Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 6 days ago
3.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Job Title: SOC Consultant Location: Gurgaon / Bangalore Experience: 3+ Years Position Type: Full-time Immediate Joiners Preferred Job Description: We are seeking a skilled SOC (Security Operations Center) Consultant with 3+ years of experience in security operations, threat analysis, and incident response. The ideal candidate should have hands-on experience with SIEM tools and a strong understanding of cybersecurity principles and frameworks. Key Responsibilities: Monitor, analyze, and respond to security events and incidents Operate and manage SIEM platforms (e.g., Splunk, QRadar, ArcSight, etc.) Perform real-time threat analysis, detection, and triage of security incidents Support vulnerability management and threat intelligence integration Work closely with clients and internal teams to implement security best practices Document security incidents and contribute to knowledge base development Assist in the development of security playbooks and incident response plans Required Skills: 3+ years of experience in SOC operations or a similar cybersecurity role Proficiency in SIEM tools and log analysis Good understanding of TCP/IP, IDS/IPS, firewalls, and malware analysis Familiarity with threat hunting techniques and cybersecurity frameworks (NIST, MITRE ATT&CK) Strong analytical and problem-solving skills Excellent communication and documentation skills Certifications (Preferred): CEH / CompTIA Security+ / SSCP / Splunk Certified / Microsoft SC-200 or equivalent
Posted 6 days ago
2.0 years
0 Lacs
Ahmedabad, Gujarat, India
On-site
Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Associate Job Description & Summary In-depth knowledge of application development processes and at least one programming and one scripting language (e.g., Java, Scala, C#, JavaScript, Angular, ReactJs, Ruby, Perl, Python, Shell). •Knowledge on OS security (Windows, Unix/Linux systems, Mac OS, VMware), network security and cloud security. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats. Responsibilities: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. · Round the clock threat monitoring & detection · Analysis of any suspicious, malicious, and abnormal behavior. · Alert triage, Initial assessment, incident validation, its severity & urgency · Prioritization of security alerts and creating Incidents as per SOPs. · Reporting & escalation to stakeholders · Post-incident Analysis · Consistent incident triage & recommendations using playbooks. · Develop & maintain incident management and incident response policies and procedures. · Preservation of security alerts and security incidents artefacts for forensic purpose. · Adherence to Service Level Agreements (SLA) and KPIs. · Reduction in Mean Time to Detection and Response (MTTD & MTTR). Mandatory skill sets: Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: SOC - Splunk Years of experience required: 2-5 Years Education qualification: B.Tech/MCA/MBA with IT background/ Bachelor’s degree in Information Technology, Cybersecurity, Computer Science a Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Master of Business Administration, Bachelor of Engineering Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills SOC Operations Optional Skills SoCs Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date
Posted 6 days ago
3.0 years
0 Lacs
India
On-site
Key Responsibilities Monitor and triage alerts from SIEM platforms including Elastic Stack , correlating data from Zscaler, Defender for Endpoint, CrowdStrike Falcon , and other security tools. Investigate suspicious activity and escalate confirmed incidents with detailed impact assessments. Support incident response lifecycle —including containment, eradication, and recovery—according to defined playbooks. Collaborate with senior analysts and threat intelligence teams to conduct in-depth investigations and recommend mitigations. Perform log analysis, packet capture review, and behavioral analytics to uncover advanced threats. Conduct proactive threat hunting using data across various telemetry sources (e.g., endpoint, network, cloud). Document investigation steps, findings, and resolution actions for audit and knowledge base purposes. Continuously tune SIEM rules, detection logic, and alert thresholds to reduce false positives and increase fidelity. Provide audit and compliance support during security assessments and regulatory evaluations. Participate in weekly SOC reviews and post-incident reviews to improve detection and response capabilities. Stay updated with the latest threat intel, CVEs, TTPs (MITRE ATT&CK), and industry best practices. Qualifications & Skill sBachelor’s degree in computer science, Cybersecurity, Information Technolog y, or related field .2–3 year s of hands-on experience in a SOC or cybersecurity role, ideally in a 24x7 monitoring environment .Solid knowledge of :Endpoint detection tools (CrowdStrike Falcon, Defender for Endpoin t )Network and cloud security solutions (Zscaler Internet Access/ZP A )Open-source and commercial SIEM tools (preferably Elastic/EL K) .Understanding of network protocol s, log format s, and Windows/Linux/macOS securit y .Familiarity with MITRE ATT&C K, CVE/CVSS scoring, and vulnerability management principles .Strong communication and incident documentation skills .Willingness to work in rotational shifts for continuous 24x7 SOC coverag e .Preferred certifications: CompTIA Security+, Microsoft SC-200, Elastic Certified Analyst, CrowdStrike Certified Falcon Responder, or simila r .
Posted 6 days ago
6.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Key Job Responsibilities: VOC - VI (Vulnerability Intelligence) & ASM (Attack Surface Management) Analyst Environment / Context Saint Gobain, world leader in the habitat and construction market, is one of the top 100 global industrial groups. Saint-Gobain is present in 68 countries with 171 000 employees. They design, manufacture and distribute materials and solutions which are key ingredients in the wellbeing of each of us and the future of all. They can be found everywhere in our living places and our daily life: in buildings, transportation, infrastructure and in many industrial applications. They provide comfort, performance and safety while addressing the challenges of sustainable construction, resource efficiency and climate change . Saint-Gobain GDI Grou pe (250 persons at the head office, including 120 that are internal) is responsible for defining, setting up and managing the Group's Information Systems (IS) and Telecom policy with its 1,000 subsidiaries in 6,500 sites worldwide. The GDI Groupe also carries the common means (infrastructures, telecoms, digital platforms, cross-functional applications ). IN DEC, the IT Development Centre of Saint-Gobain, is an entity with a vision to leverage India’s technical skills in the Information Technology domain to provide timely, high-quality and cost-effective IT solutions to Saint-Gobain businesses globally. Within the Cybersecurity Department, the Cybersecurity Vulnerability Operations Cen ter mission is to Identify, assess and confirm vulnerability and threats that can affect the Group. The CyberVOC teams are based out of Paris and Mumbai and consist of skilled persons working in different Service Lines . Mission The VOC VI & ASM Analyst will be part of a team responsible for monitoring and identifying vulnerabilities as well as proactively assessing their threat with regards to Saint-Gobain context. The team also provides comprehensive feedback and guidance on detected vulnerabilities to assist Security Officers and Application Manager on the remediationpart. This role takes a holistic approach to identifying newly published vulnerabilities and contextualizing them to Saint-Gobain environment as well as tracking potential external entry points to Saint-Gobain systems anddata. The VOC VI & ASM Analyst is responsible for: Vulnerability Intelligence (VI): Monitor new vulnerabilities and assess their criticality and risk severity based on threat, exploit availability, ease of exploit, impact, …Communicate and publish an assessment on vulnerabilities related to software used in Saint-Gobain's scope Maintain timely, high-quality vulnerability bulletins, prioritizing issues against the Group’s asset exposure Update on a regular basis our software inventory in the scope of Vulnerability Assessment Service Keep the vulnerability database up to date; enrich each CVE and security bulletin with QDS, EPSS, CVSS metrics, … Attack Surface Management (ASM): Operate continuous monitoring of external assets via ASM Security tools Update on a regular basis the coverage of ASM tools, by adding known domains and IP ranges belonging to Saint-Gobain Assess the severity of the findings and confirm their presence (review, challenge, FP assessment, …) Track and report exposure trends; escalate high-risk findings to Blue-Team remediation owners Build and use the external footprint to proactively identify new threats and new vulnerabilities Leverage ASM tools to proactively identify external assets subject to newly published vulnerabilities BlackBox Pentesting: Drive proactive follow-up on detected vulnerabilities, engaging system owners and tracking remediationto closure Active follow up with Application managers to onboard new application in the BlackBox Pentesting service Pentest launch Contract follow-up Tools follow up and maintenance Vulnerability Management:Vulnerability review, recategorization, and false positive