Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Senior Associate Job Description & Summary The SOC Analyst –L3 will be part of existing Ares Global SOC team and will be responsible for day-to-day security operations by responding to and investigating security events of interest and recommending or taking corrective action by working with IT and non-IT team members. They will also respond to security incident and investigation requests in line with established Security Incident Response processes and procedures, within defined service level targets. This position requires shift work in a 24*7*365 environment. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Responsibilities Detailed Responsibilities/Duties Responsible for initial or secondary triage of security incidents identified by internal controls or external SOC partners Proficient in Threat Research and understands the latest malware trends, common attack TTPs, and the general threat landscape Proficient in Incident Response and automation workflows as it relates to Security Operations Demonstrates ability to author content using a variety of query languages, as well as scripting for event enrichment and investigation Detects, identifies, and responds to cyber events, threats, security risks and vulnerabilities in line with cyber security policies and procedures Conducts threat hunting and analysis using various toolsets based on intelligence gathered Responsible for documenting the incident life cycle, conducting handoffs’, escalation, and providing support during cyber incidents Create detailed Incident Reports and contribute to lessons learned in collaboration with the team Works with vulnerability management resources to uncover and prioritize potential risks and makes specific recommendations to reduce the threat landscape and minimize risk Works with leadership and the engineering team to improve and expand available toolsets when warranted are critical for the role Skills Required Qualifications Experience with one or more Security Information and Event Management (SIEM) solutions Understanding of common Attack methods and their SIEM signatures Experience in security monitoring, Incident Response (IR), security tools configuration and security remediation Strong knowledge and experience in Security Event Analysis capability Understanding of network protocols (TCP/IP stack, SSL/TLS, IPSEC, SMTP/IMAP, FTP, HTTP etc.) Understanding of Operating System, Web Server, database, and Security devices (firewall/NIDS/NIPS) logs and log formats Understanding of String Parsing and Regular Expressions Strong analytical and problem-solving skills High level of personal integrity, and the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity Ability to interact effectively at all levels with sensitivity to cultural diversity Ability to adapt as the external environment and organization evolves Passionate about Cybersecurity domain and has the inclination to learn current technologies / concepts / improvements Excellent in security incident handling, documentation, root cause analysis, troubleshooting and publishing post-Incident Reports. Strong experience with cyber security in the domains of cyber threat intelligence and analysis, security monitoring and incident response Experience of network and system vulnerabilities, malware, networking protocols and attack methods to exploit vulnerabilities Knowledge of cyber security frameworks and attack methodologies Experience working with EDRs, Proxies, and anti-virus Knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies Excellent verbal and written English communication skills Mandatory Skill Sets Tools Email Security: Proofpoint, Abnormal Security, M365 Defender SOAR: Palo Alto XSOAR SIEM: Splunk Firewall: Palo Alto EDR: Crowdstrike Other tools: Darktrace and M365 Defender Preferred Skill Sets SOC Years Of Experience Required 4-8 Years Education Qualification B.Tech/MCA/MBA with IT background/ Bachelor’s degree in Information Technology, Cybersecurity, Computer Science Professional Certifications like CEH, CCSE, CCNA, Security+, etc., will be plus SIEM certifications Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering, Master of Business Administration Degrees/Field Of Study Preferred Certifications (if blank, certifications not specified) Required Skills Microsoft Defender, Palo Alto Cortex XSOAR, Splunk Optional Skills SoCs Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date Show more Show less
Posted 2 months ago
0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (OT Security) – Technology Consulting – Senior GDS Advisory's Risk group is a unique, industry-focused business unit that provides a broad range of integrated services that leverage deep industry experience with strong functional capability and product knowledge. Risk practice team provides integrated advisory services to leading Fortune 500 Companies. The team provides Risk Assurance, Risk Transformation, Internal Audit, Cybersecurity, Financial Services Risk Management and Actuarial services that take an enterprise-wide view, so that risk mitigation and risk management strategies and processes are embedded in every part of the organization. Our services mitigate risk, reduce the cost of control and help create value. The opportunity The GDS Architecture Engineering and Emerging Technology (AEET) services help our clients tackle the many security challenges they face on a daily basis and develop effective solutions using people, processes and technology, while enabling better security and risk decisions, and reducing costs related to manging security risks. The AEET team is looking for individuals who will play a direct role in delivery of Operational Technology (OT) security engagements, development of proposals in this area, and develop OT security solutions. You will play a key role in supporting our clients to secure their IT/OT environments, either through advisory and/or implementation support. Your key responsibilities To qualify, candidates must have: Understanding of security-related operational processes in the OT-ICS environments Understanding of OT SOC/ OT Identity Access Management/ OT Pen testing/ Zero Trust on OT Understanding of technologies (typical assets, communication protocols, technical architectures) utilized by OT-ICS systems and networks Knowledge of cyber / information security concepts, risk and controls concepts Understanding of aspects of functional safety (SIS) Knowledge of TCP/IP, concepts of OSI layer and protocols, networking and security concepts Knowledge of the technical security solutions utilized within OT-ICS systems and networks Knowledge of OS (Windows / Linux) security, Database security Knowledge of IT infrastructure Knowledge of cyber threats and vulnerabilities related to platform and infrastructure is a plus Prior experience working alongside delivery leads and architects to Identify and manage risks is a plus Skills And Attributes For Success Completed technical higher education in the field of industrial automation, computer science, electronics or other relevant fields Certificates or education related to industrial automation / engineering etc. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP Knowledge of standards such as ISO 27001/2, ISO 22301, ISO 27018, NIST standards on Cyber Security, HITRUST, etc. is a plus Knowledge on tools like Nessus, BackTrack, NMAP, BurpSuite, etc. is a definite plus Knowledge on OT network monitoring solution such as Nozomi, Claroty, Armis, DarkTrace, Azure Defender. To qualify for the role, you must have 5+ years of experience in the Cyber Security and OT Security Domain Minimum B. Tech. or equivalent educational qualification ISA/IEC 62443 Fundamental* SCADA Fundamentals CompTIA Network+ CompTIA Security+ What We Look For A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 months ago
0 years
0 Lacs
Gurugram, Haryana, India
On-site
Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Senior Associate Job Description & Summary The SOC Analyst –L3 will be part of existing Ares Global SOC team and will be responsible for day-to-day security operations by responding to and investigating security events of interest and recommending or taking corrective action by working with IT and non-IT team members. They will also respond to security incident and investigation requests in line with established Security Incident Response processes and procedures, within defined service level targets. This position requires shift work in a 24*7*365 environment. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a highly skilled and experienced Cybersecurity/Risk Consulting Senior Associate to join our Risk Consulting team. As a Cybersecurity Senior Associate, you will be responsible for leading and managing a team of consultants to deliver high-quality cybersecurity and risk management services to our clients. Responsibilities Key Responsibilities: Good interpersonal skills (written and oral communication) and ability to articulate complex issues Ability to communicate technical information clearly and concisely, commensurate with the audience Conceptual thinking and communication skills — the ability to conceptualize complex business and technical requirements into comprehensible models and templates. Good communicator (written and verbal) and listener. Must be a team player and motivated self-starter with ability to work independently with limited supervision. Must be assertive, methodical and detail oriented Technical Experience Experience in Web and Mobile Application Security Testing, Vulnerability Assessment and Penetration testing Analyze scan reports and suggest remediation / mitigation plan for security vulnerabilities Should be aware of tools like Qualys, HP Fortify, IBM Appscan, Burpsuite, Kali Linux suite of tools Expertise in mobile apps reverse engineering and in-depth knowledge of Android and iOS ecosystems. Knowledge of industry standard tools for mobile pentest. Thorough understanding of OWASP Top 10 vulnerabilities and their mitigations. Knowledge of Network Security technology in areas of Firewall, IPS, VPN, Gateway security solutions (proxy, web filtering) Conduct penetration test and launch exploits using Nessus, Metaspoilt, kali linux penetration testing distribution tools sets Conduct Vulnerability Assessments of Network Devices using various open source and commercial tools Map out a network, discover ports and services running on the different exposed network and security devices Research and maintain proficiency in computer network exploitation, tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption. In-depth understanding on Common Vulnerability Exposure (CVE)/ CERT advisory database. Broad background of networks, operating systems (Window, Unix, Linux), firewalls and security engineering concepts. Knowledge of scripting languages (Perl, Python, Shell etc) will be added advantage Knowledge of Open-Source Security Testing Methodology Manual (OSSTMM) Mandatory Skill Sets CEH, ECSA, LPT (any one) Preferred Skill Sets OSCP, OSWE Years Of Experience Required 2-10 Years Education Qualification B.Tech ee in Information Technology, Cybersecurity, Computer Science Professional Certifications like CEH, CCSE, CCNA, Security+, etc., will be plus SIEM certifications Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering, Master of Business Administration Degrees/Field Of Study Preferred Certifications (if blank, certifications not specified) Required Skills Microsoft Defender, Palo Alto Cortex XSOAR, Splunk Optional Skills SoCs Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date Show more Show less
