Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
0 years
0 Lacs
Nagpur, Maharashtra, India
On-site
About the job We’re looking for a passionate cybersecurity trainer to deliver engaging and practical training for cybersecurity certification aspirants (like CEH, CompTIA Security+, etc.). Ideal for candidates with real-world security experience and a passion for teaching. Location: Pan-India (Must be open to travelling in India.)Type: Contract/Full-time (based on performance) Requirements:Any 1 cybersecurity certification (like CEH, CompTIA Security+, etc.)2.5-3 years of experience in cybersecurity or IT security rolesPrior experience teaching or mentoring (formal or informal)Strong grasp of cybersecurity topics: threats, encryption, network security, risk management, penetration testingAbility to simplify technical concepts for beginnersComfortable with online training tools (Zoom, Google Meet, etc.) Nice To Have:Experience creating quizzes or mock testsStrong communication skillsFamiliarity with virtual labs or basic demo tools Role Highlights:Deliver cybersecurity courses online or offlineHelp students understand core concepts and exam prep strategiesProvide guidance, answer doubts, and support learners toward certification Apply now if you're ready to help others launch their cybersecurity careers - while growing your own!
Posted 2 months ago
2 years
0 Lacs
Gurugram, Haryana, India
Hybrid
This job is with Marsh McLennan, an inclusive employer and a member of myGwork – the largest global platform for the LGBTQ+ business community. Please do not contact the recruiter directly. We are seeking a talented individual to join our GIS team at MMC Corporate This role will be based in Gurgaon. This is a hybrid role that has a requirement of working at least three days a week in the office. Global Cyber Defense - Security Operations Center What can you expect? We are looking for someone to join and grow in our Security Operations Center (SOC) in a technical analyst role on various daytime business hours shifts.As an Analyst, you will be responsible for analyzing security event data, assessing the potential impact of events, and creating recommendations to defend against emerging threats. You will follow security events through the triage and response lifecycle and document all processes in a centralized knowledgebase.In this role, you will participate in ongoing security incidents and continuous SOC initiatives, such as new content development and enrichment.Additionally, you will collaborate across multiple teams on various efforts to continue to strengthen the security posture of Marsh & McLennan Companies. What is in it for you? Be able to work with a global team with a company with a strong brand and strong results to match.Be part of an organization with a culture of internal mobility, collaboration, valued partnership from the business and drive for innovation in data & analytics, including the latest AI technologyGrow your career with direct exposure to Senior Technologists, Business Leaders, and Employee Resource Groups which provide access relevant volunteer and mentoring opportunities and interactions with counterparts in industry groups and client organizations.Competitive pay (salary and bonus potential), Full benefits package - starting day one (medical, dental, vision, STD/LTD, life insurance, RSP (Retirement Savings Plan or TFSA (tax free savings account.)Entitled to vacation, floating holidays, time off to give back to your community, sick days, and national holidays. We Will Count On You To Analyzing network traffic, endpoint security events, and other various log sources to identify threats, assess potential impact, and recommend mitigationsSupporting other security functions and teams to ensure the holistic implementation of security controls, technologies, practices, and programsContributing to the development and improvement of response processes, documentation, tool configurations, and detection logic Assisting in additional Security Operation Center initiatives, including playbook development and documentation, new rule creation, and tool evaluationsMaintaining an operational knowledge of global threat trends, known threat actors, common tactics, techniques, and procedures (TTPs), and emerging security technologiesCollaborating on Security Operation Center team training opportunities and other cross training opportunitiesOperating as a subject matter expert on various security topics across multiple domainsSupporting 24x7 operations by assisting in ongoing incidents during non-standard hours What you need to have? Undergraduate degree in Computer Science (CS), Computer Information Systems (CIS), other related degrees, or equivalent experience2+ years of information security experience and/or 2-4 years of experience in security analysis in a non-security focused roleExcellent critical thinking skills, with proven analytical expertise and the ability to learn adaptivelyDemonstrated effective verbal, written and interpersonal communication skills with the ability to communicate security concepts to both technical and non-technical audiences Demonstrated experience with security technologies and alerts, such as intrusion prevention and detection systems, web proxies, SIEM, SOAR, EDR, firewalls, web application scanner, vulnerability scanners, forensics tools, open-source tools, or other security technologiesKnowledge in one or more of the following domains: Network Operations and Architecture, Operating Systems, Identity and Access Management, Programming, Cloud Computing, Databases, or Cryptography What Makes You Stand Out Ability to operate independently in a dynamic, evolving environment with multiple inputs and tasks simultaneouslyKnowledge of common attacks, current threats, threat actors, and industry trendsFamiliarity with common security frameworks and models, such as MITRE ATT&CK, Lockheed Martin Cyber Kill Chain, The Diamond Model of Intrusion Analysis and NIST Cybersecurity FrameworkProfessional or technical certifications, such as Security+, GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), or other related certifications Why Join Our Team We help you be your best through professional development opportunities, interesting work and supportive leaders.We foster a vibrant and inclusive culture where you can work with talented colleagues to create new solutions and have impact for colleagues, clients and communities.Our scale enables us to provide a range of career opportunities, as well as benefits and rewards to enhance your well-being. Marsh McLennan (NYSE: MMC) is the world's leading professional services firm in the areas of risk, strategy and people. The Company's more than 85,000 colleagues advise clients in over 130 countries. With annual revenue of $23 billion, Marsh McLennan helps clients navigate an increasingly dynamic and complex environment through four market-leading businesses. Marsh provides data-driven risk advisory services and insurance solutions to commercial and consumer clients. Guy Carpenter develops advanced risk, reinsurance and capital strategies that help clients grow profitably and pursue emerging opportunities. Mercer delivers advice and technology-driven solutions that help organizations redefine the world of work, reshape retirement and investment outcomes, and unlock health and well being for a changing workforce. Oliver Wyman serves as a critical strategic, economic and brand advisor to private sector and governmental clients. For more information, visit marshmclennan.com, or follow us on LinkedIn and X. Marsh McLennan is committed to embracing a diverse, inclusive and flexible work environment. We aim to attract and retain the best people and embrace diversity of age, background, caste, disability, ethnic origin, family duties, gender orientation or expression, gender reassignment, marital status, nationality, parental status, personal or social status, political affiliation, race, religion and beliefs, sex/gender, sexual orientation or expression, skin color, or any other characteristic protected by applicable law. Marsh McLennan is committed to hybrid work, which includes the flexibility of working remotely and the collaboration, connections and professional development benefits of working together in the office. All Marsh McLennan colleagues are expected to be in their local office or working onsite with clients at least three days per week. Office-based teams will identify at least one "anchor day" per week on which their full team will be together in person Marsh McLennan (NYSE: MMC) is a global leader in risk, strategy and people, advising clients in 130 countries across four businesses: Marsh, Guy Carpenter, Mercer and Oliver Wyman. With annual revenue of $24 billion and more than 90,000 colleagues, Marsh McLennan helps build the confidence to thrive through the power of perspective. For more information, visit marshmclennan.com, or follow on LinkedIn and X. Marsh McLennan is committed to embracing a diverse, inclusive and flexible work environment. We aim to attract and retain the best people and embrace diversity of age, background, caste, disability, ethnic origin, family duties, gender orientation or expression, gender reassignment, marital status, nationality, parental status, personal or social status, political affiliation, race, religion and beliefs, sex/gender, sexual orientation or expression, skin color, or any other characteristic protected by applicable law. Marsh McLennan is committed to hybrid work, which includes the flexibility of working remotely and the collaboration, connections and professional development benefits of working together in the office. All Marsh McLennan colleagues are expected to be in their local office or working onsite with clients at least three days per week. Office-based teams will identify at least one "anchor day" per week on which their full team will be together in person.
Posted 2 months ago
5 - 8 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cyber Managed Service -Senior – TDR-SOC Infrastructure Maintenance Specialist TDR/SOC (Security Operations Center) infrastructure lab maintenance job typically involves the upkeep and management of the technical environment used for security monitoring, analysis, and response. This role is crucial for ensuring that the SOC has a reliable and efficient infrastructure to support its operations Job Summary: The SOC Infrastructure Lab Maintenance Specialist is responsible for maintaining and improving the SOC's technical lab environment. This includes managing the hardware, software, and network components that comprise the SOC's lab infrastructure. The specialist ensures that the lab is operational, secure, and up to date with the latest technologies and security measures. Key Responsibilities: Infrastructure Management:Install, configure, and maintain SOC lab hardware and software, in a highly virtualized environment, including servers, workstations, network devices, and security appliances.Perform regular system updates, patches, and upgrades to ensure security and performance.Monitor system performance and troubleshoot issues to minimize downtime.Lab Environment Configuration:Set up and maintain a variety of security tools and platforms used for training, testing, and simulation purposes.Create and manage virtual environments to emulate different network configurations and scenarios for training and testing.Security and Compliance:Implement and enforce security policies and procedures within the lab environment.Conduct regular security audits and vulnerability assessments to identify and mitigate risks.Ensure compliance with industry standards and regulatory requirements.Technical Support and Training:Provide technical support to SOC analysts and other staff using the lab environment.Assist in the development and delivery of training programs for SOC personnel on new tools, technologies, and procedures.Documentation and Reporting:Maintain detailed documentation of the lab infrastructure, including network diagrams, configuration settings, and inventory lists.Prepare reports on lab usage, performance metrics, and maintenance activities.Collaboration and Innovation:Work closely with SOC analysts, engineers, and management to understand their needs and incorporate feedback into lab improvements.Stay informed about emerging technologies and security trends to propose and implement innovative solutions in the lab. Qualifications: Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field.Relevant certifications (e.g., CompTIA Network+, Security+, Cisco CCNA, RHCE) are a plus.Experience with network administration, system administration, and security technologies.VMware Virtualization and vCenter server appliance and Virtual NetworkingExperience with both Linux and Windows Server/Desktop Operating Systems and Cloud services (Azure, AWS)Strong problem-solving skills and attention to detail.Excellent communication and interpersonal skills. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 2 months ago
0 - 2 years
0 Lacs
Kottakkal, Kerala, India
On-site
Key Responsibilities Develop, update, and maintain high-quality training content and modules. Deliver engaging and informative training sessions (online and offline) for RedTeam courses, including ADCD, CPT, CICSA, CSA, CCSA, CRTA, CEH, P+, S+, CYSA+, and CHFI Guide and mentor students and junior trainers across various RedTeam branches. Ensure timely course completion and maintain training quality. Prepare students for success with assessments, mock interviews, and career guidance. Maintain training documentation: attendance, course diaries, feedback, and evaluations. Represent RedTeam in college workshops, webinars, and events like the RedTeam Security Summit. Collaborate with the R&D team for innovation and content enhancement. Conduct corporate training based on your area of expertise. About Company: RedTeam Hacker Academy is a premier cybersecurity training institute that equips learners with practical, real-world skills in ethical hacking, penetration testing, and cyber defense. Known for its hands-on approach and expert-led training, the academy offers globally recognized certifications like CEH, CHFI, CySA+, Security+, PenTest+, CPENT, OSCP, and more. Courses are tailored for students, IT professionals, and career changers, with flexible learning modes - online, offline, and hybrid. Whether you're starting out or upskilling, RedTeam provides the foundation and expertise to thrive in the cybersecurity field.
Posted 2 months ago
0 - 2 years
0 Lacs
Kozhikode, Kerala, India
On-site
Key Responsibilities Develop, update, and maintain high-quality training content and modules. Deliver engaging and informative training sessions (online and offline) for RedTeam courses, including ADCD, CPT, CICSA, CSA, CCSA, CRTA, CEH, P+, S+, CYSA+, and CHFI Guide and mentor students and junior trainers across various RedTeam branches. Ensure timely course completion and maintain training quality. Prepare students for success with assessments, mock interviews, and career guidance. Maintain training documentation: attendance, course diaries, feedback, and evaluations. Represent RedTeam in college workshops, webinars, and events like the RedTeam Security Summit. Collaborate with the R&D team for innovation and content enhancement. Conduct corporate training based on your area of expertise. About Company: RedTeam Hacker Academy is a premier cybersecurity training institute that equips learners with practical, real-world skills in ethical hacking, penetration testing, and cyber defense. Known for its hands-on approach and expert-led training, the academy offers globally recognized certifications like CEH, CHFI, CySA+, Security+, PenTest+, CPENT, OSCP, and more. Courses are tailored for students, IT professionals, and career changers, with flexible learning modes - online, offline, and hybrid. Whether you're starting out or upskilling, RedTeam provides the foundation and expertise to thrive in the cybersecurity field.
Posted 2 months ago
2 - 5 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Skills: Threat Intelligence, Incident Response, SIEM Tools, Network Security, Penetration Testing, Vulnerability Assessment, Firewalls and VPNs, Scripting Languages, Job Title: Cyber Security Specialist Key Responsibilities Threat Detection and Response: Monitor systems and networks for potential security threats and respond to incidents. Vulnerability Management: Identify and remediate vulnerabilities in systems and applications. Security Policy Development: Develop and implement security policies and procedures. Compliance: Ensure compliance with security regulations and standards. Penetration Testing: Conduct penetration testing to identify weaknesses in systems and applications. Security Awareness Training: Provide security awareness training to employees. Requirements Education: Bachelor's degree in Computer Science, Cyber Security, or related field. Experience: 2-5 years of cyber security experience. Skills: Strong knowledge of security frameworks, threat analysis, and incident response. Certifications: CompTIA Security+, CISSP, or other relevant certifications. Goals Protect company assets: Protect company systems, networks, and data from cyber threats. Ensure compliance: Ensure compliance with security regulations and standards. Improve security posture: Continuously evaluate and improve the company's security posture. Some Common Roles In Cyber Security Include Security Analyst: Analyze security threats and incidents. Penetration Tester: Conduct penetration testing to identify weaknesses. Incident Responder: Respond to security incidents. Security Engineer: Design and implement security solutions. Chief Information Security Officer (CISO): Oversee the company's overall security strategy. Akash HR Contact -7824848607
Posted 2 months ago
0 years
0 Lacs
Kanayannur, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cyber Risk and Compliance Consultant - Senior The opportunity This is a role where no two days are the same – so you’ll find yourself taking on plenty of new responsibilities as you go. You’ll work alongside clients and colleagues, balancing your time between developing security strategies, designing security and privacy controls, advising client stakeholders, facilitating workshops and supporting business development. Your Key Responsibilities As a Cyber GRC Professional in our Cyber Security practice, you will be occupied in the following domains: a) Strategy, b) Risk, c) Compliance. As part of our team strategy you will be expected to take on responsibility and initiative early, providing you with real experience working with a wide range of major clients in EY. You will be taking responsibility for the quality of your work, while continually developing your personal and professional skills through formal training, hands-on experience and coaching. Skills And Attributes For Success To qualify for the role, you must have: Degree, or equivalent, in Information Security, Cyber Security, Information Technology, Informatics, or other similar and technical areasEvidence of self-motivation to continuously develop in the areas of cybersecurityGood organizational and time management skills with the ability to prioritize and complete multiple complex projects under tight deadlinesAbility to translate security issues into business risksExcellent interpersonal skills and ability to work effectively within a team at all hierarchical levelsWillingness to research client inquiries and emerging issues, including regulations, industry practices, and new technologiesExperience, knowledge and strong interest in information and cyber security domains are essential for this roleExperience on Cyber Governance, Risk & Compliance (GRC), Cyber risk assessments & management methodologiesExperience on assessing, designing and implementing security strategies, governance frameworks over processes and controls, allowing organisations to optimally manage cyber securityExperience on design and implementation of security policies, procedures, standards and controls in line with regulation and/or current standards, such as ISO27001, NIST, SANS etc.Experience in data classification exercises and controls / mechanisms enforcementWorking knowledge of control frameworks such as ISO 27001/27002, COBIT, NIST, ITIL, etc. Ability to conduct Security regulatory and compliance assessment independently Hands on with assessment report preparation and presenting to senior technical and business stakeholdersHand on knowledge of excel, PowerPoint and wordArticulative and confident in presentation to senior stakeholdersAbility to lead workstreams or dedicated portions of projectsCyber maturity assessments, recommendations, roadmap and strategy creationknowledge of use of and risks related to modern and emerging technologies Cybersecurity auditAbility to plan and deliver cyber security training and awareness Ideally, you’ll also have: Security-related qualifications / certifications such as CISSP, SSCP, CISM, ISO27001 lead implementer or auditor, CompTIA Security+, are desirableExperience in Third Party Risk Management (TPRM) and / or vendor risk assessment engagementsExperience in design and implementation of Information Security Management Systems (i.e. security policies, procedures and guidelines) according to leading International StandardsSecurity-related vendor / technology certifications are desirable EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 2 months ago
5 - 8 years
0 Lacs
Pune, Maharashtra, India
Hybrid
Job Title - Senior Security AnalystJob Location - Baner, Pune Position OverviewAs a Sr. Security Analyst, you will play a crucial role in conducting meticulous assessments, orchestrating proactive monitoring, and spearheading strategic enhancements to fortify and advance our identity security offerings. You will be helping our customers strengthen their identity security posture and maintain compliance with industry regulations by analyzing, detecting, and responding to identity-related threats, as well as providing strategic guidance and recommendations to defend against evolving threats and safeguard customers’ critical assets. ResponsibilitiesLeverage the companies Identity SecOps platform to monitor and analyze identity-related threats and incidents, including account compromise, identity theft, and unauthorized access attempts.Lead incident response efforts for identity-related security incidents, coordinating with cross-functional teams - both internal and external - to contain, mitigate, and remediate security breaches on time.Maintain accurate and detailed documentation of security incidents, investigations, and remediation activities, and prepare comprehensive reports for management and stakeholders.Facilitate regular monthly calls with customers to ensure alignment with their security objectives and address any concerns or inquiries. Provide weekly reports on security posture, incident trends, and mitigation efforts. Promptly communicate critical alerts to customers as they occur to maintain transparency and trust in our services.Conduct proactive monitoring of identity-related security events and anomalies by leveraging the companies Identity SecOps platform.Conduct risk assessments and impact analyses of identity-related security risks, prioritize remediation efforts, and implement controls and safeguards to mitigate identified risks effectively.Promote security awareness and best practices related to identity security among employees, partners, and customers through training sessions, educational materials, and outreach initiatives.Stay abreast of emerging threats and vulnerabilities in the identity security landscape, leveraging threat intelligence sources to enhance detection capabilities and help develop proactive security measures in our product.Collaborate closely with product management, engineering team, and other stakeholders throughout the product development lifecycle.Thrive in a dynamic startup environment, contributing to a culture of innovation and excellence. RequirementsAt least 8 years of hands-on experience in cybersecurity, with a focus on identity security, authentication, and access management.Strong understanding of identity protocols and standards, such as SAML, OAuth, OpenID Connect, and LDAP.Proficiency in security analysis tools and technologies, including SIEM, SOC, and SOAR solutions, XDR/EDR, intrusion detection/prevention systems, and identity and access management (IAM) platforms.Proficiency in scripting and programming languages (e.g., Python, PowerShell) for automation, data analysis, and scripting purposes, enabling the creation of efficient analysis scripts and automation workflows to enhance security operations and streamline processes.Familiarity with security frameworks and compliance requirements, such as SOC 2, GDPR, HIPAA, and PCI DSS.Excellent attention to detail, analytical and problem-solving skills, with the ability to analyze complex security incidents and recommend effective mitigation strategies.A solid understanding of cybersecurity concepts, principles, and best practices, with experience in security testing methodologies and tools, is a significant advantage.Relevant certifications such as CISSP, CISM, CompTIA Security+, or GIAC certifications (e.g., GCIH, GCIA) are preferred.Strong communication and collaboration skills.Ability to thrive in a fast-paced, dynamic work environment.Master’s or Bachelor's degree in Computer Science, Engineering, or a related field.
Posted 2 months ago
0 years
0 Lacs
Bengaluru, Karnataka
Work from Office
Regeneron is founded on the belief that the right idea, combined with the right team, can lead to significant transformations. Our growing global network is dedicated to inventing, developing, and commercializing medicines that change lives for those with serious diseases. In doing so, we are pioneering innovative approaches to science, manufacturing, and commercialization, as well as redefining our understanding of health. TVM Analysts focus on cybersecurity vulnerability identification, facilitate priority-based patching, and validate remediation efficiency. Operational requirements include leveraging TVM and information technology service management (ITSM) platforms to provide transparency, quantification, and accountability for remediation efficacy. This includes the utilization of reporting, executive summaries, and real-time dashboards. Additional responsibilities include chipping in to cybersecurity’s strategic maturity roadmaps, collection and analysis of cyber vulnerability intelligence, IT, and business unit partnership. A typical day might include the following: Manage cybersecurity vulnerabilities and risks across Regeneron including identifying, supporting application and system owners to manage risks and remediate vulnerabilities. Conduct vulnerability assessments of scans of servers, websites, workstations, serverless technology, network devices, cloud infrastructure, and other assets using various vulnerability management platforms and tools. Analyze enterprise cybersecurity policies and configurations to evaluate compliance with regulations and enterprise policies and standards. Assist with selection of industry best of breed cybersecurity controls to mitigate risk Collection, reporting, and metrics generation for multiple cyber TVM datasets. This includes patching efficiency, identifying system misconfigurations, and security hygiene assessments. Support the process of Security Compliance assessments of systems and multi-tenant cloud services, using industry standard processes, to include, Center for Internet Security (CIS) hardening guidelines Analysis and monitoring of cybersecurity feeds, cyber threat intelligence, and open-source intelligence on trending vulnerabilities and exploits. Partner with IT service providers to operate, maintain, and enhance TVM platforms. This includes native Operating System, cloud security, and data aggregation platforms Collaborate and partner with cross-departmental peers (technical and non-technical) to report, synthesize, and prioritize vulnerabilities and threats based on contextual assets and relationship data. Leverage industry and compute environment data to assess current and alternative technical solutions and processes for continuous enhancement and issue resolution. Supports and enables Regeneron’s, global (US (United States), EU (European Union), APAC) Science to Medicine business objectives through enriching the cybersecurity defense posture. Support Regeneron's TVM capability to identify, assign, and validate remediation of compute environment vulnerabilities. This encompasses Regeneron’s on-prem, hybrid, and multi-tenant cloud environments. This job might be for you if you: Possess a Bachelor’s Degree and 2+ years of relevant experience into Threat and Vulnerability Knowledge, proven track record, and skills in vulnerability assessment, prioritization, assignment, validation, and tracking. Experience and working knowledge of vulnerability management tools such as Nmap, Qualys, Tenable, Nessus, Microsoft Defender, Wiz, Rapid7, AWS Inspector, Orca. Familiarity with OWASP (Open Web Application Security Project) Top 10, CIS Security Controls, MITRE ATT&CK Framework Solid understanding of multi-tenant cloud environments (AWS, Azure, GCP), vulnerability mitigation techniques, and system hardening. Proven threat and vulnerability assessment skills or knowledge gained through experience or academia. Ability to understand threat modeling and apply technical, administrative, and security control risk mitigation. Organized, reliable, detail oriented. Proven or conceptual abilities to navigate levels through thought equity. Cybersecurity tool familiarity. E.g., SIEM (Security Information and Event Management), IDS/IPS, Email Protection, Firewalls, DLP (Data Loss Prevention), EDR (Endpoint Detection and Response), etc. Experience gained through a sophisticated organization and managed security providers and vendors. Excellent problem-solving skills and attention to detail. Demonstrable experience in customer service, communication, and relationship building. Ability to work independently and as part of a team. CISSP, CEH, Security+, Network+ or equivalent are preferred. Connect with us, so we can learn more about you, and you can learn more about our medicines. And join us in crafting the future of healthcare. Regeneron is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion or belief (or lack thereof), sex, nationality, national or ethnic origin, civil status, age, citizenship status, membership of the Traveler community, sexual orientation, disability, genetic information, familial status, marital or registered civil partnership status, pregnancy or parental status, gender identity, gender reassignment, military or veteran status, or any other protected characteristic in accordance with applicable laws and regulations. We will ensure that individuals with disabilities are provided reasonable accommodations to participate in the job application process. Please contact us to discuss any accommodations you think you may need. Does this sound like you? Apply now to take your first step towards living the Regeneron Way! We have an inclusive and diverse culture that provides comprehensive benefits, which often include (depending on location) health and wellness programs, fitness centers, equity awards, annual bonuses, and paid time off for eligible employees at all levels! Regeneron is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion or belief (or lack thereof), sex, nationality, national or ethnic origin, civil status, age, citizenship status, membership of the Traveler community, sexual orientation, disability, genetic information, familial status, marital or registered civil partnership status, pregnancy or parental status, gender identity, gender reassignment, military or veteran status, or any other protected characteristic in accordance with applicable laws and regulations. The Company will also provide reasonable accommodation to the known disabilities or chronic illnesses of an otherwise qualified applicant for employment, unless the accommodation would impose undue hardship on the operation of the Company's business. For roles in which the hired candidate will be working in the U.S., the salary ranges provided are shown in accordance with U.S. law and apply to U.S.-based positions. For roles which will be based in Japan and/or Canada, the salary ranges are shown in accordance with the applicable local law and currency. If you are outside the U.S, Japan or Canada, please speak with your recruiter about salaries and benefits in your location. Please note that certain background checks will form part of the recruitment process. Background checks will be conducted in accordance with the law of the country where the position is based, including the type of background checks conducted. The purpose of carrying out such checks is for Regeneron to verify certain information regarding a candidate prior to the commencement of employment such as identity, right to work, educational qualifications etc.
Posted 2 months ago
6 - 10 years
6 - 11 Lacs
Bengaluru
Work from Office
Job Description Must have requirements: Minimum of 5+ years work experience working with security tools and with security administration. Designing, implementing, managing & maintaining endpoint solutions (Tanium, Crowdstrike), Hands on experience on endpoint tools and overall cybersecurity practices Strong ethics and understanding of ethics in business and information security Ability to mentor juniors and get them up to speed with the process Possess any current security certifications (e.g., CISSP, Security+) Ability to present and articulate findings to technical staff and executives Ability to participate in on-call rotation as needed Must be able to pass a background check Career Level - IC3 Responsibilities Must have requirements: Minimum of 5+ years work experience working with security tools and with security administration. Designing, implementing, managing & maintaining endpoint solutions (Tanium, Crowdstrike), Hands on experience on endpoint tools and overall cybersecurity practices Strong ethics and understanding of ethics in business and information security Ability to mentor juniors and get them up to speed with the process Possess any current security certifications (e.g., CISSP, Security+) Ability to present and articulate findings to technical staff and executives Ability to participate in on-call rotation as needed Must be able to pass a background check
Posted 2 months ago
8 - 12 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you ready to embark on a technical adventure and become a hero to our external and internal users? As Technical Support at Kyndryl, you'll be part of an elite team that provides exceptional technical assistance, enabling our clients to achieve their desired business outcomes. You'll be a troubleshooter extraordinaire, diagnosing and repairing complex equipment, software, and systems with ease. Nothing will be too challenging for you to solve as you respond to escalated issues, report critical design flaws, reliability and maintenance problems, and bugs. You'll be the go-to person for our customers who require assistance with highly technical or sophisticated products, as well as for customer installations and training. With your passion for technology, you'll provide world-class support that exceeds customer expectations. As Technical Support, you'll perform varying degrees of problem determination and resolution of desktop hardware and software issues using your technical expertise and available resources to ensure that our customers' issues are resolved efficiently and effectively. You'll also have the opportunity to perform installs, moves, adds, and changes (IMAC) activities, as well as data backup and restore on certain accounts for clients, ensuring that all related administrative duties are completed within Service Level Agreement objectives. You will develop a deep understanding of the local and regional infrastructure, as well as key contacts in other competencies, which will enable you to ensure that the proper team is aware of – and taking action on the problem. If you're a technical wizard, a customer service superstar, and have an unquenchable thirst for knowledge, we want you to join our team. Your Future at Kyndryl Imagine being part of a dynamic team that values your growth and development. As Technical Support at Kyndryl, you'll receive an extensive and diverse set of technical trainings, including cloud technology, and free certifications to enhance your skills and expertise. You'll have the opportunity to pursue a career in advanced technical roles and beyond – taking your future to the next level. With Kyndryl, the sky's the limit. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Expertise: 5+ years of experience in IT operations, with a focus on Microsoft Active Directory and related identity infrastructure. Deep understanding of Active Directory security best practices, including privileged access management, least privilege principles, and attack surface reduction. Strong experience managing and troubleshooting Entra ID, ADFS, and hybrid identity environments. Hands-on experience with backup and recovery procedures, disaster recovery planning, and incident management. Proficiency in PowerShell scripting for automation and configuration management. Familiarity with Quest Change Auditor, Quest Recovery Manager, or similar security auditing and recovery tools. Knowledge of compliance frameworks such as NIST, ISO 27001, or SOC 2. Excellent troubleshooting, problem-solving, and analytical skills. Strong communication, documentation, and interpersonal skills. Ability to work independently and as part of a team in a fast-paced, managed services environment. As an Identity & Directory Services Operations Specialist, you will:Provide Level 2 & Level 3 Operations Support:Monitor, audit, troubleshoot, and resolve incidents and problems across all directory and identity services. Act as a subject matter expert and provide support and consultation to other IT services and projects. Implement business and security settings according to defined processes and requests. Participate in on-call rotations as required to address critical incidents outside of business hours. Preferred Technical and Professional Expertise: Microsoft certifications related to Active Directory, Azure, or security (e.g., MCSA, MCSE, Security+). Experience with other identity and access management (IAM) solutions. Knowledge of DevOps principles and practices. Experience with cloud security tools and technologies. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 2 months ago
0 - 2 years
0 Lacs
Mumbai Metropolitan Region
On-site
About Us Decisions is a software development company headquartered in Virginia Beach, Virginia, USA, and it provides a no-code automation platform for all types of business processes. With the no-code automation platform, you can fix the customer experience, modernize legacy systems, ensure regulatory compliance, and automate anything in your business. We help people who know what to do, get it done, and change their world. Role Summary As a Compliance/Security Analyst, your daily work ensures organizational operations meet industry compliance standards to increase customer confidence in Decisions' platform, people, and processes. This role is directly responsible for collaborating with leadership, training employees on industry standards, developing policies, evaluating compliance, and communicating the security posture of Decisions with customers and Decisions leadership. You will strive to elevate the security of customer data as well as internal systems and tools by fighting the status quo of “security theater” to extend our culture of safety and security as a lifestyle in all facets of our business. Key Objectives Objective #1: Bolster Public Brand Trust Support Customer Growth Eliminate internal and external threats to our business Manage vulnerability scanning, reporting, and mitigation activities Identify and understand current organizational policies and practices Communicate with prospects, customers, and team members to continually increase confidence Contribute to the timely completion of accurate customer security questionnaires Observe and act as needed to advance our mission and who we are as an Organization Objective #2: Drive Business Alignment Steward a shared company culture of data security awareness Serve as Incident Response Coordinator during threat events Administer quarterly phish tests and implement remediation strategies Partner with IT to maintain principle of account least privilege Contribute to the org-wide Risk Register to proactively monitor, manage, and resolve business threats Advise on developing and implementing new compliance policies and procedures as required Collaborate with security champions within each department Complete timely and accurate Cloud Cost reporting and SLA reporting requests Objective #3: Maintain Regulatory Adherence Support real-time, collaborative audit readiness Complete internal and external security and privacy audits (ex: SOC2, HITRUST, PCI DSS, ISO27001, etc) Communicate with auditors and follow up on action items in a timely manner Contribute to internal audits to assess operational and procedural compliance Research industry regulations and policies Required Specialized Experience or Skills Technical adeptness and proficiency (if you’ve never used a computer, this is not the role for you) Experience prioritizing and completing multiple tasks on tight timelines Strong problem-solving skills as well as excellent process discipline, milestone management, and time management skills Ability to take in information and summarize the most important content Ability to listen attentively to others and communicate effectively both verbally and in writing Experience working on teams that require high levels of cooperation, flexibility, cross-group collaboration, and real-time response Ability to independently seek and find answers to complete tasks under narrow deadlines Attention to detail without losing sight of the big picture Preferred IT (Helpdesk, Technical Support, SysAdmin) and/or Customer Service Experience COMPTIA A+, Network+, and/or Security+ Exposure to performing key Information Security operational activities Experience with EDR/XDR, IDS/IPS systems Experience contributing to internal and external audits (ex: SOC2, ISO 27000, PCI DSS, HITRUST, FEDRAMP, etc) Experience using Public Clouds (bonus points for Azure or AWS certifications) Linux experience Other Industry certifications: CAP, CCSK, CISA, CCSP, CRISC, Linux+
Posted 3 months ago
2.0 years
0 Lacs
Visakhapatnam, Andhra Pradesh
On-site
Visakhapatnam, Andhra Pradesh Work Type: Full Time We are seeking a seasoned and proactive IT Lead to oversee and enhance our organization’s IT infrastructure, security posture, and end-user computing environment. This leadership role demands deep technical expertise across networking, device management, server architecture, and cybersecurity, along with a proven track record in leading and mentoring IT support and infrastructure teams. You will be responsible for planning, implementing, optimizing, and maintaining all aspects of IT infrastructure and services while also managing a team of 5–8 IT professionals. Your mission is to ensure a reliable, secure, and scalable technology environment that aligns with business goals. Key Responsibilities Infrastructure & Network Management Design, deploy, and manage network infrastructure, including LAN, WAN, Wi-Fi, firewalls, switches, and routers. Ensure high availability and performance of on-premises and cloud-hosted infrastructure. Proactively monitor and remediate performance issues or risks in network and server environments. Security Oversight Define and implement best-in-class cybersecurity practices, including endpoint protection, patching strategies, firewalls, VPNs, and access control. Conduct vulnerability assessments and initiate remediation processes for security gaps. Ensure compliance with data protection standards (e.g., ISO 27001, GDPR, SOC2). Asset & Device Management Oversee lifecycle management of IT assets: procurement, deployment, monitoring, and decommissioning. Implement and manage MDM/EMM solutions to secure and control endpoints (laptops, mobile devices). Enforce standardization of operating environments and configurations across the organization. Server & Systems Administration Manage physical and virtualized servers (Windows/Linux) and cloud infrastructure (e.g., AWS, Azure, GCP). Administer AD, DNS, DHCP, backup systems, and centralized authentication (SSO, LDAP). Implement and optimize automation for server and application deployment. Team Leadership & Collaboration Lead, mentor, and develop a team of 5–8 IT engineers and support specialists. Define and track KPIs and SLAs for support and operational excellence. Collaborate with business units and leadership to align IT strategy with organizational goals. IT Governance & Operational Excellence Develop IT policies, SOPs, and disaster recovery plans. Manage service desk operations ensuring timely resolution of IT incidents and requests. Drive continuous improvement initiatives, vendor evaluations, and tool rationalization. Skills: Technical Proficiency 7+ years of experience in IT infrastructure and network administration, with 2+ years in a leadership capacity. Strong expertise in managing firewalls (e.g., Fortinet, Palo Alto), VPNs, and network security tools. Experience with Windows/Linux servers, Active Directory, Office 365, Exchange, and Azure AD. Familiarity with cloud infrastructure, virtual environments (e.g., VMware/Hyper-V), and automation tools. Proficient in IT asset management systems, ticketing platforms, and monitoring tools. Leadership & Communication Demonstrated ability to lead and scale technical teams. Excellent stakeholder management, reporting, and cross-functional collaboration. Strong problem-solving, crisis response, and strategic planning capabilities. Preferred Qualifications Certifications such as CCNA/CCNP, CompTIA Security+, Microsoft Certified: Azure Administrator, or CISSP. Experience working in regulated industries or with compliance requirements. Knowledge of DevSecOps and integrating security into CI/CD pipelines. Open Date: Jul-04-2025
Posted 4 months ago
0.0 years
0 Lacs
Gwalior, Madhya Pradesh
Remote
Job Information Date Opened 02/15/2025 Job Type Full time Industry IT Services Work Experience Fresher City Gwalior State/Province Madhya Pradesh Country India Zip/Postal Code 474010 About Us SNS System specialize in global business consulting and IT services, delivering innovative solutions to optimize your operations, accelerate digital transformation, and drive sustainable growth Job Description As a Windows and Linux Administrator, you will manage and maintain both Windows and Linux servers, ensure system security, troubleshoot performance issues, and implement disaster recovery plans. Your role will be essential in optimizing server performance and applying security best practices to ensure a stable and secure IT environment. Requirements What You’ll Be Doing: Install, Configure, and Maintain Servers: Set up and manage Windows and Linux servers, ensuring they operate optimally with minimal downtime. Manage System Security and Updates: Apply security patches and updates, monitor vulnerabilities, and ensure adherence to security best practices for all systems. Troubleshoot Performance Issues: Quickly identify, analyze, and resolve network and system performance problems to maintain efficiency and minimize disruptions. Set Up Firewalls, VPNs, and Security Policies: Configure firewalls, VPNs, and implement security policies to protect systems and enable secure remote access. Backup and Disaster Recovery: Perform regular backups and manage disaster recovery strategies to minimize data loss and ensure business continuity. Monitor Server Performance and Optimization: Continuously monitor server health and implement optimizations to improve performance, uptime, and overall stability. What We’re Looking For: Strong Knowledge of Windows Server and Linux Environments: Extensive experience with Windows Server, Active Directory, and Linux distributions (e.g., Ubuntu, Debian, CentOS). Experience with Cloud Services: Practical experience with cloud platforms such as AWS, Azure, or Google Cloud for managing virtualized and cloud-based infrastructure. Automation Tools Experience: Familiarity with automation tools like Ansible, Puppet, or Terraform to automate system management and infrastructure as code (IaC). Scripting Skills: Proficiency in scripting languages (PowerShell, Bash, or Python) for automating tasks and streamlining system management. Networking Protocols Knowledge: Strong understanding of networking protocols like TCP/IP, DNS, and DHCP to manage system and network configurations. Problem-Solving Skills: Ability to troubleshoot complex system and network issues effectively and quickly. Good To Have: Experience with Virtualization technologies such as VMware or Hyper-V. Security Certifications like CompTIA Security+, Certified Linux Administrator (LPIC), or Microsoft Certified Solutions Expert (MCSE). Familiarity with Monitoring Tools like Nagios, Zabbix, or Prometheus for system monitoring and performance tracking.
Posted 5 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
31458 Jobs | Dublin
Wipro
16542 Jobs | Bengaluru
EY
10788 Jobs | London
Accenture in India
10711 Jobs | Dublin 2
Amazon
8660 Jobs | Seattle,WA
Uplers
8559 Jobs | Ahmedabad
IBM
7988 Jobs | Armonk
Oracle
7535 Jobs | Redwood City
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi
Capgemini
6091 Jobs | Paris,France