identification Proactive vulnerability testingand replayPre-analyze and consolidate vulnerability data from various scanning tools Prepare concise syntheses of available vulnerabilities Offer guidance to the SO and CISO on vulnerabilities Collaborate with key stakeholders to develop strategies for vulnerability management Scripting and automation:Automate data extraction and data push from VI and ASM tools to DataLake tools Build automation workflows to streamline vulnerability identification, assessment, and reporting Collaborate with the offensive and defensive teams to enhance vulnerability assessmentand t esting Skills and Qualifications Bachelor's degree in Computer Science, Information Security, EXTC or related field; relevant certifications (e.g., CISSP, CCSP, CompTIA Security+) are a plusProven experience (6+ years) working within the Cybersecurity field, with emphasis on security platform implementation & administration Experience on Penetration testing actions (web application, infrastructure, …) Experience with security scanning tools Experience with VI and ASM tools Experience in investigating newly published vulnerabilities and assessing their risks and severity Experience with scripting languages (e.g., Python, Bash, Powershell, C#, …) for automation and customization of security processes is a plus Experience with Pentester tools (Burp, SQLmap, Metasploit, Kali environment, …) Strong technical skills with an interest in open-source intelligence investigations Knowledge of NIST CVE database, OWASP Top 10, Microsoft security bulletins Excellent writing skills in English and ability to communicate complicate technical challenges in a business language to a range ofstakeholders. Personal Skills Has a systematic, disciplined, and analytical approach to problem solving with Thorough leadership skills & experience Excellent ability to think critically under pressure Strong communication skills to convey technical concepts clearly to both technical and non-technical stakeholders Willingness to stay updated with evolving cyber threats, technologies, and industry trends Capacity to work collaboratively with cross-functional teams, developers, and management to implement robust security measures Additional Information The position is based in Mumbai (India)
Posted 6 days ago
2.0 years
6 Lacs
Thiruvananthapuram
On-site
2 - 3 Years 1 Opening Trivandrum Role description Overview: We are looking for a skilled SIEM Administrator to manage and maintain Security Information and Event Management (SIEM) solutions such as Innspark , LogRhythm , or similar tools. This role is critical to ensuring effective security monitoring, log management, and event analysis across our systems. Key Responsibilities: Design, deploy, and manage SIEM tools (e.g., Innspark, LogRhythm, Splunk). Develop and maintain correlation rules, s, dashboards, and reports. Integrate logs from servers, network devices, cloud services, and applications. Troubleshoot log collection, parsing, normalization, and event correlation issues. Work with security teams to improve detection and response capabilities. Ensure SIEM configurations align with compliance and audit requirements. Perform routine SIEM maintenance (e.g., patching, upgrades, health checks). Create and maintain documentation for implementation, architecture, and operations. Participate in evaluating and testing new SIEM tools and features. Support incident response by providing relevant event data and insights. Required Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field. 3+ years of hands-on experience with SIEM tools. Experience with Innspark, LogRhythm, or other SIEM platforms (e.g., Splunk, QRadar, ArcSight). Strong knowledge of log management and event normalization. Good understanding of cybersecurity concepts and incident response. Familiarity with Windows/Linux OS and network protocols. Scripting knowledge (e.g., Python, PowerShell) is a plus. Strong troubleshooting, analytical, and communication skills. Industry certifications (CEH, Security+, SSCP, or vendor-specific) are a plus. Key Skills: SIEM Tools (Innspark, LogRhythm, Splunk) Troubleshooting Log Management & Analysis Scripting (optional) Security Monitoring Skills Siem,Splunk,Troubleshooting Skills Siem,Splunk,Troubleshooting About UST UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.
Posted 1 week ago
3.0 years
0 Lacs
Bengaluru
Remote
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Staff (CTM – Threat Detection & Response) KEY Capabilities: Experience in working with Splunk Enterprise, Splunk Enterprise Security & Splunk UEBA Minimum of Splunk Power User Certification Good knowledge in programming or Scripting languages such as Python (preferred), JavaScript (preferred), Bash, PowerShell, Bash, etc. Assist in remote and on-site gap assessment of the SIEM solution. Work on defined evaluation criteria & approach based on the Client requirement & scope factoring industry best practices & regulations Assist in interview with stakeholders, review documents (SOPs, Architecture diagrams etc.) Asist in evaluating SIEM based on the defined criteria and prepare audit reports Good experience in providing consulting to customers during the testing, evaluation, pilot, production and training phases to ensure a successful deployment. Experience in onboarding data into Splunk from various sources including unsupported (in-house built) by creating custom parsers Verification of data of log sources in the SIEM, following the Common Information Model (CIM) Experience in parsing and masking of data prior to ingestion in SIEM Provide support for the data collection, processing, analysis and operational reporting systems including planning, installation, configuration, testing, troubleshooting and problem resolution Assist clients to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sources Assist client with technical guidance to configure their log sources (in-scope) to be integrated to the SIEM Experience in SIEM content development which includes : Hands-on experience in development and customization of Splunk Apps & Add-Ons Builds advanced visualizations (Interactive Drilldown, Glass tables etc.) Build and integrate contextual data into notable events Experience in creating use cases under Cyber kill chain and MITRE attack framework Capability in developing advanced dashboards (with CSS, JavaScript, HTML, XML) and reports that can provide near real time visibility into the performance of client applications. Sound knowledge in configuration of Alerts and Reports. Good exposure in automatic lookup, data models and creating complex SPL queries. Create, modify and tune the SIEM rules to adjust the specifications of alerts and incidents to meet client requirement Experience in creating custom commands, custom alert action, adaptive response actions etc. Qualification & experience: Minimum of 3 years’ experience in Splunk and 3 to 5 years of overall experience with knowledge in Operating System and basic network technologies Experience in SOC as L1/L2 Analyst will be an added advantage Strong oral, written and listening skills are an essential component to effective consulting. Good to have knowledge of Vulnerability Management, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting Certification in any other SIEM Solution such as IBM QRadar, Exabeam, Securonix will be an added advantage Certifications in a core security related discipline (CEH, Security+, etc.) will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 week ago
7.0 years
0 Lacs
New Delhi, Delhi, India
On-site
Job Title: IT Security Engineer – Contractual (3+ / 5+ / 7+ Years Experience) Compensation: (6-10Lakh/10-15Lakh/12-18Lakh respectively) Location: New Delhi Type: Contractual [ 2 months contract] Openings: Multiple Domain Focus: Network Infrastructure Security, ISO 27019 Compliance Email: hr@pivotsec.in Note: This is an urgent contractual opening. Immediate joiners will be prioritized. Job Summary: P.I.V.O.T Security is seeking skilled IT Security Engineers for contractual roles with a primary focus on network architecture and infrastructure security reviews, covering routers, switches, firewalls, CCTV networks, and related devices. These roles are part of critical infrastructure security compliance assessments in alignment with ISO 27019 standards. Responsibilities (based on experience level): Review the entire network architecture, including: • Core and access routers & switches • Perimeter and internal firewalls • CCTV and physical security network components • Wireless network segmentation and NAC implementations • Conduct firewall audits, rulebase validations, and segmentation testing • Evaluate security configurations for IoT and surveillance systems (e.g., CCTV NVR/DVR) • Lead or support Vulnerability Assessment and Penetration Testing (VA/PT) of infrastructure • Identify gaps in network design, access control, and compliance with ISO 27019 • Document security weaknesses, propose remediations, and engage with client infra teams • Prepare technical documentation, risk reports, and mitigation strategies Skills & Tools: Assessment Tools: Nmap, Nessus, Burp Suite, Metasploit (based on role level) Device Knowledge: Cisco, Fortinet, Palo Alto, Juniper, Hikvision, Dahua, etc. Review Focus: Routing protocols, VLANs, ACLs, VPNs, NAT policies, CCTV network isolation Scripting (Senior roles): PowerShell, Bash, Python Understanding of critical infrastructure protection and ISO/IEC 27019 Certifications (Preferred): CEH, CompTIA Security+ (3–5 YOE) OSCP, CEH, or equivalent (5–7+ YOE) Candidate Requirements: 3 to 7+ years of experience in IT/network security, architecture assessment Strong knowledge of infrastructure hardening and secure configuration practices Ability to review, assess, and advise on physical and logical security architecture Effective communication and client interaction skills Capable of independently preparing architecture review reports To apply, email your updated resume to hr@pivotsec.in Use the subject line: "IT Security – [Years] YOE" (e.g. "IT Security – 5 YOE")
