Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Job Title: Support Level Engineer (Identity & Access Management) No. of Positions: 6 Location: Noida, Uttar Pradesh Employment Type: Full-time Experience Level: 1–4 years (L1/L2 Support) Reports To: IAM Support Lead / IT Security Manager About Us: DigiTaiken Tech LLP is at the forefront of delivering secure and seamless digital identity and access solutions. We are looking to expand our support team with professionals who have hands-on experience with leading Identity & Access Management (IAM) platforms: 1Kosmos (BlockID) , CyberArk , and OKTA . Join us and be part of a mission to build a secure digital future. Job Summary: The IAM Support Engineer will be responsible for providing Level 1 and Level 2 support for our IAM platforms – primarily 1Kosmos, CyberArk, and OKTA for our prestigious customers. The role involves monitoring system health, responding to user queries and incidents, and performing administrative tasks across these platforms to ensure the integrity and performance of our identity infrastructure. Key Responsibilities: Provide technical support for incidents and service requests related to 1Kosmos (BlockID) , CyberArk , and OKTA platforms. Perform user administration tasks : provisioning, de-provisioning, role assignment, group management, and access reviews. Monitor IAM platforms for performance, health checks, and potential security issues. Troubleshoot and resolve authentication, authorization, SSO, MFA, and password management issues. Create and maintain documentation for standard procedures, FAQs, and incident response playbooks. Work closely with internal IT teams, security teams, and vendors to resolve complex issues. Participate in on-call rotation and ensure prompt resolution of high-priority tickets. Escalate issues to L3 teams or vendors where appropriate, following internal protocols. Stay updated with product updates, patches, and best practices for IAM systems. Technical Skills & Qualifications: Mandatory Experience in one or more of the following IAM platforms : 1Kosmos (BlockID) CyberArk (PAS, PVWA, PSM, CPM, Conjur – as applicable) OKTA (Workforce Identity, Universal Directory, MFA, SSO) Understanding of IAM concepts : Identity Lifecycle Management, RBAC, least privilege, MFA, SSO, and federation protocols (SAML, OAuth, OIDC). Familiarity with Active Directory/LDAP , Windows & Linux environments. Hands-on with ticketing systems (e.g., ServiceNow, JIRA) and ITIL-based service management. Scripting knowledge (PowerShell, Bash, or Python) is a plus. Cybersecurity certifications (such as CompTIA Security+, OKTA Certified Professional, or CyberArk Trustee) are advantageous. Preferred Attributes: Strong problem-solving and communication skills. Ability to work in shifts or rotational schedules . Passion for cybersecurity and interest in advancing within the IAM domain. Fast learner with a proactive attitude and customer-first mindset . What We Offer: A collaborative work culture. Opportunity to work with cutting-edge IAM platforms and our tier1 customers. Career growth in a high-demand domain. Competitive compensation and benefits. To Apply: Send your resume to hr@digitaiken.com with subject line: “IAM Support Engineer – [Your Name]” Show more Show less
Posted 1 month ago
0.0 - 2.0 years
0 Lacs
Kochi, Kerala
On-site
Job Title: SOC Analyst (SA- Security Analyst – L1 Threat Hunt) Location: Kochi We are seeking a highly motivated Level 1 SOC Threat Hunte r to join our Security Operations Center team. This entry-level role is ideal for individuals with a foundational understanding of cybersecurity who are eager to grow their skills in proactive threat detection and response. As an L1 Threat Hunter, you will work closely with SOC analysts and incident responders to identify, analyze, and escalate suspicious activity using a variety of tools and threat intelligence sources. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Requirements Must-have: 2 - 3 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Knowledge of creating and modifying the dashboards. Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows Deep Knowledge in SIEM, Ticketing tool, EDR, Vulnerability Management, MimeCast, Email security. Excellent written and verbal communication skills. Good to have: Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others Main Responsibilities Monitor security alerts and events from SIEM and other security tools. Perform basic threat hunting across endpoints, network traffic, and log sources using predefined queries and playbooks. Investigate anomalies, potential indicators of compromise (IOCs), and low-fidelity alerts. Escalate verified threats to L2/L3 analysts with relevant context and documentation. Assist in identifying false positives and refining detection rules in collaboration with senior analysts. Document findings, maintain accurate logs of activities, and contribute to reports. Follow standard operating procedures and incident handling workflows. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Leading efforts to counter SLA breaches and anticipating the likelihood of future security alerts, incidents. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Keep updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats in security perspective. Other responsibilities and additional duties as assigned by the security management team or service delivery manager. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹50,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Did you have worked in the role Threat Hunting and SIEM Tools ? Education: Bachelor's (Required) Experience: minimum: 2 years (Required) Language: English (Required) Location: Kochi, Kerala (Required) Work Location: In person
Posted 1 month ago
5.0 years
0 Lacs
Ahmedabad, Gujarat, India
On-site
Job Summary: We are seeking an experienced and proactive Network Administrator to manage and support our web portal infrastructure. The ideal candidate will be responsible for ensuring high availability, optimal performance, and robust security across all servers and network components. This role requires hands-on experience with Linux , Microsoft SQL Server , AWS Cloud Platform , and network security protocols. The candidate should also possess relevant industry certifications to validate their expertise. Key Responsibilities: Design, implement, and maintain secure and scalable networks for a high-traffic web portal. Administer and monitor physical and virtual S ervers , ensuring optimal performance and uptime. Manage MS SQL Server databases, including backup, restoration, and security protocols. Implement and enforce robust data security policies, including firewalls, intrusion detection/prevention, and access controls. Maintain and optimize AWS infrastructure , including EC2, RDS, S3, IAM, and VPC configurations. Monitor network traffic and troubleshoot connectivity issues across servers and endpoints. Ensure disaster recovery and backup procedures are tested and reliable. Apply patches, updates, and system hardening as part of a proactive security strategy. Coordinate with development and DevOps teams to support application deployment and infrastructure needs. Document network infrastructure, configurations, processes, and changes comprehensively. Required Skills & Qualifications: Bachelor’s degree in Computer Science, Information Technology, or a related field. 3–5 years of proven experience as a Network Administrator in a production web environment. Strong hands-on experience with Windows OS & Linux (Ubuntu/CentOS/Red Hat) systems administration. Proficient in managing and securing MS SQL Server environments. In-depth knowledge of AWS Cloud Services , including architecture, deployment, and monitoring tools. Solid understanding of TCP/IP , routing, DNS, VPN, and other core networking protocols. Experience with firewalls , VPNs , SIEM , and endpoint security tools. Familiar with network automation and monitoring tools (e.g., Ansible, Nagios, Prometheus, CloudWatch). Excellent problem-solving and documentation skills. Certifications (Preferred) AWS Certified Solutions Architect – Associate or Professional (Required) Red Hat Certified System Administrator (RHCSA) or equivalent (Preferred) Microsoft Certified: Azure/Windows Server or MS SQL Certification (Preferred) CompTIA Network+ or Security+ (Preferred) Certified Information Systems Security Professional (CISSP) (Optional but a plus) Preferred Attributes: Ability to work independently and take ownership of critical infrastructure components. Strong communication and interpersonal skills to coordinate with cross-functional teams. Keen attention to detail and commitment to ensuring secure and efficient IT operations. Show more Show less
Posted 1 month ago
2.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Job Title: IT Administrator with Networking & Server Administration Location : Hyderabad Experience : 6 months – 2 years Job Type: Paid Internship About Us: Instaresz Business Services Pvt Ltd is a forward-thinking, fast-growing technology company that thrives on innovative solutions. We are currently looking for an experienced IT Administrator who will take responsibility for managing and maintaining the network infrastructure, servers, and systems while ensuring smooth day-to-day IT operations across the organization. Key Responsibilities: Set up, configure, and maintain LAN/WAN networks, routers, switches, firewalls, and VPNs. Administer Windows/Linux servers, Active Directory, DNS, DHCP, and user access controls. Manage software and OS package installations using tools like apt, yum, dnf, and rpm. Monitor and troubleshoot network and system performance issues. Maintain web, file, mail, and database servers (Apache, Nginx, Postfix, MySQL, etc.). Implement and monitor IT security measures including firewalls, antivirus, and access policies. Perform system backups, restore processes, and support disaster recovery plans. Support virtualization platforms (VMware, Hyper-V) and assist with basic cloud infrastructure (AWS, Azure). Automate tasks using PowerShell or Bash scripting. Document IT procedures, configurations, and network diagrams. Required Skills & Qualifications: Proven Experience in IT system administration, networking, and server management. Hands-on Knowledge of networking protocols, IP addressing, subnetting, and VPNs. Experience with network devices such as routers, switches, and firewalls. Proficient in Windows Server (Active Directory, Group Policies, DNS, DHCP) and Linux administration (Ubuntu, CentOS, RHEL). In-depth knowledge of server administration , including web servers (Apache, Nginx), databases (MySQL, PostgreSQL), and mail servers (Postfix, Exchange). Experience with package management tools (apt, yum, dnf, rpm). Familiarity with cloud platforms (AWS, Azure) and virtualization tools (VMware, Hyper-V). Strong understanding of IT security practices , including firewalls, antivirus, VPNs, and access management. Scripting skills for automation (PowerShell, Bash). Excellent problem-solving and troubleshooting abilities. Preferred Certifications: CompTIA Network+ CompTIA Security+ Microsoft Certified: Windows Server / Azure Administrator Cisco Certified Network Associate (CCNA) Red Hat Certified System Administrator (RHCSA) ITIL Foundation (For IT Service Management) Additional Skills (Good to Have): Experience with containerization technologies (Docker, Kubernetes). Knowledge of Version Control Systems (Git). Why Join Us: Competitive salary and performance-based incentives Dynamic and collaborative work environment Opportunities for learning and growth Exposure to cutting-edge technologies and industry trends Show more Show less
Posted 1 month ago
0 years
0 Lacs
New Delhi, Delhi, India
Remote
Company Description Resecurity is an American cybersecurity company based in Los Angeles, California. The company provides next-generation endpoint protection and intelligence-driven cybersecurity solutions to leading Fortune 500 corporations and governments worldwide. Role Description This is a full-time hybrid role for a Threat Intelligence Analyst at Resecurity located in New Delhi, with the option for some remote work. The Threat Intelligence Analyst will be responsible for conducting threat assessments, analyzing security incidents, assessing vulnerabilities, and providing actionable intelligence to enhance cybersecurity defenses. Qualifications Cybersecurity Threat Assessment, Incident Analysis, and Vulnerability Assessment skills Experience in threat intelligence, threat modeling, and security research Proficiency in malware analysis and reverse engineering Knowledge of cyber threat landscape, threat actors, and attack techniques Strong analytical and problem-solving skills Understanding of network protocols and security technologies Relevant industry certifications (e.g., CISSP, CEH, CompTIA Security+) Bachelor's or Master's degree in Cybersecurity, Computer Science, or related field Show more Show less
Posted 1 month ago