Posted 2 months ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
About Us We are a global climate technologies company engineered for sustainability. We create sustainable and efficient residential, commercial and industrial spaces through HVACR technologies. We protect temperature-sensitive goods throughout the cold chain. And we bring comfort to people globally. Best-in-class engineering, design and manufacturing combined with category-leading brands in compression, controls, software and monitoring solutions result in next-generation climate technology that is built for the needs of the world ahead. Whether you are a professional looking for a career change, an undergraduate student exploring your first opportunity, or recent graduate with an advanced degree, we have opportunities that will allow you to innovate, be challenged and make an impact. Join our team and start your journey today! Principal Functional Responsibilities Develop, implement, and maintain cybersecurity policies, standards, and procedures in alignment with industry frameworks and regulatory requirements. Conduct risk assessments, security control evaluations, and gap analyses to identify and mitigate risks. Support internal and external audits, ensuring compliance with frameworks such as NIST CSF, ISO 27001, CIS Controls, SOC 2, and regulatory obligations. Assist in the management of third-party risk assessments and vendor security evaluations. Track, monitor, and report on cybersecurity risks, controls, and compliance metrics. Work with cross-functional teams to ensure security controls are embedded in business processes and IT operations. Develop and maintain risk registers, compliance documentation, and audit evidence repositories. Provide cybersecurity awareness training and guidance to employees on security best practices and compliance requirements. Stay current with evolving cybersecurity threats, regulatory changes, and best practices to enhance the organization's security and compliance posture. Basic Requirements Bachelor’s degree in computer science, Information Systems, or related degree plus three (3+) years of experience or equivalent combination of education and experience. Strong knowledge of security and risk management frameworks like NIST CSF, CIS Critical Security Controls, ISO 27001, NIST 800-53, FAIR, and CIS Must possess excellent oral and written communication skills and the ability to communicate in technical and business terms. Additionally, must be comfortable developing presentations and delivering them to senior management. 3+ years of experience in cybersecurity, governance, risk, and compliance. Experience conducting risk assessments, control evaluations, and compliance audits. Strong knowledge of cybersecurity best practices, policies, and procedures. Excellent analytical, problem-solving, and communication skills. Ability to work independently and collaboratively in a dynamic environment. Professional certifications in IT and Cybersecurity a plus (e.g., Security+, GCRP, CGRC etc.). Preferred Requirements Bachelor’s degree in computer science, Information Systems, or related degree plus eight (3-4) years of experience or equivalent combination of education and experience 3-4 years of experience in Cybersecurity roles (i.e., incident response, security operations, application security, etc.) Ability to simultaneously handle multiple projects and adjust to changing priorities while multitasking effectively. Self-starter, strong initiative, critical thinker, self-directed with a proven track record to collaborate and inspire change. Experience designing and implementing cybersecurity reporting and metrics (i.e., KPI/KRI development) Fluent in English; additional languages are a plus. Competencies Tech Savvy: Anticipating and adopting innovations in business-building digital and technology applications. Optimizes Work Processes: Knowing the most effective and efficient processes to get things done, focusing on continuous improvement. Plans & Aligns: Planning and prioritizing work to meet commitments aligned with the interpersonal goals. Business Insight: Applying knowledge of business and the marketplace to advance the organization’s goals. Communicates Effectively: Developing and delivering multi-mode communications that clearly understand the different audiences' unique needs. Our Commitment to Our People Across the globe, we are united by a singular Purpose: Sustainability is no small ambition. That’s why everything we do is geared toward a sustainable future—for our generation and all those to come. Through groundbreaking innovations, HVACR technology and cold chain solutions, we are reducing carbon emissions and improving energy efficiency in spaces of all sizes, from residential to commercial to industrial. Our employees are our greatest strength. We believe that our culture of passion, openness, and collaboration empowers us to work toward the same goal - to make the world a better place. We invest in the end-to-end development of our people, beginning at onboarding and through senior leadership, so they can thrive personally and professionally. Flexible and competitive benefits plans offer the right options to meet your individual/family needs. We provide employees with flexible time off plans, including paid parental leave (maternal and paternal), vacation and holiday leave. Together, we have the opportunity – and the power – to continue to revolutionize the technology behind air conditioning, heating and refrigeration, and cultivate a better future. Learn more about us and how you can join our team! Our Commitment to Diversity, Equity & Inclusion At Copeland, we believe having a diverse, equitable and inclusive environment is critical to our success. We are committed to creating a culture where every employee feels welcomed, heard, respected, and valued for their experiences, ideas, perspectives and expertise. Ultimately, our diverse and inclusive culture is the key to driving industry-leading innovation, better serving our customers and making a positive impact in the communities where we live. Equal Opportunity Employer Copeland is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, age, marital status, political affiliation, sexual orientation, gender identity, genetic information, disability or protected veteran status. We are committed to providing a workplace free of any discrimination or harassment. Show more Show less
Posted 2 months ago
0 - 3 years
0 - 0 Lacs
Saibaba Colony, Coimbatore, Tamil Nadu
Work from Office
Job Title: Cyber Security Engineer Location: Coimbatore Department: IT Security Reports To: Solution Specialist/ Project Director Job Overview: We are seeking a motivated and detail-oriented Junior Cyber Security Analyst to join our IT Security team. The successful candidate will assist in protecting our organization's information systems and data from cyber threats. This role provides an excellent opportunity for professional growth in the field of cyber security. Key Roles & Responsibilities: Monitoring & Analysis: Assist in monitoring network traffic, security alerts, and system logs for suspicious activities. Analyze and respond to security incidents under the guidance of senior staff. Incident Response: Support the investigation and resolution of security incidents. Document findings and actions taken in accordance with established procedures. Vulnerability Management: Help identify and assess security vulnerabilities. Assist in the application of patches and updates to mitigate risks. Threat Intelligence: Stay updated on the latest cyber threats and vulnerabilities. Contribute to threat intelligence efforts by researching and analyzing emerging threats. Security Tools: Utilize various security tools and technologies (e.g., firewalls, intrusion detection systems, antivirus software) to safeguard information systems. Compliance & Documentation: Assist in ensuring compliance with security policies, procedures, and regulations. Help maintain accurate and up-to-date documentation. User Support: Provide support to end-users regarding security-related issues and best practices. Assist with security awareness training and education. Qualifications: Education: Bachelor’s degree in Cyber Security, Information Technology, Computer Science, or a related field, or equivalent work experience. Experience: 2-4 years of experience in a cyber security or IT role, with a strong understanding of basic security concepts and technologies. Technical Skills: Familiarity with security tools and technologies, such as firewalls, IDS/IPS, antivirus software, and VPNs. Basic knowledge of networking and operating systems (Windows, Linux). Certifications: Relevant certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), or similar are a plus but not required. Soft Skills: Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. Ability to work effectively both independently and as part of a team. Attention to Detail: High attention to detail and ability to handle multiple tasks simultaneously. Preferred Skills: Experience with scripting or programming languages (e.g., Python, PowerShell) is a plus. Knowledge of regulatory frameworks and standards (e.g., GDPR, HIPAA) is advantageous. Must have 2W/4W Driving License Hindi Language both written & speaking is a Must Why Join Us: Professional Development: Opportunities for growth and advancement in the field of cyber security. Dynamic Environment: Work in a fast-paced, collaborative environment with a focus on innovation. Competitive Salary: Competitive compensation package and benefits. Supportive Team: Join a supportive and experienced team dedicated to professional development and success. How to Apply: Interested candidates should submit their resume and a cover letter outlining their qualifications and interest in the position to [email address] with the subject line " Cyber Security Analyst Application ." Job Types: Full-time, Permanent Pay: ₹45,000.00 - ₹65,000.00 per month Benefits: Commuter assistance Health insurance Schedule: Day shift Supplemental Pay: Yearly bonus Ability to commute/relocate: Saibaba Colony, Coimbatore, Tamil Nadu: Reliably commute or planning to relocate before starting work (Preferred) Experience: total work: 3 years (Preferred) Language: Hindi (Required) Work Location: In person
Posted 2 months ago
0 - 2 years
4 - 7 Lacs
Bengaluru, Karnataka
Remote