Posted 1 week ago
3.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
Overview: Role description We are looking for a skilled SIEM Administrator to manage and maintain Security Information and Event Management (SIEM) solutions such as Innspark , LogRhythm , or similar tools. This role is critical to ensuring effective security monitoring, log management, and event analysis across our systems. Key Responsibilities: Design, deploy, and manage SIEM tools (e.g., Innspark, LogRhythm, Splunk). Develop and maintain correlation rules, s, dashboards, and reports. Integrate logs from servers, network devices, cloud services, and applications. Troubleshoot log collection, parsing, normalization, and event correlation issues. Work with security teams to improve detection and response capabilities. Ensure SIEM configurations align with compliance and audit requirements. Perform routine SIEM maintenance (e.g., patching, upgrades, health checks). Create and maintain documentation for implementation, architecture, and operations. Participate in evaluating and testing new SIEM tools and features. Support incident response by providing relevant event data and insights. Required Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field. 3+ years of hands-on experience with SIEM tools. Experience with Innspark, LogRhythm, or other SIEM platforms (e.g., Splunk, QRadar, ArcSight). Strong knowledge of log management and event normalization. Good understanding of cybersecurity concepts and incident response. Familiarity with Windows/Linux OS and network protocols. Scripting knowledge (e.g., Python, PowerShell) is a plus. Strong troubleshooting, analytical, and communication skills. Industry certifications (CEH, Security+, SSCP, or vendor-specific) are a plus. Key Skills: SIEM Tools (Innspark, LogRhythm, Splunk) Troubleshooting Log Management & Analysis Scripting (optional) Security Monitoring Skills Siem,Splunk,Troubleshooting Skills Siem,Splunk,Troubleshooting
Posted 1 week ago
5.0 years
0 Lacs
India
On-site
Location: Fort Gillem, Forest Park, GA Required Clearance: TS/SCI with Polygraph Certifications: DoD 8140 IAT Level II certification (e.g., CompTIA Security+ CE, CCNA Security, CySA+). Required Education: Associate’s degree in IT, Computer Science, or related discipline preferred. Required Experience: Minimum of 5 years of experience in classified IT services and networking Position Description PingWind is seeking a Systems Administrator to provide day-to-day operational support for Army IT systems under a mission-critical DoD contract. The candidate will be responsible for system configuration, maintenance, user support, patching, and compliance activities in accordance with Army and DoD Information Assurance (IA) standards. Primary Responsibilities Typical Responsibilities/Tasks: Install, configure, and maintain Windows and/or Linux servers and workstations. Perform daily system monitoring, verify system availability and integrity, and review system logs for issues. Apply DISA STIGs and Security Technical Implementation Guidelines to harden systems. Implement IAVA patches and ensure compliance with cybersecurity directives. Create and manage user accounts, groups, and permissions using Active Directory (AD), Group Policy, and Role-Based Access Control (RBAC). Support user account provisioning/de-provisioning, system login issues, and file permissions. Monitor system performance, conduct root-cause analysis, and tune systems for efficiency. Maintain backup systems and disaster recovery procedures. Support Risk Management Framework (RMF) efforts, vulnerability scans, and POA&M remediation tasks. Assist with audit readiness, IA controls, and security incident response. Collaborate with cybersecurity personnel on system hardening and event analysis. Maintain technical documentation, SOPs, change logs, and configuration baselines. Provide Tier I/II support for help desk tickets, resolving hardware, software, and networking issues. Required Qualifications Minimum of 5 years of experience in classified IT services and networking DoD 8140 IAT Level II certification (e.g., CompTIA Security+ CE, CCNA Security, CySA+). Desired Qualifications Bachelor’s Degree Prior experience supporting an Army tactical or enterprise IT environment (NETCOM, PEO EIS, Army Futures Command, etc.). Familiarity with Army-specific systems such as GCSS-Army, Army Enterprise Email, or SIPR/NIPR networks. Experience with DoD RMF processes, DISA STIG compliance, and IAVA/Vulnerability Management. About PingWind PingWind is focused on delivering outstanding services to the federal government. We have extensive experience in the fields of cyber security, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement. PingWind is a VA CVE certified Service-Disabled Veteran Owned Small Business (SDVOSB) and SBA HUBZone Certified with offices in Washington DC and Northern Virginia. www.PingWind.com Our benefits include: Paid Federal Holidays Robust Health & Dental Insurance Options 401k with matching Paid vacation and sick leave Continuing education assistance Short Term / Long Term Disability & Life Insurance Employee Assistance Program through Sun Life Financial EAP Guidance Resources Veterans are encouraged to apply PingWind, Inc. does not discriminate in employment opportunities, terms and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law
Posted 1 week ago
6.0 years
0 Lacs
Noida
On-site
Job Information Date Opened 07/25/2025 Job Location Noida Job Type Full time Industry IT Services Work Experience 6-10 years City Noida State/Province Uttar Pradesh Country India Zip/Postal Code 201305 About Us We are an IT Consulting & IT Services company with ISO 9001, 14001, 20001 27001 & Great Place to Work Certified. We at Quadrafort assist our customers in enhancing Productivity and Business efficiency achieved by our best-in-class Cloud Solutions and innovative 360° consulting services. We are a Technology Consulting services provider assisted by a team of certified technologists aided by domain experience & proficiency garnered across industries and business verticals. We endeavor to empower organizations in their digital transformation journey with the least disruption with emphasis on proper adoption, to aid in achieving complex business goals. We work across industries encompassing Manufacturing, Retail, Hi-Tech, IT, BFSI, Healthcare, Automobile and Media. Industry - IT Services and IT Consulting Job Description We are seeking a dynamic and technically proficient Cybersecurity Analyst to support our presales and delivery teams. This hybrid role combines solution architecture, technical consulting, and hands-on implementation. The ideal candidate will have a strong foundation in enterprise cybersecurity and critical IT infrastructure, with the ability to engage directly with customers, design tailored solutions and ensure successful project execution. Key Responsibilities: Collaborate with the presales team to scope, size, and define cybersecurity solutions aligned with customer requirements. Develop and present compelling technical proposals, solution architectures, and proof-of-concept demonstrations. Translate business needs into technical requirements and articulate solution value to both technical and non-technical stakeholders. Design end-to-end cybersecurity architectures for enterprise environments, including on-prem, cloud, and hybrid models. Lead or support the deployment, configuration, and integration of cybersecurity technologies. Ensure timely and high-quality delivery of projects, adhering to best practices and compliance standards. Act as a trusted advisor during customer interactions, including discovery sessions, workshops, and technical deep-dives. Address complex technical queries and provide expert guidance on cybersecurity strategies, tools, and frameworks. Maintain strong relationships with key stakeholders to ensure customer satisfaction and solution adoption. Maintain hands-on expertise in cybersecurity domains such as network security, endpoint protection, identity and access management, SIEM/SOAR, and cloud security. Stay abreast of emerging threats, technologies, and regulatory changes to enhance solution offerings continuously. Contribute to internal knowledge sharing, solution accelerators, and reusable assets. Requirements 5+ Years of experience in cybersecurity solution design, implementation, or consulting. Proven experience with enterprise-grade cybersecurity. Strong understanding of IT infrastructure components including networking, virtualization, and cloud platforms. Demonstrated ability to lead technical engagements and deliver complex solutions. Excellent presentation, communication, and stakeholder management skills. Ability to align technical solutions with business outcomes and articulate Cyber Security’s value proposition effectively. Strong problem-solving, strategic thinking, and analytical skills. Bachelor’s/Master’s degree in Computer Science, Engineering, or related field. Industry certifications such as CISSP, CISM, CEH, CompTIA Security+, or equivalent.