0.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Join Amgen’s Mission of Serving Patients At Amgen, if you feel like you’re part of something bigger, it’s because you are. Our shared mission—to serve patients living with serious illnesses—drives all that we do. Since 1980, we’ve helped pioneer the world of biotech in our fight against the world’s toughest diseases. With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year. As a member of the Amgen team, you’ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you’ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. Junior Vulnerability Management Analyst What You Will Do Let’s do this. Let’s change the world. In this vital role supports the identification, assessment, and tracking of vulnerabilities across the organization’s IT landscape. The Junior Vulnerability Management Analyst assists senior team members in analyzing vulnerability data, correlating risk indicators (e.g., KEV, EPSS), and supporting remediation efforts. This position offers an opportunity to grow technical expertise while contributing to the organization’s security posture through structured vulnerability management processes. Roles & Responsibilities: Assist with analyzing vulnerability scan results from tools such as Tenable, Qualys, or Rapid7. Support prioritization efforts using CVSS scores, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), and asset criticality. Collaborate with IT and security teams to track remediation status and escalate high-risk findings. Monitor public threat intelligence sources to understand the context of vulnerabilities. Contribute to the development of dashboards and reports for tracking vulnerabilities and trends. Assist in documenting vulnerability management processes and remediation workflows. Support compliance and audit requests by providing vulnerability data as needed. Learn and follow policies related to patch management and secure configurations. What We Expect Of You We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Bachelor’s degree and 0 to 3 years of experience in cybersecurity or IT operations with exposure to vulnerability or security tools OR Diploma and 4 to 7 years of experience in cybersecurity or IT operations with exposure to vulnerability or security tools Must-Have Skills: Basic familiarity with vulnerability management platforms (e.g., Tenable, Qualys, or Rapid7) Understanding of basic CVSS scoring and vulnerability classification Awareness of cybersecurity concepts such as threat intelligence, patching, and risk assessment Foundational knowledge of networking and common IT systems Willingness to learn and grow in the field of vulnerability management Preferred Qualifications: Good-to-Have Skills: Exposure to KEV, EPSS, or similar threat-based scoring frameworks Basic experience with scripting languages (e.g., Python, PowerShell) Awareness of cloud security tools (e.g., AWS Inspector, Azure Defender) Familiarity with compliance standards such as NIST, ISO, or PCI-DSS CompTIA Security+ (preferred) Tenable Certified Nessus Auditor (Preferred) Qualys Vulnerability Management Specialist (Preferred) Soft Skills: Analytical Thinking – Comfortable working with data and identifying patterns Attention to Detail – Careful review and tracking of vulnerabilities Communication Skills – Able to clearly document and explain findings Collaboration & Teamwork – Works well with cross-functional teams Curiosity & Continuous Learning – Strong interest in cybersecurity and professional growth Problem-Solving Mindset – Seeks practical solutions to real-world security issues What You Can Expect Of Us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now and make a lasting impact with the Amgen team. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. Show more Show less
Posted 1 month ago
0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cyber Governance Risk and Compliance Consultant - Senior The opportunity This is a role where no two days are the same – so you’ll find yourself taking on plenty of new responsibilities as you go. You’ll work alongside clients and colleagues, balancing your time between developing security strategies, designing security and privacy controls, advising client stakeholders, facilitating workshops and supporting business development. Your Key Responsibilities As a Cyber GRC Professional in our Cyber Security practice, you will be occupied in the following domains: a) Strategy, b) Risk, c) Compliance. As part of our team strategy you will be expected to take on responsibility and initiative early, providing you with real experience working with a wide range of major clients in EY. You will be taking responsibility for the quality of your work, while continually developing your personal and professional skills through formal training, hands-on experience and coaching. Skills And Attributes For Success To qualify for the role, you must have: Degree, or equivalent, in Information Security, Cyber Security, Information Technology, Informatics, or other similar and technical areas Evidence of self-motivation to continuously develop in the areas of cybersecurity Good organizational and time management skills with the ability to prioritize and complete multiple complex projects under tight deadlines Ability to translate security issues into business risks Excellent interpersonal skills and ability to work effectively within a team at all hierarchical levels Willingness to research client inquiries and emerging issues, including regulations, industry practices, and new technologies Experience, knowledge and strong interest in information and cyber security domains are essential for this role Experience on Cyber Governance, Risk & Compliance (GRC), Cyber risk assessments & management methodologies Experience on assessing, designing and implementing security strategies, governance frameworks over processes and controls, allowing organisations to optimally manage cyber security Experience on design and implementation of security policies, procedures, standards and controls in line with regulation and/or current standards, such as ISO27001, NIST, SANS etc. Experience in data classification exercises and controls / mechanisms enforcement Working knowledge of control frameworks such as ISO 27001/27002, COBIT, NIST, ITIL, etc. Ability to conduct Security regulatory and compliance assessment independently Hands on with assessment report preparation and presenting to senior technical and business stakeholders Hand on knowledge of excel, PowerPoint and word Articulative and confident in presentation to senior stakeholders Ability to lead workstreams or dedicated portions of projects Cyber maturity assessments, recommendations, roadmap and strategy creation knowledge of use of and risks related to modern and emerging technologies Cybersecurity audit Ability to plan and deliver cyber security training and awareness Ideally, you’ll also have: Security-related qualifications / certifications such as CISSP, SSCP, CISM, ISO27001 lead implementer or auditor, CompTIA Security+, are desirable Experience in Third Party Risk Management (TPRM) and / or vendor risk assessment engagements Experience in design and implementation of Information Security Management Systems (i.e. security policies, procedures and guidelines) according to leading International Standards Security-related vendor / technology certifications are desirable EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
2.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Description and Requirements "At BMC trust is not just a word - it's a way of life!" We are an award-winning, equal opportunity, culturally diverse, fun place to be. Giving back to the community drives us to be better every single day. Our work environment allows you to balance your priorities, because we know you will bring your best every day. We will champion your wins and shout them from the rooftops. Your peers will inspire, drive, support you, and make you laugh out loud! We help our customers free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead - and are relentless in the pursuit of innovation! Our IS&T (Information Services and Technology) department provides all the required technology and operational support services to run our business here in BMC! We have over 200 servers on premises to support production, disaster recovery, databases, applications and over 1000 servers in Lab environment. IS&T is transformational not only for BMC but also for the customer experience, because we give a 360 degrees view to the customer about the products they should know, opportunities in the pipeline, and any service issues outstanding with the customer. We use cutting-edge technologies to manage BMC's infrastructure and showcase it to the customers – program is called BMC on BMC! We are seeking a proactive and technically capable Cyber Threat Management Engineer to join our cybersecurity threat management team. This early-career role is ideal for individuals with foundational experience in cybersecurity who are ready to grow their technical skills and contribute to BMC’s threat detection and response capabilities. You will play an integral part in identifying, analyzing, and mitigating cyber threats across BMC’s global environment. Here is how, through this exciting role, YOU will contribute to BMC's and your own success: Monitor and analyze data from security systems including open source and enterprise solutions. Effectively communicate identified threats and track remediations until completion. Participate in the investigation and technical analysis of security incidents and provide remediation guidance. Integrate threat intelligence feeds and use frameworks like MITRE ATT&CK to assess and defend against current adversary tactics. Contribute to automation initiatives to streamline threat detection, alerting, and response workflows. Support threat hunting and red team exercises. Document findings, techniques, and outcomes in knowledge bases and reports. To ensure you’re set up for success, you will bring the following skillset & experience: Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field—or equivalent hands-on experience. Foundational experience (e.g., 1–2 years) in cybersecurity operations, threat analysis, or incident response. Proficiency with at least one SIEM platform (e.g., Splunk, QRadar, Sentinel). Proficiency with enterprise solutions providing dark web monitoring, attack surface management, threat intelligence, and risk rating. Understanding of network protocols, operating systems, and cybersecurity fundamentals. Strong scripting or automation skills (e.g., Python, PowerShell, Bash) Excellent communication and documentation abilities. Whilst these are nice to have, our team can help you develop in the following skills: Familiarity with threat intelligence tools and frameworks (e.g., MISP, STIX/TAXII). Knowledge of cloud security practices (AWS, Azure, or GCP). Relevant certifications such as CompTIA Security+, CySA+, SC-200, or GIAC (GCIH, GCIA, GCTI). Curiosity for cybersecurity and continuous learning. Our commitment to you! BMC’s culture is built around its people. We have 6000+ brilliant minds working together across the globe. You won’t be known just by your employee number, but for your true authentic self. BMC lets you be YOU! If after reading the above, You’re unsure if you meet the qualifications of this role but are deeply excited about BMC and this team, we still encourage you to apply! We want to attract talents from diverse backgrounds and experience to ensure we face the world together with the best ideas! BMC is committed to equal opportunity employment regardless of race, age, sex, creed, color, religion, citizenship status, sexual orientation, gender, gender expression, gender identity, national origin, disability, marital status, pregnancy, disabled veteran or status as a protected veteran. If you need a reasonable accommodation for any part of the application and hiring process, visit the accommodation request page. < Back to search results BMC Software maintains a strict policy of not requesting any form of payment in exchange for employment opportunities, upholding a fair and ethical hiring process. At BMC we believe in pay transparency and have set the midpoint of the salary band for this role at 1,725,800 INR. Actual salaries depend on a wide range of factors that are considered in making compensation decisions, including but not limited to skill sets; experience and training, licensure, and certifications; and other business and organizational needs. The salary listed is just one component of BMC's employee compensation package. Other rewards may include a variable plan and country specific benefits. We are committed to ensuring that our employees are paid fairly and equitably, and that we are transparent about our compensation practices. ( Returnship@BMC ) Had a break in your career? No worries. This role is eligible for candidates who have taken a break in their career and want to re-enter the workforce. If your expertise matches the above job, visit to https://bmcrecruit.avature.net/returnship know more and how to apply. Show more Show less
Posted 1 month ago
3.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
We are the leading provider of professional services to the middle market globally, our purpose is to instill confidence in a world of change, empowering our clients and people to realize their full potential. Our exceptional people are the key to our unrivaled, inclusive culture and talent experience and our ability to be compelling to our clients. You’ll find an environment that inspires and empowers you to thrive both personally and professionally. There’s no one like you and that’s why there’s nowhere like RSM. We are seeking analyst level individuals with experience working in the field of cybersecurity and a desire to help organizations improve their operations to join our team and help run the ongoing security operations for RSM clients in a variety of industries and geographic locations. Successful candidates will have working knowledge in some or all these areas – IT operations, security monitoring, active directory, IP networking and various cloud technologies. Position And Key Responsibilities At RSM, analysts work with large and small companies in variety of industries. They develop strong working relationships with their peers within the security operations center (SOC) while learning their clients’ businesses and challenges facing their organizations. Analysts work as part of a broader team under the direction of more senior analysts, threat hunters, shift leads, intelligence analysts and SOC managers in support of multiple clients. Working in a mutually respectful team environment helps our analysts perform at their best and integrate their career with their personal life. You will have the opportunity to: Role Responsibilities: Investigate security incidents using SIEM tools, automation, and other cybersecurity technologies (i.e. ServiceNow, Stellar Cyber, Hyas Insight and DNS Protect, sentinel One, ELK Stack, Virus total, Shodan, NetFlow, Passive DNS, Silobreaker, Tenable.io, Hatching Triage Sandbox) Analyze, escalate, and assist in remediation of critical security incidents. Improve and challenge existing processes and procedures in a very agile and fast-paced information security environment serving multiple clients Process IDS alerts and identifying incidents and events in customer data. Setup and execution and analysis of vulnerability scans Perform advanced analysis and investigation into alerts as they are identified Performing initial basic malware analysis utilizing automated means (static and dynamic sandbox analysis or other available tools) Incident intake, ticket updates and reporting of cyber events and threat intelligence Understanding, identifying, and researching indicators of compromise (IOCs) from a variety of sources such as threat intelligence reports and feeds Writing incident reports, process documentation, and interact with clients as required Transcribe and implement atomic indicators into a monitoring environment. Consume policy documentation and determine applicability in a network. Work with protocols at layers 2 and higher in the OSI model, to include ARP TCP, UDP, ICMP, DNS, Telnet, SSH, HTTP, SSL, SNMP, SMTP, and other common protocols that use well-known ports. Develops the playbooks to respond and recovery from various attacks/incidents. Drives the automation efforts focused on the closing cases, responding to Cyber events and analyzing data required to enable efficient response activities. Processing of Cyber Threat Intel that is used across RSM detection platforms to understand and prepare for potential threats. Threat intel is heavily used across RSM platforms drive issue prioritization. Open to working shifts in a 24x7 operations environment. Qualifications and Experience: Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences or prior relevant military / law enforcement experience. Computer science, information technology, information systems management, or other similar degrees preferably with a focus on information security 3-5 years’ experience working in a security operations center, networking operations center or threat intelligence capacity. Possess at least one security industry certification such as CYSA+, Security+, CISSP, SANS GIAC (GSOC, GCIA, GMON, CGCDA) Knowledge of security standards and information security and compliance frameworks, controls, and best practices, including SSAE 16, SOC 2 and SOC3, OWASP Top 10, SANS, NIST Must have a naturally curious mindset and approach to solving problems. Basic understanding of cloud technologies and their operations Experience supporting various operating systems such as Windows/Linux Understanding of IP network protocols At RSM, we offer a competitive benefits and compensation package for all our people. We offer flexibility in your schedule, empowering you to balance life’s demands, while also maintaining your ability to serve clients. Learn more about our total rewards at https://rsmus.com/careers/india.html. RSM does not tolerate discrimination and/or harassment based on race; colour; creed; sincerely held religious beliefs, practices or observances; sex (including pregnancy or disabilities related to nursing); gender (including gender identity and/or gender expression); sexual orientation; HIV Status; national origin; ancestry; familial or marital status; age; physical or mental disability; citizenship; political affiliation; medical condition (including family and medical leave); domestic violence victim status; past, current or prospective service in the Indian Armed Forces; Indian Armed Forces Veterans, and Indian Armed Forces Personnel status; pre-disposing genetic characteristics or any other characteristic protected under applicable provincial employment legislation. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process and/or employment/partnership. RSM is committed to providing equal opportunity and reasonable accommodation for people with disabilities. If you require a reasonable accommodation to complete an application, interview, or otherwise participate in the recruiting process, please send us an email at careers@rsmus.com. Show more Show less
Posted 1 month ago
5.0 - 10.0 years
8 - 18 Lacs
Gurugram
Remote
General Summary: The Information Security Lead is responsible for leading the development, support, and administration of information security applications and processes including implementations, configuration changes, updates, upgrades, development of reporting, and documentation by proactively planning for and recognizing new and emerging threats to Clients information security. Essential Job Functions and Responsibilities: Provide team leadership for information security functions Implement security tools and best practices to secure Clients information security Administer information security applications applying configuration changes and updates as needed to protect Clients Information security Research known and emerging email threats and update and configure email applications as needed to prevent threats and reduce risk Research known and emerging PC and Server threats and update and configure end-point protection as needed to prevent threats and reduce risk Research known and emerging network vulnerabilities and threats and recommend changes to firewalls, switches, wireless access points, Directory as needed to prevent threats and reduce risk Oversee security incident and event detection and behavioral analysis mechanisms ensuring Clients is protected from active threats and risks to information security Develop reports and alerts and analyze data for consistency and completeness and pinpoint exceptions and/or anomalies and recommend plans of action Recommend information security policies and process changes and updates and review with management Administrator security awareness training program, executing campaigns, and reviewing reports, exceptions, and remediations with management Assist in identification of opportunities for improvement in processes and efficiency Assist in identification of opportunities for improvement of Clients information security processes Assist in identification of opportunities to improve associate training and security awareness Effectively communicate results and/or process to associates constructively and supportively Other duties as assigned by management Level of education required: College degree (4-year) -OR- Equivalent Experience: Degree in Management Information Systems, Computer Science or related major, or equivalent experience required. Equivalent years of experience are defined as one year of professional experience for each year of college requested. 2-5 years experience in information security, systems support or systems engineering Previous experience in Information Security, Active Directory, Cloud Directories, industry leading security applications is required; compliance or technology auditing experience is preferred. Information Security certification from CompTIA, ISC 2, ISACA, etc. Level of experience required: 3 years to 5 years relevant experience. Knowledge/Skills/Abilities: Results-driven, self-motivated person with the drive to maximize personal contribution to the organization Good project management skills with an ability to multi-task and manage competing priorities to meet deadlines Deals successfully with ambiguity, managing multiple priorities, and is able to lead the organization through complex changes Analytical mindset with demonstrated ability to critically evaluate end-to-end business processes Flexibility and ability to adapt to a fast-paced culture, changes in the environment, and changes in work priorities Excellent written and verbal communication skills Proficiency in Microsoft Office Suite and web-based project management applications
Posted 1 month ago
3.0 years
4 - 8 Lacs
Gurgaon
On-site
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. At AHEAD, we prioritize creating a culture of belonging, where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer, and do not discriminate based on an individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, marital status, or any other protected characteristic under applicable law, whether actual or perceived. We embrace all candidates that will contribute to the diversification and enrichment of ideas and perspectives at AHEAD. SOC Analysts at AHEAD monitor customer environments and perform Incident Detection, Validation, and Incident Reporting. SOC Analysts are the frontline of SOC and are customer-facing representatives. SOC Analysts are responsible for triaging events, incidents, and reporting validated incidents to the customer for incident response. Incumbents will possess strong technical and analytical skills while providing accurate analysis of security related problems. They have a well-rounded networking background and are responsible for performing troubleshooting of customer issues. This individual is user focused and works to resolve client needs in a timely manner. These needs may involve resolving hardware/software failures, investigating, and responding to security threats, and making change request to the security policy of company devices. The SOC Analyst is expected to monitor security feeds streaming from client servers, network devices, and end user workstations, operate and maintain network security equipment at client locations. The Analyst is expected to be familiar with a wide range of security tools and understand basic security fundamentals. The Analyst will perform information security event analysis and must possess knowledge of operating systems, TCP/IP networking, network attacks, attack signatures, defense countermeasures, vulnerability management, and log analysis. Roles & Responsibilities: Monitor and analyze network traffic and alerts Investigate intrusion attempts and perform in-depth analysis of exploits Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident Conduct proactive threat research Review security events that are populated in a Security Information and Event Management (SIEM) system Tuning of rules, filters, and policies for detection-related security technologies to improve accuracy and visibility Data mining of log sources to uncover and investigate anomalous activity, along with related items of interest Independently follow procedures to contain, analyze, and eradicate malicious activity Document all activities during an incident and provide leadership with status updates during the life cycle of the incident Incident management, response, and reporting Provide information regarding intrusion events, security incidents, and other threat indications and warning information to the client Track trends, statistics, and key figures for each assigned client Assist with the development of processes and procedures to improve incident response times, analysis of incident, and overall SOC functions Reporting Incident reports Security status reports Client-facing security meetings Position Requirements: Incident handling/response experience Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles Understanding of and a strong desire to learn common security technologies (IDS, Firewall, SIEM, etc.) The ability to think creatively to find elegant solutions to complex problems Excellent verbal and written communication skills The desire to work both independently and collaboratively with a larger team A willingness to be challenged along with a strong appetite for learning 3-6 years of experience in Information Security, Incident Response, etc. (or related field) Hands-on experience with common security technologies (IDS, Firewall, SIEM, etc.) Knowledge of common security analysis tools & techniques Understanding of common security threats, attack vectors, vulnerabilities and exploits Knowledge of regular expressions Education: Bachelors Degree in Computer Science, Information Security or related/equivalent educational or work experience One or more of the following certifications: CISSP, GCIA, Security+, CEH, ACSE Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include: Medical, Dental, and Vision Insurance 401(k) Paid company holidays Paid time off Paid parental and caregiver leave Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (“OTE”) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidate’s relevant experience, qualifications, and geographic location.
Posted 1 month ago
2.0 years
0 - 0 Lacs
India
On-site
Job Title: System Administrator Department: IT Location: Madambakkam Reporting To: IT Manager / Principal / Administrative Head Job Purpose: To ensure the smooth operation, maintenance, security, and optimization of all computer systems, networks, and IT infrastructure across the campus. The System Administrator will provide technical support to staff and students, manage servers and software systems, and implement technology solutions aligned with the institution's goals. Key Responsibilities: Install, configure, and maintain servers, network equipment, and system software (Windows/Linux). Monitor system performance and ensure uptime, availability, and security of all systems. Manage network infrastructure including LAN, Wi-Fi, switches, firewalls, and internet connectivity. Provide daily technical support to staff and students for hardware, software, and networking issues. Set up and maintain user accounts, permissions, and passwords. Regularly back up data and develop disaster recovery plans. Manage email systems, antivirus solutions, and software licensing compliance. Coordinate with external vendors for IT equipment and services. Ensure cyber security protocols are followed to safeguard sensitive school data. Support IT-related requirements for smart classrooms, biometric systems, ERP, and CCTV. Maintain IT asset inventory and documentation. Required Skills & Qualifications: Bachelor’s Degree or Diploma in Computer Science, Information Technology, or a related field. 2+ years of experience in a similar role (preferably in an educational environment). Strong knowledge of Windows/Linux OS, Active Directory, network security, firewalls, routers, and switches. Familiarity with school ERP systems, CCTV, biometric attendance systems, and educational software is a plus. Excellent problem-solving, communication, and time management skills. Ability to work independently and under pressure. Desirable Certifications: Microsoft Certified: Azure / Windows Server Administrator Cisco Certified Network Associate (CCNA) CompTIA Security+ or equivalent (preferred) Job Type: Full-time Pay: ₹16,000.00 - ₹22,000.00 per month Benefits: Provident Fund Schedule: Day shift Application Question(s): Do you have a degree or diploma in Computer Science, IT, or a related field? Yes / No How many years of experience do you have as a System Administrator? Less than 1 year 1–2 years 3–5 years Have you previously worked in an educational institution or similar environment? Yes / No Are you familiar with managing and troubleshooting network devices such as routers, switches, and firewalls? Yes / No Have you handled data backup and disaster recovery planning? Yes / No Have you managed or supported CCTV, biometric attendance systems, or school ERP platforms? Yes / No Work Location: In person Speak with the employer +91 9600173626
Posted 1 month ago
8.0 years
0 Lacs
Pune, Maharashtra, India
On-site
About TripleLift We're TripleLift, an advertising platform on a mission to elevate digital advertising through beautiful creative, quality publishers, actionable data and smart targeting. Through over 1 trillion monthly ad transactions, we help publishers and platforms monetize their businesses. Our technology is where the world's leading brands find audiences across online video, connected television, display and native ads. Brand and enterprise customers choose us because of our innovative solutions, premium formats, and supportive experts dedicated to maximizing their performance. As part of the Vista Equity Partners portfolio, we are NMSDC certified, qualify for diverse spending goals and are committed to economic inclusion. Find out how TripleLift raises up the programmatic ecosystem at triplelift.com. The Role TripleLift is seeking a Lead Security Engineer to join our team full time. We are an established company in the advertising technology sector, trying to tackle some of the most challenging problems facing the industry. You will be joining a rapidly growing and complex environment and will work as part of a small team that will be responsible for developing, evangelizing, and executing our security roadmap. You’ll help drive improvements in our security operations capability and support critical projects enhancing our detect-and-respond capabilities. Responsibilities Cloud Infrastructure Management: Oversee and manage cloud infrastructure components, ensuring proper configuration, resource provisioning, and adherence to security best practices for AWS. Collaborate with development teams to define infrastructure requirements and implement scalable and secure cloud architectures. DevOps Integration and Automation: Collaborate with engineering teams to integrate security into CI/CD pipelines, version control systems, and infrastructure as code practices. Develop automation scripts and tools to streamline security controls and ensure consistent deployment of secure cloud resources. Network and Infrastructure Security: Design and implement secure network architectures aligned with a zero-trust model. Implement and manage Web Application Firewalls (WAFs), VPNs, and relevant network access controls. Collaborate with cloud engineers and developers to ensure secure configurations and protocols across services. Support the deployment and management of zero-trust security tooling to enforce least privilege and continuous authentication. Identity and Access Management (IAM): Develop and maintain robust IAM policies, roles, and permissions, implementing least privilege access controls, multi-factor authentication, and identity federation across cloud platforms. Endpoint Security and Privilege Management: Architect, implement, and maintain an endpoint privilege management strategy to enforce least privilege principles across all user workstations and servers. This includes defining and managing user roles, application control policies, and elevation rules to prevent unauthorized software execution and limit the impact of potential security breaches. Collaborate with the IT department to deploy and manage endpoint security controls, ensuring seamless integration with existing systems and minimal disruption to user productivity while significantly enhancing the organization's security posture against malware and insider threats. Security Monitoring and Incident Response: Establish and manage security monitoring tools, SIEM systems, and incident response processes to detect, respond, and mitigate security incidents in cloud environments. Develop and enhance incident response playbooks and implement automated incident response and alerting mechanisms. Compliance and Governance: Implement and maintain compliance controls, ensuring adherence to industry regulations and cloud-specific compliance requirements. Conduct regular audits, prepare reports, and actively manage governance processes. Problem Solving and Risk Analysis: Assess security risks, identify vulnerabilities, and propose effective solutions to mitigate risks within cloud environments. Cloud Security Best Practices: Stay up-to-date with cloud security best practices, emerging trends, and technologies. Communication and Collaboration: Collaborate effectively with cross-functional teams and stakeholders to communicate security requirements, provide guidance on secure cloud practices, and ensure alignment with organizational objectives. Work closely with developers to promote a culture of security awareness and knowledge sharing. Desired Skills And Attributes 8+ years of experience in security engineering or cloud security roles, with proven expertise in securing cloud-native, highly distributed environments. Proven ability to lead technical projects independently with minimal oversight, from design to deployment. Track record of mentoring junior engineers and influencing secure design across multiple teams. Strong communication skills with the ability to translate technical concepts for engineering, product, and compliance stakeholders. Comfortable engaging cross-functionally (engineering, DevOps, legal, compliance) to drive security improvements and cultural change. Strong programming proficiency in Java, Javascript, GoLang and/or Python with a focus on secure coding, automation, and infrastructure tooling. Experience integrating security controls in CI/CD pipelines, including GitHub Actions or similar. Deep hands-on experience with AWS services such as IAM, Security Hub, GuardDuty, VPC, S3, CloudTrail, CloudWatch, Config, and Lambda. Proficient in the use of SIEM systems, IDS/IPS, vulnerability scanning, and penetration testing tools. Strong understanding of cloud networking concepts including VPC peering, security groups, NACLs, private link, and hybrid connectivity (VPN/direct connect). Proven ability to analyze and effectively address security issues and incidents. Understanding of security fundamentals with relation to various cybersecurity and compliance frameworks, particularly NIST CSF, but any of: PCI, SOC2, HITRUST, ISO 27001/2, or similar is a plus Experience supporting internal audits, user access reviews, and policy exception workflows using tools like Jira or GRC platforms. Openness to adapt in response to emerging cloud technologies and security threats. Receptive to feedback and open to constructive criticism for continuous improvement. Holds a Cybersecurity certification, e.g. CISSP, CISA, Security+, or AWS Certified Security Specialty Life at TripleLift At TripleLift, we’re a team of great people who like who they work with and want to make everyone around them better. This means being positive, collaborative, and compassionate. We hustle harder than the competition and are continuously innovating. Learn more about TripleLift and our culture by visiting our LinkedIn Life page. Establishing People, Culture and Community Initiatives At TripleLift, we are committed to building a culture where people feel connected, supported, and empowered to do their best work. We invest in our people and foster a workplace that encourages curiosity, celebrates shared values, and promotes meaningful connections across teams and communities. We want to ensure the best talent of every background, viewpoint, and experience has an opportunity to be hired, belong, and develop at TripleLift. Through our People, Culture, and Community initiatives, we aim to create an environment where everyone can thrive and feel a true sense of belonging. Privacy Policy Please see our Privacy Policies on our TripleLift and 1plusX websites. TripleLift does not accept unsolicited resumes from any type of recruitment search firm. Any resume submitted in the absence of a signed agreement will become the property of TripleLift and no fee shall be due. Show more Show less
Posted 1 month ago
5.0 years
0 Lacs
Nagpur, Maharashtra, India
On-site
Job Title: Senior IT Service Desk Support | Australian Time Zone Job Type: Full-Time | Onsite | Permanent Location: Nagpur, Maharashtra, India About the Role We are seeking an experienced and process-oriented IT Service Desk Support professional to join our team onsite. The ideal candidate will have 5+ years of hands-on experience in Level 1 & 2 IT support , along with a solid understanding of ITSM frameworks, change management processes, architecture planning, and technical documentation . This is a client-facing role , requiring strong communication skills, the ability to follow and define process-driven support methodologies, and experience in executing change and configuration management policies. Key Responsibilities Provide onsite Level 1 and Level 2 IT support for end-user devices and business-critical systems Manage incidents and service requests via a structured ticketing system Troubleshoot Windows OS, Office 365, printing, endpoint issues, and standard enterprise applications Conduct patching, updates, vulnerability handling, and basic network troubleshooting (Wi-Fi, DNS, VPN, etc.) Implement, support, and optimize ITSM processes (Incident, Problem, Change, Asset, Configuration) Participate in defining and documenting change management workflows and policies Assist in creating technical architecture , implementation plans, and deployment documentation for support-related technologies Maintain accurate IT documentation, knowledge base articles, and change logs Collaborate with internal teams and vendors to ensure consistent and reliable IT service delivery Required Qualifications 5+ years of experience in service desk or desktop support roles Strong knowledge of Windows, Active Directory, Office 365, and standard IT tools Solid understanding of ITSM concepts and tools (e.g., ServiceNow, Freshservice, ManageEngine, etc.) Practical experience with change management, documentation, and IT support architecture Excellent written documentation skills and ability to define support policies and standard operating procedures Experience with patching, endpoint management, and vulnerability remediation Ability to work during AEST/AEDT business hours Preferred Certifications ITIL v3/v4 Foundation (strongly preferred) CompTIA A+, Network+, or Security+ Microsoft Modern Desktop Administrator Associate Cisco CCNA or CEH (basic cybersecurity awareness) Important Note Only candidates who strictly meet the experience, certification, and time zone/location requirements will be considered. Applications not matching these criteria will not be reviewed. Email - info@thesecurealley.com Show more Show less
Posted 1 month ago
5.0 years
0 Lacs
Gurugram, Haryana, India
On-site
About the Role The Database & Cloud Security Specialist will be responsible for administering SQL Server environments, managing cloud-based applications (SaaS), overseeing Azure cloud operations, and ensuring robust security protocols across all IT assets. This role is key to protecting sensitive business data and maintaining system integrity across the enterprise. Duties & Responsibilities Database Administration (SQL Server): Administer, configure, and optimize SQL Server environments (on-prem and cloud-hosted) Ensure high availability, backup, and disaster recovery strategies Monitor performance, troubleshoot issues, and implement best practices Implement and manage database-level security (user roles, permissions, encryption) Cloud (SaaS + Azure) Management: Manage Azure subscriptions, resource groups, virtual networks, and security groups Support deployments and monitoring of cloud-based applications (e.g., Business Central, Channelier , Channel connect) Ensure secure integration between SaaS platforms and internal systems Monitor usage, cost optimization, and compliance on Azure Azure Infrastructure Management Virtual Machines (VMs), Networking (VNet, VPN), and Storage setup High availability, disaster recovery, and backup strategies Monitoring, diagnostics, and automated scaling Azure DevOps & Automation CI/CD pipelines with Azure DevOps Infrastructure as Code (IaC) with ARM templates and Bicep Automated environment provisioning and deployment Azure Security & Compliance Azure Security Center configuration Threat protection and security policies Governance via Azure Policy and Blueprints Azure AI, Data & Analytics Azure Synapse, Data Factory, and SQL-based data solutions Integration of Azure Machine Learning and Cognitive Services Power BI for real-time business intelligence dashboards Security & Compliance : Implement and enforce IT security protocols (firewalls, endpoint security, identity access management) Conduct regular security audits and vulnerability assessments Ensure compliance with industry regulations and internal data governance policies Respond to security incidents and support forensic investigations Collaboration & Documentation: Work closely with application teams, vendors, and stakeholders to ensure secure deployments Maintain technical documentation for database and cloud configurations Provide training and knowledge sharing to internal IT team members Qualifications and Experience: Microsoft Certified: Azure Security Engineer Associate Microsoft Certified: Database Administrator Associate CompTIA Security+ or equivalent Experience: 5+ years of experience in database administration and IT security 2+ years of hands-on Azure or other cloud platform management Knowledge, Skills and Abilities Proven experience in administering SQL Server databases (2016 and above) Strong hands-on knowledge of Microsoft Azure (IaaS, PaaS, networking, security) Experience with cloud-based SaaS platforms (preferably Dynamics 365, ZingHR, Channelier) Familiarity with PowerShell , T-SQL , and Azure CLI Knowledge of data encryption , RBAC , firewalls , VPNs , multi-factor authentication Show more Show less
Posted 1 month ago
130.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Job Description As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. Current Employees apply HERE Current Contingent Workers apply HERE Secondary Language(s) Job Description Senior Manager, Cybersecurity Engineering Cloud and App Security The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company’s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. You will be tasked with identifying vulnerabilities, supporting the response to incidents, and ensuring that security protocols and controls are adhered to. Your role is vital in safeguarding critical assets and ensuring compliance with legal and regulatory standards. What Will You Do In This Role Lead the development of enhanced cloud and application security control integrations and architectural best practices. Lead the development and implementation of product security policies and standards to ensure that application, cloud services and infrastructure meet organizational security requirements. Lead the maintenance and monitoring security tools and dashboards, ensuring that applications deployed in our environments adhere to organizational security standards and compliance requirements. Lead adoption of our security tools within other teams ensuring the inputs and outputs are fully integrated enabling a complete security function. Design, implement, test, document, and support integration of security tools and technologies in pipelines, Also, assist the product teams in related activities. Work closely with cross-functional Infrastructure teams on Automation and Orchestration. Create and document detailed designs for simple software applications or components. Apply agreed modelling techniques, standards, patterns, and tools. Work within a matrix organizational structure, reporting to both the functional manager and the project manager. What Should You Have Bachelors’ degree in Information Technology, Computer Science or any Technology stream. Working experience in cloud environments AWS must have and good to have Azure, or GCP. Understanding of OWASP Top 10 security risks and mitigation strategies, relevant NIST standards, and Zero Trust principles. Familiarity with programming/scripting languages like Python, Bash, Terraform, Ansible, JSON, PowerShell, or JavaScript for automating tasks. Familiarity with software development/delivery lifecycle and related technologies 7+ years of hands-on experience working with network protocols, firewalls, intrusion detection systems, encryption technologies, and endpoint security solutions. Proficiency in security tools in the areas of cloud, application, endpoint, network or identity, vulnerability scanners, and malware analysis platforms. Knowledge of authentication methods, identity management, and security access protocols (e.g., SSO, MFA, LDAP). Ideally AWS certified. Good interpersonal and communication skills (verbal and written). Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are often required or highly desirable. Proven record of delivering high-quality results. Product and customer-centric approach. Innovative thinking, experimental mindset. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who We Are We are known as Merck & Co., Inc., Rahway, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world. What We Look For Imagine getting up in the morning for a job as important as helping to save and improve lives around the world. Here, you have that opportunity. You can put your empathy, creativity, digital mastery, or scientific genius to work in collaboration with a diverse group of colleagues who pursue and bring hope to countless people who are battling some of the most challenging diseases of our time. Our team is constantly evolving, so if you are among the intellectually curious, join us—and start making your impact today. #HYDIT2025 Search Firm Representatives Please Read Carefully Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails. Employee Status Regular Relocation VISA Sponsorship Travel Requirements Flexible Work Arrangements Hybrid Shift Valid Driving License Hazardous Material(s) Required Skills Design Applications, Information Security, Security Operations, SLA Management, Software Development, Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Scanning Preferred Skills Job Posting End Date 07/2/2025 A job posting is effective until 11 59 59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID R335950 Show more Show less
Posted 1 month ago
130.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Job Description Current Employees apply HERE Current Contingent Workers apply HERE Secondary Language(s) Job Description Manager, Cybersecurity Engineering Cloud and App Security The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company’s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. You will be tasked with identifying vulnerabilities, supporting the response to incidents, and ensuring that security protocols and controls are adhered to. Your role is vital in safeguarding critical assets and ensuring compliance with legal and regulatory standards. What Will You Do In This Role Contribute to the development of enhanced cloud and application security control integrations and architectural best practices. Contribute to the development and implementation of product security policies and standards to ensure that application, cloud services and infrastructure meet organizational security requirements. Help maintain and monitor security tools and dashboards, ensuring that applications deployed in our environments adhere to organizational security standards and compliance requirements. Identify and prioritize adoption of our security tools within other teams ensuring the inputs and outputs are fully integrated enabling a complete security function. Follow standard approaches and established design patterns to create new designs for systems or system components. Identify and resolve minor design issues. Assist in implementing and maintaining specific security controls as required by organisational policy and local risk assessments and contribute to identifying risks that arise from potential technical solution architectures. Monitor and log the actual service provided, compared to that required by service level agreements. Undertake low-complexity routine vulnerability assessments using automated and semi-automated tools and contribute to evaluating and documenting the scope of results. Design, implement, test, document, and support integration of security tools and technologies in pipelines, Also, assist the product teams in related activities. Assist in maintaining security infrastructure and performing system updates. Investigate minor security breaches in accordance with established procedures. Assist users in defining their access rights and privileges and perform non-standard operational security tasks. Resolve security events and operational security issues. Work closely with cross-functional Infrastructure teams on Automation and Orchestration. Create and document detailed designs for simple software applications or components. Apply agreed modelling techniques, standards, patterns, and tools. Work within a matrix organizational structure, reporting to both the functional manager and the project manager. What Should You Have Bachelors’ degree in Information Technology, Computer Science or any Technology stream. Working experience in cloud environments AWS must have and good to have Azure, or GCP. Understanding of OWASP Top 10 security risks and mitigation strategies, relevant NIST standards, and Zero Trust principles. Familiarity with programming/scripting languages like Python, Bash, Terraform, Ansible, JSON, PowerShell, or JavaScript for automating tasks. Familiarity with software development/delivery lifecycle and related technologies 3+ years of hands-on experience working with network protocols, firewalls, intrusion detection systems, encryption technologies, and endpoint security solutions. Proficiency in security tools in the areas of cloud, application, endpoint, network or identity, vulnerability scanners, and malware analysis platforms.. Knowledge of authentication methods, identity management, and security access protocols (e.g., SSO, MFA, LDAP). Ideally AWS certified. Good interpersonal and communication skills (verbal and written). Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are often required or highly desirable. Proven record of delivering high-quality results. Product and customer-centric approach. Innovative thinking, experimental mindset. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who We Are We are known as Merck & Co., Inc., Rahway, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world. What We Look For Imagine getting up in the morning for a job as important as helping to save and improve lives around the world. Here, you have that opportunity. You can put your empathy, creativity, digital mastery, or scientific genius to work in collaboration with a diverse group of colleagues who pursue and bring hope to countless people who are battling some of the most challenging diseases of our time. Our team is constantly evolving, so if you are among the intellectually curious, join us—and start making your impact today. #HYDIT2025 Search Firm Representatives Please Read Carefully Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails. Employee Status Regular Relocation VISA Sponsorship Travel Requirements Flexible Work Arrangements Hybrid Shift Valid Driving License Hazardous Material(s) Required Skills Design Applications, Information Security, Security Operations, SLA Management, Software Development, Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Scanning Preferred Skills Job Posting End Date 07/2/2025 A job posting is effective until 11 59 59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID R335935 Show more Show less
Posted 1 month ago
130.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Job Description Associate Specialist, Cybersecurity Operations The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company’s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. You will be tasked with identifying vulnerabilities, supporting the response to incidents, and ensuring that security protocols and controls are adhered to. Your role is vital in safeguarding critical assets and ensuring compliance with legal and regulatory standards. What Will You Do In This Role Collaborate with product teams to enforce application security best practices, conduct reviews, perform scans and assist in threat modeling to identify and mitigate security risks throughout the development lifecycle. Contribute with penetration testing efforts to evaluate the security posture of applications and containers, providing detailed reports on findings and working with development teams to remediate identified issues. Collaborate to the oversight of security-related bugs and vulnerabilities using tracking systems. Help prioritize security issues based on risk and impact and ensuring that reported issues are triaged and addressed in a timely manner. Contribute to the creation and delivery of training materials for the workforce to raise awareness and increase adoption of application security best practices, cloud security best practices, including secure usage of cloud applications and availability of compensating controls. Help maintain and monitor security tools and dashboards, ensuring that applications deployed in our environments adhere to organizational security standards and compliance requirements. Follow standard approaches and established design patterns to create new designs for systems or system components. Identify and resolve minor design issues. Monitor and log the actual service provided, compared to that required by service level agreements. Assist in maintaining security infrastructure and performing system updates. Investigate minor security breaches in accordance with established procedures. Assist users in defining their access rights and privileges and perform non-standard operational security tasks. Resolve security events and operational security issues. Work closely with cross-functional Infrastructure teams on Automation and Orchestration. Create and document detailed designs for simple software applications or components. Apply agreed modelling techniques, standards, patterns, and tools. Work within a matrix organizational structure, reporting to both the functional manager and the project manager. What Should You Have Bachelors’ degree in Information Technology, Computer Science or any Technology stream. 3+ years of hands-on experience working with proficiency in security tools in the areas of cloud, application, endpoint, network or identity, vulnerability scanners, and malware analysis platforms. Understanding of OWASP Top 10 security risks and mitigation strategies, relevant NIST standards, and Zero Trust principles. Good to have experience in cloud environments AWS, Azure, or GCP. Familiarity with software development/delivery lifecycle and related technologies Familiarity with programming/scripting languages like Python, Bash, Terraform, Ansible, JSON, PowerShell, or JavaScript for automating tasks. Knowledge of authentication methods, identity management, and security access protocols (e.g., SSO, MFA, LDAP). Ideally AWS certified. Good interpersonal and communication skills (verbal and written). Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are often required or highly desirable. Proven record of delivering high-quality results. Product and customer-centric approach. Innovative thinking, experimental mindset. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who We Are We are known as Merck & Co., Inc., Rahway, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world. What We Look For Imagine getting up in the morning for a job as important as helping to save and improve lives around the world. Here, you have that opportunity. You can put your empathy, creativity, digital mastery, or scientific genius to work in collaboration with a diverse group of colleagues who pursue and bring hope to countless people who are battling some of the most challenging diseases of our time. Our team is constantly evolving, so if you are among the intellectually curious, join us—and start making your impact today. #HYDIT2025 Current Employees apply HERE Current Contingent Workers apply HERE Search Firm Representatives Please Read Carefully Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails. Employee Status Regular Relocation VISA Sponsorship Travel Requirements Flexible Work Arrangements Hybrid Shift Valid Driving License Hazardous Material(s) Job Posting End Date 04/28/2025 A job posting is effective until 11 59 59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID R341160 Show more Show less
Posted 1 month ago
0 years
0 Lacs
Mumbai Metropolitan Region
On-site
Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Senior Associate Information Security Analyst is a developing subject matter expert, responsible for designing and implementing security systems to protect the organization's computer networks from cyber-attacks, and to help set and maintain security standards. This role is required to monitor the organization's computer networks for security issues, install security software, and document any security issues or breaches found. The Senior Associate Information Security Analyst is responsible for assisting in the planning, implementation, and management of information security measures to safeguard the organization's digital assets and systems and contributes to maintaining a secure and compliant environment. What You'll Be Doing Key Responsibilities: Monitors security alerts and events from various sources, investigates potential threats, and escalates incidents as necessary. Assists in the implementation and monitoring of security controls, including firewalls, intrusion detection systems, and access controls. Performs regular vulnerability assessments, analyses scan results, and assists in prioritizing and remediating identified vulnerabilities. Supports the incident response team in investigating security incidents, documenting findings, and participating in remediation efforts. Assists in ensuring compliance with industry standards (for example, GDPR, ISO 27001) by conducting assessments and implementing necessary controls. Installs security measures and operates software to protect systems and information infrastructure, including firewalls and data encryption programs. Documents security breaches and assess the damage they cause. Works with the security team to perform tests and uncover network vulnerabilities. Fixes detected vulnerabilities to maintain a high-security standard. Develops organizational best practices for IT security. Performs penetration testing and upgrades systems to unable security software. Installs and upgrades antivirus software and tests and evaluates new technology. Assists with the installation of security software and understands information security management. Researches security enhancements and makes recommendations to management. Stays abreast of information technology trends and security standards. Contributes to security awareness initiatives by creating training materials, conducting workshops, and educating employees about best security practices. Maintains accurate records of security incidents, assessments, and actions taken for reporting and audit purposes. Assists in the management and maintenance of security tools, including antivirus software, encryption tools, and security information and event management (SIEM) systems. Participates in risk assessments to identify potential security threats, vulnerabilities, and associated risks to the organization. Collaborates with cross-functional teams, IT, and other teams to ensure security measures are integrated into the organization's processes and projects. Performs any other related task as required. Knowledge and Attributes: Good communication skills to effectively convey technical information to non-technical stakeholders. Good analytical thinking and problem-solving skills to prevent hacking on a network. Ability to identify and evaluate potential risks and to develop solutions. Ability to identify and mitigate network vulnerabilities and explain how to avoid them. Understands firewalls, proxies, SIEM, antivirus, and IDPS concepts. Understands patch management with the ability to deploy patches in a timely manner whilst understanding business impact. Developing proficiency with MAC and OS. Familiarity with security frameworks, standards, and regulations (for example, NIST, CIS, GDPR). Basic understanding of network and system architecture, protocols, and security controls. Ability to analyze security incidents and assess potential risks. Ability to work both independently and collaboratively in a fast-paced environment. Academic Qualifications and Certifications: Bachelor's degree or equivalent in information security, cybersecurity, computer science, or related. Security certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM) are advantageous. Required Experience: Moderate level of demonstrated experience in information security or cybersecurity, or related roles. Moderate level of demonstrated experience working in a global IT organization. Moderate level of demonstrated experience with computer network penetration testing and techniques. Moderate level of demonstrated experience with security assessment and vulnerability scanning tools. Workplace type: On-site Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today. Show more Show less
Posted 1 month ago
0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Company Description Wissenhive is one of the world’s leading certification training providers, offering online training in various cutting-edge disciplines such as Cyber Security, Cloud Computing, Project Management, DevOps, Artificial Intelligence, and Data Science. Based in New Delhi, India, Wissenhive has trained over 200,000 professionals and companies across 150+ countries to help them acquire certifications and upskill their workforce. Our courses are designed and updated by 2000+ industry experts, combining online classes, instructor-led virtual sessions, project work, and 24/7 teaching assistance. We are recognized by more than 40 global training organizations as an official provider of certification training. Role Description This is a full-time on-site role for a Cyber Security Trainer located in Delhi NCR. The Cyber Security Trainer will be responsible for developing and delivering comprehensive training programs in various areas of cybersecurity. Day-to-day tasks include creating training materials, conducting live virtual and in-person training sessions, assessing trainee performance, and staying updated with the latest in cybersecurity trends and technologies. The role also involves providing mentorship and guidance to trainees to ensure they attain the necessary skills and certifications. Qualifications Proficiency in Application Security, Cybersecurity Expertise in Network Security, Information Security Skills in Malware Analysis Excellent communication and presentation skills Ability to create and update training materials Bachelor's degree in Cybersecurity, IT, Computer Science, or a related field Relevant certifications such as Security+, CEH, or similar are a plus Experience in an educational or training role is beneficial Show more Show less
Posted 1 month ago
3.0 years
0 Lacs
New Delhi, Delhi, India
On-site
Job Summary: We are seeking a skilled Endpoint Management Specialist with hands-on experience in Persistent Endpoint Management , preferably Radia certified , and strong expertise in patch management for both Unix and Windows environments. The ideal candidate should also possess a sound understanding of Infrastructure/Domain Systems to ensure robust and compliant IT operations. Key Responsibilities: - Manage and maintain Persistent Endpoint Management systems using Radia or equivalent tools. - Perform patching activities across Unix, Windows, and application-level software. - Monitor patch compliance and remediate vulnerabilities in coordination with InfoSec guidelines. - Automate and streamline patch deployment workflows to reduce downtime and improve consistency. - Work closely with infrastructure teams to align endpoint strategies with overall system architecture. - Troubleshoot issues related to endpoint configurations, patch failures, and compliance gaps. - Provide technical expertise during audits and compliance checks. - Create and maintain detailed documentation on patch cycles, configurations, and endpoint baselines. Required Skills: - Radia certification (or strong hands-on experience with HP/BDNA/Radia Endpoint Management tools). - Strong expertise in patch management for both Windows and Unix/Linux systems. - Experience with application patching (Adobe, Java, browsers, etc.). - Good understanding of Infrastructure, Active Directory, and Domain Systems. - Familiarity with scripting (PowerShell, Bash, or similar) for automation. - Strong analytical and troubleshooting skills. - Knowledge of ITIL processes is a plus Qualifications - Bachelor's degree in Computer Science, Information Technology, or a related field. - 3+ years of relevant experience in endpoint or patch management. - Industry certifications like Radia, ITIL, or CompTIA Security+ are advantageous Show more Show less
Posted 1 month ago
2.0 years
0 Lacs
Ahmedabad, Gujarat, India
On-site
Job Title: Information Security Analyst Experience Required: 2+ Years Location: WFO Job Type: Full-Time Role Overview: As an Information Security Analyst, you will be responsible for safeguarding the organization’s digital assets by identifying vulnerabilities, monitoring threats, and ensuring compliance with security frameworks such as ISO 27001 and SOC 2. You will work closely with IT, compliance, and risk teams to maintain a robust security posture. Key Responsibilities: Implement and manage an Information Security Management System (ISMS) in alignment with ISO 27001 . Support SOC 2 Type I & II audit activities including control implementation, evidence gathering, and remediation. Apply NIST Cybersecurity Framework (CSF) and CIS Benchmarks to enhance infrastructure security and compliance. Assist in internal and external audits , preparing documentation and audit artifacts. Deploy and manage SIEM tools (e.g., Microsoft Sentinel, Splunk) for log aggregation, threat detection, and incident response. Configure and monitor Azure security services , including Microsoft Defender for Cloud , Azure Policy , Key Vault , Network Security Groups (NSG) , Azure Firewall / WAF , Azure Security Center / Microsoft Purview Support Cloud Security Posture Management (CSPM) , Cloud Access Security Broker (CASB) , and Cloud Workload Protection (CWP) . Deploy, configure, and monitor Data Loss Prevention (DLP) controls across endpoints and cloud apps. Conduct risk assessments , vulnerability evaluations , and assist in incident handling . Stay updated on the latest threats, vulnerabilities, and security compliance requirements. Required Skills and Experience: Minimum of 2 years of experience in information security, cloud security, or related roles. Solid understanding of ISO/IEC 27001 implementation and audit processes. Experience supporting or conducting SOC 2 Type I/II readiness. Working knowledge of NIST CSF , NIST 800-53 , or similar frameworks. Proficiency with SIEM tools (especially Microsoft Sentinel ). Good understanding of cloud security controls , preferably in Microsoft Azure . Familiarity with DLP , antivirus/EDR/XDR solutions , and endpoint security . Preferred Certifications: ISO27001 Lead Implementer / Auditor. Nice to have: Microsoft Certified: Azure Security Engineer Associate. CompTIA Security+ About Company: Dynatech System is Gold partner of Microsoft , CMMI level 3 Multinational organization . DynaTech Systems is providing Consulting, Implementation, Support and Offshore development services designed to improve the productivity and performance of organizations. We help our clients become industry innovators through the use of effective technology and solutions, focusing on providing exceptional on stop service. With the right team composition, we are very well positioned to help our customers with every service related to Microsoft Dynamics 365, Dynamics AX 2012 and related technologies. We have a precise and the right team, that we think is the best fit to help our employees in the most effective ways. Our team strength is 200+ intellectual mates. Let’s join us and be a part of one of fastest growing organization! Company Website – Microsoft Dynamics Partner & Technology Experts - DynaTech Systems (dynatechconsultancy.com) LinkedIn - DynaTech Systems: My Company | LinkedIn Show more Show less
Posted 1 month ago
0.0 - 8.0 years
0 Lacs
Pune, Maharashtra
On-site
IT-ISPune Posted On 03 Jun 2025 End Date 31 Dec 2025 Required Experience 6 - 8 Years Basic Section Grade Role Senior Systems Engineer Employment Type Full Time Employee Category Organisational Group Company NewVision Company Name New Vision Softcom & Consultancy Pvt. Ltd Function Business Units (BU) Department/Practice IT-IS Organization Unit IT-IS Region APAC Country India Base Office Location Pune Working Model Work From Office Weekly Off Pune Office Standard State Maharashtra Skills Skill WINDOWS & AD CONSULTING NETWORK ADMINISTRATION VMWARE ADMINISTRATION CLOUD Highest Education GRADUATION/EQUIVALENT COURSE CERTIFICATION No data available Working Language ENGLISH Job Description Job Overview: We are seeking a highly skilled and motivated Senior Internal IT Engineer to join our dynamic IT team. In this role, you will be responsible for managing and maintaining the organization's internal IT infrastructure, ensuring the smooth and efficient operation of all hardware, software, and network systems, with a specific focus on Microsoft 365 solutions and other enterprise technologies. The ideal candidate will have 6-8 years of hands-on experience in IT systems engineering, with strong expertise in systems administration, troubleshooting, and project management, and a broad knowledge of IT tools, especially those integrated with Microsoft 365. Key Responsibilities: Infrastructure Management: Administer and maintain the internal network, servers, storage solutions, and cloud environments (on-premises and cloud-based). Manage and optimize system performance, backups, and disaster recovery protocols. Oversee the configuration, installation, and maintenance of hardware (desktops, laptops, printers, mobile devices, etc.) and software applications. Ensure optimal performance and uptime of Microsoft 365 services (Teams, Exchange Online, SharePoint, OneDrive, etc.) as well as related technologies. Microsoft 365 Administration: Administer and configure Microsoft 365 services including Exchange Online, SharePoint Online, OneDrive, Teams, Power Platform (Power Automate, Power Apps), and other Microsoft 365 tools. Manage user accounts, security settings, licenses, and permissions in Microsoft 365. Troubleshoot and resolve Microsoft 365-related issues, such as mail flow, SharePoint permissions, Teams connectivity, and user access. Implement security best practices in M365, including multi-factor authentication (MFA), conditional access, and compliance solutions. Support the migration, deployment, and integration of Microsoft 365 across the organization. Networking & Systems Administration: Administer and maintain network components, including routers, switches, firewalls, VPNs, and wireless networks. Ensure the stability and performance of internal systems, including Active Directory (AD), DNS, DHCP, and file servers. Configure and manage virtualized environments (VMware, Hyper-V), along with cloud infrastructure (AWS, Azure). Provide solutions for networking issues related to both on-premises and cloud-based environments. Security & Compliance: Implement security policies and manage enterprise-grade security tools, including endpoint protection, firewalls, and antivirus systems. Monitor and ensure compliance with industry standards (e.g., GDPR, HIPAA) in all internal systems, including M365. Regularly audit and update security measures to prevent unauthorized access, utilizing advanced features in M365, such as Intune for device management and Defender for Endpoint. Design and implement disaster recovery, backup, and business continuity plans for critical systems. Technical Support & Troubleshooting: Provide tier-3 support for escalated IT issues related to hardware, software, and network systems. Troubleshoot complex issues related to M365 apps (Exchange, Teams, SharePoint, OneDrive), network connectivity, and server performance. Provide solutions for end-users, acting as a subject-matter expert for all M365 tools. Project Management & IT Initiatives: Lead IT projects related to the implementation, migration, and integration of Microsoft 365 services and other IT infrastructure projects. Coordinate with other teams to deploy solutions across departments and ensure integration with existing systems. Manage the rollout of new software solutions, including collaboration tools, productivity applications, and cybersecurity tools. Create and maintain project documentation and provide regular status updates to management. Automation & Scripting: Automate routine administrative tasks and improve workflows using PowerShell, Azure Automation, or other scripting languages. Use tools such as Power Automate and PowerShell to streamline Microsoft 365 management tasks and integrate third-party systems. Develop and manage custom workflows, scripts, and tools to improve operational efficiency. Documentation & Reporting: Maintain up-to-date documentation for all IT systems, network configurations, policies, and procedures. Generate detailed reports on system performance, security incidents, compliance, and user activity, especially related to Microsoft 365 usage. Document troubleshooting procedures and resolutions for internal knowledge sharing. Continuous Improvement & Training: Stay current with emerging technologies and best practices, particularly in the Microsoft 365 ecosystem and cloud computing. Mentor and train junior IT staff on system administration, M365 tools, and best practices. Provide end-user training on the effective use of M365 applications, especially Teams, SharePoint, and OneDrive. Qualifications: Education & Experience: Bachelor’s degree in Computer Science, Information Technology, or a related field (preferred). 6-8 years of hands-on experience in IT systems engineering, network administration, or related roles. Proven experience administering and supporting Microsoft 365 environments (Exchange Online, SharePoint Online, Teams, OneDrive, etc.). Experience with cloud services (Azure, AWS) and virtualization platforms (VMware, Hyper-V). Experience with network and infrastructure management (firewalls, VPNs, DNS, DHCP, etc.). Technical Skills: Strong knowledge of operating systems (Windows Server, Linux, macOS) and enterprise applications. Proficiency in Microsoft 365 administration and troubleshooting (Exchange Online, SharePoint, Teams, OneDrive, Power Platform). Familiarity with cloud technologies (Azure, AWS) and virtualization solutions (VMware, Hyper-V). Knowledge of networking protocols (TCP/IP, DNS, DHCP, VPNs, etc.), firewall configurations, and network troubleshooting. Experience with enterprise security solutions, including firewalls, antivirus, MFA, endpoint protection (e.g., Defender), and security compliance frameworks. Familiarity with scripting languages (PowerShell, Python, Bash) for automation and integration tasks. Certifications (Preferred but not required): CompTIA Network+ / Security+ Microsoft Certified: Azure Administrator / Solutions Architect Microsoft Certified: Enterprise Administrator Expert (M365) Cisco Certified Network Associate (CCNA) Certified Information Systems Security Professional (CISSP) Microsoft Certified: Security, Compliance, and Identity Fundamentals VMware Certified Professional (VCP) AWS Certified Solutions Architect – Associate Soft Skills: Strong problem-solving and troubleshooting abilities. Excellent communication and interpersonal skills to collaborate with cross-functional teams. Ability to manage multiple projects and priorities simultaneously. Attention to detail and a proactive approach to resolving issues before they become major problems. Ability to mentor junior IT staff and effectively communicate technical concepts to non-technical users.
Posted 1 month ago
0.0 - 5.0 years
0 Lacs
Hyderabad, Telangana
On-site
Location: Hyderabad, Telangana Time type: Full time Job level: Associate Job type: Regular Category: Risk Consulting ID: JR113489 About us We are the leading provider of professional services to the middle market globally, our purpose is to instill confidence in a world of change, empowering our clients and people to realize their full potential. Our exceptional people are the key to our unrivaled, inclusive culture and talent experience and our ability to be compelling to our clients. You’ll find an environment that inspires and empowers you to thrive both personally and professionally. There’s no one like you and that’s why there’s nowhere like RSM. We are seeking analyst level individuals with experience working in the field of cybersecurity and a desire to help organizations improve their operations to join our team and help run the ongoing security operations for RSM clients in a variety of industries and geographic locations. Successful candidates will have working knowledge in some or all these areas – IT operations, security monitoring, active directory, IP networking and various cloud technologies. Position and Key Responsibilities At RSM, analysts work with large and small companies in variety of industries. They develop strong working relationships with their peers within the security operations center (SOC) while learning their clients’ businesses and challenges facing their organizations. Analysts work as part of a broader team under the direction of more senior analysts, threat hunters, shift leads, intelligence analysts and SOC managers in support of multiple clients. Working in a mutually respectful team environment helps our analysts perform at their best and integrate their career with their personal life. You will have the opportunity to: Role Responsibilities: Investigate security incidents using SIEM tools, automation, and other cybersecurity technologies (i.e. ServiceNow, Stellar Cyber, Hyas Insight and DNS Protect, sentinel One, ELK Stack, Virus total, Shodan, NetFlow, Passive DNS, Silobreaker, Tenable.io, Hatching Triage Sandbox) Analyze, escalate, and assist in remediation of critical security incidents. Improve and challenge existing processes and procedures in a very agile and fast-paced information security environment serving multiple clients Process IDS alerts and identifying incidents and events in customer data. Setup and execution and analysis of vulnerability scans Perform advanced analysis and investigation into alerts as they are identified Performing initial basic malware analysis utilizing automated means (static and dynamic sandbox analysis or other available tools) Incident intake, ticket updates and reporting of cyber events and threat intelligence Understanding, identifying, and researching indicators of compromise (IOCs) from a variety of sources such as threat intelligence reports and feeds Writing incident reports, process documentation, and interact with clients as required Transcribe and implement atomic indicators into a monitoring environment. Consume policy documentation and determine applicability in a network. Work with protocols at layers 2 and higher in the OSI model, to include ARP TCP, UDP, ICMP, DNS, Telnet, SSH, HTTP, SSL, SNMP, SMTP, and other common protocols that use well-known ports. Develops the playbooks to respond and recovery from various attacks/incidents. Drives the automation efforts focused on the closing cases, responding to Cyber events and analyzing data required to enable efficient response activities. Processing of Cyber Threat Intel that is used across RSM detection platforms to understand and prepare for potential threats. Threat intel is heavily used across RSM platforms drive issue prioritization. Open to working shifts in a 24x7 operations environment. Qualifications and Experience: Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences or prior relevant military / law enforcement experience. Computer science, information technology, information systems management, or other similar degrees preferably with a focus on information security 3-5 years’ experience working in a security operations center, networking operations center or threat intelligence capacity. Possess at least one security industry certification such as CYSA+, Security+, CISSP, SANS GIAC (GSOC, GCIA, GMON, CGCDA) Knowledge of security standards and information security and compliance frameworks, controls, and best practices, including SSAE 16, SOC 2 and SOC3, OWASP Top 10, SANS, NIST Must have a naturally curious mindset and approach to solving problems. Basic understanding of cloud technologies and their operations Experience supporting various operating systems such as Windows/Linux Understanding of IP network protocols At RSM, we offer a competitive benefits and compensation package for all our people. We offer flexibility in your schedule, empowering you to balance life’s demands, while also maintaining your ability to serve clients. Learn more about our total rewards at https://rsmus.com/careers/india.html. RSM does not tolerate discrimination and/or harassment based on race; colour; creed; sincerely held religious beliefs, practices or observances; sex (including pregnancy or disabilities related to nursing); gender (including gender identity and/or gender expression); sexual orientation; HIV Status; national origin; ancestry; familial or marital status; age; physical or mental disability; citizenship; political affiliation; medical condition (including family and medical leave); domestic violence victim status; past, current or prospective service in the Indian Armed Forces; Indian Armed Forces Veterans, and Indian Armed Forces Personnel status; pre-disposing genetic characteristics or any other characteristic protected under applicable provincial employment legislation. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process and/or employment/partnership. RSM is committed to providing equal opportunity and reasonable accommodation for people with disabilities. If you require a reasonable accommodation to complete an application, interview, or otherwise participate in the recruiting process, please send us an email at careers@rsmus.com.
Posted 1 month ago
170.0 years
0 Lacs
Mulshi, Maharashtra, India
On-site
Area(s) of responsibility About Us Birlasoft, a global leader at the forefront of Cloud, AI, and Digital technologies, seamlessly blends domain expertise with enterprise solutions. The company’s consultative and design-thinking approach empowers societies worldwide, enhancing the efficiency and productivity of businesses. As part of the multibillion-dollar diversified CKA Birla Group, Birlasoft with its 12,000+ professionals, is committed to continuing the Group’s 170-year heritage of building sustainable communities. Job Title: Endpoint Security Specialist – Trend Micro Apex One Location: Any Birlasoft Location Department: Cybersecurity – Endpoint Security About the Role- We are looking for a highly skilled Endpoint Security Specialist with deep expertise in Trend Micro Apex One and a strong understanding of endpoint protection strategies. This role involves end-to-end implementation, integration with SOC operations, and client-facing solution design including RFP preparation. The ideal candidate will also be familiar with emerging security tools and industry best practices. Key Responsibilities, Lead the deployment, configuration, and lifecycle management of Trend Micro Apex One across enterprise environments. Integrate Apex One with SIEM, EDR, and XDR platforms for enhanced threat visibility. Manage policy tuning, threat detection, and remediation workflows. Implement and support other Trend Micro offerings such as Deep Security, Cloud App Security, and Vision One. Perform upgrades, patching, and health checks of endpoint security infrastructure. Work closely with SOC teams to analyze alerts, investigate incidents, and provide Tier 2/3 support. Develop and maintain playbooks for endpoint threat response. Generate actionable reports and dashboards for threat intelligence. Evaluate and integrate top-tier endpoint protection tools like CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, etc. Stay updated on threat trends and recommend proactive security measures. Prepare and present RFPs, technical proposals, and solution architectures to clients. Conduct workshops, demos, and PoCs tailored to client environments. Translate complex technical concepts into business-friendly language. Required Skills & Qualifications 5–8 years of experience in endpoint security, with at least 4 years in Trend Micro Apex One. Strong knowledge of malware analysis, threat hunting, and endpoint hardening. Experience with SIEM, EDR/XDR, and incident response. Familiarity with scripting (PowerShell, Python) for automation and reporting. Excellent communication and presentation skills for client-facing roles. Preferred Certifications Trend Micro Certified Professional (TMCP) – Apex One or Vision One CompTIA Security+, CEH, CISSP, or equivalent ITIL Foundation or similar process-oriented certifications Show more Show less
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
31458 Jobs | Dublin
Wipro
16542 Jobs | Bengaluru
EY
10788 Jobs | London
Accenture in India
10711 Jobs | Dublin 2
Amazon
8660 Jobs | Seattle,WA
Uplers
8559 Jobs | Ahmedabad
IBM
7988 Jobs | Armonk
Oracle
7535 Jobs | Redwood City
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi
Capgemini
6091 Jobs | Paris,France