About us ThoughtVerve provides tailored software & technology solutions to clients across the globe for decisive outcomes. Headquartered in Bangalore, we are committed to long-term partnerships with our clients pivoted around sustainable, top-of-industry practices. We commit to be with our clients every step of the way starting from conception through their evolution. Responsibilities Provide remote technical support and solutions across multiple companies, networks and domains to end users. Resolve applications, networking, PC, and peripheral issues. Responsible for hardware/software setup and configuration. This includes imaging laptops. Microsoft Active Directory Hybrid and 365 management experience required. (Setting up new users, email accounts, distribution groups and OUs.) Assist with maintaining and troubleshooting Windows Server 2008/2012/2016 and Microsoft Remote Desktop Environment. Purchase, track and maintain inventory of IT equipment Administration of voice and data communications Maintain support documentation, including technical configuration information and process flows. Resolve issues by working with other System Support Admin team members and cross-departmental teams, application developers, vendors, network and database administrators. Solve moderately complex problem situations and participate in the identification of opportunities for improvement to processes, procedures, or tools. Requirements: 2+ years working in a Laptop / Desktop Support Admin role 2+ years of Microsoft 365 Management experience 1-2 years working with Active Directory (AD) Hybrid 1-2 years year of Microsoft Entra ID and Intune experience Should have setup Printers, tablets, iPhone and Android phones 1-2 years of Microsoft Entra ID Conditional Access experience Ability to diagnose and resolve technical issues remotely and on-premises Working knowledge of troubleshooting basic to complex hardware issues Working knowledge of troubleshooting basic network (bandwidth/connectivity) issues Excellent customer interfacing skills is a must Should possess good communication and inter-personal skills Qualifications & Skills Bachelor’s degree in computer science, Information Technology or a related field. Certification in Network+, Security+, MCSE, MCITP, MCTS is an added advantage. Entra ID Administrator Associate certified PowerShell experience is a huge plus Knowledge of firewalls is desirable Excellent analytical and problem-solving skills. Strong communication and collaboration skills, with the ability to work effectively in a team environment. Ability to learn and adapt to new and evolving technologies. Ability to work independently and in a team. Ability to effectively prioritize and execute tasks in a fast pace and ever-changing environment. Flexible with working across time zones. Must be flexible - Willing to work on call after-hours rotation. Location: Onsite Bangalore Job Type: Full-time Pay: ₹400,000.00 - ₹750,000.00 per year Shift: Night shift Work Days: Monday to Friday Language: English (Required) Work Location: In person Application Deadline: 08/03/2025 Expected Start Date: 30/05/2025
Posted 2 months ago
0 - 3 years
0 - 0 Lacs
Hebbal Kempapura, Bengaluru, Karnataka
Work from Office
Designation: IT ADMIN Location: Kirloskar business park Hebbal, Bangalore (Onsite) Working Days: Mon - Friday Timings: 10 AM to 7 PM Notice Period: Immediate Joiner Gender preference: Male Education qualification: Graduation Mandatory Experience: Min 3 years Language preference: English and Hindi, Kannada (Mandatory) Key Responsibilities: Job Summary: We are seeking a skilled and motivated IT Administrator to join our team . The IT Admin will be responsible for managing, supporting, and troubleshooting the organization’s IT infrastructure, ensuring that systems and networks run efficiently and securely. The ideal candidate will have strong technical expertise, problem-solving skills, and a commitment to maintaining IT operations and user support. Key Responsibilities: 1.Network and System Management: Configure, maintain, and monitor local area networks (LAN), wide area networks (WAN), and other network infrastructure. Ensure the optimal performance of servers, workstations, printers, and other network devices. Troubleshoot network issues and ensure that connectivity is stable across all departments. 2. Security and Data Protection: Implement and monitor cybersecurity measures to safeguard company data and IT assets. Regularly update firewalls, antivirus software, and intrusion detection/prevention systems. Conduct regular security audits and risk assessments. Manage access controls and user permissions for systems and applications. 3. User Support and Troubleshooting: Provide technical support to staff for hardware, software, and network-related issues. Set up and configure new devices and systems for employees, including desktops, laptops, and mobile devices. Troubleshoot and resolve IT issues promptly, providing excellent customer service. 4. Software and System Maintenance: Install, update, and patch operating systems, applications, and software tools. Manage software licensing and ensure compliance with legal and organizational standards., Ensure that data backups are regularly conducted and can be restored in case of an emergency. 5. IT Documentation and Reporting: Maintain accurate records of IT assets, licenses, network configurations, and user support requests. Generate periodic reports on system performance, security status, and issues resolved. 6. Collaboration and Planning: Work closely with other IT team members, management, and departments to address technology needs. Assist in planning for future IT infrastructure expansions and upgrades. Qualifications: Education: Bachelor’s degree in Computer Science, Information Technology, or related field, or equivalent experience. Experience: Minimum of 3 years of experience in IT administration or a similar role. Technical Skills: Proficiency in Windows, Linux, and/or macOS server administration. Knowledge of networking protocols (TCP/IP, DNS, DHCP, VPN, etc.). Experience with cloud services (e.g., AWS, Azure, Google Cloud) and virtualization (e.g., VMware, Hyper-V). Familiarity with database management systems (e.g., SQL, MySQL). Strong understanding of security practices, including firewalls, antivirus, and backup solutions. Certifications (optional but preferred): CompTIA A+, Network+, or Security+. Microsoft Certified: Azure Administrator Associate or similar certifications. Cisco Certified Network Associate (CCNA). Personal Attributes: Strong problem-solving and analytical skills. Excellent communication and interpersonal skills. Ability to manage time effectively and prioritize tasks in a fast-paced environment. Attention to detail and a proactive approach to IT management. Job Type: Full-time Pay: ₹9,130.98 - ₹45,866.58 per month Benefits: Paid sick time Provident Fund Schedule: Day shift Work Location: In person Speak with the employer +91 9535378865
Posted 2 months ago
0 - 2 years
0 - 0 Lacs
Mira Road, Thane, Maharashtra
Work from Office
Job Summary: We are seeking a detail-oriented and technically proficient Security Surveillance System Technician to join our team. The ideal candidate will be responsible for the installation, maintenance, and repair of electronic security systems, ensuring optimal functionality and compliance with safety standards. Key Responsibilities: Installation & Configuration : Install and configure CCTV systems, access control systems, alarm systems, and related hardware. Conduct site surveys to determine optimal equipment placement. Lay and terminate cables, wiring, and data points. Maintenance & Troubleshooting : Perform regular inspections and preventive maintenance on security systems. Diagnose and repair system faults, including hardware and software issues. Respond promptly to service calls and emergency breakdowns. System Integration & Testing : Integrate security systems with existing IT infrastructure. Test and commission installed systems to ensure proper functionality. Document installation, testing, and maintenance activities. Client Support & Training : Provide technical support and training to end-users on system operations. Address client inquiries and provide solutions to technical issues. Qualifications: High school diploma or equivalent; a diploma or degree in Electronics, Electrical Engineering, or a related field is preferred. Minimum of 2 years of experience in installing and maintaining security surveillance systems. Certifications such as CompTIA Security+, CCNA, or equivalent are advantageous. Valid driver's license and willingness to travel to client sites as required. Required Skills: Proficiency in installing and configuring CCTV, access control, and alarm systems. Strong understanding of networking principles and IP-based systems. Ability to read and interpret technical documents, schematics, and blueprints. Excellent problem-solving and troubleshooting skills. Effective communication and customer service abilities. Physical capability to handle equipment and work in various environments, including confined spaces and at heights. Work Conditions: Full-time position with potential for overtime. Work may involve exposure to varying weather conditions and requires adherence to safety protocols. Flexibility to work on weekends and public holidays as needed. Benefits: Competitive salary based on experience and qualifications. Opportunities for professional development and certification. Health insurance and other standard employment benefits. Job Types: Full-time, Part-time, Permanent, Fresher, Internship, Freelance Contract length: 12 months Pay: ₹20,000.00 - ₹35,000.00 per month Expected hours: 9 per week Benefits: Commuter assistance Health insurance Schedule: Day shift Monday to Friday Supplemental Pay: Commission pay Overtime pay Performance bonus Yearly bonus Work Location: In person
Posted 2 months ago
1 - 2 years
11 - 15 Lacs
Bengaluru
Work from Office
Education: Bachelor s degree in Cybersecurity, Information Technology, Computer Science, or a related field. Experience: 1-2 years of experience in Security operation center (SOC), or a related role. Experience in CrowdStrike SIEM and EDR preferred. Analytical Skills: Ability to analyze and interpret security data to identify potential threats. Communication Skills: Strong verbal and written communication skills for documenting incidents and collaborating with team members. Attention to Detail: High level of attention to detail to accurately monitor and assess security alerts. Certifications (Preferred): Certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or similar. Typically works in a security operations center. May require shift work to provide 24/7 monitoring. . Analyze and investigate security alerts to determine their validity and severity. Perform initial triage and escalation of security incidents to appropriate teams or individuals. Follow established procedures for incident response, including containment, eradication, and recovery. Document incident details, actions taken, and recommendations for future improvements. Collaborate with other MDR team members and cross-functional teams to investigate and resolve security incidents. Assist in the development and maintenance of MDR procedures, processes, and documentation. Stay current with emerging threats, vulnerabilities, and security technologies.
Posted 2 months ago
2 - 5 years
2 - 6 Lacs
Hyderabad
Work from Office
SOC T1 Analyst What you will do Let’s do this. Let’s change the world. In this vital role you will responsible for the initial response to security events and incidents within a 24/7 Cybersecurity Operations Center (CSOC). This role involves following established procedures to investigate security events, providing feedback to improve processes, and assisting in the incident response lifecycle. Additionally, the associate will participate in knowledge-sharing sessions and correlate security alerts across platforms. Roles & Responsibilities: Follow established procedures to triage, investigate and respond to security events and incidents. Provide feedback to senior analysts to improve, review, and optimize existing procedures and documentation. Correlate security alerts from various platforms based on common elements. Participate in and lead CSOC Tier 1 knowledge-sharing and learning sessions. Assist incident responders in coordinating the response, containment, eradication, recovery, and lessons learned phases of the incident response lifecycle. What we expect of you We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Bachelor’s degree with 1 to 3 yeras of experience in Security Operations or related field OR Diploma with 4 to 7 year of experience in Security Operations or related field Solid understanding of security technologies and their core functionality Experience in analyzing cybersecurity threats with up-to-date knowledge of attack vectors and the cyber threat landscape. Ability to prioritize tasks effectively and solve problems efficiently in a diverse, global team environment. Good knowledge of Windows and/or Linux systems. Preferred Qualifications: Familiarity with CSOC operations and incident response procedures. Experience with security alert correlation across different platforms. Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) MTA Security Fundamentals (preferred) Soft Skills: Strong communication and collaboration skills, especially when working with global teams. Ability to prioritize and manage tasks in high-pressure situations. Critical thinking and problem-solving abilities in cybersecurity contexts. A commitment to continuous learning and knowledge sharing. Work Hours: This position requires you to work a later shift and may be assigned a second or third shift schedule. Candidates must be willing and able to work during evening or night shifts, as required. Potential Shifts (subject to change based on business requirements)Second Shift2:00pm – 10:00pm IST; Third Shift10:00 pm – 7:00 am IST. What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Posted 2 months ago
0 years
0 Lacs
Bengaluru, Karnataka
Work from Office
Job Description: Detailed knowledge and working experience with: Design, Implementation & Deployment of CyberArk on Premise and SaaS Environments Knowledge with Preparing and understanding HLD & LLD Assessing and troubleshooting CyberArk and other PAM solution installations Assisting in the daily operations of CyberArk and other PAM solutions Execution of daily tasks, support tickets, and provisioning tasks as assigned or routed via the ticketing system Applies knowledge, skills and abilities to implement a process or procedure, timely and professionally. Responsible for Privileged User account administration of various Windows and UNIX accounts using CyberArk components. Integrating various platforms with CyberArk, such as different LDAP providers, Windows servers, UNIX servers, Databases and networking Devices. Creating and Managing Safes, Platforms and Owners. Central Policy Manager (CPM) policies management or redistribution. Perform health check monitoring on all CyberArk severs to ensure consistent availability of the system to end-user. Ability to document installation procedures, Standard Operating Procedures (SOP), etc. Extensive experience with digital password vaulting solutions Experience in programming (Perl, Python, PowerShell, Administrative scripting) a plus Basic understanding of high-availability (HA) and failover implementations for network infrastructure and server systems Providing an overview of CyberArk and equivalent Privileged Access Management solution capabilities CPM Plugins and PSM connector Build and Customization skills Communicates project status and escalates issues as needed. Execution of project tasks during engagement activities Works on special projects as assigned. Education (degree) and professional experience required: University Degree in Computer Science, Computer Engineering, Electronics/ Electrical Engineering or equivalent Other requirements: Fluent in English language CyberArk Certifications (Defender/Sentry) CDE Certification (Mandatory) CPC certification preferable Preferred Security Certifications (CISSP, CompTIA Security+). Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .
Posted 2 months ago
0 - 8 years
0 Lacs
Bengaluru, Karnataka
Work from Office
We help the world run better At SAP, we enable you to bring out your best. Our company culture is focused on collaboration and a shared passion to help the world run better. How? We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences, values flexibility, and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative, caring team environment with a strong focus on learning and development, recognition for your individual contributions, and a variety of benefit options for you to choose from. Summary An SAP Global Cyber Incident Response and Recovery Investigator is a crucial front-line defender and core part of SAP’s digital enterprise. Our Cyber Incident Investigators are responsible for triaging security events detected by security monitoring operations tools, analyzing all available data to determine severity and priority, doing an initial assessment whether a cyber-attack is occurring. Then the Investigator will escalate to a Global Security Operations Investigator in scoping the extent of a suspected attack, coordinating efforts to contain attacks, and supporting forensic investigation to determine the details around the attack. What you'll do Our Global Cyber Security Incident Response and Recovery Investigator are our first line of response for security event and incidents with a global scope. They are responsible for triaging security alerts detected by Enterprise Detection and SIEM, analyzing available data to determine scope, severity, and priority to determine follow on actions, which could include escalation to a GSO Investigator. In escalation cases, they then work in a supportive capacity to further validate if a cyber-attack is occurring, scoping the extent of a suspected attack, coordinating efforts to contain attacks, supporting forensic investigations to determine the details around an attack, and providing guidance on remediation actions. In this role, you will not only conduct an initial assessment of the event, but also help scope and determine root cause analysis, support development of attack remediation strategies and coordinate the communication and handling of escalations of security activities. This role also triages operational response processes like those intervening in phishing campaigns. You will also assist in the review and updating of incident handling processes, standard operating procedures, playbooks and runbooks. You will work with Detection and SIEM teams to make improvements to detection and alerting mechanisms and support forensic investigations to determine incident details and provide supporting evidence. What you bring You should have demonstrated experience in cyber-attack analysis and of working in a similar 24/7 environments managing cases with enterprise SIEM or Incident Management systems. Previous experience of supporting multi-function, cross-organizational teams is also highly desirable. We are looking for analytical, critical thinkers, who have an eye for detail and are solution orientated. You should be quick to learn and adapt and operate in a dynamic environment. You typically will have most of the following technical skills and experience: 7 to 8 years’ of experience in a similar incident Investigator role or equivalent combination of education, certifications, and trainings Security certification (e.g. Security+, GCIA, GCIH, CISSP) Knowledge APT actors; their tools, techniques, and procedures (TTPs) Knowledge of TTP methods and frameworks Knowledge of TCP/IP communications & knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB Solid knowledge of one or more: Windows/AD file system, registry functions and memory artifacts Unix/Linux file systems and memory artifacts Mac file systems and memory artifacts Database, web application, cloud, or mobile device cyber incident response principals and techniques Cybersecurity automation Web servers and web applications. SIEM Security tools: IPS, Web proxy, Email proxy, pDNS, Deception, EDR etc.... Experience with one or more scripting languages (Powershell, Python, Bash, etc.) Experience with integration of threat hunting and cyber threat intelligence into the incident response process Experience with information security compliance audit frameworks and requirements e.g. ISO, FISMA, FedRAMP, SOC, SOX, PCI, GDPR and Data Privacy Bring out your best SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, you can bring out your best. We win with inclusion SAP’s culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone – regardless of background – feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world. SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team: Careers@sap.com For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program, according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training. EOE AA M/F/Vet/Disability: Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, age, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability. Successful candidates might be required to undergo a background verification with an external vendor. Requisition ID: 411769 | Work Area: Information Technology | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid.
Posted 2 months ago
2 years
0 - 0 Lacs
Saibaba Colony, Coimbatore, Tamil Nadu
Work from Office
Key Responsibilities Design and deliver cybersecurity training programs (online or in-person) Create course materials, labs, and assessments aligned with industry standards Train students on cybersecurity fundamentals, ethical hacking, SOC analysis, SIEM tools, network security, and more Stay current with the latest cybersecurity trends, tools, and threats Support students during practical sessions, helping troubleshoot and explain real-world scenarios Evaluate student progress and provide constructive feedback Customize training content for different audiences (entry-level to advanced) Maintain records of attendance, assessments, and certifications Required Skills & Qualifications Bachelor’s degree in Computer Science, IT, Cybersecurity, or related field (or equivalent experience) 2+ years of hands-on cybersecurity experience (SOC, penetration testing, incident response, etc.) Experience in teaching, training, mentoring, or technical presentations Strong knowledge of: Network security concepts Ethical hacking tools (e.g., Kali Linux, Metasploit) Security frameworks (e.g., NIST, MITRE ATT&CK) SIEM tools (e.g., Splunk, QRadar) Excellent communication and presentation skills Industry certifications preferred: CompTIA Security+, CEH, CISSP, CISA, or similar Job Types: Full-time, Part-time Pay: ₹15,000.00 - ₹20,000.00 per month Schedule: Evening shift Monday to Friday Morning shift Rotational shift Weekend availability Work Location: In person
Posted 2 months ago
0 - 1 years
0 - 0 Lacs
Calicut, Kerala
Work from Office
We are seeking a passionate and knowledgeable Cybersecurity Faculty member to join our educational team. The ideal candidate will have a strong background in cybersecurity and computer networking, a commitment to student success, and the ability to engage learners in a dynamic environment. This role involves teaching courses, mentoring students, and contributing to the development of our cybersecurity curriculum. Key Responsibilities: Teach courses in cybersecurity and computer networking, including topics such as network security, ethical hacking, and cybersecurity fundamentals. Develop and update course materials, including lesson plans, assignments, and assessments. Mentor students and provide academic and career guidance. Conduct workshops and seminars on relevant cybersecurity topics at our institute and other educational institutions. Represent our institute at industry events and conferences. Create and deliver engaging video classes for social media to promote cybersecurity education and awareness. Stay current with industry trends and integrate them into the curriculum. Collaborate with industry partners and engage in community outreach. Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Computer Networking, Information Technology, or a related field. Relevant industry certifications (e.g., CISSP, CEH, CompTIA Security+) preferred. Experience teaching in a vocational or training environment is highly desirable. Strong knowledge of cybersecurity concepts and practices, with practical experience in the field. Excellent communication, interpersonal, and organizational skills Candidates who can communicate effectively in Malayalam is preferred. Benefits: Competitive salary and benefits package. Opportunities for professional development and continuing education. Supportive and collaborative work environment focused on student success. Competitive salary Share your CV to +91 9645200014 Job Types: Full-time, Fresher Pay: ₹10,000.00 - ₹17,000.00 per month Schedule: Day shift Fixed shift Morning shift Supplemental Pay: Commission pay Education: Diploma (Required) Experience: Cybersecurity: 1 year (Preferred) Language: Malayalam (Required) Work Location: In person Expected Start Date: 25/05/2025
Posted 2 months ago
3 - 4 years
0 Lacs
Kochi, Kerala
Remote
Role Overview: We are looking for a knowledgeable and driven Infrastructure Security Trainer to join our team in Kochi. The trainer will be responsible for equipping learners with the skills and knowledge required to secure enterprise infrastructure, including networks, systems, and cloud environments. You will play a key role in delivering hands-on training programs and ensuring best practices are communicated effectively to internal staff or trainees. Key Responsibilities: Develop and deliver training modules on: Network security fundamentals and advanced topics Secure configuration of firewalls, routers, switches, and servers Endpoint protection and system hardening Secure architecture design for on-prem and hybrid environments Cloud infrastructure security (AWS, Azure, GCP basics) Incident detection, response, and mitigation strategies Create engaging course content, lab exercises, and certification prep materials. Stay current with evolving infrastructure threats, vulnerabilities, and mitigation techniques. Customize training sessions for technical teams, IT admins, or freshers based on skill levels. Evaluate and improve the effectiveness of training through feedback and assessments. Collaborate with SOC, DevOps, and IT teams to align training with real-time scenarios and tools. Required Qualifications: Bachelor’s degree in Information Technology, Cybersecurity, or a related field. Minimum 3 years of experience in infrastructure security or IT system administration with a strong security focus. Solid understanding of networking concepts, firewalls, VPNs, IDS/IPS, and access control. Experience working with tools and platforms like Windows/Linux hardening, VMware, Active Directory, Wireshark, etc. Excellent training, communication, and public speaking skills. Preferred Qualifications: Certifications like CompTIA Security+, CCNA Security, Microsoft AZ-500, or equivalent. Hands-on experience in securing cloud infrastructure (AWS, Azure). Familiarity with compliance frameworks (ISO 27001, NIST, CIS Benchmarks). Work Environment: Location: Kochi (on-site) Schedule: Monday to Friday, 9:00 AM to 6:00 PM Job Type: Full-time Schedule: Day shift Monday to Friday Experience: total work: 4 years (Required) Language: English (Required) Work Location: Hybrid remote in Kochi, Ernakulam, Kerala Expected Start Date: 13/05/2025
Posted 2 months ago
0 - 4 years
0 Lacs
Kochi, Kerala
Remote
About the Role: We are seeking an experienced and passionate Threat & Vulnerability Trainer to join our team in Kochi. The ideal candidate will be responsible for delivering comprehensive training programs focused on cybersecurity threats, vulnerability assessments, and remediation strategies. You will work closely with technical teams and trainees to upskill professionals and ensure readiness to tackle evolving cyber threats. Key Responsibilities: Design and deliver in-depth training sessions on cybersecurity topics including: Threat intelligence Vulnerability scanning and management Common attack vectors (phishing, malware, zero-day exploits, etc.) Security frameworks (NIST, ISO 27001, OWASP Top 10) Remediation techniques and best practices Develop customized training materials, hands-on labs, and assessments. Conduct workshops, webinars, and classroom sessions for internal and external learners. Continuously update training content to align with industry trends and threat landscapes. Assess the effectiveness of training sessions through feedback, tests, and practical evaluations. Collaborate with SMEs, SOC teams, and IT departments to understand training needs and integrate real-world scenarios into modules. Required Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field. 3+ years of experience in cybersecurity, with a focus on threat and vulnerability management. Proven experience in delivering technical training or mentoring. Familiarity with tools like Nessus, Qualys, Rapid7, Metasploit, Burp Suite, etc. Strong knowledge of CVEs, threat modeling, penetration testing basics, and SIEM concepts. Excellent communication, presentation, and facilitation skills. Preferred Qualifications: Certifications such as CEH, CompTIA Security+, OSCP, CISSP, or similar. Experience working in a SOC or red/blue team environment. Prior experience with learning management systems (LMS) or e-learning content creation. Work Location & Schedule: Location: Kochi (mandatory on-site presence) Work Hours: Monday to Friday, 9:00 AM – 6:00 PM Job Type: Full-time Benefits: Flexible schedule Internet reimbursement Schedule: Day shift Evening shift Monday to Friday Morning shift US shift Experience: total work: 4 years (Required) Language: English (Required) Work Location: Hybrid remote in Kochi, Ernakulam, Kerala Expected Start Date: 13/05/2025
Posted 2 months ago
2 - 4 years
6 - 7 Lacs
Nagpur
Work from Office
Responsibilities: Deliver engaging cybersecurity training (offline) Simplify core topics for beginners Guide learners in exam prep and concept clarity Address student queries and provide mentorship Support learners toward certification success
Posted 2 months ago
4 - 6 years
0 Lacs
Kolkata, West Bengal, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security - DPP- Risk – Consulting – Senior As part of our EY-Cyber security in the Risk Consulting team, your role will be primarily responsible for the daily monitoring and/or maintenance of the enterprise Data Protection tools/solutions. The main duties of the person in this role will include proper care and administration of the Data Protection tools, monitoring and responding to the alerts that generate from the tool. This person will interface with IT Operations, Network Operations, Infrastructure teams, Legal, Risk Management, etc. The opportunity We’re looking for Security Analyst in the Risk Consulting team to work on various privacy/data protection related projects for our customers across the globe. In line with EY’s commitment to quality, consultant shall confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, consultant shall help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Build DATA PROTECTION solution concepts and deployment requirementsDeploying DATA PROTECTION tools and implementation of endpoint protection.Work with vendors to support the DATA PROTECTION technology (troubleshooting, upgrades, etc.)Administration of the Data Protection tools which includes configuring policies, upgrading and patching, etc.Monitor and respond to alerts generated from the Data Protection systems and other technologiesUnderstand and follow the incident response process through event escalationsRespond to escalations by the Incident Response TeamFollow processes to maintain the leading DATA LOSS PREVENTION/CASB systemAssisting clients in privacy related incident response activities.Supporting the client’s team by acting as an interim team member (e.g., security officer, security manager, security analyst.) Skills And Attributes For Success Should be a good team player.Excellent verbal and written communication skill.Proficient Documentation and Power Point skillsGood social, communication and technical writing skillsShould interface with internal and external clients.Strong analytical/problem solving skills.Ability to prioritize tasks and work accurately under pressure to meet deadlines.Should understand and follow workplace policies and procedures.Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. To qualify for the role, you must have Bachelor's or Master’s degree in Computer Science, Information Systems, Engineering or a related field.At least 4-6 years of experience in supporting Data Security Technology.At least 4-6 years of experience in two or more of the following:Information Security concepts related to Governance, Risk & ComplianceData Loss Prevention, CASB Technology support and Event HandlingExperience of Administration of the DLP, CASB tools which includes configuring policies, upgrading and patching for leading vendors. (Digital Guardium, McAfee, Forcepoint, Netskope, Symantec CloudSOC, MCAS etc.)MS Purview/ CASB (Netskope/MS/Symantec).Knowledge of Digital Guardium is a Must.Technical/Vendor certification will be added advantage.Experience in utilizing and good knowledge of other data protection technology like Endpoint Security Suite, EDR, ATP will be added advantage.Maintain current data protection and privacy expertise, skills and competences.Ability to independently research and solve technical issues.Demonstrated integrity in a professional environment.Knowledge of core Information Security concepts related to Governance, Risk & Compliance.Ability to work in and adapt to a changing environment.Extend required support for any reported data protection and privacy incidents such as information breaches and leakages.Ability to communicate in a clear and concise manner. Ideally, you’ll also have Professional certificate or be actively pursuing related professional certifications such as the CompTia Security+, CEH, CISSP or Vendor/Technical certification. If not, certified candidates are expected to complete one of the business required certifications within 12 months of hire.To expect some weekend work and 20%-30% travel based on job requirement. What We Look For A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills.An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide.Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues aroundOpportunities to develop new skills and progress your careerThe freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 2 months ago
5 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. Encryption Engineer Today’s world is fueled by vast amounts of information which makes data more valuable than ever before. Best security practices have informed many organizations to take full control of their cryptographic keys which encrypt data on-premises and in the cloud rather than leaving those responsibilities to cloud providers or third-party companies. Protecting data in information systems is central to this role, and everyone in EY Information Security has a critical role to play. Join a global team of almost 900 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Encryption Engineer will be a member of the Cryptography team within the Information Security Identity and Access Management Services (IAMS) team. This Engineer will deploy, configure and maintain a centralized key management tool and ensure that storage of sensitive key material reside only in a Hardware Security Module (HSM). Your Key Responsibilities Deploy and configure enterprise key management and HSM tools, which will centralize key lifecycle administration across the global EY platform for data at rest and data in transit. Your responsibilities include:Deploy and configure the Firm’s enterprise key management tools.Deploy and configure the Firm’s Hardware Security Module.Implement process automations as it relates to enterprise key management and HSM administration.Maintain and update the enterprise key management tools to support new business requirements while maintaining the fundamentals of a centralised key management service.Support integration of HSMs to support Apache, Nginx, Windows IIS and Java keystores.Support cloud application teams in centralizing storage of sensitive key material in proprietary repositories such as Azure Key Vault (AKV) and Goggle Cloud Key Management Services while aligning to the overall EY key management strategy.Provide Level 3 and 4 support to operational team on key management which has a direct impact of the Recovery Time Objective (RTO).Document operational procedures for deployment and configuration of security appliance.Update system configuration runbook regularly.Lead HSM engineering and enterprise key management efforts across the internal infrastructure and cloud environments.Work with cross functional teams and collaborate with IAM Operations.Research on impact of future computer security standard such as Federal Information Processing Standard 140-3 (FIPS 140-3), Cryptographic Module Validation Program (CMVP), Common Criteria (ISO/IEC 15408) on EY KMS strategy.Research on business problems that can be solved by a quantum computer faster than a classical computer and suggest areas in EY KMS strategy which require updates.Provide subject matter expertise on HSM, FIPS, CMVP, ISO/IEC 15408 to project teams, and other audiences as needed Skills And Attributes For Success A successful candidate for this role impacts EY business by deploying and configuring security tools recommended in EY key management strategy. As such, candidates must possess:Experience with Key Management Life Cycle - Key Generation, Storage, Distribution, Backup, Rotation, Revocation, Destruction, etc.Experience with major enterprise key management system as well as cloud based key management servicesHands on experience and knowledge of TLS, PKI, HSMs, KMIP, Digital Certificate Management, Azure Key Vault, and transparent database encryptionExperience with FIPS 140-2 compliance requirements and implementationExperience in security key management, security standards, cryptography, certificate management lifecycle and PKIUnderstanding of cloud computing architecture, technical design, and implementationTo qualify for the role, you must haveDegree in Computer Science, Computer Engineering or 5 years Security Engineering Experience or equivalent3+ years’ experience in enterprise key management, HSM configuration, application layer encryption, and transparent data encryption Ideally, you’ll also have Experience working with diverse, globally distributed teamsAbility to work well in a highly matrixed environment yet builds credibility to drive execution outside of direct chain of command while working across all organizational levels.Strong analytical and problem-solving skills.A security industry certification such as Security+, Network+, Cryptography Certification. Ability to work independently or with a team, under minimum supervision What We Look For A successful candidate for this role would be expected to think like an Engineer. Thinking like an engineer means looking at situations from multiple lenses. It means persistence, originality and apply technical concepts rather than popular opinion. Networking with key stakeholders and sponsors, cross-teaming across the organization is required for this role, as such we would look out for relationship builder. As an engineer slowing down to enjoy the process rather than fixating on its conclusion is key in this role. What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next.Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way.Confidence: We will provide you the insights, coaching and self-assurance in your decision making that the world needs.Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.
Posted 2 months ago
5 years
0 Lacs
Kochi, Kerala, India
On-site
At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. Encryption Engineer Today’s world is fueled by vast amounts of information which makes data more valuable than ever before. Best security practices have informed many organizations to take full control of their cryptographic keys which encrypt data on-premises and in the cloud rather than leaving those responsibilities to cloud providers or third-party companies. Protecting data in information systems is central to this role, and everyone in EY Information Security has a critical role to play. Join a global team of almost 900 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Encryption Engineer will be a member of the Cryptography team within the Information Security Identity and Access Management Services (IAMS) team. This Engineer will deploy, configure and maintain a centralized key management tool and ensure that storage of sensitive key material reside only in a Hardware Security Module (HSM). Your Key Responsibilities Deploy and configure enterprise key management and HSM tools, which will centralize key lifecycle administration across the global EY platform for data at rest and data in transit. Your responsibilities include:Deploy and configure the Firm’s enterprise key management tools.Deploy and configure the Firm’s Hardware Security Module.Implement process automations as it relates to enterprise key management and HSM administration.Maintain and update the enterprise key management tools to support new business requirements while maintaining the fundamentals of a centralised key management service.Support integration of HSMs to support Apache, Nginx, Windows IIS and Java keystores.Support cloud application teams in centralizing storage of sensitive key material in proprietary repositories such as Azure Key Vault (AKV) and Goggle Cloud Key Management Services while aligning to the overall EY key management strategy.Provide Level 3 and 4 support to operational team on key management which has a direct impact of the Recovery Time Objective (RTO).Document operational procedures for deployment and configuration of security appliance.Update system configuration runbook regularly.Lead HSM engineering and enterprise key management efforts across the internal infrastructure and cloud environments.Work with cross functional teams and collaborate with IAM Operations.Research on impact of future computer security standard such as Federal Information Processing Standard 140-3 (FIPS 140-3), Cryptographic Module Validation Program (CMVP), Common Criteria (ISO/IEC 15408) on EY KMS strategy.Research on business problems that can be solved by a quantum computer faster than a classical computer and suggest areas in EY KMS strategy which require updates.Provide subject matter expertise on HSM, FIPS, CMVP, ISO/IEC 15408 to project teams, and other audiences as needed Skills And Attributes For Success A successful candidate for this role impacts EY business by deploying and configuring security tools recommended in EY key management strategy. As such, candidates must possess:Experience with Key Management Life Cycle - Key Generation, Storage, Distribution, Backup, Rotation, Revocation, Destruction, etc.Experience with major enterprise key management system as well as cloud based key management servicesHands on experience and knowledge of TLS, PKI, HSMs, KMIP, Digital Certificate Management, Azure Key Vault, and transparent database encryptionExperience with FIPS 140-2 compliance requirements and implementationExperience in security key management, security standards, cryptography, certificate management lifecycle and PKIUnderstanding of cloud computing architecture, technical design, and implementationTo qualify for the role, you must haveDegree in Computer Science, Computer Engineering or 5 years Security Engineering Experience or equivalent3+ years’ experience in enterprise key management, HSM configuration, application layer encryption, and transparent data encryption Ideally, you’ll also have Experience working with diverse, globally distributed teamsAbility to work well in a highly matrixed environment yet builds credibility to drive execution outside of direct chain of command while working across all organizational levels.Strong analytical and problem-solving skills.A security industry certification such as Security+, Network+, Cryptography Certification. Ability to work independently or with a team, under minimum supervision What We Look For A successful candidate for this role would be expected to think like an Engineer. Thinking like an engineer means looking at situations from multiple lenses. It means persistence, originality and apply technical concepts rather than popular opinion. Networking with key stakeholders and sponsors, cross-teaming across the organization is required for this role, as such we would look out for relationship builder. As an engineer slowing down to enjoy the process rather than fixating on its conclusion is key in this role. What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next.Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way.Confidence: We will provide you the insights, coaching and self-assurance in your decision making that the world needs.Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.
Posted 2 months ago
4 years
0 Lacs
Thane, Maharashtra, India
On-site
About us:Embark on a fintech journey like never before with 5paisa. We're not just redefining finance; we're rewriting the rules. Join us at the forefront of innovation, where your career is a thrilling adventure in the future of fintech. With cutting-edge tech, transparent transactions, and user centric design, 5paisa is your gateway to a career that's as dynamic as you are. Ready to be a part of the revolution? Welcome to 5paisa, where your aspirations meet innovation. Position Overview:The Information Security Assistant will play a key role in supporting the CISO by managing security operations, monitoring threats, ensuring compliance, and facilitating effective cyber incident response. This role requires a strong understanding of IT infrastructure, Cloud infrastructure, information security principles and practices, excellent organizational skills, and the ability to work collaboratively with various teams. Key Responsibilities:1. Security Operations:Assist in monitoring of security systems (CSPM, SIEM, CASB, ZTNA), including firewalls, intrusion detection systems, and anti-virus solutions.Support daily security operations and help ensure the security infrastructure is functioning as intended.2. Threat Monitoring and Analysis:Monitor security alerts and reports to identify potential threats and vulnerabilities.Assist in the analysis of security incidents and collaborate with the team to develop mitigation strategies.3. Compliance and Documentation:Help maintain and update security policies, procedures, and documentation.Develop Guidelines and manuals to the IT and Information security based on industry best practices (NIST CSF, CIS, etc.)Support compliance with relevant regulations and standards (e.g., SEBI, DPDP, ISO 27001, industry-specific requirements).4. Incident Response:Assist in responding to security incidents, including investigating and documenting events.Provide support during incident handling and coordinate with relevant teams to resolve issues.5. Reporting and Communication:Prepare and present security reports and updates to the CISO and other stakeholders.Communicate effectively with various departments to ensure security practices are understood and followed.6. Administrative Support:Manage scheduling and coordination of security meetings and training sessions.Assist in maintaining an inventory of security tools and assets. Qualifications:Bachelor’s degree in Information Security, Computer Science, or a related field (or equivalent experience).Proven experience in a security-related role or a strong understanding of information security principles.4+ Years of experience in a similar role, preferably in the financial services industry.Familiarity with security technologies and tools (e.g., SIEM, firewalls, IDS/IPS).Knowledge of regulatory requirements and standards relevant to information security.Excellent organizational and multitasking abilities.Strong analytical and problem-solving skills.Exceptional communication and interpersonal skills.High level of integrity and discretion in handling sensitive information. Preferred Skills:Individual with experience of Networking would be preferred.Security certifications such as CompTIA Security+, CEH, CISSP, ISO 27001 LA or similar.Hands on experience in using MsOffice. Proficient with MS excel and MS PowerPoint.Experience with scripting or automation for security tasks.Work experience on working in a Cloud / hybrid environment will be an advantage.Familiarity with risk management and vulnerability assessment.
Posted 2 months ago
0 years
0 Lacs
Vadodara, Gujarat
Remote
Welcome to Veradigm! Our Mission is to be the most trusted provider of innovative solutions that empower all stakeholders across the healthcare continuum to deliver world-class outcomes. Our Vision is a Connected Community of Health that spans continents and borders. With the largest community of clients in healthcare, Veradigm is able to deliver an integrated platform of clinical, financial, connectivity and information solutions to facilitate enhanced collaboration and exchange of critical patient information. Veradigm Veradigm is here to transform health, insightfully. Veradigm delivers a unique combination of point-of-care clinical and financial solutions, a commitment to open interoperability, a large and diverse healthcare provider footprint, along with industry proven expert insights. We are dedicated to simplifying the complicated healthcare system with next-generation technology and solutions, transforming healthcare from the point-of-patient care to everyday life. For more information, please explore www.veradigm.com. What will your job look like: Cyber Security Engineers supports and implements cloud and application security tools and technologies. These technologies include firewalls, IDS/IPS, antivirus, web proxy, certificate management, SIEM, patch management, access controls as well as vulnerability assessments within the Veradigm environment. The Cyber Security Engineer should be comfortable working with a variety of security technologies and implements security measures to protect our systems from attacks, intrusion, and infiltration. An Ideal Candidate will have: Experience monitoring and maintaining firewalls, IDS/IPS systems, web proxy, and content filtering security products for policy violations, intrusions, anomalous behaviors, and day to day incident response activities. Experience with deployment, administration and troubleshooting of endpoint detection and response (EDR) and antivirus (AV) solutions supporting both servers and workstations. Experience securing cloud infrastructure (Azure or AWS). Administers authentication and access controls including provisioning, changes and deprovisioning of user and system accounts, security/access roles and access permissions. Monitoring and analyzing system access logs and deployment and implementation of SIEM solution such as Microsoft Sentinel or Splunk. Experience with Active Directory, Entra ID, and IAM protocols such as SAML, Single Sign On (SSO) and MFA solutions. Experience with email security and filtering, and sender authentication. Experience creating and maintaining automation and scripting tools such as PowerShell, JavaScript, Python, Perl, or Bash. Working knowledge of Windows Server administration and support including security best practices and understanding of Active Directory/Entra ID. Analyze and report organizational security posture trends. Experience with Linux distros such as RHEL, CentOS, Ubuntu, or Oracle Linux a plus. Experience conducting vulnerability assessments or risk assessments with tools such as Nessus, Qualys, Metasploit, Kali and working with application and server owners to review scan results, suggest remediation actions, and track/report on progress to management Certification Requirements Comptia Security Certification Security+ or CySA+ or CASP+ or PenTest+ Other Security Certifications- GSEC or CEH or OSCP or CCSP or MS-500 or AZ-500 Benefits Veradigm believes in empowering our associates with the tools and flexibility to bring the best version of themselves to work. Through our generous benefits package with an emphasis on work/life balance, we give our employees the opportunity to allow their careers to flourish. Quarterly Company-Wide Recharge Days Flexible Work Environment (Remote/Hybrid Options) Peer-based incentive "Cheer" awards "All in to Win" bonus Program Tuition Reimbursement Program To know more about the benefits and culture at Veradigm, please visit the links mentioned below: - https://veradigm.com/about-veradigm/careers/benefits/ https://veradigm.com/about-veradigm/careers/culture/ We are an Equal Opportunity Employer. No job applicant or employee shall receive less favorable treatment or be disadvantaged because of their gender, marital or family status, color, race, ethnic origin, religion, disability or age; nor be subject to less favorable treatment or be disadvantaged on any other basis prohibited by applicable law. #LI-SM1 #LI-REMOTE Veradigm is proud to be an equal opportunity workplace dedicated to pursuing and hiring a diverse and inclusive workforce. Thank you for reviewing this opportunity! Does this look like a great match for your skill set? If so, please scroll down and tell us more about yourself!
Posted 2 months ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. About The Role We are seeking a highly skilled Security Analyst (Level 2) to join our MSSP SOC team. The ideal candidate will have expertise in SIEM (Splunk, QRadar), XDR/EDR solutions, and security analysis with hands-on experience in investigating and responding to security alerts. This role requires proficiency in reviewing and analyzing Level 1 alerts, providing detailed recommendations, and engaging with customers for incident handling. The candidate should also have basic SIEM administration knowledge and Python scripting skills for troubleshooting and playbook development. Key Responsibilities Threat Detection & Response: Analyze and investigate security alerts, events, and incidents generated by SIEM, XDR, and EDR solutions.Incident Investigation & Handling: Conduct in-depth security incident investigations, assess impact, and take appropriate actions. Incident Escalation & Communication: Escalate critical incidents to Level 3 analysts or senior security teams while maintaining detailed documentation.Content Management: Develop and fine-tune correlation rules, use cases, and alerts in SIEM/XDR platforms to improve detection accuracy.Malware Analysis: Perform basic malware analysis and forensic investigation to assess threats.Customer Request Handling: Collaborate with customers to address security concerns, provide recommendations, and respond to inquiries.SIEM Administration: Assist in the administration and maintenance of SIEM tools like Splunk or QRadar, ensuring smooth operations.Automation & Playbooks: Utilize Python scripting for automation, troubleshooting, and playbook development to enhance SOC efficiency.Reporting & Documentation: Prepare detailed reports on security incidents, trends, and mitigation strategies. Basic Qualifications B.E/B. Tech degree in computer science, Information Technology, Masters in Cybersecurity3+ years of experience in a SOC or cybersecurity operations role.Strong knowledge of SIEM tools (Splunk, QRadar) and XDR/EDR solutions.Hands-on experience in threat detection, security monitoring, and incident response.Knowledge of network security, intrusion detection, malware analysis, and forensics.Basic experience in SIEM administration (log ingestion, rule creation, dashboard management).Proficiency in Python scripting for automation and playbook development.Good understanding of MITRE ATT&CK framework, security frameworks (NIST, ISO 27001), and threat intelligence.Strong analytical, problem-solving, and communication skills.Ability to work in a 24x7 SOC environment (if applicable) Preferred Qualifications Certified SOC Analyst (CSA)Certified Incident Handler (GCIH, ECIH)Splunk Certified Admin / QRadar Certified AnalystCompTIA Security+ / CEH / CISSP (preferred but not mandatory Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted.
Posted 2 months ago
5 - 8 years
0 Lacs
Sahibzada Ajit Singh Nagar, Punjab, India
On-site
About Us We are a global climate technologies company engineered for sustainability. We create sustainable and efficient residential, commercial and industrial spaces through HVACR technologies. We protect temperature-sensitive goods throughout the cold chain. And we bring comfort to people globally. Best-in-class engineering, design and manufacturing combined with category-leading brands in compression, controls, software and monitoring solutions result in next-generation climate technology that is built for the needs of the world ahead. Whether you are a professional looking for a career change, an undergraduate student exploring your first opportunity, or recent graduate with an advanced degree, we have opportunities that will allow you to innovate, be challenged and make an impact. Join our team and start your journey today! Job Title Security Analyst Reports to Sr. Manager Job Purpose As a Security Analyst, you will be a key member of our Global Cybersecurity Team, helping to strengthen Copeland’s cybersecurity posture. This role involves monitoring tools and dashboards, identifying and mitigating security vulnerabilities, and collaborating with teams to address risks effectively. You will also contribute to continuously improving our vulnerability management processes and play an active role in ensuring our IT systems remain secure. Key Responsibilities Monitor security tools and dashboards to identify vulnerabilities, assess risks, and propose compensating controls to reduce threats.Communicate findings to appropriate teams and track vulnerabilities through resolution.Create detailed vulnerability reports for technical teams and summary reports for management.Collaborate with IT and development teams to prioritize and remediate vulnerabilities.Maintain an up-to-date database of vulnerabilities, including their status and remediation progress.Contribute to the development and improvement of vulnerability management processes and tools. Duties And Responsibilities Support product security programs, projects, and initiatives to align with organizational security objectives.Lead small to medium-scale security initiatives, ensuring timely and successful execution.Collaborate with business units and engineering teams to implement security policies, establish sustainable processes, and enhance compliance while reducing risk.Identify and address gaps within the cybersecurity program, applying your expertise to strengthen the organization’s security posture.Conduct security scans, validate vulnerabilities through penetration testing, and retest fixes to ensure effectiveness.Recommend and participate in initiatives to prevent repeated vulnerability findings.Provide support for cybersecurity projects, technical discussions, and collaborative meetings.Respond to and assist in resolving outputs from security tools and engagement activities. Qualifications Bachelor’s degree in Engineering, Computer Science, or related discipline3+ years of experience in vulnerability assessment, penetration testing, or cybersecurity.Hands-on experience with vulnerability scanning tools and remediation processes.Knowledge of networking, operating systems (Windows, Linux), and application security.Some experience with programming or scripting and familiarity with DevSecOps practices.Experience with vulnerability frameworks (NIST, CVSS, etc.)Proficient in MS Office (Word, Excel, PowerPoint, etc.)Strong communication skills, with the ability to deliver clear oral, written, and visual presentations.Strong organizational skills, with the ability to plan, prioritize, and align tasks effectively.Customer-focused mindset with a strong eagerness to learn and grow.SANS GIAC, Network+, Security+ or other industry certifications preferred Key Competencies Customer Focus, Tech Savvy, Action Oriented, Collaborates, Communicates Effectively, Instills Trust, Being Resilient Our Commitment to Our People Across the globe, we are united by a singular Purpose: Sustainability is no small ambition. That’s why everything we do is geared toward a sustainable future—for our generation and all those to come. Through groundbreaking innovations, HVACR technology and cold chain solutions, we are reducing carbon emissions and improving energy efficiency in spaces of all sizes, from residential to commercial to industrial. Our employees are our greatest strength. We believe that our culture of passion, openness, and collaboration empowers us to work toward the same goal - to make the world a better place. We invest in the end-to-end development of our people, beginning at onboarding and through senior leadership, so they can thrive personally and professionally. Flexible and competitive benefits plans offer the right options to meet your individual/family needs. We provide employees with flexible time off plans, including paid parental leave (maternal and paternal), vacation and holiday leave. Together, we have the opportunity – and the power – to continue to revolutionize the technology behind air conditioning, heating and refrigeration, and cultivate a better future. Learn more about us and how you can join our team! Our Commitment to Diversity, Equity & Inclusion At Copeland, we believe having a diverse, equitable and inclusive environment is critical to our success. We are committed to creating a culture where every employee feels welcomed, heard, respected, and valued for their experiences, ideas, perspectives and expertise. Ultimately, our diverse and inclusive culture is the key to driving industry-leading innovation, better serving our customers and making a positive impact in the communities where we live. Equal Opportunity Employer Copeland is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, age, marital status, political affiliation, sexual orientation, gender identity, genetic information, disability or protected veteran status. We are committed to providing a workplace free of any discrimination or harassment.
Posted 2 months ago
4 years
0 Lacs
Indore, Madhya Pradesh, India
On-site
Position: Cybersecurity ConsultantJob Type: Full TimeLocation: IndoreExperience: 2–4 years Job Summary: We are seeking a skilled Full-Time Cybersecurity Consultant to enhance our organization's security posture. The ideal candidate will assess our current systems, identify vulnerabilities, and implement robust security measures to protect our digital assets. This role requires a proactive individual who can work independently and provide expert guidance on cybersecurity best practices. Key Responsibilities:● Conduct comprehensive security assessments of our IT infrastructure, including networks, systems, and applications.● Identify potential vulnerabilities and recommend appropriate mitigation strategies.● Experienced with DevOps tools● Develop and implement security policies, protocols, and procedures.● Monitor and analyze security incidents, providing incident response and remediation support.● Advise on compliance with relevant cybersecurity regulations and standards.● Collaborate with internal teams to ensure security measures are integrated into all aspects of operations.● Stay updated on the latest cybersecurity threats and trends to proactively address potential risks. Required Skills & Qualifications: ● Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field.● Minimum of 2 years of experience in cybersecurity roles.● Proficiency in security assessment tools and methodologies.● Strong understanding of network security, firewalls, intrusion detection systems, and encryption protocols.● Familiarity with compliance standards such as ISO 27001, GDPR, and NIST.● Excellent analytical and problem-solving skills.● Strong communication skills, both written and verbal. Preferred Certifications:● Certified Information Systems Security Professional (CISSP)● Certified Ethical Hacker (CEH)● Certified Information Security Manager (CISM)● CompTIA Security+ What We Offer: ● Opportunity to work with a dynamic team focused on innovation and security.● Competitive compensation based on experience and qualifications.● Access to the latest tools and technologies in cybersecurity. If you are passionate about cybersecurity and looking for a flexible consulting opportunity, we encourage you to apply on engage@qualwebs.com.
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
31458 Jobs | Dublin
Wipro
16542 Jobs | Bengaluru
EY
10788 Jobs | London
Accenture in India
10711 Jobs | Dublin 2
Amazon
8660 Jobs | Seattle,WA
Uplers
8559 Jobs | Ahmedabad
IBM
7988 Jobs | Armonk
Oracle
7535 Jobs | Redwood City
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi
Capgemini
6091 Jobs | Paris,France