Posted 1 week ago
1.0 years
0 Lacs
Mumbai Metropolitan Region
On-site
Job Description: Position Title: Tier 1 Hosting Analyst Role Purpose As a part of the team, the Tier 1 Hosting Analyst partners with the Merkle business to make technology an asset for customers and employees, providing effective and timely solutions to technological requests and incidents. The Tier 1 Hosting Analyst should have previous experience with Helpdesk support and a strong drive to learn new Enterprise-class technologies. This role relies heavily on on-the-job training. The ideal candidate will thrive in a fast-paced environment and will possess the ability to self-start and logically prioritize workloads from multiple workstreams, while communicating progress or pitfalls. The candidate should be very detail-oriented with possession of advanced Excel skills as one of the primary responsibilities is to compile IT related financial data and communicate that out with accuracy. In addition, the ideal candidate should actively seek out new knowledge and skills, and will maintain consistent performance quality, avoiding repeat mistakes to learn and grow. Key Responsibilities: Responsible for monthly cost allocations for cloud environments to accurately distribute costs across the business based on standard operating procedures Update and conduct initial analyzation of IT cost center’s monthly financial dataset for internal management review Monitor and act on high-severity incidents and requests, meeting strict SLA/OLA requirements Escalate issues as defined in documented escalation procedures Follow incident/request management best practices Triage and support Windows and Linux server environments Provision/decommission servers following documented SOPs Process and troubleshoot access requests to various platforms through Active Directory and Okta Provide application support for Enterprise shared platforms (scheduling, managed file transfer, etc.) Perform server maintenance and patching both in-cycle and in response to urgent security vulnerabilities Continuously contribute to documentation in the Knowledge Base Consistently learn new systems and skills Uphold and promote dentsu’s core values and culture Other duties as required Key Skills and Experience: Analytical mindset, detail oriented Strong Excel experience with advanced functions with nesting in formulas (XLOOKUP, VLOOKUP, UNIQUE, SUMIF, IF(AND), MATCH(INDEX), etc.) Associates degree or higher in Information Technology, Computer Science, or related fields of study preferred 1 year of Helpdesk or customer service experience strongly preferred, bonus if ServiceNow was the ticketing platform used 1-3 years of experience with Enterprise technology support required, with a focus on Windows and Linux servers CompTIA A+, Security+, Network+, and AWS/GCP Cloud certifications preferred Basic understanding of Windows (Windows Server 2016 or higher) and Linux (RHEL/CentOS/Alma/etc.) Basic understanding of Enterprise data center concepts (server storage, networking, server administration) The ability to work independently with limited direct supervision, prioritizing tasks efficiently per established priority guidelines Exemplary etiquette with customers Clear English communication skills, both orally and in writing 24x7 Rotational shift. This is permanent role so end date is not applicable to this position. Location: DGS India - Mumbai - Thane Ashar IT Park Brand: Dentsu Time Type: Full time Contract Type: Permanent
Posted 1 week ago
5.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Job Title: Attack Surface Management Analyst Job Location: UniOps Bangalore About Unilever Be part of the world’s most successful, purpose-led business. Work with brands that are well-loved around the world, that improve the lives of our consumers and the communities around us. We promote innovation, big and small, to make our business win and grow; and we believe in business as a force for good. Unleash your curiosity, challenge ideas and disrupt processes; use your energy to make this happen. Our brilliant business leaders and colleagues provide mentorship and inspiration, so you can be at your best. Every day, nine out of ten Indian households use our products to feel good, look good and get more out of life – giving us a unique opportunity to build a brighter future. Every individual here can bring their purpose to life through their work. Join us and you’ll be surrounded by inspiring leaders and supportive peers. Among them, you’ll channel your purpose, bring fresh ideas to the table, and simply be you. As you work to make a real impact on the business and the world, we’ll work to help you become a better you. About Uniops Unilever Operations (UniOps) is the global technology and operations engine of Unilever offering business services, technology, and enterprise solutions. UniOps serves over 190 locations and through a network of specialized service lines and partners delivers insights and innovations, user experiences and end-to-end seamless delivery making Unilever Purpose Led and Future Fit. Unilever is one of the world’s leading consumer goods companies with operations in over 190 countries and serving 3.4 billion consumers every day. Unilever delivers best in class performance with market making, unmissably superior brands which include Dove, Knorr, Domestos, Hellmann’s, Marmite and Lynx. Our strategy beings with a purpose that places our consumers at the heart of everything we do, “Brighten everyday life for all”. Role Purpose This role supports the Threat Intelligence & EASM Lead in identifying, monitoring, and managing Unilever’s external digital footprint. The EASM Analyst will leverage open-source intelligence (OSINT), commercial EASM platforms, and reconnaissance tools to discover, assess, and reduce Unilever’s exposure to external cyber threats. Role Summary The External Attack Surface Management (EASM) Analyst plays a critical role in Unilever’s proactive cybersecurity strategy by continuously identifying, analyzing, and mitigating risks associated with the organization’s internet-facing assets. As digital transformation accelerates and cloud adoption expands, the external attack surface becomes increasingly dynamic and complex. This role is designed to provide visibility into that evolving landscape and ensure that Unilever’s digital perimeter is secure, monitored, and well-managed. The analyst will be responsible for leveraging a combination of commercial EASM platforms (such as Mandiant, Wiz, and Qualys) and open-source reconnaissance tools (like Shodan, FOFA, and Censys) to discover unknown or unmanaged assets, detect misconfigurations, and identify potential vulnerabilities. This includes domains, IP addresses, cloud services, APIs, and third-party integrations that may be exposed to the internet. The EASM Analyst will work closely with Threat Intelligence, Vulnerability Management, and Incident Response teams to contextualize findings, prioritize risks, and support remediation efforts. They will also contribute to the development of automated discovery and alerting mechanisms, ensuring that new exposures are detected in near real-time. In addition to technical responsibilities, the role requires strong communication and collaboration skills to engage with asset owners, IT teams, and business stakeholders across the organization. The analyst will help drive awareness of external risks, support secure asset lifecycle management, and contribute to the overall maturity of Unilever’s cyber defense capabilities. Main Accountabilities External Asset Discovery & Mapping: Use EASM tools (e.g., Mandiant, Wiz, Qualys) to identify and catalog Unilever’s external-facing assets. Perform continuous monitoring to detect changes in the external attack surface. Reconnaissance & Threat Identification Utilize OSINT and reconnaissance tools (e.g., Shodan, FOFA, Censys) to identify exposed services, misconfigurations, and potential vulnerabilities. Correlate findings with threat intelligence to assess risk and prioritize remediation. Risk Assessment & Reporting Collaborate with vulnerability management and security operations to triage and remediate high-risk exposures. Provide regular reports and dashboards on EASM findings, trends, and KPIs. Collaboration & Process Improvement Work with IT and cloud teams to validate asset ownership and ensure secure configurations. Contribute to the development of EASM processes, playbooks, and automation strategies. Skills Key Skills and Relevant Experience Strong understanding of internet protocols, DNS, SSL/TLS, and cloud infrastructure. Proficiency with EASM and OSINT tools (e.g., Mandiant, Wiz, Qualys, Shodan, FOFA). Ability to analyze large datasets and identify patterns or anomalies. Excellent communication skills to convey technical findings to non-technical stakeholders. Familiarity with vulnerability management and threat intelligence workflows. Experience 3–5 years of experience in cybersecurity, with at least 1–2 years in EASM, threat intelligence, or vulnerability management. Experience with cloud platforms (Azure, AWS, GCP) and their security configurations. Knowledge of security frameworks such as MITRE ATT&CK, NIST CSF, or CIS Controls. Relevant certifications (e.g., CEH, OSCP, Security+, GIAC GOSI) are a plus. Note: "All official offers from Unilever are issued only via our Applicant Tracking System (ATS). Offers from individuals or unofficial sources may be fraudulent—please verify before proceeding."
Posted 1 week ago
3.0 years
0 Lacs
Hayathnagar, Telangana, India
On-site
View all jobs Business Systems & Technology Analyst Edmonton, Alberta Information Technology About Vytal Filtration Vytal Filtration Technologies delivers unparalleled filtration solutions. Filter by filter, we transform our industry by building an in-depth understanding of customer needs to maintain a clean and efficient environment. Nimble, meticulous, entrepreneurial, and solutions-oriented, we take the filter industry to the next level with leading expertise and service. From our broad filtration portfolio, we tailor solutions for a range of industry problems for every one of our customers. At Vytal, we believe the success of our employees drives the success of our customers. We foster a culture of collaboration and innovation, empowering our team to deliver exceptional results. You will become part of tight knit community that is highly motivated to address the challenges of the filtration industry and is well positioned for expansion in the North American market. By cultivating an environment of teamwork and mutual respect, we ensure our people can deliver high-quality, tailored solutions that exceed customer expectations. When our people thrive, our customers succeed. Our forward-thinking culture emphasizes customer focus, continuous improvement, and innovation. Job Summary We are seeking a highly motivated and versatile Business Systems & Technology Analyst to join our team and directly support the Chief Information Officer (CIO). This role will be instrumental in driving system improvements, delivering business intelligence and reporting, expanding Microsoft Dynamics 365 Business Central functionality, and maintaining IT infrastructure and cybersecurity posture. The ideal candidate is both technically skilled and business-minded, with a strong understanding of ERP systems, data reporting, and modern IT practices. This is a hands-on role in which the incumbent will lead and support projects, streamline processes, and improve organizational visibility through metrics, dashboards, and secure systems. Key Responsibilities ERP & Business Central (BC) Support Assist with the implementation, configuration, and ongoing optimization of Microsoft Dynamics 365 Business Central modules. Collaborate with stakeholders to enhance BC functionality through customizations, workflows, and integrations. Troubleshoot and resolve BC-related issues and coordinate with vendors or partners as required. Provide comprehensive training and continuous support to users to ensure effective use of BC across the organization. Business Intelligence & Reporting Design and deliver actionable dashboards, KPIs, and reports using tools such as Power BI. Maintain and improve data models that support financial, operational, and performance reporting. Support data governance and promote data-driven decision-making across departments. Collaborate with functional leaders to identify key business metrics and automate regular reporting. Monitor reporting performance and accuracy to ensure timely, meaningful insights. Project & Process Improvement Lead or support cross-functional technology and process improvement projects. Identify opportunities to automate tasks, streamline operations, and improve system usability. Work directly with the CIO to research, scope, and execute strategic initiatives. Cybersecurity & IT Support Assist in the implementation and monitoring of cybersecurity best practices, policies, and tools. Support IT systems, networks, and hardware configurations (desktops, servers, printers, firewalls, etc.). Manage and document hardware/software inventories and license compliance. Collaboration & Communication Serve as a bridge between technical systems and business users, translating requirements into effective solutions. Create technical documentation, user guides, and training resources. Provide day-to-day support for business users in relation to technology systems and tools. Required Skills and Qualifications: 3+ years of experience with Microsoft Dynamics 365 Business Central or NAV (configuration, workflows, reports, etc.) Proficient in Power BI or similar BI/reporting tools. Strong understanding of core IT systems, infrastructure, networking, and cybersecurity fundamentals. Demonstrated ability to lead or assist with multi-departmental technology projects. Strong analytical and problem-solving skills. Excellent written and verbal communication skills. Preferred Knowledge of SQL, AL or other data-querying or ERP customization languages. Knowledge of XML mapping and report building and customizations inside of Business Central. Familiarity with Microsoft Azure, Entra ID (Azure AD), SharePoint Online, or Power Platform. Certifications in Business Central, Power BI, or Cybersecurity (e.g., CompTIA Security+) are an asset.
Posted 1 week ago
3.0 years
0 Lacs
Greater Bengaluru Area
On-site
The GRC Security Analyst will plan and implement policies, procedures, standards, and controls to govern the protection of corporate information systems, networks, and data. The GRC security analysts will stay up-to-date on the latest cybersecurity intelligence, including hackers' methodologies, in order to modify standards and controls that govern cybersecurity across the corporation. About the Role Essential Duties & Responsibilities: Performing control assessments against corporate cybersecurity frameworks Perform review of policies and supporting procedures/processes Perform assessments of adherence to standards Customer Security Questionnaire assistance Work closely with management on security practices Assess 3rd party vendors for adherence to standards Develop routine reports in accordance with GRC metrics Stay on top of changes in the industry as it relates to security. Other security-related projects that may be assigned according to skills Ensure compliance with policies and procedures Develop and test Disaster Recover Plans Help align company with HITRUST CSF Qualifications Bachelor’s Degree, ideally in Computer Engineering, Computer Science, or Information Systems Management or equivalent work experience in the field of Cybersecurity 3+ years of relevant work experience in: compliance/systems engineering/cybersecurity role Experience in a healthcare setting preferred Possess current security certifications (e.g., Security+, CISSP, CEH, SANS) or be willing to obtain within 1 year of assignment. Required Skills 3 – 5 years experience in building an Information Security Risk Management program Experience supporting the development of Disaster Recovery Plans (DRPs). Proven ability to coordinate, execute, and document Disaster Recovery Plan tests, including analysis and reporting of results. Understanding and familiarity with information system standards Understanding and familiarity with cybersecurity frameworks (ISO, NIST, HiTrust, COBIT, etc…) Assist in maturing the Information Security Risk Management Program by helping to define an IS risk register which includes identifying threats and risks to the organization Meet with business stakeholders to identify top security risks Assist in performing IS self-assessments to ensure systems and applications are complying with corporate policies, applicable regulatory and legal requirements, and leading industry practices Assist in developing and driving the implementation of security best practices and standards to mature the overall IS Risk Management Program which includes defining security system and application standards of control Provide solutions to identified issues and risks Work with the CISO to determine the acceptable level of risk for enterprise computing platforms. Coordinate with key functional teams such as HR, IT, Marketing, Finance, Product Management, Development, General Counsel, and the Business to identify new applications and service providers in use and the associated security controls to secure the data. Assist in performing Third Party Risk Assessments for new and existing vendor tools, on premise implementations, and third parties with access to the environment. Assist in maturing the Third Party Risk Management program by defining security controls based on tiers of vendors. Articulating identified risks to the business for remediation, mitigation and sign off. Investigates incidents and events that include potential HIPAA and other data breaches, data leakage, brand reputational risks, malware propagation, system compromises etc. Mature the Data Loss Prevention Program by defining DLP rulesets in existing tools such as Varonis, CASB, Next Generation Firewalls etc. and review outputs to determine the appropriate action required. Assist with maturing the Data Governance Program which includes defining a Data Classification and Handling Program, identifying Data Owners, and assisting with the design and implementation of a Data Classification and Rights Management tool. Assist in developing and maintaining Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs) for the Data Governance Security Program and initiatives. Assist in the management and maintenance of the enterprise wide IS Security Awareness Program which includes phishing simulations, computer based training, proactive communications on latest threats, workshops and newsletters. Assist in developing enterprise and functional team specific presentations to promote a security mindset Work with the CISO to ensure the Information Security team stays abreast of new regulatory, legal and/or compliance data security requirements. Ensure compliance with HIPAA, HITRUST, and applicable legal and regulatory requirements. Strong documentation and communications skills Pay range and compensation package This position is primarily a sedentary job and requires that the associate can work in an environment where they will consistently be seated for the majority of the work day. This role requires that one can sit and regularly type on a keyboard the majority of their work day. This position requires the ability to observe a computer screen for long periods of time to observe their own and others’ work, as well as in-coming and out-going communications via the computer and/or mobile devices. The role necessitates the ability to listen and speak clearly to customers and other associates. The work environment is an open room with other associates and noise from others will be part of the regular work day.
Posted 1 week ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! Overview: We are seeking a talented and experienced Security Engineer to join our team. As a Security Engineer, you will play a crucial role in fortifying our systems, networks, and data against cybersecurity threats. Your primary responsibility will be designing, implementing, and maintaining security solutions to uphold the integrity of our organization's assets. Responsibilities: Security Infrastructure Design and Implementation: Collaborate with stakeholders to design and implement robust security infrastructure solutions. Deploy and maintain security tools and technologies to detect and prevent cyber threats. Conduct security assessments and penetration tests to identify vulnerabilities and recommend remediation actions. Identity and Access Management: Architect and build IAM infrastructure components, including identity management systems, directory services, authentication mechanisms, and access control mechanisms. Develop secure IAM frameworks and workflows, ensuring scalability, reliability, and high availability of IAM infrastructure. Implement role-based access control (RBAC) frameworks and access control models to grant appropriate access privileges to users based on their roles and responsibilities. Automation for Building and Maintaining Infrastructure: Implement automation tools and scripts to streamline the building and maintenance of security infrastructure. Develop automated workflows for provisioning and configuring security controls across systems and networks. Utilize Infrastructure as Code (IaC) principles to automate the deployment and configuration of security-related resources. Patching Infrastructure Management: Manage and maintain patching infrastructure owned by the Cyber Fusion Center. Coordinate and execute patch management activities across all systems and networks, ensuring timely deployment of security patches and updates. Develop and implement patching policies and procedures to minimize security risks and vulnerabilities. Security Monitoring and Analysis: Monitor security events and alerts to identify suspicious activities and potential threats. Perform log analysis and security incident investigations to determine the scope and impact of security incidents. Develop and maintain security monitoring tools and dashboards to enhance threat detection capabilities. Security Policy and Compliance: Assist in the development and enforcement of security policies, standards, and procedures. Conduct security assessments and audits to ensure compliance with regulatory requirements and industry standards. Provide guidance and support to ensure that security controls are implemented effectively across the organization. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Relevant certifications such as CISSP, CEH, or CompTIA Security+ are preferred. Proven experience in cybersecurity roles, with a focus on security infrastructure design, patch management, and security monitoring. Strong knowledge of cybersecurity principles, best practices, and industry standards. Proficiency in security tools and technologies, including SIEM solutions, patch management systems, and endpoint security controls. Excellent analytical and problem-solving skills, with the ability to assess complex security issues and propose effective solutions. Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and stakeholders. Ability to work independently and manage multiple tasks simultaneously in a fast-paced environment.
Posted 1 week ago
5.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Position Summary... What you'll do... Walmart’s Enterprise Business Services (EBS) is a powerhouse of several exceptional teams delivering world-class technology solutions and services making a profound impact at every level of Walmart. As a key part of Walmart Global Tech, our teams set the bar for operational excellence and leverage emerging technology to support millions of customers, associates, and stakeholders worldwide. Each time an associate turns on their laptop, a customer makes a purchase, a new supplier is onboarded, the company closes the books, physical and legal risk is avoided, and when we pay our associates consistently and accurately, that is EBS. Joining EBS means embarking on a journey of limitless growth, relentless innovation, and the chance to set new industry standards that shape the future of Walmart. Enterprise Business Services (EBS) is seeking a highly skilled and experienced Senior Software Engineer at IDC for the Corporate Affairs Technology team. As a engineer specializing in Full stack Technologies with AI/ML, you will lead the development and deployment of Fullstack and AI/ML driven products; playing an important role in a team of software engineers and collaborate with product leaders to drive innovation. About Team: As a Fortune #1 company, our work impacts millions of associates globally. We strive to continuously improve Corporate Affairs technology and products to help Suppliers and associates so they can focus on what matters most. Walmart Global Tech’s Enterprise Business Services, which is invested in building a compact, robust organization that includes technology solutions for Corporate Affairs, Transaction & Risk Technology, Finance, People, and the Associate Digital Experience. What you will do: We are looking for a Senior Software Engineer who has the passion to develop Fullstack AI driven intelligent products for the Corporate Affairs domain, with the ability to influence partner teams, data scientists, ML engineers, product managers and software developers. A successful candidate will have an established expertise in Fullstack applications with hands-on AI, ML experience in driving technical products, Full stack developer, and a passion for great customer-centric products. 5+ years of object-oriented programming experience in Java, Spring boot, Microservices, React, NestJS, Node. Good understanding of Data Structures 4+ years of experience in systems design, algorithms, and distributed systems. Have programming experience preferably in the Finance/ retail / ecommerce industry. Python knowledge would be an added advantage Exposure to cloud infrastructure, such as Open Stack, Azure, GCP, or AWS Identify or propose AI/ML use-cases to business teams to improve business processes and develop quick MVPs/ POCs to help stakeholders make better decisions Design, architect, build AI/ML models, AI Agents and deploy, operate, optimize the solutions Good to have hands on experience on Python and mainstream machine learning frameworks, e.g. TensorFlow or PyTorch and Agentic Frameworks like Pydantic Experience working in Agile Methodology Experience using CI/CD, tools for logging and metrics A continuous drive to explore, improve, enhance, automate and optimize systems and tools. Strong computer science fundamentals in data structures and algorithms Exposure to information retrieval, statistics, and machine learning. Excellent oral and written communication skills. Good analytical and problem-solving skills Additional Job Description Innovation and Research: Stay at the forefront of technological advancements, conducting research to identify emerging tools and methodologies. Collaborative Communication: Communicate complex technical concepts effectively to both technical and non-technical stakeholders, promoting a culture of open communication and collaboration. What you'll bring: You have 5+ years' experience in design, development, deployment, and maintenance of highly scalable, robust, and user-centric Fullstack/GenAI /AI /ML products and applications You have a bachelor's/master's degree in computer science, information technology, engineering, statistics, economics, mathematics, or related area You can communicate internally and externally through publications, presentations, and other mediums on research progress, major breakthroughs, and product innovation. You have experience at writing high-performing production-quality code in Python You have experience in working with end-to-end CI/CD pipelines You are thorough, meticulous and detail oriented You believe in the importance of establishing work standards and leveraging automations You have a history of collaboration, openness, honesty, timely decision making, and clear communication in both verbal and written forms You embrace lifelong learning - always learning new technologies and techniques. You are also engaged in the open-source communities to both find answers and help others About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. That’s what we do at Walmart Global Tech. We’re a team of software engineers, data scientists, cybersecurity expert's and service professionals within the world’s leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Belonging We aim to create a culture where every associate feels valued for who they are, rooted in respect for the individual. Our goal is to foster a sense of belonging, to create opportunities for all our associates, customers and suppliers, and to be a Walmart for everyone. At Walmart, our vision is "everyone included." By fostering a workplace culture where everyone is—and feels—included, everyone wins. Our associates and customers reflect the makeup of all 19 countries where we operate. By making Walmart a welcoming place where all people feel like they belong, we’re able to engage associates, strengthen our business, improve our ability to serve customers, and support the communities where we operate. Equal Opportunity Employer Walmart, Inc., is an Equal Opportunities Employer – By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing unique styles, experiences, identities, ideas and opinions – while being inclusive of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 3years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 5 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, GISF, CISSP, CCSP, or GSEC, Master’s degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 1 year’s experience leading information security or cybersecurity projects Information Technology - CISCO Certification - Certification Primary Location... Pardhanani Wilshire Ii, Cessna Business Park, Kadubeesanahalli Village, Varthur Hobli , India R-2241494
Posted 1 week ago
6.0 years
0 Lacs
Cochin
On-site
The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Requirements Must-haves: Must have experience in SIEM, Threat hunting and Team management 6-8 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Knowledge of creating and modifying the dashboards. Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows Deep Knowledge in SIEM, Ticketing tool, EDR, Vulnerability Management, MimeCast, DMARC tool. Excellent written and verbal communication skills. Good to have: · Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others Main Responsibilities Tier 1 SOC analysts are incident responders, remediating serious attacks escalated from junior analyst, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments(CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Leading efforts to counter SLA breaches and anticipating the likelihood of future security alerts,incidents. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone),based on the security event severity and suspicious activities, escalate to managed service support teams, tier 2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when newthreats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. · Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Keep updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats in security perspective. Other responsibilities and additional duties as assigned by the security management team or service delivery manager. Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting Job Type: Full-time Work Location: In person
Posted 1 week ago
5.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Skills :-Security Operations + Netskope, Devo, and/or Akamai +cloud security frameworks and zero trust architecture. Location :- Hyderabad Shift Timings :- 6.30 pm - 3.30 am Analyst, Security Operations Omnicom Global Solutions, Hyderabad IN About Omnicom Global Solutions Omnicom Global Solutions is an integral part of Omnicom Group, a leading global marketing and corporate communications company. Omnicom’s branded networks and numerous specialty firms provide advertising, strategic media planning and buying, digital and interactive marketing, direct and promotional marketing, public relations, and other specialty communications services to over 5,000 clients in more than 70 countries. OGS India plays a critical role for our group companies and global agencies by providing stellar products, solutions, and services across Creative Services, Technology, Marketing Science (Data & Analytics), Advanced Analytics, Market Research, Business Support Services, Media Services, and Project Management. With over 4000 talented colleagues in India, we are growing rapidly and are looking for professionals like you to help build the next chapter of our journey. Role Overview We have an exciting opportunity for an Analyst, Security Operations at our Hyderabad office. This role is responsible for maintaining the confidentiality, integrity, and availability of personal information and company assets, ensuring compliance with Omnicom’s internal policies and standards. The Analyst will support the tools, technologies, and operational architecture that monitor and protect Omnicom’s physical and digital environments. This role plays a vital part in defending the organization’s infrastructure and data by executing daily operational security tasks and contributing to long-term strategic security initiatives. Key Responsibilities Manage and support cybersecurity tools and software that protect Omnicom’s digital and physical environments. Operate and maintain controls such as Web Access Firewall (WAF), Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Cloud Firewall (CFW), Endpoint Detection & Response (EDR), and Security Information and Event Management (SIEM) systems. Deploy and maintain software agents and intermediate nodes to facilitate secure operations across cloud and on-premises environments. Collaborate across internal Omnicom teams as well as with external support, accounting, and engineering teams from trusted security partners. Monitor environments for security threats and respond in accordance with incident response protocols. Support ongoing security posture improvement initiatives and assist in risk mitigation efforts. Required Qualifications 3–5 years of experience in security operations, cybersecurity, or IT infrastructure. Working knowledge of security platforms such as WAF, CASB, ZTNA, CFW, EDR, and SIEM tools. Familiarity with incident detection, triage, and response processes. Experience in agent deployment and system integration for enterprise-wide security tools. Strong analytical and problem-solving skills with a proactive security mindset. Ability to coordinate across teams and manage third-party security service providers. Excellent communication skills and a detail-oriented approach to operational tasks. Preferred Qualifications Security certifications such as CompTIA Security+, GIAC, or equivalent. Experience with cloud security frameworks and zero trust architecture. Exposure to regulatory compliance environments (e.g., GDPR, HIPAA, ISO 27001).
Posted 1 week ago
0 years
0 Lacs
Navi Mumbai, Maharashtra, India
Remote
Job Title : Security Analyst L1 Job Description: The Area: The Information Security Team is a central function governing corporate and product security globally. We have built a strong team of high performing security experts and are creating a new team within Information Security here at Morningstar. As a member of our new Security Operations Center Team, you will get to be a part of a growing and well supported program protecting Morningstar’s Infrastructure, Data, and People. The Role: As an analyst on our Security Operations Center Team, you will monitor and analyze threats, provide security monitoring, and incident response services. Day to day you will work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting impact. You will analyze incidents to determine scope and impact and assist in recovery efforts. You will combine threat intelligence, event data, and assessments from recent events, to identify patterns to understand attackers' goals and stop them from succeeding. This position is based in our Mumbai office. Responsibilities: Provide 24x7 monitoring operations for security alerts Detect, analyze, report and respond to cyber security events and incidents using a combination of technology solutions and processes Review and escalate alerts Examine and operationalize new adversary detection methods to defend Morningstar Assess the security impact of security alerts and traffic anomalies to identify malicious actions. Generate reports for both technical and non-technical staff and stakeholders. Requirements A bachelor’s degree and 2-3 years’ experience in Information Security. Excellent communication skills and an understanding of cyber security fundamentals. Candidates should be interested in keeping up with the latest security trends. Experience with security tools +Add-on Certification like Security+, CompTIA+, Splunk. Morningstar is an equal opportunity employer Morningstar’s hybrid work environment gives you the opportunity to work remotely and collaborate in-person each week. We’ve found that we’re at our best when we’re purposely together on a regular basis, at least three days each week. A range of other benefits are also available to enhance flexibility as needs change. No matter where you are, you’ll have tools and resources to engage meaningfully with your global colleagues. I10_MstarIndiaPvtLtd Morningstar India Private Ltd. (Delhi) Legal Entity
Posted 1 week ago
4.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! We are looking for a Security Analyst to join our Cyber Fusion Center team, focusing on vulnerability management, policy compliance, and security posture management. In this role, you will support the day-to-day execution of security assessments using industry-leading tools including Qualys TruRISK Platform to detect, report, and coordinate remediation of vulnerabilities across Qualys environments. You will also contribute to improving compliance posture through policy enforcement, container and web application security testing, and audit readiness. This role is ideal for professionals passionate about security operations, compliance, and automation—driven to make an impact in a fast-paced, technology-focused environment. Key Responsibilities Vulnerability Management Program Deploy, configure, and maintain Qualys VMDR for continuous vulnerability scanning across on-premises and cloud-based assets. Manage asset groups, tag configurations, scan schedules, and coverage to ensure full visibility of security posture. Analyze scan results, identify high-risk vulnerabilities, and track remediation efforts across IT and engineering teams. Work with application owners and infrastructure teams to prioritize and resolve security issues within SLA. Generate detailed reports and executive summaries to communicate findings and track trends over time. Support integration of vulnerability data into dashboards or ticketing systems for automation and workflow management. Policy Compliance Configure and maintain the Qualys Policy Compliance (PC) module to assess systems against CIS, NIST, and internal benchmarks. Regularly review compliance scan results and coordinate with system administrators to resolve violations. Assist in developing and maintaining custom compliance policies based on organizational and regulatory requirements. Container Security Integrate container scanning tools (e.g., Qualys Container Security) into CI/CD pipelines to identify vulnerabilities in images before deployment. Monitor running containers for misconfigurations, outdated components, or privilege escalation risks. Partner with DevOps and engineering teams to embed container security best practices into the build and release lifecycle. Web Application Scanning Set up and manage Qualys WAS (Web Application Scanning) for internal and external web assets. Identify common vulnerabilities such as SQL injection, XSS, and misconfigurations in custom and third-party applications. Collaborate with application developers to review and resolve reported security issues efficiently. File Integrity Monitoring (FIM) Configure and maintain File Integrity Monitoring solutions to detect unauthorized changes in critical system and application files. Monitor alerts and ensure baselines are accurate, relevant, and maintained in line with system updates. Assist in defining rulesets and thresholds for actionable alerting. Audit & Compliance Support Contribute to internal and external audits by providing accurate reports, remediation evidence, and tool configurations. Ensure vulnerability and compliance-related controls are aligned with regulatory requirements such as ISO 27001, SOC 2, PCI-DSS, and FedRAMP. Maintain clear documentation for security tool configurations, scan schedules, and compliance mappings. Security Operations & Automation Identify opportunities for automation within the vulnerability management lifecycle using scripting or orchestration platforms. Maintain dashboards, reports, and alerting mechanisms to provide continuous visibility into security posture. Collaborate with tool vendors, especially Qualys, to resolve issues, evaluate new features, and apply platform updates. Qualifications & Experience Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field. 2–4 years of hands-on experience in vulnerability management and security operations. Strong knowledge of Qualys VMDR, PC, WAS, Container Security, and FIM. Solid understanding of security control frameworks (e.g., CIS, NIST, ISO 27001) and compliance requirements. Familiarity with cloud environments (AWS, Azure, GCP) and hybrid infrastructure security. Proficiency in reading scan results, interpreting risk levels, and advising on remediation strategies. Excellent problem-solving skills and attention to detail. Strong written and verbal communication for documentation and stakeholder coordination. Preferred certifications: Security+, CEH, Qualys Certified Specialist, ISO 27001 Internal Auditor, or similar. Good to Have Experience with automation (e.g., Python, PowerShell, APIs). Exposure to security ticketing systems (e.g., ServiceNow, Jira). Knowledge of CI/CD security integration and DevSecOps practices.
Posted 1 week ago
6.0 years
0 Lacs
Delhi, India
Remote
We’re Hiring: Lead – SOC (Security Operations Center) Engineer 📍 Location: [Onsite/Hybrid/Remote – specify] 🕒 Experience: 6+ Years in Cybersecurity/SOC Operations 📜 Certifications Required: Valid CEH, CISSP, CISM, CompTIA Security+, or equivalent 📅 Joining: Immediate / Up to 30 Days Are you a seasoned cybersecurity professional ready to lead SOC operations, manage incident response, and strengthen enterprise security posture? We’re looking for a Lead SOC Engineer to take charge of real-time threat monitoring, incident handling, and mentoring junior analysts. Key Responsibilities Lead end-to-end SOC operations and ensure 24x7 monitoring coverage Manage security incidents: triage, analysis, containment, eradication, and recovery Perform threat hunting, log analysis, and forensic investigations Define and implement SOC playbooks, escalation procedures, and use cases Collaborate with SIEM engineers to tune and optimize correlation rules Stay up to date with latest threats, TTPs, and share insights with the team Mentor L1/L2 SOC analysts and ensure adherence to SLAs and KPIs Required Skills 6+ years in SOC operations , incident response , or threat detection Hands-on experience with SIEM tools (e.g., Splunk, QRadar, ArcSight), EDR, and SOAR Strong understanding of MITRE ATT&CK , malware analysis, and cyber kill chain Proficient in log analysis, threat intelligence integration , and reporting Valid cybersecurity certifications: CISSP, CEH, CISM, Security+, or equivalent Familiar with NIST, ISO 27001, and incident response frameworks Nice to Have Experience with cloud security monitoring (AWS/Azure/GCP) Familiarity with automation in incident response using SOAR platforms Knowledge of scripting (Python, PowerShell) for custom threat detection
Posted 1 week ago
2.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Job Summary We are looking for a motivated and detail-oriented L1 Support Engineer to assist in the monitoring and coordination of DDoS protection activities. This role is based in India and requires fluency in both Farsi and English, as it involves collaboration with regional teams and Farsi-speaking customers. The role is not deeply technical but will focus on monitoring alerts, documenting incidents, and effectively coordinating with internal teams to ensure timely and appropriate responses. Key Responsibilities Monitor dashboards and tools related to DDoS protection platforms. Identify basic alerts and notify the internal technical teams as per defined procedures. Coordinate and follow up with L2/L3 engineers during ongoing incidents. Act as a communication bridge with Farsi-speaking customers, ensuring clear and professional updates. Maintain accurate records of incidents, timelines, and follow-up actions. Support documentation and reporting processes. Participate in regular check-ins with teams to track open items and improvements. Escalate any recurring issues or anomalies for further analysis. Required Skills & Qualifications Fluency in Farsi and English (both spoken and written) is essential. 1–2 years of experience in coordination, helpdesk, SOC/NOC, or support environment. Basic understanding of IT/network operations or willingness to learn. Strong communication and teamwork skills. Comfortable with shift work, including evenings or weekends if needed. Good documentation and organizational abilities. Preferred Qualifications Exposure to DDoS protection platforms (e.g., Arbor, Radware, or cloud providers) is a plus. Certifications like ITIL Foundation, CompTIA Security+, or CCNA are a bonus but not mandatory. Skills: fluency in farsi,fluency in english,strong communication skills,organizational abilities,helpdesk,fluency in farsi (persian),teamwork skills,noc,coordination,good documentation abilities,basic understanding of it/network operations,ddos monitoring,soc,technical support
Posted 1 week ago
8.0 years
0 Lacs
Gurugram, Haryana, India
On-site
About the job We’re looking for a Senior Symantec Network Security Support Engineer with years of hands-on experience in Symantec solutions , who will perform the role of a Subject Matter Expert for the entire team. The ideal candidate will be skilled in troubleshooting complex issues, identifying root causes, and offering guidance and escalation support to Level 2 engineers. The person should have the technical knowledge for understanding the impact of the issues or of the proposed changes to the security posture of an organization. At TeKnowledge , your work makes an impact from day one. We partner with organizations to deliver AI-First Expert Technology Services that drive meaningful impact in AI, Customer Experience, and Cybersecurity. We turn complexity into clarity and potential into progressing a place where people lead and tech empowers. You will be part of a diverse and inclusive team where trust, teamwork, and shared success fuel everything we do. We push boundaries, using advanced technologies to solve complex challenges for clients around the world. Here, your work drives real change, and your ideas help shape the future of technology. We invest in you with top-tier training, mentorship, and career development ensuring you stay ahead in an ever-evolving world. Why you will enjoy it here: Be Part of Something Big A growing company where your contributions matter. Make an Immediate Impact Support groundbreaking technologies with real-world results. Work on Cutting-Edge Tech AI, cybersecurity, and next-gen digital solutions. Thrive in an Inclusive Team A culture built on trust, collaboration, and respect. We Care – Integrity, empathy, and purpose guide every decision. We’re looking for innovators, problem-solvers, and experts ready to drive change and grow with us. We Are TeKnowledge. Where People Lead and Tech Empowers. Responsibilities: Fulfil the role of trusted advisor to the company’s customers Troubleshoot a wide array of technical issues within complex customer environments, apply broad concepts and theories to achieve innovative and effective solutions to complex problems Provide a leadership role for the work group through knowledge in your area of specialization, determine work priorities based on general direction from managers Determine methods and procedures on new assignments; determine your own priorities, both tactical and strategic; consult with management on long-range goals Own your work and the complete customer experience, drive successful outcomes Demonstrate accountability and sense of urgency based on customer needs Frequent, empathetic and qualitative communication with all stakeholders (internal and external) Drive to achieve the timely resolution of cases and contribute to customer retention, renewal and adoption Effectively fulfil the associated tasks and attributions of your assigned roles and follow the approved company’s procedures Participation in ensuring regional weekend and holiday coverage Participate in regional and global projects Exhibit awareness, initiative, consistency and proactivity Constantly seek to improve and refine your customer service skills Qualifications: Bachelor’s degree and 8+ years of related experience, Master’s degree is a plus Experience in technical support and customer relationship management roles Knowledge and experience with Symantec Network Security: ISG Proxy, Web Isolation Cloud, Cloud Secure Web Gateway - Cloud SWG Cyber Security fundamentals knowledge. Recognized Cyber Security certifications are a plus: Security+, CySA+, CASP+, SSCP, CCSP, CISSP, CCNA, CCNP, etc. Experience working with enterprise grade cyber security products, such as Symantec Endpoint Security, is required Hands on experience across the following technologies: Active Directory, Domain Name System, DHCP, TCP/IP, Routing, Network Topologies, Windows OS (Client & Server), Virtualization Experience with the following technologies: HTTP and FTP protocols, HAR file analysis and TLS/SSL Working knowledge in any of the following technologies is a plus: Firewall, Proxy, Intrusion Detection/ Intrusion Prevention, PKI, Wireshark, Netmon, Memory Dump Analysis, Process Monitor/Process Explorer, Linux OS, Mac OS, SQL, Cloud and Hybrid environments, IIS, Apache Sponsored certifications (others may be sponsored on request): CompTIA Security+ CompTIA CySA+ Symantec Certified Specialist (various products) TeKnowledge is an equal opportunity employer, and we believe in celebrating – diversity, equity, and inclusion. We are committed to building an equitable environment by providing fair employment opportunities in our communities without regard to gender, ethnicity, socio-economic background, disability, marital and veteran status. Our employees join us in adopting, celebrating, and championing our drive towards building an equitable opportunity environment. We do not and will not ask you to send or share with us any sensitive personal data.
Posted 1 week ago
5.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Position Summary... Demonstrates up-to-date expertise and applies this to the development, execution, and improvement of action plans by providing expert advice and guidance to others in the application of information and best practices; supporting and aligning efforts to meet customer and business needs; and building commitment for perspectives and rationales. Provides and supports the implementation of business solutions by building relationships and partnerships with key stakeholders; identifying business needs; determining and carrying out necessary processes and practices; monitoring progress and results; recognizing and capitalizing on improvement opportunities; and adapting to competing demands, organizational changes, and new responsibilities. Models compliance with company policies and procedures and supports company mission, values, and standards of ethics and integrity by incorporating these into the development and implementation of business plans; using the Open Door Policy; and demonstrating and assisting others with how to apply these in executing business processes and practices. What you'll do... Job Summary You are a passionate front-end engineer who loves to code. You love to take ideas and build great products with JavaScript, HTML, and CSS. You know JavaScript is imperfect, but you embrace its functional side and genuinely enjoy coding with it. You might like to talk about obscure computer science topics, but really, you just want to write simple code and ship new products and features to customers (or improve existing ones). You have an eye for design and user experience. You care about more than just the code. You care about the customer experience and help our customers make better decisions while shopping. You love learning new things. You love researching new tech and driving forward with the implementation details. Your focus is on frontend JavaScript code, but you can dig in wherever needed. Node.js, GraphQL, NextJS, Nx, build tools, shell scripts, you name it. If you don't already know it, you're ready to learn it. You understand performance, A/B tests, web vitals, front end optimization and can write code to bring them to life too. You love helping others. You love sharing knowledge with the rest of your team, building shared tooling for other engineers, giving back to the open-source community, and directly helping customers. About The Team Imagine working in an environment where one line of code can make life easier for hundreds of millions of people and put a smile on their face. That’s what we do at Walmart Global Tech. We’re a team of 15,000+ software engineers, data scientists and service professionals within Walmart, the world’s largest retailer, delivering innovations that improve how our customers shop and empower our 2.2 million associates. To others, innovation looks like an app, service or some code, but Walmart has always been about people. People are why we innovate, and people power our innovations. Being human-led is our true disruption. What You’ll Do Walmart International is a diverse and fast-growing business unit, so you'll get experience on many different projects across the organization. That said, here are some things you'll do: Build reusable React components with modular CSS, manage data on the client with Redux, use react query, and GraphQL. Measure and resolve performance bottlenecks, using tools like Chrome DevTools, Lighthouse, WebPagetest, or custom tooling. Refactor or improve existing code. We constantly find ways to improve all of our JavaScript code and you are all aboard. Work closely with our product, design, and UX teams to create amazing and intuitive experiences that make it effortless to connect different apps together. Help put tools, processes, and documentation in place to improve our code quality. Demonstrate technical expertise in solving challenging programming and design problems Review code written by other team members or other teams. Ship to hundreds of thousands of users every day while having lots of autonomy in terms of code and feature ownership. Help out with our Node-based developer platform. Share what you know and learn either one-on-one or with lightning talks to the group. Work boldly with a sense of urgency; embrace mistakes, learn from them, and drive the team toward success What You’ll Bring 5+ years of experience in building responsive web applications using modern front-end JavaScript technologies like React, Angular, Vue, etc. Thorough understanding of React, Node.JS and its core principles Experience in creating and/or consuming RESTful web services Excellent communication skills: Demonstrated ability to explain complex technical issues to both technical and non-technical audiences Expertise with unit testing & Test-Driven Development (TDD) BS/MS in computer science or equivalent work experience About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. That’s what we do at Walmart Global Tech. We’re a team of software engineers, data scientists, cybersecurity expert's and service professionals within the world’s leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Belonging We aim to create a culture where every associate feels valued for who they are, rooted in respect for the individual. Our goal is to foster a sense of belonging, to create opportunities for all our associates, customers and suppliers, and to be a Walmart for everyone. At Walmart, our vision is "everyone included." By fostering a workplace culture where everyone is—and feels—included, everyone wins. Our associates and customers reflect the makeup of all 19 countries where we operate. By making Walmart a welcoming place where all people feel like they belong, we’re able to engage associates, strengthen our business, improve our ability to serve customers, and support the communities where we operate. Equal Opportunity Employer Walmart, Inc., is an Equal Opportunities Employer – By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing unique styles, experiences, identities, ideas and opinions – while being inclusive of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 3years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 5 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, GISF, CISSP, CCSP, or GSEC, Master’s degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 1 year’s experience leading information security or cybersecurity projects Information Technology - CISCO Certification - Certification Primary Location... BLOCK- 1, PRESTIGE TECH PACIFIC PARK, SY NO. 38/1, OUTER RING ROAD KADUBEESANAHALLI, , India R-2250676
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough