Experience: 3-6 years About Us At Nurix AI, we envision a world powered by super-intelligent AI agents that transform how businesses engage with customers. Our cutting-edge AI agents do more than just solve problems, they create opportunities. From suggesting next purchases to boosting revenue while maintaining customer satisfaction, to analyzing vast datasets for actionable insights, our technologies shape your business and product strategies. By resolving queries with precision and delivering highly personalized interactions, we redefine the customer experience and drive measurable impact. Nurix.ai is at the forefront of AI innovation, developing cutting-edge AI and LLM solutions to enhance productivity and automation. Backed by $27.5M in seed funding, we are building next-gen AI-driven applications that redefine human-machine collaboration. We are looking for a Technical Lead to spearhead our AI engineering efforts and drive product innovation. We are pioneering the AI revolution as India’s first scaled AI services company. We deliver cutting-edge AI and LLM solutions tailored for the dynamic needs of the modern world. Backed by robust funding we are a vibrant, young team set on redefining technological boundaries. Join us in shaping the future. Join us in building the future, where every interaction is smarter, faster and more impactful. The Opportunity This is more than just a security role; it's a chance to build an information security function at Nurix AI, a rapidly scaling AI startup. With our exponential growth and our use of sophisticated AI, LLMs, and multi-cloud infrastructure (AWS, GCP, Azure), we need a seasoned expert to establish and champion a world-class security posture. Our customers are entrusting us with their data in an era of heightened security concerns, and your role will be pivotal in maintaining and strengthening that trust. You will be instrumental in fortifying our defenses at Nurix AI, proactively addressing the unique security challenges of AI and LLMs, and ensuring our innovative solutions are secure by design. What You'll Do (Key Responsibilities) Roles & Responsibilities (What you’ll be doing): Execute penetration tests on web apps, APIs, and mobile applications, then deliver detailed vulnerability assessments and clear remediation advice. Perform both manual and automated secure code reviews—primarily in Java, Python, and JavaScript. Build Python-based security automation tools to broaden test coverage, cut manual work, and speed up assessments. Partner with engineering teams to resolve security issues quickly within rapid release cycles. Develop and maintain threat models, applying proven techniques to surface and address design-level risks early. Champion a security-first culture by coaching developers on secure coding, common weaknesses, and attack vectors, while clearly presenting findings to all stakeholders. What You Bring To The Table 2-5 years of hands-on experience in application security, penetration testing, or a closely related field. Deep expertise with testing tools such as Burp Suite, OWASP ZAP, Semgrep, MobSF, Jadx-GUI, and other mobile security frameworks. Proven ability to embed security across the SDLC, leveraging modern DevSecOps pipelines and tooling. Strong command of secure-coding fundamentals, the OWASP Top 10, CWE catalog, and common exploit techniques. Solid scripting and automation skills—Python preferred. Excellent communication and stakeholder-management capabilities. A passion for continual learning and staying ahead of emerging threats. Bonus Skills Master’s degree in Cybersecurity or a related field. Industry-recognized security certifications such as CISSP, CISM, CCSP, CEH, or CompTIA Security+, or specific cloud security certifications (AWS, GCP, Azure). Experience in a rapidly scaling technology startup. Strong working knowledge of global and Indian data privacy frameworks (e.g., GDPR, HIPAA, DPDP Act ). Experience building a security function from the ground up. Bonus points for credentials like OSCP, OSWE, CRTP, or a noteworthy bug-bounty / CTF track record. What We Offer Opportunity to work on cutting-edge generative AI projects with leading clients. A dynamic and inclusive work environment that promotes professional growth and development. Competitive salary and benefits package, including opportunities for continuous learning and skill enhancement. If you are passionate about leveraging generative AI to drive business transformation and have the expertise to lead complex projects, we invite you to apply and join our innovative team. Show more Show less

Posted 1 month ago

Apply

6.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Information Security Lead at Nurix AI Location: Bangalore, India Experience: 6-10 years About Us At Nurix AI, we envision a world powered by super-intelligent AI agents that transform how businesses engage with customers. Our cutting-edge AI agents do more than just solve problems, they create opportunities. From suggesting next purchases to boosting revenue while maintaining customer satisfaction, to analyzing vast datasets for actionable insights, our technologies shape your business and product strategies. By resolving queries with precision and delivering highly personalized interactions, we redefine the customer experience and drive measurable impact. Nurix.ai is at the forefront of AI innovation, developing cutting-edge AI and LLM solutions to enhance productivity and automation. Backed by $27.5M in seed funding, we are building next-gen AI-driven applications that redefine human-machine collaboration. We are looking for a Technical Lead to spearhead our AI engineering efforts and drive product innovation. We are pioneering the AI revolution as India’s first scaled AI services company. We deliver cutting-edge AI and LLM solutions tailored for the dynamic needs of the modern world. Backed by robust funding we are a vibrant, young team set on redefining technological boundaries. Join us in shaping the future. Join us in building the future, where every interaction is smarter, faster and more impactful. The Opportunity This role involves building and leading the information security function at Nurix AI. The company is experiencing rapid growth and requires a seasoned expert to establish a world-class security posture. The role focuses on addressing the unique security challenges of AI, LLMs, and multi-cloud infrastructure, ensuring innovative solutions are secure by design. Key Responsibilities Security Strategy & Architecture: Design and implement a comprehensive information security strategy, with a focus on AI/ML workloads, LLMs, conversational AI, and multi-cloud infrastructure (AWS, GCP, Azure). Threat Management & Incident Response: Establish threat detection, vulnerability management, and incident response capabilities. AI & LLM Security: Implement security best practices for the AI/ML development lifecycle, including data security, model integrity, and adversarial attack mitigation for LLMs. Cloud Security Governance: Develop and enforce security controls across multi-cloud environments. DevSecOps Leadership: Embed security best practices throughout the SDLC and CI/CD pipelines. Policy, Compliance & Risk Management: Develop and enforce security policies aligned with international standards and data protection laws. Conduct risk assessments on internal systems, vendors, and AI solutions. Security Operations & Tooling: Oversee the use of security tools (SIEM, EDR, vulnerability scanners). Security Awareness & Culture: Drive a culture of security awareness. Customer Trust & Advocacy: Serve as a security subject matter expert. Vendor Management: (Requires significant experience) Understanding of Global Compliances. Required Qualifications Bachelor’s degree in Computer Science, Cybersecurity, or related field. 6-10 years of experience in Information Security, with a focus on cloud environments and complex software systems. Deep expertise in AI/ML security, including risks associated with LLMs, data pipelines, and conversational AI. Proven experience in designing and managing security in multi-cloud environments (AWS, GCP, Azure). Hands-on experience with security tools (SIEM, EDR, vulnerability scanning). Understanding of securing APIs, containers, microservices, and CI/CD pipelines. Knowledge of security frameworks and standards (OWASP, MITRE ATT&CK, ISO 27001, SOC 2). Experience in developing security policies, conducting risk assessments, and managing incident response. Excellent communication, leadership, and project management skills. Preferred Skills (Bonus Points) Master’s degree in Cybersecurity or related field. Security certifications (CISSP, CISM, CCSP, CEH, CompTIA Security+, cloud security certifications). Experience in a rapidly scaling technology startup. Strong knowledge of global and Indian data privacy frameworks (GDPR, HIPAA, DPDP Act). Experience building a security function from the ground up. What We Offer The opportunity to work in a fast-paced, innovative company that is changing the way industries operate. A dynamic work environment with ample opportunities for professional growth and advancement. Attractive salary, equity options, and benefits package. A chance to be at the forefront of the AI and technology revolution with a team of passionate, like-minded professionals. Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

Maharashtra, India

On-site

Key Responsibilities JOB DESCRIPTION Identity and Access Management (IAM) Design, implement, and manage IAM frameworks, ensuring secure access control across on-premises and cloud environments. Administer user accounts, roles, and permissions following the principle of least privilege. Perform periodic access reviews and audits to ensure compliance with organizational policies. Manage single sign-on (SSO), multi-factor authentication (MFA), and identity federation solutions. Collaborate with application teams to implement secure authentication and authorization protocols. Vulnerability Management Conduct regular vulnerability scans across infrastructure, applications, and endpoints using tools such as Qualys, Nessus, or equivalent. Analyze vulnerability reports, prioritize risks, and coordinate remediation efforts with relevant teams. Maintain and improve patch management processes to address identified vulnerabilities. Monitor and track emerging threats, ensuring timely implementation of mitigation measures. Create and present vulnerability management dashboards and reports for stakeholders. Security Operations Monitor and respond to security incidents, ensuring quick containment and resolution. Configure and manage security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. Conduct root cause analysis for incidents and implement preventive measures. Ensure compliance with security standards such as ISO 27001, NIST, or CIS benchmarks. Develop and update runbooks and incident response procedures. Collaboration and Governance Work closely with DevOps, infrastructure, and application teams to integrate security best practices. Participate in security assessments, audits, and risk analysis exercises. Support the development and enforcement of security policies and standards. Provide security awareness training to teams and stakeholders. Documentation and Reporting Maintain comprehensive documentation of IAM workflows, security processes, and vulnerability management activities. Provide periodic compliance and risk reports to management and relevant stakeholders. Qualifications And Skills Proven experience in IAM, vulnerability management, and security operations. Strong knowledge of identity management tools and vulnerability scanning tools (e.g., Qualys). Proficiency in configuring and managing security tools such as firewalls, IDS/IPS, and endpoint security solutions. Familiarity with cloud security practices across platforms like AWS, Azure, or Google Cloud. Strong analytical and problem-solving skills with attention to detail. Relevant certifications such as CISSP, CISM, CompTIA Security+, or GIAC are highly desirable. Show more Show less

Posted 1 month ago

Apply

0 years

0 Lacs

India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cyber Governance Risk and Compliance Consultant - Senior The opportunity This is a role where no two days are the same – so you’ll find yourself taking on plenty of new responsibilities as you go. You’ll work alongside clients and colleagues, balancing your time between developing security strategies, designing security and privacy controls, advising client stakeholders, facilitating workshops and supporting business development. Your key responsibilities As a Cyber GRC Professional in our Cyber Security practice, you will be occupied in the following domains: a) Strategy, b) Risk, c) Compliance. As part of our team strategy you will be expected to take on responsibility and initiative early, providing you with real experience working with a wide range of major clients in EY. You will be taking responsibility for the quality of your work, while continually developing your personal and professional skills through formal training, hands-on experience and coaching. Skills and attributes for success To qualify for the role, you must have: Degree, or equivalent, in Information Security, Cyber Security, Information Technology, Informatics, or other similar and technical areas Evidence of self-motivation to continuously develop in the areas of cybersecurity Good organizational and time management skills with the ability to prioritize and complete multiple complex projects under tight deadlines Ability to translate security issues into business risks Excellent interpersonal skills and ability to work effectively within a team at all hierarchical levels Willingness to research client inquiries and emerging issues, including regulations, industry practices, and new technologies Experience, knowledge and strong interest in information and cyber security domains are essential for this role Experience on Cyber Governance, Risk & Compliance (GRC), Cyber risk assessments & management methodologies Experience on assessing, designing and implementing security strategies, governance frameworks over processes and controls, allowing organisations to optimally manage cyber security Experience on design and implementation of security policies, procedures, standards and controls in line with regulation and/or current standards, such as ISO27001, NIST, SANS etc. Experience in data classification exercises and controls / mechanisms enforcement Working knowledge of control frameworks such as ISO 27001/27002, COBIT, NIST, ITIL, etc. Ability to conduct Security regulatory and compliance assessment independently Hands on with assessment report preparation and presenting to senior technical and business stakeholders Hand on knowledge of excel, PowerPoint and word Articulative and confident in presentation to senior stakeholders Ability to lead workstreams or dedicated portions of projects Cyber maturity assessments, recommendations, roadmap and strategy creation knowledge of use of and risks related to modern and emerging technologies Cybersecurity audit Ability to plan and deliver cyber security training and awareness Ideally, you’ll also have: Security-related qualifications / certifications such as CISSP, SSCP, CISM, ISO27001 lead implementer or auditor, CompTIA Security+, are desirable Experience in Third Party Risk Management (TPRM) and / or vendor risk assessment engagements Experience in design and implementation of Information Security Management Systems (i.e. security policies, procedures and guidelines) according to leading International Standards Security-related vendor / technology certifications are desirable EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 month ago

Apply

3.0 years

3 - 6 Lacs

Bengaluru

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Portfolio Compliance Enablement Compliance Specialist Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of over 1000 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team help protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The Opportunity As a Senior Associate in the Information Security Portfolio Compliance Enablement function, you will support EY's commitment to secure digital services by helping to ensure compliance with Information Security policies. This role involves actively participating in projects to strengthen risk management, collaborating with various business teams, and contributing to the maintenance of the technology compliance posture through detailed work and analysis. You will also assist in aligning data protection, privacy, and software development practices with legal and regulatory standards. Key Responsibilities Contribute to projects that aim to improve EY's risk posture and compliance with Information Security policies. Assist in developing and implementing compliance strategies and remediation plans. Manage delivery of one or more processes and/or solutions with a focus on quality and effective risk management. Support the translation of technical vulnerabilities into business risk terms for clear communication to stakeholders. Participate in the use and enhancement of compliance assessment toolkits. Be involved in assessments for technology infrastructure, applications, and third-party dependencies. Collaborate with compliance specialists and contribute expertise to specific projects and initiatives. Skills and Attributes for Success Experience in compliance management within Information Security. Ability to understand the impact of security requirements on business operations. Good organizational skills and a proactive approach to problem-solving. Effective communication skills for building relationships and promoting compliance with security policies. Experience in conducting risk assessments, supporting remediation strategies, and writing technical documentation Familiarity with technical infrastructure, applications, and compliance frameworks. To Qualify for the Role, You Must Have A minimum of 3 years of experience in Cyber Security, Information Security, or a related field. A degree in Cyber Security, Information Security, Computer Science, or a related discipline. Certifications such as Security+, Network+, CRISC, CISSP, CISM, CISA, or equivalent are desirable. Knowledge of information security standards like ISO 27001/27002, NIST, PCI DSS. Awareness of regulatory requirements such as PCI, SOX, HIPAA, GDPR. Strong communication skills and the ability to work effectively within a team. Ideally, You’ll Also Have Strong analytical and decision-making skills. The ability to adapt to new challenges and evolving project requirements. Strong interpersonal skills and the ability to communicate technical concepts effectively. Experience with GRC platforms like RSA Archer or IBM Open Pages is beneficial. What we look for We are looking for individuals with a passion for information security and demonstrated ability to apply their knowledge to new and emerging technologies that are supporting the growth strategy of a global professional services firm. What we offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 month ago

Apply

2.0 years

3 - 6 Lacs

Bengaluru

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Portfolio Compliance Enablement Compliance Specialist Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of over 1000 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The Opportunity As an Associate in the Information Security Portfolio Compliance Enablement function at EY, you will contribute to the firm's digital services by supporting the adherence to Information Security policies. This entry-level role involves assisting with projects that enhance risk management, collaborating with team members, and learning about the maintenance of technology compliance posture. You will also help ensure that data protection, privacy, and software development practices are aligned with legal and regulatory standards. Key Responsibilities Support projects aimed at improving EY's risk posture and adherence to Information Security policies. Assist in the development and execution of, and alignment to compliance strategies and remediation plans under the guidance of more experienced team members. Contribute to the delivery of processes and/or solutions, focusing on quality and effective risk management. Help document and translate technical vulnerabilities into business risk terms for stakeholder communication. Participate in the use and improvement of compliance assessment toolkits under supervision. Support assessments for technology infrastructure, applications, and third-party dependencies. Collaborate with the team and contribute to specific compliance-related tasks and initiatives. Skills and Attributes for Success Basic knowledge and understanding of compliance management within Information Security. Eagerness to learn and understand the impact of security requirements on business operations. Good organizational skills and a proactive approach to problem solving and tasks. Strong communication skills for effective collaboration within the team and advocating for adherence to security policies. Interest in conducting risk assessments and learning about remediation strategies. Familiarity with or willingness to learn about technical infrastructure, applications, and compliance frameworks. To Qualify for the Role, You Must Have At least 2 years’ experience in Cyber Security, Information Security, or a related field. A degree in Cyber Security, Information Security, Computer Science, or a related discipline. Certifications such as Security+, Network+, or an interest in pursuing relevant certifications like CRISC, CISSP, CISM, CISA. Basic knowledge of information security standards like ISO 27001/27002, NIST, PCI DSS. An understanding of or interest in learning about regulatory requirements such as PCI, SOX, HIPAA, GDPR. Strong communication skills and technical writing skills and the ability to work effectively within a team environment. Ideally, You’ll Also Have Analytical skills and the ability to make informed decisions. Flexibility and adaptability to new challenges and changing project requirements. Desire to learn and grow within the role. Strong interpersonal skills and the ability to communicate effectively. A willingness to engage with GRC platforms and other compliance tools. What we look for We are looking for individuals with a passion for information security and demonstrated ability to apply their knowledge to new and emerging technologies that are supporting the growth strategy of a global professional services firm. What we offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. We ensure that individuals with disabilities are provided reasonable accommodations to participate in the job application or interview process, to perform essential job functions and to receive other benefits and privileges of employment. Please contact us to request accommodations. EY is committed to being an inclusive employer, and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 month ago

Apply

5.0 years

0 Lacs

Chennai

On-site

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you ready to embark on a technical adventure and become a hero to our external and internal users? As Technical Support at Kyndryl, you'll be part of an elite team that provides exceptional technical assistance, enabling our clients to achieve their desired business outcomes. You'll be a troubleshooter extraordinaire, diagnosing and repairing complex equipment, software, and systems with ease. Nothing will be too challenging for you to solve as you respond to escalated issues, report critical design flaws, reliability and maintenance problems, and bugs. You'll be the go-to person for our customers who require assistance with highly technical or sophisticated products, as well as for customer installations and training. With your passion for technology, you'll provide world-class support that exceeds customer expectations. As Technical Support, you'll perform varying degrees of problem determination and resolution of desktop hardware and software issues using your technical expertise and available resources to ensure that our customers' issues are resolved efficiently and effectively. You'll also have the opportunity to perform installs, moves, adds, and changes (IMAC) activities, as well as data backup and restore on certain accounts for clients, ensuring that all related administrative duties are completed within Service Level Agreement objectives. You will develop a deep understanding of the local and regional infrastructure, as well as key contacts in other competencies, which will enable you to ensure that the proper team is aware of – and taking action on the problem. If you're a technical wizard, a customer service superstar, and have an unquenchable thirst for knowledge, we want you to join our team. Your Future at Kyndryl Imagine being part of a dynamic team that values your growth and development. As Technical Support at Kyndryl, you'll receive an extensive and diverse set of technical trainings, including cloud technology, and free certifications to enhance your skills and expertise. You'll have the opportunity to pursue a career in advanced technical roles and beyond – taking your future to the next level. With Kyndryl, the sky's the limit. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Expertise: 5+ years of experience in IT operations, with a focus on Microsoft Active Directory and related identity infrastructure. Deep understanding of Active Directory security best practices, including privileged access management, least privilege principles, and attack surface reduction. Strong experience managing and troubleshooting Entra ID, ADFS, and hybrid identity environments. Hands-on experience with backup and recovery procedures, disaster recovery planning, and incident management. Proficiency in PowerShell scripting for automation and configuration management. Familiarity with Quest Change Auditor, Quest Recovery Manager, or similar security auditing and recovery tools. Knowledge of compliance frameworks such as NIST, ISO 27001, or SOC 2. Excellent troubleshooting, problem-solving, and analytical skills. Strong communication, documentation, and interpersonal skills. Ability to work independently and as part of a team in a fast-paced, managed services environment. As an Identity & Directory Services Operations Specialist, you will: Provide Level 2 & Level 3 Operations Support: Monitor, audit, troubleshoot, and resolve incidents and problems across all directory and identity services. Act as a subject matter expert and provide support and consultation to other IT services and projects. Implement business and security settings according to defined processes and requests. Participate in on-call rotations as required to address critical incidents outside of business hours. Preferred Technical and Professional Experience: Microsoft certifications related to Active Directory, Azure, or security (e.g., MCSA, MCSE, Security+). Experience with other identity and access management (IAM) solutions. Knowledge of DevOps principles and practices. Experience with cloud security tools and technologies Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 1 month ago

Apply

3.0 years

0 - 0 Lacs

Noida

On-site

Job Summary: The ideal candidate will be responsible for designing, implementing, and managing network security measures to protect our organization's digital assets from cyber threats. This role requires in-depth knowledge of networking protocols, firewalls, intrusion detection systems (IDS/IPS), VPNs, and security best practices. Key Responsibilities: Design, configure, and maintain secure network infrastructure, including firewalls, routers, switches, and VPNs. Troubleshooting network issues or outages in compliance with ICSP. Identification and implementation of Network/ Application-level security methods. Perform vulnerability assessments and recommend security enhancements. Ensure compliance with security standards and regulatory requirements (e.g., ISO 27001, NIST, GDPR). Manage firewall policies and rulesets, and ensure they are up to date and effective. Implementing and Monitoring patches, permissions, and service deployments. Conduct regular security audits, penetration tests, and risk assessments. Security management for servers like Blade server, RACK Server and HCI. Documenting policies and procedures. Requirements: Graduate BE/ B,Tech in IT / computer Science and Postgraduate- MCA/MTECH with specialization in computers/ electronics/ IT or M.Sc.in CS/ IT 3–6 years of hands-on experience in network security engineering or a similar role. Strong understanding of TCP/IP, DNS, DHCP, VPNs, and routing protocols. Proficiency with firewalls (e.g., Palo Alto, Fortinet, Cisco ASA), IDS/IPS, and SIEM tools. Familiarity with cloud security (AWS, Azure, GCP) is a plus. Knowledge of scripting (Python, Bash, PowerShell) for automation is preferred. Security certifications such as CCNP Security, CEH, CISM, CISSP, or CompTIA Security+ are a plus. Excellent analytical, problem-solving, and communication skills. Work opportunity with Headquarters Integrated Defence Staff Job Types: Part-time, Contractual / Temporary Contract length: 12 months Pay: ₹60,000.00 - ₹65,000.00 per month Expected hours: 54 per week Schedule: Day shift Work Location: In person

Posted 1 month ago

Apply

0 years

5 - 6 Lacs

Noida

Remote

Optum is a global organization that delivers care, aided by technology to help millions of people live healthier lives. The work you do with our team will directly improve health outcomes by connecting people with the care, pharmacy benefits, data and resources they need to feel their best. Here, you will find a culture guided by inclusion, talented peers, comprehensive benefits and career development opportunities. Come make an impact on the communities we serve as you help us advance health optimization on a global scale. Join us to start Caring. Connecting. Growing together. The Remediation Analyst is responsible for resolving security vulnerabilities on Optum managed enterprise workstations, and contributes to team goals to ensure desired compliance levels. Primary Responsibilities: Receives work assignments directly from Remediation Management Team manager Confirms approved solutions for identified vulnerabilities Engages impacted end users and Application Owners using approved communication protocols Performs security updates in accordance with prescribed remediation plans Provides status updates. Monitors Key Performance Indicators (KPI's) Escalates security violations to appropriate parties Comply with the terms and conditions of the employment contract, company policies and procedures, and any and all directives (such as, but not limited to, transfer and/or re-assignment to different work locations, change in teams and/or work shifts, policies in regards to flexibility of work benefits and/or work environment, alternative work arrangements, and other decisions that may arise due to the changing business environment). The Company may adopt, vary or rescind these policies and directives in its absolute discretion and without any limitation (implied or otherwise) on its ability to do so Required Qualifications: Graduate degree or equivalent experience Experience providing Level 2 support for remote end users. Quality & Professionalism Experience with use of systems management tools (Altiris, SCCM, Microsoft Endpoint Configuration Management) Experience working with Powershell scripts and Microsoft Excel data analysis. Experience with security risk assessment of published software vulnerabilities. Active industry standard security-related certification (CompTIA Security+, ISC2 CC or CISSP) Critical thinking & problem solving skills. Attention to detail At UnitedHealth Group, our mission is to help people live healthier lives and make the health system work better for everyone. We believe everyone - of every race, gender, sexuality, age, location and income - deserves the opportunity to live their healthiest life. Today, however, there are still far too many barriers to good health which are disproportionately experienced by people of color, historically marginalized groups and those with lower incomes. We are committed to mitigating our impact on the environment and enabling and delivering equitable care that addresses health disparities and improves health outcomes - an enterprise priority reflected in our mission.

Posted 1 month ago

Apply

5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Key Accountabilities JOB DESCRIPTION Perform and provide oversight for day-to-day security SOC operations duties, including the management of security analysts, the development and implementation of security policies and procedures, and the response to security alerts. Develop and maintain KPI reports on SOC team performance and other aggregated performance metrics. Develop reports on Security operations for executive management and regional teams. Manage a team of SOC analysts including rostering / shifts planning, tasks allocation and coordination. Continuously monitor security events and alerts generated by various security monitoring tools, such as SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection/Prevention Systems), and endpoint protection platforms. Identify and analyze security incidents based on the available information. Classify and prioritize incidents according to their severity and potential impact. Initiate and coordinate the incident response process, following predefined procedures and workflows. Work with different IT teams to troubleshoot and resolve security-related issues and assist in configuring the logs to be forwarded from their respective systems to the centralized logging system. Analyze vulnerability scan results and work with system owners and IT teams to remediate identified vulnerabilities within specified timeframes. Provide recommendation for Security Use-case creation and optimization for any new/existing systems. Conduct Network and Endpoint log analyses including threat hunting activities and present findings. Studying vulnerabilities, identifying relevant threats, corrective actions recommendations and reporting results. Document all incidents, investigations, and analysis activities accurately and thoroughly. Prepare incident reports, including detailed information on the incident timeline, impact, and recommended remediation actions. Other Act as an ambassador for DP World at all times when working; promoting and demonstrating positive behaviours in harmony with DP World’s Principles, values and culture; ensuring the highest level of safety is applied in all activities; understanding and following DP World’s Code of Conduct and Ethics policies. Perform other related duties as assigned. Qualifications, Experience And Skills Knowledge and Experience Bachelor’s Degree in Computer Science or equivalent. Should have 5-7 years of experience in IT Security with at least 4 years’ experience in conducting analysis of log data and security operations center. Technical and hands-on experience across Cyber Security and technology domains. Background in security technologies, network protocols and operations and understanding of TCP/IP protocol and OSI Seven Layer Model. Computer programming and scripting languages. Strong understanding of the Cyber Kill Chain, pervasive threats attack methods and remediation. Industry recognized professional certifications such as GSEC, Security+, CEH, CySA. Good understanding in E-commerce, logistics, supply chain & port operations applications will be added advantage. Soft Skills Sound analytical and intellectual capabilities. Excellent time management and organizational skills. Decision-making abilities. Team player and conflict management skills. Ability to multi-task, prioritize, coordinate, and work well under pressure to meet deadlines. Strong interpersonal and communication skills ability to work in a team environment. Cultural awareness. Must possess Excellent Reporting Skills. Technical Skills Knowledge of Security Orchestration and Automation (SOAR) solutions. Experience with two or more analysis tools used in a CIRT or similar investigative environment. Ability to analyse and triage IoCs. Show more Show less

Posted 1 month ago

Apply

130.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job Description Current Employees apply HERE Current Contingent Workers apply HERE Secondary Language(s) Job Description Manager, Cybersecurity Engineering Cloud and App Security The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company’s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. You will be tasked with identifying vulnerabilities, supporting the response to incidents, and ensuring that security protocols and controls are adhered to. Your role is vital in safeguarding critical assets and ensuring compliance with legal and regulatory standards. What Will You Do In This Role Contribute to the development of enhanced cloud and application security control integrations and architectural best practices. Contribute to the development and implementation of product security policies and standards to ensure that application, cloud services and infrastructure meet organizational security requirements. Help maintain and monitor security tools and dashboards, ensuring that applications deployed in our environments adhere to organizational security standards and compliance requirements. Identify and prioritize adoption of our security tools within other teams ensuring the inputs and outputs are fully integrated enabling a complete security function. Follow standard approaches and established design patterns to create new designs for systems or system components. Identify and resolve minor design issues. Assist in implementing and maintaining specific security controls as required by organisational policy and local risk assessments and contribute to identifying risks that arise from potential technical solution architectures. Monitor and log the actual service provided, compared to that required by service level agreements. Undertake low-complexity routine vulnerability assessments using automated and semi-automated tools and contribute to evaluating and documenting the scope of results. Design, implement, test, document, and support integration of security tools and technologies in pipelines, Also, assist the product teams in related activities. Assist in maintaining security infrastructure and performing system updates. Investigate minor security breaches in accordance with established procedures. Assist users in defining their access rights and privileges and perform non-standard operational security tasks. Resolve security events and operational security issues. Work closely with cross-functional Infrastructure teams on Automation and Orchestration. Create and document detailed designs for simple software applications or components. Apply agreed modelling techniques, standards, patterns, and tools. Work within a matrix organizational structure, reporting to both the functional manager and the project manager. What Should You Have Bachelors’ degree in Information Technology, Computer Science or any Technology stream. Working experience in cloud environments AWS must have and good to have Azure, or GCP. Understanding of OWASP Top 10 security risks and mitigation strategies, relevant NIST standards, and Zero Trust principles. Familiarity with programming/scripting languages like Python, Bash, Terraform, Ansible, JSON, PowerShell, or JavaScript for automating tasks. Familiarity with software development/delivery lifecycle and related technologies 3+ years of hands-on experience working with network protocols, firewalls, intrusion detection systems, encryption technologies, and endpoint security solutions. Proficiency in security tools in the areas of cloud, application, endpoint, network or identity, vulnerability scanners, and malware analysis platforms.. Knowledge of authentication methods, identity management, and security access protocols (e.g., SSO, MFA, LDAP). Ideally AWS certified. Good interpersonal and communication skills (verbal and written). Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are often required or highly desirable. Proven record of delivering high-quality results. Product and customer-centric approach. Innovative thinking, experimental mindset. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who We Are We are known as Merck & Co., Inc., Rahway, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world. What We Look For Imagine getting up in the morning for a job as important as helping to save and improve lives around the world. Here, you have that opportunity. You can put your empathy, creativity, digital mastery, or scientific genius to work in collaboration with a diverse group of colleagues who pursue and bring hope to countless people who are battling some of the most challenging diseases of our time. Our team is constantly evolving, so if you are among the intellectually curious, join us—and start making your impact today. #HYDIT2025 Search Firm Representatives Please Read Carefully Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails. Employee Status Regular Relocation VISA Sponsorship Travel Requirements Flexible Work Arrangements Hybrid Shift Valid Driving License Hazardous Material(s) Required Skills Design Applications, Information Security, Security Operations, SLA Management, Software Development, Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Scanning Preferred Skills Job Posting End Date 06/15/2025 A job posting is effective until 11 59 59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID R335939 Show more Show less

Posted 1 month ago

Apply

130.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job Description As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. Current Employees apply HERE Current Contingent Workers apply HERE Secondary Language(s) Job Description Senior Manager, Cybersecurity Engineering Cloud and App Security The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company’s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. You will be tasked with identifying vulnerabilities, supporting the response to incidents, and ensuring that security protocols and controls are adhered to. Your role is vital in safeguarding critical assets and ensuring compliance with legal and regulatory standards. What Will You Do In This Role Lead the development of enhanced cloud and application security control integrations and architectural best practices. Lead the development and implementation of product security policies and standards to ensure that application, cloud services and infrastructure meet organizational security requirements. Lead the maintenance and monitoring security tools and dashboards, ensuring that applications deployed in our environments adhere to organizational security standards and compliance requirements. Lead adoption of our security tools within other teams ensuring the inputs and outputs are fully integrated enabling a complete security function. Design, implement, test, document, and support integration of security tools and technologies in pipelines, Also, assist the product teams in related activities. Work closely with cross-functional Infrastructure teams on Automation and Orchestration. Create and document detailed designs for simple software applications or components. Apply agreed modelling techniques, standards, patterns, and tools. Work within a matrix organizational structure, reporting to both the functional manager and the project manager. What Should You Have Bachelors’ degree in Information Technology, Computer Science or any Technology stream. Working experience in cloud environments AWS must have and good to have Azure, or GCP. Understanding of OWASP Top 10 security risks and mitigation strategies, relevant NIST standards, and Zero Trust principles. Familiarity with programming/scripting languages like Python, Bash, Terraform, Ansible, JSON, PowerShell, or JavaScript for automating tasks. Familiarity with software development/delivery lifecycle and related technologies 7+ years of hands-on experience working with network protocols, firewalls, intrusion detection systems, encryption technologies, and endpoint security solutions. Proficiency in security tools in the areas of cloud, application, endpoint, network or identity, vulnerability scanners, and malware analysis platforms. Knowledge of authentication methods, identity management, and security access protocols (e.g., SSO, MFA, LDAP). Ideally AWS certified. Good interpersonal and communication skills (verbal and written). Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are often required or highly desirable. Proven record of delivering high-quality results. Product and customer-centric approach. Innovative thinking, experimental mindset. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who We Are We are known as Merck & Co., Inc., Rahway, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world. What We Look For Imagine getting up in the morning for a job as important as helping to save and improve lives around the world. Here, you have that opportunity. You can put your empathy, creativity, digital mastery, or scientific genius to work in collaboration with a diverse group of colleagues who pursue and bring hope to countless people who are battling some of the most challenging diseases of our time. Our team is constantly evolving, so if you are among the intellectually curious, join us—and start making your impact today. #HYDIT2025 Search Firm Representatives Please Read Carefully Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails. Employee Status Regular Relocation VISA Sponsorship Travel Requirements Flexible Work Arrangements Hybrid Shift Valid Driving License Hazardous Material(s) Required Skills Design Applications, Information Security, Security Operations, SLA Management, Software Development, Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Scanning Preferred Skills Job Posting End Date 06/20/2025 A job posting is effective until 11 59 59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID R335936 Show more Show less

Posted 1 month ago

Apply

6.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Company Description PSA International (PSA) is a leading global port operator with over 70 terminals in 45 countries. PSA collaborates with customers and partners to develop world-class port ecosystems and deliver innovative supply chain solutions. PSA India, an early participant in India’s container terminal privatization program, has investments in Mundra, Chennai and Navi Mumbai. PSA India is seeking a Cyber Security Engineer to play a key role in strengthening the organization’s cybersecurity posture through a combination of policy governance , risk management and security operations . This hybrid position requires a hands-on and collaborative professional who can balance governance and compliance needs with technical oversight of operational controls and processes. Role Description Drive the implementation and maintenance of cybersecurity policies, procedures, and standards aligned with ISO 27001, NIST CSF, and internal controls. Support internal, external, and third-party audits by providing evidence, validating controls, and coordinating remediation actions. Maintain the cybersecurity risk register, coordinate with stakeholders for risk assessments, and track treatment plans to closure. Guide and validate technical teams on implementation of security baselines, secure configuration templates, and infrastructure hardening. Participate in infrastructure and cloud architecture reviews, validate security design elements, and provide recommendations based on risk exposure. Review and advise on network architecture, segmentation strategies, firewall rulesets, and secure zone definitions. Work with engineering teams to review architectural diagrams, deployment plans, and ensure controls are mapped to technical designs. Coordinate and track operational cybersecurity tasks including patch compliance, endpoint health, logging, backup validation, and certificate lifecycle management. Assist business units during security incidents by coordinating initial triage, containment guidance, and post-incident documentation. Collaborate with IT and business leads to embed cybersecurity requirements into project governance, change management, and vendor onboarding. Manage access control processes, conduct periodic reviews, and ensure alignment with least privilege principles. Contribute to the development of security awareness programs and deliver periodic training and communication across functions. 4–6 years of experience in cybersecurity engineering, risk governance, or audit-aligned operations roles. Hands-on familiarity with network infrastructure, secure architecture principles, endpoint security, and foundational cloud security. Qualifications Information Security and Cybersecurity Governance expertise Experience in infrastructure security, network architecture validation and secure configurations Exposure to internal/external audit processes, compliance tracking, and risk assessments Understanding of vulnerability management lifecycle and operational control implementation Strong analytical, documentation, and stakeholder coordination skills Cybersecurity and Network Security expertise Strong analytical and problem-solving skills Knowledge of industry best practices in cyber security Professional certifications such as ISO 27001 LA, CEH, CompTIA Security+ or equivalent are preferred. Bachelor's degree in Computer Science, Information Technology, or related field Show more Show less

Posted 1 month ago

Apply

5.0 years

0 Lacs

Nashik, Maharashtra, India

Remote

Job Description In This Role, Your Responsibilities Will Be: Responsible for supporting & implementing project delivery from proposal all the way to delivery & site acceptance Design and implementation of (wired and wireless) networks for Delta V and IT systems. Installation and administration of Windows system, including remote access. Installation and administration of Delta V systems. Virtualization of Delta V systems within a Windows OS environment. 1st line support for the solve of Delta V and IT hardware and software issues. Analyze and understand customer requirements Participate in customer facing workshops regarding OT designs & solutions Raise Technical Queries Develop System Architecture and Network/Cybersecurity related design and documentation Perform FAT with customer Bring up project issues/risk to Lead Engineer/Project Coordinator with appropriate mitigation plan Able to co-ordinate with overseas offices to understand scope & schedule, TQ clarification, review meetings and progress reporting Take full ownership of allocated tasks Ready to travel on assignments at various locations Develop a positive & collaborative environment within the Team for work and professional growth Perform base customer support activities as needed, including phone support, field service and remote diagnostics, as well as work with Emerson Field Support Engineers, regional offices and guide resources as needed to resolve issues Continually and proactively increase one’s technical capabilities, growing and establishing higher levels of expertise Help to improve the value of the OT & Cyber team by giving towards additional group activities/tasks, developing new internal/external solutions, and assisting with skills development. Quality Control & Assurance Implementation of EEEC IMS processes/documentation as & when required throughout the project. Adopts to WA quality requirements and Customer’s regulatory guidelines Practices and promotes First time right approach. Closely follows GDP (Good Documentation Practices). Other Duties Perform other additional specific duties, when requested by the business. These will, typically, be strategic in nature but could potentially be anything that the post holder is suitably qualified and experienced to undertake. These duties may be assigned to the person under guidance of a supervisor. Who You Are: You promote high visibility of shared contributions to goals. You quickly and significantly take action in constantly evolving, unexpected situations. You actively seek guidance from pertinent sources to make timely and well-informed decisions. You handle the risk that comes with moving forward when the outcome is not certain. For This Role, You Will Need: 5years experience in the field of networking including but not limited to led and unmanaged switches; Firewalls; Routers; Wireless Network; Server management; Patch management; Antivirus, Backup and Recovery management; Virtualized infrastructure and Cyber security. Technical Skills: Experience with Virtualization, particularly Hyper-V and HCI Windows Server, to MSCA level or equivalent. Windows 10, to MSCA level or equivalent. Networking, to Cisco CCENT/CCNA Routing & Switching, CompTIA Network+ or equivalent. Cybersecurity, to CompTIA Security+ or equivalent. Knowledge of OPC, Modbus and other TCP/IP based Industrial Protocols would be an added advantage Preferred Qualifications that Set You Apart: Engineering OR Science Graduate with CCNA, Cybersecurity certification in the field of networking. Our Culture & Commitment to You At Emerson, we prioritize a workplace where every employee is valued, respected, and empowered to grow. We foster an environment that encourages innovation, collaboration, and diverse perspectives—because we know that great ideas come from great teams. Our commitment to ongoing career development and growing an inclusive culture ensures you have the support to thrive. Whether through mentorship, training, or leadership opportunities, we invest in your success so you can make a lasting impact. We believe diverse teams, working together are key to driving growth and delivering business results. We recognize the importance of employee wellbeing. We prioritize providing competitive benefits plans, a variety of medical insurance plans, Employee Assistance Program, employee resource groups, recognition, and much more. Our culture offers flexible time off plans, including paid parental leave (maternal and paternal), vacation and holiday leave About Us WHY EMERSON Our Commitment to Our People At Emerson, we are motivated by a spirit of collaboration that helps our diverse, multicultural teams across the world drive innovation that makes the world healthier, safer, smarter, and more sustainable. And we want you to join us in our bold aspiration. We have built an engaged community of inquisitive, dedicated people who thrive knowing they are welcomed, trusted, celebrated, and empowered to solve the world’s most complex problems — for our customers, our communities, and the planet. You’ll contribute to this vital work while further developing your skills through our award-winning employee development programs. We are a proud corporate citizen in every city where we operate and are committed to our people, our communities, and the world at large. We take this responsibility seriously and strive to make a positive impact through every endeavor. At Emerson, you’ll see firsthand that our people are at the center of everything we do. So, let’s go. Let’s think differently. Learn, collaborate, and grow. Seek opportunity. Push boundaries. Be empowered to make things better. Speed up to break through. Let’s go, together. Accessibility Assistance or Accommodation If you have a disability and are having difficulty accessing or using this website to apply for a position, please contact: idisability.administrator@emerson.com . About Emerson Emerson is a global leader in automation technology and software. Through our deep domain expertise and legacy of flawless execution, Emerson helps customers in critical industries like life sciences, energy, power and renewables, chemical and advanced factory automation operate more sustainably while improving productivity, energy security and reliability. With global operations and a comprehensive portfolio of software and technology, we are helping companies implement digital transformation to measurably improve their operations, conserve valuable resources and enhance their safety. We offer equitable opportunities, celebrate diversity, and embrace challenges with confidence that, together, we can make an impact across a broad spectrum of countries and industries. Whether you’re an established professional looking for a career change, an undergraduate student exploring possibilities, or a recent graduate with an advanced degree, you’ll find your chance to make a difference with Emerson. Join our team – let’s go! No calls or agencies please. Show more Show less

Posted 1 month ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! Qualys, a leading cybersecurity firm, is seeking an experienced Senior Technical Support Engineer for Security Applications to resolve global customer and partner service requests promptly. Collaborate across teams for high customer satisfaction in a secure environment. Ideal for security enthusiasts with solid networking skills. Lead in resolving technical issues, provide top-tier support, and contribute to world-class assistance. Responsibilities: Promptly resolve global customer and partner service requests in a highly secured environment. Collaborate with cross-functional teams for high customer satisfaction. Provide support via phone, email, and MS Teams for Product modules over the SaaS platform. Ensure friendly and professional customer interactions throughout the service life cycle. Act as the main point of contact for technical issues, collaborating directly with Development and QA teams. Thrive in a challenging and dynamic environment, delivering world-class support and technical solutions. Qualifications: 5+ years of technical support experience. Experience in Vulnerability Management and Web Application Security/Firewall application support. In-depth TCP/IP understanding and LAN/WAN infrastructure knowledge. Strong foundation in Windows and/or solid Linux/Unix experience in an enterprise environment. Familiarity with common OS services (IIS, BIND, Apache, AD, WINS, Samba, SSH). Knowledge of firewalls, Intrusion Detection System technologies, and Network Vulnerability Scanners. Outstanding troubleshooting and analytical skills. Excellent written and verbal communication skills. Bachelor of Science in Computer Science or equivalent experience. Networking: OSI Layer understanding. Knowledge of broadcast domain vs. collision domain. Familiarity with different records zones in DNS and how it works. Understanding of SSL Handshake and TCP/IP Handshake. Proficiency in ARP, DHCP, proxy servers, and DNS cache clearing. Differentiation between TCP and UDP, and protocols & their workings. Linux/Unix: Understanding of the boot process and run levels. Various ways to assign an IP address to a Unix/Linux/Debian machine. Proficient in checking running processes, hidden files, and installing packages. Knowledge of sudo, permissions, file systems, and SSH banner. Windows: Insight into the Windows boot process and control panel basics. Understanding of UAC, registry hives, and remote registry manipulation tools. Knowledge of kernel mode vs. user mode, Active Directory, and Group Policies. Familiarity with Kerberos and NTLM authentication, Procmon, and service control manager. Security: Understanding of vulnerabilities, the vulnerability cycle, and exploits. Knowledge of malware types (virus, trojan, worm) and False/True Positive/Negative concepts. Understanding of False Positive, False Negative, True Positive, and True Negative in the security context. Preferred: Experience with packet capture review and diagnosis. Previous API support and Regex knowledge. Scripting experience (Bash, Python). Knowledge of major web server software, UNIX/Windows web services, and diverse platforms. Oracle and Microsoft SQL knowledge. CCNA, MCSE, CISSP, CompTIA Security+, and CEH certifications are highly desirable. Experience with Customer Support and Development Tools (Salesforce, Jira, etc.). Willing to work in 24/7 rotational shifts. Show more Show less

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies