Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
5.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Skills: Enterprise and data center IT network specialist, Cisco Certified Network Professional, AWS certified advanced networking Cloud certified, CompTIA Network+, CompTIA Security+, Network Architecture, Cisco Networking, Position: Consultant / Senior Consultant Role: Enterprise and data center IT network specialist / SME Total Experience: Consultant (5+ years), Senior Consultant (7+ years) Base Location: Bangalore, Hyderabad, Mumbai, Pune and Delhi/NCR Company Overview EIL Global is a leading IT services provider, headquartered in Adelaide, Australia, with a reach extending across the Asia Pacific and EMEA regions. We deliver comprehensive digital transformation solutions, including AIOPS, AI-based workforce automation, and blockchain solutions. With a focused team of 11-50 employees, we excel in IT infrastructure support encompassing desktops, servers, networks, and data centre technologies. Certification: Must have any networking domain certification such as Cisco Certified Network Professional (CCNP) Cisco Certified Network Associate (CCNA) CompTIA Network+, CompTIA Security+ AWS certified advanced networking Cloud certified. Role Summary We are looking for an enterprise and data center IT network specialist who poses core IT networking skills, a solid foundation for working in the IT and networking infra management domain and showcase strong experience in deploy, manage, migrate, secure, and troubleshoot a wide range of data center network infrastructures. The role demands to lead or support end to end technology transformation engagements, offering network strategy domain, implementation and optimization services for large enterprises. The Subject matter expert (SME) having proficiency in working with multi-vendor and multi network domain solutions across on-premises and hybrid cloud networking. Youll work closely with client stakeholders, OEM vendors, and internal teams to deliver value-driven, secure, and future-ready infrastructure solutions. Technical Skills Required Strong working experience on LAN, WAN, WLAN, SD-WAN, and firewall networking technologies. Expertise in deploy and configure network devices, routing protocols static, RIP, OSPF, BGP, EIGR), redundancy protocols (HSRP, VRRP, Cluster), IP addressing (IPV4/IPV6, subnetting and CIDR), routing tables, and security policies. Proficiency in setting up access controls (ACLs), encryption protocols (e.g., SSL/TLS, IPSec), Intrusion Detection and Prevention (IPS/IDS) and VPN services. Exposure to SDN and network virtualization technologies and solutions. Wired and Wireless LAN Networking Deploying and configuring Nexus, DC leaf & Spine, Cisco ACI, L2/L3 switches fabric, network segmentations, SD-LAN (Cisco, Aruba & Dell) technologies. Wireless Networking Good knowledge of Wi-Fi standards (e.g., 802.11a/b/g/n/ac/ax) and their respective strengths, limitations, security protocols (WPA2, WPA3). Expertise in installing WLC and access points as per heatmap design and conduct performance optimization and assessment and tunning as per end user traffic requirements. Good exposure to Wi-Fi6/6E and Wi-Fi7 solutions. WAN Networking - Hands on experience of IP routing, Ethernet, MPLS, DIA, P2P, ILL, Mobile Networks (4G/LTE, 5G), QOS, IPSec VPN, Vendor solutions for routers and SD-WAN (Cisco, Juniper, Fortinet, Aruba), Load Balancers (F5, Citrix HA Proxy, Cloud) and traffic engineering. Working with ISPs for connectivity, links terminations, bandwidth optimization and performance. Configurating and managing QoS, Class of services, performance parameters and security policies across the underlay and overlay networks. Cloud Networking Working knowledge of public cloud networking (AWS, Azure and GCP), creating virtual networks (VPCs, VNets), virtual machines, container networking, integrating multi cloud networking systems, Hybrid cloud integrating using IPSec VPN, direct connect /express routes, security groups and load balancing. Experiencing of working as L2/L3 network operation engineer, handling incident and service requests. Creating RCAs and capacity planning. Proficiency with network diagnostic tools and expertise to troubleshoot at L3/ SME level. Working experience of deploying monitoring tools (SolarWinds, ManageEngine, Nagios or Zabbix), integrating with ITSM solutions (i.e. ServiceNow) Good knowledge on setting up Network Security solutions, perimeter Firewall (Palo Alto, Check Point), DMZ, EDR solutions, Antivirus, PAM, SASE enabled SD-WAN Familiarity of cloud managed network services, cloud Meraki solutions. Having multi-vendor end-to-end implementation experience involving network setup and configuration Good To Have Familiarity with tools like Ansible, Puppet, and Chef to automate network configurations and management. Understanding on network automation- Network digital twin, service catalogue, AI/ML enabled solutions, CI/CD Skills in writing network automation scripts using languages like Python, Bash, or PowerShell. 3rd party API integration, configuration, and monitoring Understanding of 5G networks, IoT networking concepts, connectivity protocols and security Network slicing for 5G networks. Show more Show less
Posted 1 week ago
6.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Position Summary... What you'll do... Skillset: Java with Devops Experience: 6 - 12 years Job Description Summary: Responsible for building, automating, and maintaining high-performance, scalable, and reliable cloud-based systems that support millions of Walmart business users and suppliers within the Enterprise Business Services. About Team: Walmart’s Enterprise Business Services (EBS) is a powerhouse of several exceptional teams delivering world-class technology solutions and services making a profound impact at every level of Walmart. As a key part of Walmart Global Tech, our teams set the bar for operational excellence and leverage emerging technology to support millions of customers, associates, and stakeholders worldwide. Each time an associate turns on their laptop, a customer makes a purchase, a new supplier is onboarded, the company closes the books, physical and legal risk is avoided, and when we pay our associates consistently and accurately, that is EBS. Joining EBS means embarking on a journey of limitless growth, relentless innovation, and the chance to set new industry standards that shape the future of Walmart. What you'll do: You are responsible for coding, unit testing, building high performance and scalable applications that meet the demands of Walmart home office users and suppliers across the world. You are responsible for automating deployments, monitoring systems, and ensuring high availability and performance of cloud-based applications and infrastructure. You are expected to be an intellectually curious engineer who is passionate about accounting, supply chain and technology in general. What you'll bring: You have 7 to 12 years of software engineering and DevOps experience in Java, Spring Boot technology stack. Strong knowledge of CI/CD pipelines, infrastructure as code, and system automation. Hands-on experience with Java 14 or above, including lambda functions and related technologies. Proficiency in writing modular and testable code and test cases using frameworks like Junit, Mockito and MockMVC Strong debugging, profiling, and performance tuning skills. Experience with microservices architecture and a solid understanding of distributed systems and cloud-native design principles. Hands-on experience with Spring Boot, RESTful services, and containerization tools like Docker and Kubernetes. Experience with cloud platforms, especially Azure and GCP, including services like Compute Engine, App Services, Cloud Functions, and monitoring tools. Proficiency in infrastructure automation tools such as Terraform, Ansible, or ARM templates. Experience with monitoring and alerting tools like Prometheus, Grafana, Splunk, and cloud-native monitoring solutions. Familiarity with relational and NoSQL databases, including Cosmos DB. Experience with messaging and pub/sub systems like Kafka. Strong experience with CI/CD tools such as Jenkins, GitHub Actions, Maven, and Gradle. Experience to cloud security, cost optimization, and operational excellence in cloud environments. Experience in frontend technologies like React, Angular, and JavaScript is preferable and considered a plus. About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. That’s what we do at Walmart Global Tech. We’re a team of software engineers, data scientists, cybersecurity expert's and service professionals within the world’s leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Belonging We aim to create a culture where every associate feels valued for who they are, rooted in respect for the individual. Our goal is to foster a sense of belonging, to create opportunities for all our associates, customers and suppliers, and to be a Walmart for everyone. At Walmart, our vision is "everyone included." By fostering a workplace culture where everyone is—and feels—included, everyone wins. Our associates and customers reflect the makeup of all 19 countries where we operate. By making Walmart a welcoming place where all people feel like they belong, we’re able to engage associates, strengthen our business, improve our ability to serve customers, and support the communities where we operate. Equal Opportunity Employer Walmart, Inc., is an Equal Opportunities Employer – By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing unique styles, experiences, identities, ideas and opinions – while being inclusive of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 3years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 5 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, GISF, CISSP, CCSP, or GSEC, Master’s degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 1 year’s experience leading information security or cybersecurity projects Information Technology - CISCO Certification - Certification Primary Location... Rmz Millenia Business Park, No 143, Campus 1B (1St -6Th Floor), Dr. Mgr Road, (North Veeranam Salai) Perungudi , India R-2197113 Show more Show less
Posted 1 week ago
3.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Position Summary... What you'll do... Skillset: Java with Devops Experience: 3 - 8 years Job Description Summary: Responsible for building, automating, and maintaining high-performance, scalable, and reliable cloud-based systems that support millions of Walmart business users and suppliers within the Enterprise Business Services. About Team: Walmart’s Enterprise Business Services (EBS) is a powerhouse of several exceptional teams delivering world-class technology solutions and services making a profound impact at every level of Walmart. As a key part of Walmart Global Tech, our teams set the bar for operational excellence and leverage emerging technology to support millions of customers, associates, and stakeholders worldwide. Each time an associate turns on their laptop, a customer makes a purchase, a new supplier is onboarded, the company closes the books, physical and legal risk is avoided, and when we pay our associates consistently and accurately, that is EBS. Joining EBS means embarking on a journey of limitless growth, relentless innovation, and the chance to set new industry standards that shape the future of Walmart. What you'll do: You are responsible for coding, unit testing, building high performance and scalable applications that meet the demands of Walmart home office users and suppliers across the world. You are responsible for automating deployments, monitoring systems, and ensuring high availability and performance of cloud-based applications and infrastructure. You are expected to be an intellectually curious engineer who is passionate about accounting, supply chain and technology in general. What you'll bring: You have 4 to 8 years of experience in software engineering and DevOps with a strong foundation in Java and Spring Boot. Strong knowledge of CI/CD pipelines, infrastructure as code, and system automation. Hands-on experience with Java 14 or above, including lambda functions and related technologies. Proficiency in writing modular and testable code and test cases using frameworks like Junit, Mockito and MockMVC Strong debugging, profiling, and performance tuning skills. Experience with microservices architecture and a solid understanding of distributed systems and cloud-native design principles. Hands-on experience with Spring Boot, RESTful services, and containerization tools like Docker and Kubernetes. Experience with cloud platforms, especially Azure and GCP, including services like Compute Engine, App Services, Cloud Functions, and monitoring tools. Proficiency in infrastructure automation tools such as Terraform, Ansible, or ARM templates. Experience with monitoring and alerting tools like Prometheus, Grafana, Splunk, and cloud-native monitoring solutions. Familiarity with relational and NoSQL databases, including Cosmos DB. Experience with messaging and pub/sub systems like Kafka. Strong experience with CI/CD tools such as Jenkins, GitHub Actions, Maven, and Gradle. Prior exposure to cloud security, cost optimization, and operational excellence in cloud environments is a plus. Experience in frontend technologies like React, Angular, and JavaScript is preferable and considered a plus. About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. That’s what we do at Walmart Global Tech. We’re a team of software engineers, data scientists, cybersecurity expert's and service professionals within the world’s leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Belonging We aim to create a culture where every associate feels valued for who they are, rooted in respect for the individual. Our goal is to foster a sense of belonging, to create opportunities for all our associates, customers and suppliers, and to be a Walmart for everyone. At Walmart, our vision is "everyone included." By fostering a workplace culture where everyone is—and feels—included, everyone wins. Our associates and customers reflect the makeup of all 19 countries where we operate. By making Walmart a welcoming place where all people feel like they belong, we’re able to engage associates, strengthen our business, improve our ability to serve customers, and support the communities where we operate. Equal Opportunity Employer Walmart, Inc., is an Equal Opportunities Employer – By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing unique styles, experiences, identities, ideas and opinions – while being inclusive of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 2years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 4 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, Network+, GISF, GSEC, CISSP, or CCSP, Master’s degree in Computer Science, Information Technology, Engineering, Information Systems, Cybersecurity, or related area Primary Location... Pardhanani Wilshire Ii, Cessna Business Park, Kadubeesanahalli Village, Varthur Hobli , India R-2197093 Show more Show less
Posted 1 week ago
6.0 years
0 Lacs
Andaman and Nicobar Islands, India
On-site
Rockwell Automation is a global technology leader focused on helping the world’s manufacturers be more productive, sustainable, and agile. With more than 28,000 employees who make the world better every day, we know we have something special. Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that’s you we would love to have you join us! Job Description Job Summary: In this role, you will be an integral part of the IT organization. The candidate need to have a demonstrated understanding of Information Security, Computer Networking, the Software Development Life Cycle (SDLC) and an extensive experience in interacting with customers. Candidate must have Security Information and Event Management (SIEM) expertise and be willing to get trained on the company platform and products. You will report to the Cyber Security Manager. Your Responsibilities This is a technical, hands-on role to focus on maintaining the SIEM platform, working with team members and stakeholders as well as training and enabling teams for successful adoption of the SIEM platform. Manage platform, agent, and app\add-on log source integration upgrades. Develop alerts, reports, data models, dashboards, and connectors to support custom user requirements. Recognise patterns and inconsistencies that could indicate complex cyber-attacks. Develop SIEM correlation rules to detect new threats beyond current capabilities. Assist with designing and documenting work processes. Perform log file analysis as and when required. Develop recommendations in collaboration with other team members to maximise Enterprise capabilities in prevention, detection, analysis, containment, eradication, and recovery from cyber-attacks. Contribute to CTI (Cyber Threat Intelligence) data gathering, reporting, and analysis activities. Leverage automation and orchestration solutions to automate repetitive tasks. Research and explore new avenues to by using the latest technologies and cybersecurity standards. The Essentials - You Will Have Bachelor's degree in cyber security, Computer Science, Information Systems, Software Engineering, Computer Engineering or related field, or equivalent work experience. Typically requires a minimum of 6 years of experience in the Information Security field. 1+ years of experience in SIEM and UEBA solutions such as Splunk, LogRhythm and Elastic. Understanding of log collection methodologies and aggregation techniques such as Syslog, NXlog and Windows Event Forwarding. Working knowledge of cloud platforms such as AWS, Azure and GCP. The Preferred - You Might Also Have Strong knowledge of at least one programming or scripting language (ex. Python, PowerShell, PHP, Perl) is preferrable. Understanding of security models and frameworks (ex. MITRE ATT&CK, MITRE D3FEND, Cyber Kill Chain (CKC)). Demonstrated experience providing customer-driven solutions or service. Ability to communicate effectively with all levels of an organisation from Engineering, Operations to C-level audiences. Security certifications (Security+, GSEC, GCIH, GCIA, CISSP, NCSF etc.) will be an added advantage. Sentinel and Datalake experience are preferrable. Familiar with Risk-based Alerting (RBA) frameworks and implementation. Experienced in architecting, planning, deploying, and using SIEM or UEBA platforms. Experienced in integrating or using endpoint security and host-based intrusion detection solutions. Extensive knowledge and understanding of directory services. Demonstrated experience in one of the following fields Cyber Threat Intelligence, Incident Response, or Computer Forensics is preferrable. Having solid knowledge of one or more programming or scripting language such as Python, PowerShell, PHP and Perl is preferrable. What We Offer Our benefits package includes … Comprehensive mindfulness programmes with a premium membership to Calm. Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching programme – Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program. Personalised wellbeing programmes through our OnTrack programme. On-demand digital course library for professional development. and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. Rockwell Automation’s hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office. Show more Show less
Posted 1 week ago
3.0 years
0 Lacs
Andhra Pradesh, India
On-site
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In cybersecurity incident management at PwC, you will focus on effectively responding to, and mitigating, cyber threats, maintaining the security of client systems and data. You will be responsible for identifying, analysing, and resolving security incidents to minimise potential damage and protect against future attacks. Driven by curiosity, you are a reliable, contributing member of a team. In our fast-paced environment, you are expected to adapt to working with a variety of clients and team members, each presenting varying challenges and scope. Every experience is an opportunity to learn and grow. You are expected to take ownership and consistently deliver quality work that drives value for our clients and success as a team. As you navigate through the Firm, you build a brand for yourself, opening doors to more opportunities. Skills Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to: Apply a learning mindset and take ownership for your own development. Appreciate diverse perspectives, needs, and feelings of others. Adopt habits to sustain high performance and develop your potential. Actively listen, ask questions to check understanding, and clearly express ideas. Seek, reflect, act on, and give feedback. Gather information from a range of sources to analyse facts and discern patterns. Commit to understanding how the business works and building commercial awareness. Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements. Associate Qualifications Cybersecurity Risk & Controls Assessor Job Description 1–3 years of experience in IT audit, IT risk assessment, or cybersecurity compliance. Experience supporting internal or external audits. Familiarity with common control frameworks such as NIST CSF, NIST 800-53, ISO 27001, SOC 2, COBIT, or HIPAA. Ability to understand and evaluate technical environments (e.g., IAM, cloud platforms, network security). Strong organizational and analytical skills; ability to work independently and within teams. Strong written and verbal communication skills, particularly around documentation of controls and findings. High attention to detail and ability to manage multiple concurrent assessments. Exposure to IAM systems, cloud security, or endpoint protection technologies. Familiarity with GRC tools (e.g., ServiceNow GRC, RSA Archer). Working knowledge of IT general controls (ITGCs), risk assessment methods, and compliance reporting. Professional certifications preferred (e.g., CISA, CRISC, Security+, or ISO 27001 Lead Implementer). Senior Associate Qualifications 4-6 years of experience in IT audit, IT risk assessment, or cybersecurity compliance Experience supporting internal or external audits. Familiarity with common control frameworks such as NIST CSF, NIST 800-53, ISO 27001, SOC 2, COBIT, or HIPAA. Ability to understand and evaluate technical environments (e.g., IAM, cloud platforms, network security). Strong organizational and analytical skills; ability to work independently and within teams. Strong written and verbal communication skills, particularly around documentation of controls and findings. High attention to detail and ability to manage multiple concurrent assessments. Exposure to IAM systems, cloud security, or endpoint protection technologies. Familiarity with GRC tools (e.g., ServiceNow GRC, RSA Archer). Working knowledge of IT general controls (ITGCs), risk assessment methods, and compliance reporting. Professional certifications preferred (e.g., CISA, CRISC, Security+, or ISO 27001 Lead Implementer). Key Responsibilities Assist in the execution of IT and cybersecurity control assessments based on regulatory, industry, and internal frameworks (e.g., NIST 800-53, ISO 27001, SOC 2). Collect and review evidence from system owners and control operators to support control testing and validation. Perform control testing and document results in line with internal assessment methodology. Collaborate with SMEs and business teams to understand technical implementations and control applicability. Identify control gaps, exceptions, or risk themes, and support remediation tracking. Support reporting of findings, risks, and recommendations to management and risk stakeholders. Maintain documentation for audit trails and ensure compliance with assessment timelines and procedures. Assist in the continuous improvement of assessment procedures and templates. Leverage tools such as ServiceNow, Archer, or custom GRC platforms for evidence tracking, issue logging, and reporting. Show more Show less
Posted 1 week ago
3.0 years
0 Lacs
Andhra Pradesh, India
On-site
A career in our Managed Services team will provide you an opportunity to collaborate with a wide array of teams to help our clients implement and operate new capabilities, achieve operational efficiencies, and harness the power of technology. Our Cyber Managed Services team will provide you with the opportunity to help our clients implement effective cybersecurity programs that protect against threats, propel transformation, and drive growth. As companies continue their transformations to digital business models, exponentially more data is generated and shared among organizations, partners and customers. You’ll play an integral role in helping our clients protect their businesses by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and mitigate risks while increasing the value they derive from their cybersecurity investments. Our Identity and Access Management Managed Services team helps organisations by designing and implementing end to end IAM programs, as well as providing ongoing operations support with continuous operational improvements. To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be a purpose-led and values-driven leader at every level. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future. Responsibilities As a Senior Associate, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to: Use feedback and reflection to develop self awareness, personal strengths and address development areas. Delegate to others to provide stretch opportunities, coaching them to deliver results. Demonstrate critical thinking and the ability to bring order to unstructured problems. Use a broad range of tools and techniques to extract insights from current industry or sector trends. Review your work and that of others for quality, accuracy and relevance. Know how and when to use tools available for a given situation and can explain the reasons for this choice. Seek and embrace opportunities which give exposure to different situations, environments and perspectives. Use straightforward communication, in a structured way, when influencing and connecting with others. Able to read situations and modify behavior to build quality relationships. Uphold the firm's code of ethics and business conduct. Associate Qualifications Cybersecurity Risk & Controls Assessor Job Description 1–3 years of experience in IT audit, IT risk assessment, or cybersecurity compliance. Experience supporting internal or external audits. Familiarity with common control frameworks such as NIST CSF, NIST 800-53, ISO 27001, SOC 2, COBIT, or HIPAA. Ability to understand and evaluate technical environments (e.g., IAM, cloud platforms, network security). Strong organizational and analytical skills; ability to work independently and within teams. Strong written and verbal communication skills, particularly around documentation of controls and findings. High attention to detail and ability to manage multiple concurrent assessments. Exposure to IAM systems, cloud security, or endpoint protection technologies. Familiarity with GRC tools (e.g., ServiceNow GRC, RSA Archer). Working knowledge of IT general controls (ITGCs), risk assessment methods, and compliance reporting. Professional certifications preferred (e.g., CISA, CRISC, Security+, or ISO 27001 Lead Implementer). Senior Associate Qualifications 4-6 years of experience in IT audit, IT risk assessment, or cybersecurity compliance Experience supporting internal or external audits. Familiarity with common control frameworks such as NIST CSF, NIST 800-53, ISO 27001, SOC 2, COBIT, or HIPAA. Ability to understand and evaluate technical environments (e.g., IAM, cloud platforms, network security). Strong organizational and analytical skills; ability to work independently and within teams. Strong written and verbal communication skills, particularly around documentation of controls and findings. High attention to detail and ability to manage multiple concurrent assessments. Exposure to IAM systems, cloud security, or endpoint protection technologies. Familiarity with GRC tools (e.g., ServiceNow GRC, RSA Archer). Working knowledge of IT general controls (ITGCs), risk assessment methods, and compliance reporting. Professional certifications preferred (e.g., CISA, CRISC, Security+, or ISO 27001 Lead Implementer). Key Responsibilities Assist in the execution of IT and cybersecurity control assessments based on regulatory, industry, and internal frameworks (e.g., NIST 800-53, ISO 27001, SOC 2). Collect and review evidence from system owners and control operators to support control testing and validation. Perform control testing and document results in line with internal assessment methodology. Collaborate with SMEs and business teams to understand technical implementations and control applicability. Identify control gaps, exceptions, or risk themes, and support remediation tracking. Support reporting of findings, risks, and recommendations to management and risk stakeholders. Maintain documentation for audit trails and ensure compliance with assessment timelines and procedures. Assist in the continuous improvement of assessment procedures and templates. Leverage tools such as ServiceNow, Archer, or custom GRC platforms for evidence tracking, issue logging, and reporting. Show more Show less
Posted 1 week ago
3.0 years
0 Lacs
Thane, Maharashtra, India
On-site
Responsibilities Design, implement, and maintain comprehensive cybersecurity measures for safeguarding systems, networks, and sensitive data. Administer and optimize cybersecurity infrastructure including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint detection and response (EDR), privileged access management (PAM), and cloud security posture management (CSPM) platforms. Perform regular security assessments and audits to proactively identify vulnerabilities, prioritizing and addressing remediations. Continuously monitor network and system activity for suspicious behavior or potential threats, performing detailed risk analysis and incident investigation. Serve as a vital member of the Incident Response Team, effectively addressing cybersecurity breaches and minimizing business impact. Develop, document, and execute emergency response plans, disaster recovery protocols, and incident playbooks. Collaborate closely with IT teams and various business units to integrate robust security practices across the organization. Partner actively with the Security Operations team to stay ahead of emerging ransomware, phishing campaigns, and zero-day vulnerabilities, and implement appropriate preventive measures. Contribute to the creation, review, and enforcement of cybersecurity policies and procedures, ensuring compliance with applicable regulations and industry standards. Generate clear, concise, and timely reports on security posture, threats, incidents, and mitigation measures for senior management. Stay abreast of industry developments, emerging threats, innovative technologies, and best practices to continually enhance cybersecurity defenses. Recommend improvements to security architecture, technology adoption, and procedures based on threat intelligence and industry advancements. Perform additional cybersecurity-related duties as required. Basic Qualifications Minimum 3 years of experience in cybersecurity roles, with a solid understanding of network infrastructure and database security. Demonstrated proficiency in security technologies including firewalls, VPN, IDS/IPS, endpoint protection, encryption, and cloud security. Hands-on experience working in diverse environments such as cloud, hybrid-cloud, multi-cloud, and on-premises systems. Familiarity with cybersecurity frameworks (e.g., NIST, ISO 27001) and regulatory standards (e.g., GDPR, HIPAA). Strong analytical, critical thinking, and problem-solving capabilities. Excellent written and verbal communication skills in English, with proven ability to collaborate effectively across teams. Relevant industry certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) strongly preferred. Ability to travel domestically or internationally up to 10% as needed. Preferred Characteristics Bachelor’s or Master's degree in Computer Science, Information Security, or related technical fields. Experience securing Operational Technology (OT) systems in global manufacturing environments. Expertise in defending against sophisticated threats, including nation-state threat actors. Prior U.S. Security Clearance or experience in highly regulated environments. Familiarity and experience conducting audits and maintaining compliance with standards such as SOC, ISO 27001/27017/27018/27701, FedRAMP, SOX 404, HITRUST CSF, HIPAA, GxP, 21 CFR Part 11, EU Annex 11, and NIST guidelines. Proficiency in scripting languages such as Python, Shell, Ruby, or Perl. Previous experience in corporate IT, help desk, or infrastructure support roles. Show more Show less
Posted 1 week ago
2.0 years
0 Lacs
Cochin
On-site
The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Requirements Must-haves: 2-3 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Knowledge of creating and modifying the dashboards. Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows Deep Knowledge in SIEM, Ticketing tool, EDR, Vulnerability Management, MimeCast, DMARC tool. Excellent written and verbal communication skills. Good to have: · Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others Main Responsibilities Tier 1 SOC analysts are incident responders, remediating serious attacks escalated from junior analyst, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments(CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Leading efforts to counter SLA breaches and anticipating the likelihood of future security alerts,incidents. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone),based on the security event severity and suspicious activities, escalate to managed service support teams, tier 2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when newthreats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. · Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Keep updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats in security perspective. Other responsibilities and additional duties as assigned by the security management team or service delivery manager. Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting Job Types: Full-time, Permanent Pay: Up to ₹70,000.00 per month Benefits: Internet reimbursement Schedule: Day shift Supplemental Pay: Performance bonus Application Question(s): Do you have any experience in SIEM Tools? Experience: minimum: 2 years (Required) Language: English (Required) Location: Kochi, Kerala (Required) Work Location: In person
Posted 1 week ago
2.0 years
10 Lacs
India
On-site
Job Title: SOC Engineer / IT Security Specialist Exp : 2 to 4 years Job location : Mumbai - Fort (On site) Department: Information Security / SOC Reports to: CISO / Security Lead Role Summary: Responsible for managing and enhancing the organization's security posture through continuous monitoring, compliance tracking, risk assessment, policy enforcement, and incident response. Ensures alignment with internal policies, regulatory standards, and industry best practices. Key Responsibilities :Technology & Compliance: Regularly review security tools and systems for compliance and hardening. Maintain and update internal security policies and ensure adherence. Track compliance with regulatory standards (SEBI, RBI, CERT-IN, ISO 27001, etc.). Prepare compliance and audit reports for senior management. SOC Operations & Governance: Oversee 24/7 SOC operations, threat monitoring, and incident handling. Track and report actionable audit/compliance items to closure. Provide weekly/monthly security dashboards and risk summaries to CISO. Risk & Incident Management: Conduct regular risk assessments and implement mitigation strategies. Develop and maintain incident response plans and ensure timely resolution of security breaches. Lead efforts in cyber resiliency and recovery from security incidents. Security Architecture & Monitoring: Design secure network/system architectures and monitor them continuously. Manage SIEM, EDR/XDR, NAC, and other security tools for threat detection. Oversee access control, patch management, and vulnerability remediation. Cloud & Data Security: Implement and manage security measures across cloud platforms (AWS, Azure, GCP). Ensure data protection via encryption, DLP, DAM, and secure storage practices. Governance, Risk & Compliance (GRC): Maintain alignment with GDPR, HIPAA, PCI DSS, ISO 27001, and other standards. Collaborate across teams to ensure integrated GRC efforts and audit preparedness. Training & Awareness: Conduct employee security training and awareness programs. Promote a culture of cybersecurity across the organization. Preferred Skills & Qualifications:Technical Skills: Experience with tools like EDR/XDR, FIM, DAM, DLP, WAF, IPS/IDS, and firewalls. Knowledge of OS security (Windows, Linux, macOS), network security, and secure coding practices. Proficiency in encryption, vulnerability scanning, and SIEM tools. Certifications (Preferred): CISSP, CISM, CEH, CISA, CompTIA Security+, ISO 27001, ISO 22301. Soft Skills: Strong analytical thinking and problem-solving abilities. Excellent documentation and reporting skills. Collaborative mindset with the ability to train and influence others. Resilient under pressure and eager to stay current with cybersecurity trends. Job Types: Full-time, Permanent Pay: Up to ₹1,000,000.00 per year Benefits: Flexible schedule Health insurance Paid sick time Paid time off Provident Fund Schedule: Day shift Monday to Friday Application Question(s): How many relevant years of exp do you have ? What is your current location ? Work Location: In person
Posted 1 week ago
5.0 years
0 Lacs
Bengaluru
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Description for Defender M365 Consultant: Key Capabilities: Core experience in handling technical administration and troubleshooting activities related to M365 Defender suite. Needs to be able to design and implement architecture for the whole Defender M365 suite. Act as a security consultant for strategic, advisory and future state consultations on the Microsoft Defender Architecture Design the Defender M365 architecture across on-prem and multi-clouds. Experience in migration from legacy endpoint security technologies to Microsoft Security Stack and integration to current incident response processes Building and sharing knowledge assets through executed engagements, industry connects, research and development. Supporting presales initiatives with regards to Microsoft Security such as answering RFPs, client presentations, demos. Conducting maturity assessments and develop maturity model Qualification & Experience: 5-7 years of experience in Cyber Security Experienced in the below different Microsoft Defender M365 suite: Microsoft Defender for Endpoint Microsoft Defender Vulnerability Management Microsoft Defender for Office 365 Microsoft Defender for Identity Microsoft Defender for Cloud Apps Knowledge on Microsoft O365 Security, Microsoft Azure Security, Microsoft Azure AD Security Capable of leading security projects single handedly. Good business acumen to understand client requirements and build strong relationships. Strong oral, written and listening skills are an essential component to effective consulting. Good to have knowledge of Vulnerability Management, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting Good to have knowledge on Defender for Cloud Certification in any other SIEM Solution Certifications in a core security related discipline (CEH, Security+, etc.) will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 week ago
10.0 years
2 - 5 Lacs
Bengaluru
On-site
W e help the world run better A t SAP, we enable you to bring out your best. Our company culture is focused on collaboration and a shared passion to help the world run better. How? We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences, values flexibility, and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative, caring team environment with a strong focus on learning and development, recognition for your individual contributions, and a variety of benefit options for you to choose from. WHAT YOU'LL DO: A s part of this global team, you’ll be involved in projects and services including bug bounty programs where you can: C ombine technical expertise with communication skills to effectively manage time sensitive and confidential product vulnerability reports. A dvise and work closely with researchers and the engineering teams to drive the timely delivery of security patches. W ork closely with stakeholders in ensuring an aligned delivery of security advisories to customers. W HAT YOU BRING: 6 to 10 years of total experience with 4+ years of relevant experience in Security domain. B achelor or master’s degree in computer science, information systems, or a related engineering discipline with enthusiasm for cybersecurity and Artificial Intelligence(AI). F undamental understanding of AI concepts, including machine learning, deep learning, natural language processing, and data analytics. A wareness of common AI algorithms and models, their applications, and limitations. D eep understanding on AI relevant security vulnerabilities and ability to interpret using right metrics. S tay current with the latest advancements in AI, ML, and cybersecurity. C onduct continuous research on emerging threats and vulnerabilities related to AI to improve knowledge base and support stakeholders. P rovide technical guidance and training on AI-related security initiatives. H ands-on experience in using tools like Burp Suite is preferred I ndustry specific security related certifications (e.g., Security+, CEH, CISSP, OSCP, CISA, CCSK) preferred. A ny relevant AI/ML certifications preferred. E xcellent problem-solving and analytical skills. S trong communication and teamwork abilities with Skills to communicate technical concepts and AI insights to non-technical stakeholders. A bility to work in a fast-paced, dynamic environment and manage multiple tasks simultaneously. M EET YOUR TEAM: T he SAP Security Patch Quality Assurance Team is a dynamic international team comprising experienced security experts that manage the quality assurance of the security patches for vulnerabilities reported by independent security researchers, customers, partners together with engineering teams across SAP # QualityAssurance, #SAPApplicationSecurity, #SAPSecurityNotes, #SecurityResearchers, #0-days, #SecurityExploits, #PatchManagement, #AI B ring out your best S AP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, you can bring out your best. W e win with inclusion S AP’s culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone – regardless of background – feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world. SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team: Careers@sap.com For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program, according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training. E OE AA M/F/Vet/Disability: Q ualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, age, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability. Successful candidates might be required to undergo a background verification with an external vendor. R
Posted 1 week ago
6.0 years
4 - 6 Lacs
Bengaluru
On-site
Rockwell Automation is a global technology leader focused on helping the world’s manufacturers be more productive, sustainable, and agile. With more than 28,000 employees who make the world better every day, we know we have something special. Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that’s you we would love to have you join us! Job Description Job Summary: In this role, you will be an integral part of the IT organization. The candidate need to have a demonstrated understanding of Information Security, Computer Networking, the Software Development Life Cycle (SDLC) and an extensive experience in interacting with customers. Candidate must have Security Information and Event Management (SIEM) expertise and be willing to get trained on the company platform and products. You will report to the Cyber Security Manager. Your Responsibilities: This is a technical, hands-on role to focus on maintaining the SIEM platform, working with team members and stakeholders as well as training and enabling teams for successful adoption of the SIEM platform. Manage platform, agent, and app\add-on log source integration upgrades. Develop alerts, reports, data models, dashboards, and connectors to support custom user requirements. Recognise patterns and inconsistencies that could indicate complex cyber-attacks. Develop SIEM correlation rules to detect new threats beyond current capabilities. Assist with designing and documenting work processes. Perform log file analysis as and when required. Develop recommendations in collaboration with other team members to maximise Enterprise capabilities in prevention, detection, analysis, containment, eradication, and recovery from cyber-attacks. Contribute to CTI (Cyber Threat Intelligence) data gathering, reporting, and analysis activities. Leverage automation and orchestration solutions to automate repetitive tasks. Research and explore new avenues to by using the latest technologies and cybersecurity standards. The Essentials - You Will Have: Bachelor's degree in cyber security, Computer Science, Information Systems, Software Engineering, Computer Engineering or related field, or equivalent work experience. Typically requires a minimum of 6 years of experience in the Information Security field. 1+ years of experience in SIEM and UEBA solutions such as Splunk, LogRhythm and Elastic. Understanding of log collection methodologies and aggregation techniques such as Syslog, NXlog and Windows Event Forwarding. Working knowledge of cloud platforms such as AWS, Azure and GCP. The Preferred - You Might Also Have: Strong knowledge of at least one programming or scripting language (ex. Python, PowerShell, PHP, Perl) is preferrable. Understanding of security models and frameworks (ex. MITRE ATT&CK, MITRE D3FEND, Cyber Kill Chain (CKC)). Demonstrated experience providing customer-driven solutions or service. Ability to communicate effectively with all levels of an organisation from Engineering, Operations to C-level audiences. Security certifications (Security+, GSEC, GCIH, GCIA, CISSP, NCSF etc.) will be an added advantage. Sentinel and Datalake experience are preferrable. Familiar with Risk-based Alerting (RBA) frameworks and implementation. Experienced in architecting, planning, deploying, and using SIEM or UEBA platforms. Experienced in integrating or using endpoint security and host-based intrusion detection solutions. Extensive knowledge and understanding of directory services. Demonstrated experience in one of the following fields Cyber Threat Intelligence, Incident Response, or Computer Forensics is preferrable. Having solid knowledge of one or more programming or scripting language such as Python, PowerShell, PHP and Perl is preferrable. What We Offer: Our benefits package includes … Comprehensive mindfulness programmes with a premium membership to Calm. Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching programme – Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program. Personalised wellbeing programmes through our OnTrack programme. On-demand digital course library for professional development. ... and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. #LI-Hybrid #LI-RS1 Rockwell Automation’s hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office.
Posted 1 week ago
6.0 years
3 - 7 Lacs
Bengaluru
On-site
We help the world run better At SAP, we enable you to bring out your best. Our company culture is focused on collaboration and a shared passion to help the world run better. How? We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences, values flexibility, and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative, caring team environment with a strong focus on learning and development, recognition for your individual contributions, and a variety of benefit options for you to choose from. WHAT YOU'LL DO: As part of this global team, you’ll be involved in projects and services including bug bounty programs where you can: Combine technical expertise with communication skills to effectively manage time sensitive and confidential product vulnerability reports. Advise and work closely with researchers and the engineering teams to drive the timely delivery of security patches. Work closely with stakeholders in ensuring an aligned delivery of security advisories to customers. WHAT YOU BRING: 6 to 10 years of total experience with 4+ years of relevant experience in Security domain. Bachelor or master’s degree in computer science, information systems, or a related engineering discipline with enthusiasm for cybersecurity and Artificial Intelligence(AI). Fundamental understanding of AI concepts, including machine learning, deep learning, natural language processing, and data analytics. Awareness of common AI algorithms and models, their applications, and limitations. Deep understanding on AI relevant security vulnerabilities and ability to interpret using right metrics. Stay current with the latest advancements in AI, ML, and cybersecurity. Conduct continuous research on emerging threats and vulnerabilities related to AI to improve knowledge base and support stakeholders. Provide technical guidance and training on AI-related security initiatives. Hands-on experience in using tools like Burp Suite is preferred Industry specific security related certifications (e.g., Security+, CEH, CISSP, OSCP, CISA, CCSK) preferred. Any relevant AI/ML certifications preferred. Excellent problem-solving and analytical skills. Strong communication and teamwork abilities with Skills to communicate technical concepts and AI insights to non-technical stakeholders. Ability to work in a fast-paced, dynamic environment and manage multiple tasks simultaneously. MEET YOUR TEAM: The SAP Security Patch Quality Assurance Team is a dynamic international team comprising experienced security experts that manage the quality assurance of the security patches for vulnerabilities reported by independent security researchers, customers, partners together with engineering teams across SAP #QualityAssurance, #SAPApplicationSecurity, #SAPSecurityNotes, #SecurityResearchers, #0-days, #SecurityExploits, #PatchManagement, #AI Bring out your best SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, you can bring out your best. We win with inclusion SAP’s culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone – regardless of background – feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world. SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team: Careers@sap.com For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program, according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training. EOE AA M/F/Vet/Disability: Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, age, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability. Successful candidates might be required to undergo a background verification with an external vendor. Requisition ID: 418729 | Work Area: Solution and Product Management | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid.
Posted 1 week ago
3.0 years
0 Lacs
Chennai
Remote
About Us: Barry-Wehmiller is a diversified global supplier of engineering consulting and manufacturing technology for the packaging, corrugating, sheeting and paper-converting industries. By blending people-centric leadership with disciplined operational strategies and purpose-driven growth, Barry-Wehmiller has become a $3 billion organization with nearly 12,000 team members united by a common belief: to use the power of business to build a better world. Job Description: About Barry Wehmiller: - Barry Wehmiller Companies is a global supplier of manufacturing technology and services based in St. Louis Missouri. Although it was founded in 1885 as a maker of machinery for the brewing industry, since 1987 Barry-Wehmiller has acquired more than 80 companies that provide equipment and services for a variety of industries: packaging, paper converting, sheeting, corrugating, engineering, and IT consulting. In 2016 it was ranked no. 10 on the St. Louis Business Journal's list of the city's Top 150 Privately Held Companies. We believe our culture differentiates us from other firms. In India, Barry-Wehmiller operates as a hub of innovation and collaboration, housing our Global Competency Center (GCC) and other strategic functions. The GCC, based in Chennai, is an Engineering Center of Excellence that supports all Barry-Wehmiller divisions globally. The center focuses on areas such as design and development in mechanical, electrical, and controls engineering, software development, and additive manufacturing. We believe in: Ownership – You’ll drive features end-to-end, from design to deployment. Flexibility – A friendly, results-oriented culture that respects your time. Empowerment – Your insights are valued, and your work makes a visible difference. Learning & Growth – You’ll work on complex challenges with smart, passionate peers—and have the support to level up continually. If you’re ready to bring your best thinking to the table and grow in a high-impact, future-focused environment, we’d love to hear from you. Job Description: The Enterprise IT Service Desk Workstation Vulnerability Analyst’s role is to help secure the company’s workstations against vulnerabilities. This will be done through analyzing scan data, researching vulnerabilities, and providing mitigation for said vulnerabilities within SLA timelines. Additionally, deployment of mitigations may be required. The Workstation Vulnerability Analyst will also need to present findings to IT leadership. Job Specifications: Proven analytical and problem-solving abilities. Ability to effectively prioritize and execute tasks in a fast-paced environment. Ability to shift between tasks as priorities change Strong written and oral communication skills. Strong troubleshooting skills and knowledge of IT hardware and software. Ability to conduct research into software issues and products as required. Strong organizational skills with keen attention to detail. Basic understanding of security principles, protocols, and technologies. Familiarity with vulnerability assessment tools (e.g., Nessus/Tenable, Qualys, OpenVAS) is a plus. Principal Duties and Responsibilities (Essential Functions): Analyze the results of vulnerability scans Understand business criticality of various systems Prioritize work based on risk Complete work within deadlines Assist in identifying and assessing vulnerabilities in the organization's systems, networks, and applications. Support the development and implementation of remediation plans to address identified vulnerabilities. Participate in regular vulnerability assessments and penetration tests to identify new security risks. Monitor security alerts and incidents and assist in determining the impact and necessary response. Assist with rollback if necessary Document and report on remediation activities, including progress and outcomes. Investigate and remediate malfunctioning security agents Function and communicate in a global support team. Analyze root cause and implement corrective solutions. Collaborate with IT, security, and development teams to ensure timely and effective remediation. When necessary, contact third-party software and PC equipment vendors. Maintain knowledge of current IT trends and advancements. Stay informed about the latest security threats, vulnerabilities, and mitigation techniques. Provide support to other teams on vulnerability management best practices. Required Education and Experience: An associate degree in the field of computer science or management information systems, and/or 3-5 years of related work experience is preferred. 3-5 years of vulnerability remediation preferred; experience with patch management and scripting is a plus. Experience working in a team-oriented, collaborative environment. Relevant certifications (e.g., CompTIA Security+, CEH) are a plus but not required. Travel: Travel could be up to 15% (in the country) as needed for remote support. What is it for you? This role is more than just a job. It’s an opportunity to be part of a global team that values people excellence, innovative solutions, and operational excellence. Barry-Wehmiller provides a unique environment where you can grow your skills, work on impactful projects, and collaborate with some of the brightest minds in the industry. In addition, we are deeply committed to your personal and professional growth, fostering a culture that helps you achieve your full potential. To understand more about our people-first philosophy, you may like to watch this short video by our CEO, Mr. Bob Chapman , on Truly Human Leadership : Watch the video At Barry-Wehmiller we recognize that people come with a wealth of experience and talent beyond just the technical requirements of a job. If your experience is close to what you see listed here, please still consider applying. We know that our differences often can bring about innovation, excellence and meaningful work—therefore, people from all backgrounds are encouraged to apply to our positions. Please let us know if you require reasonable accommodations during the interview process. Company: BW Corporate US
Posted 1 week ago
4.0 years
0 Lacs
Noida
On-site
Job Description: Essential Job Functions: Support security assessments, audits, and vulnerability scans, contributing to report generation and action items. Monitor security events and incidents, escalating as required and assisting in containment. Assist with the implementation of security policies and standards. Collaborate with the security team on documentation and process improvement. Participate in incident response activities, including investigations and reporting. Stay informed about emerging security threats and best practices. Contribute to security awareness training efforts. Seek opportunities for professional development in the security field. Basic Qualifications: Bachelor's degree in a relevant field or equivalent combination of education and experience Typically, 4+ years of relevant work experience in industry, with a minimum of 1+ years in a similar role Proven experience in information security analysis Proficiencies in security technologies and risk assessment A continuous learner that stays abreast with industry knowledge and technology Other Qualifications: Advanced degree in a relevant field is a plus Relevant certifications such as CompTIA Security+, CEH, or equivalent are a plus Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .
Posted 1 week ago
4.0 years
0 Lacs
Calcutta
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security - DPP- Risk – Consulting – Senior As part of our EY-Cyber security in the Risk Consulting team, your role will be primarily responsible for the daily monitoring and/or maintenance of the enterprise Data Protection tools/solutions. The main duties of the person in this role will include proper care and administration of the Data Protection tools, monitoring and responding to the alerts that generate from the tool. This person will interface with IT Operations, Network Operations, Infrastructure teams, Legal, Risk Management, etc. The opportunity We’re looking for Security Analyst in the Risk Consulting team to work on various privacy/data protection related projects for our customers across the globe. In line with EY’s commitment to quality, consultant shall confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, consultant shall help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your key responsibilities Build DATA PROTECTION solution concepts and deployment requirements Deploying DATA PROTECTION tools and implementation of endpoint protection. Work with vendors to support the DATA PROTECTION technology (troubleshooting, upgrades, etc.) Administration of the Data Protection tools which includes configuring policies, upgrading and patching, etc. Monitor and respond to alerts generated from the Data Protection systems and other technologies Understand and follow the incident response process through event escalations Respond to escalations by the Incident Response Team Follow processes to maintain the leading DATA LOSS PREVENTION/CASB system Assisting clients in privacy related incident response activities. Supporting the client’s team by acting as an interim team member (e.g., security officer, security manager, security analyst.) Skills and attributes for success Should be a good team player. Excellent verbal and written communication skill. Proficient Documentation and Power Point skills Good social, communication and technical writing skills Should interface with internal and external clients. Strong analytical/problem solving skills. Ability to prioritize tasks and work accurately under pressure to meet deadlines. Should understand and follow workplace policies and procedures. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. To qualify for the role, you must have Bachelor's or Master’s degree in Computer Science, Information Systems, Engineering or a related field. At least 4-6 years of experience in supporting Data Security Technology. At least 4-6 years of experience in two or more of the following: Information Security concepts related to Governance, Risk & Compliance Data Loss Prevention, CASB Technology support and Event Handling Experience of Administration of the DLP, CASB tools which includes configuring policies, upgrading and patching for leading vendors. (Digital Guardium, McAfee, Forcepoint, Netskope, Symantec CloudSOC, MCAS etc.) MS Purview/ CASB (Netskope/MS/Symantec). Knowledge of Digital Guardium is a Must. Technical/Vendor certification will be added advantage. Experience in utilizing and good knowledge of other data protection technology like Endpoint Security Suite, EDR, ATP will be added advantage. Maintain current data protection and privacy expertise, skills and competences. Ability to independently research and solve technical issues. Demonstrated integrity in a professional environment. Knowledge of core Information Security concepts related to Governance, Risk & Compliance. Ability to work in and adapt to a changing environment. Extend required support for any reported data protection and privacy incidents such as information breaches and leakages. Ability to communicate in a clear and concise manner. Ideally, you’ll also have Professional certificate or be actively pursuing related professional certifications such as the CompTia Security+, CEH, CISSP or Vendor/Technical certification. If not, certified candidates are expected to complete one of the business required certifications within 12 months of hire. To expect some weekend work and 20%-30% travel based on job requirement. What we look for A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What working at EY offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 week ago
8.0 years
0 Lacs
Indore, Madhya Pradesh, India
On-site
EXPERIENCE: 5 – 8 Years RESPONSIBILITIES (INCLUDES TASKS AND AUTHORITIES): Key Responsibilities Detect, identify, and promptly alert on potential attacks, intrusions, anomalous activities, and misuse, distinguishing them from benign events. Conduct research, analysis, and correlation across diverse data sets to identify indications and warnings of threats. Analyze network alerts from multiple sources and determine their root causes and potential impact. Provide daily summary reports of relevant network and security events. Notify and coordinate with managers and incident responders, clearly articulating event history, status, and potential business impact as per the incident response plan. Analyze and report on system security posture trends. Assess access controls based on the principles of least privilege and need-to-know. Perform vulnerability management, including scanning, analysis, and follow-up on critical vulnerabilities. Lead and participate in incident response activities, including root cause analysis and remediation recommendations. Develop, review, and maintain SIEM correlation rules and incident response playbooks. Provide mentorship and guidance to L1 SOC analysts, reviewing and escalating tickets as needed. Stay current with emerging threats, vulnerabilities, and regulatory security requirements. Required Skills & Experience 2–4 years of experience in a SOC environment, with at least 1 year in a Level 2 (L2) role Proficiency in Splunk SIEM: log analysis, rule creation, dashboarding, and incident investigation1 Hands-on experience with Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms. Strong knowledge of network security protocols, intrusion detection/prevention systems (IDS/IPS), and firewall/VPN technologies Ability to perform packet-level analysis using tools such as Wireshark or tcpdump Experience in malware analysis, digital forensics, and threat intelligence platforms1 Familiarity with authentication, authorization, and access control methods. Strong understanding of incident response and handling methodologies. Experience interpreting data from network tools (e.g., nslookup, ping, traceroute). Knowledge of Windows/Unix ports, services, and operating system command-line tools. Understanding of key security management concepts (e.g., patch management, release management). Excellent analytical, problem-solving, and communication skills Experience in documenting and reporting security incidents and trends. CERTIFICATIONS(Any three): Relevant certifications such as SPLUNK, Certified SOC Analyst (CSA) , CompTIA Security+: TECHNICAL SKILLS /COMPETENCIES: MANDATORY Experience with SIEM (e.g. Splunk, XDR) SIEM tools (e.g., Splunk, QRadar) Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) Firewall and VPN technologies Threat intelligence platforms & Endpoint detection and response tools Hands-on experience with Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms. Strong knowledge of network security protocols, intrusion detection/prevention systems (IDS/IPS), and firewall/VPN technologiesa Show more Show less
Posted 1 week ago
130.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Dentsply Sirona is the world’s largest manufacturer of professional dental products and technologies, with a 130-year history of innovation and service to the dental industry and patients worldwide. Dentsply Sirona develops, manufactures, and markets a comprehensive solutions offering including dental and oral health products as well as other consumable medical devices under a strong portfolio of world class brands. Dentsply Sirona’s products provide innovative, high-quality and effective solutions to advance patient care and deliver better and safer dentistry. Dentsply Sirona’s global headquarters is located in Charlotte, North Carolina, USA. The company’s shares are listed in the United States on NASDAQ under the symbol XRAY. Bringing out the best in people As advanced as dentistry is today, we are dedicated to making it even better. Our people have a passion for innovation and are committed to applying it to improve dental care. We live and breathe high performance, working as one global team, bringing out the best in each other for the benefit of dental patients, and the professionals who serve them. If you want to grow and develop as a part of a team that is shaping an industry, then we’re looking for the best to join us. Working At Dentsply Sirona You Are Able To Develop faster - with our commitment to the best professional development. Perform better - as part of a high-performance, empowering culture. Shape an industry - with a market leader that continues to drive innovation. Make a difference -by helping improve oral health worldwide. Scope The Senior Security Analyst is responsible for maintaining security systems, implementing process automation, and responding to security incidents. They must have a thorough understanding of both cloud-based and on-prem environments and threats. They serve as an escalation point for incident response and the support of security toolsets. They must be capable of working on multiple projects and alerts with general supervision. Key Responsibilities Administer, monitor, and maintain cloud-based and on-prem security systems. Coordinate the implementation and upgrade of security systems. Administer, monitor, and maintain automated security response tools. Develop and maintain automated security processes and workflows. Investigate and remediate security related alerts for both cloud-based and on-prem systems. Investigate and remediate security policy violations. Research threat actors, tactics, techniques, procedures, malware, and other IOCs. Engineer and tune custom alerts for security systems. Research emerging security technologies and make recommendations to influence security initiatives. Assist with documentation and training related to security systems. Act as an escalation point and mentor for junior analysts. Act as an escalation point and oversee relationship with hosted SOC. Act as a technical point of contact during security incidents. Prepare security reports for benchmarking security efficiency. Collaborate with cross-functional teams to support security initiatives of varying complexity. Typical Background Education: BS/BA Degree in Computer Information Systems, Computer Science, Information Systems Management, or equivalent professional experience Certifications/Licensing: COMPTIA Security+, CEH, CISSP, GIAC Security Essentials, CCNA Security, Google Professional Cloud Security Engineer Years and Type of Experience: 6+ years of experience in Information Systems with at least 2 years of formal experience in Cyber Security. Excellent English written and spoken communication skills with the ability to explain technical information to non-technical people. Key Required Skills, Knowledge And Capabilities Experience with the Microsoft Suite of Security Tools. Experience with configuration and management of security solutions for Google Cloud, Microsoft Azure, and/or Amazon Web Services. Experience with configuration and management of endpoint security solutions including EDR and DLP. Experience with process and security automation. Experience with SIEM configuration, alert tuning, and KQL. Experience with configuration and management of Office 365 services and security solutions. Experience with incident response. Must have excellent technical writing and research skills. Experience with Microsoft Windows, Linux, and macOS. Willing to work non-standard hours and be on-call. Team player. Ability to work with ambiguity. Resilience to change. Communication skills. Integrity. Open minded, respectful, empathetic ability to work in a multicultural environment. Analytical thinking, problem solving. Dentsply Sirona is an Equal Opportunity/ Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, sexual orientation, disability, or protected Veteran status. We appreciate your interest in Dentsply Sirona. If you need assistance with completing the online application due to a disability, please send an accommodation request to careers@dentsplysirona.com. Please be sure to include “Accommodation Request” in the subject. Show more Show less
Posted 1 week ago
2.0 years
0 Lacs
Jaipur, Rajasthan, India
On-site
Job Profile: Cyber Security Trainer/Mentor or Ethical Hacking Trainer/Mentor Job Location: Jaipur, Rajasthan Experience Required: 2+ Years About the Company: WsCube Tech is a Vernacular Upskilling Edtech offering Tech-powered Career Acceleration Programs and Courses developing Job-ready Professionals for Global workforce needs. WsCube Tech aims to create scalable impact and competitive-participation-shift with its Vernacular Tech-enabled Bridging Interfaces & Job-Oriented Skill Training Programs. In next 5 years, the Company aims to disrupt Career Readiness for over 100 Million Career Aspirants in deep demographics of “Bharat“ and set them competitively ready with hands-on skills to crack global career opportunities. WsCube Tech aims to combat the Learning Language barrier & Skill Mentorship lacuna with its Vernacular “Upskilling Bharat” Proposition. Website Link: https://www.wscubetech.com/ YouTube Channel Link: https://www.youtube.com/@wscubetech Position Overview : The Cyber Security Trainer is responsible for designing, developing, and delivering training programs that educate individuals and organizations on best practices in cyber security. This role involves creating comprehensive training materials, conducting engaging training sessions, and ensuring participants gain the necessary skills to protect their digital assets effectively. Key Responsibilities: Design, develop, and deliver cyber security training programs. Create and conduct training for various skill levels. Develop and update training materials. Design hands-on lab sessions and simulations. Develop assessment tools to evaluate knowledge and skills. Provide feedback and track participant progress. Stay updated on the latest cyber security developments. Attend industry events and network with professionals. Tailor training programs to meet specific client needs. Offer post-training support and consultation. Ensure training aligns with regulatory requirements and industry standards. Educate participants on compliance issues. Collect and analyze feedback to improve training. Innovate training methods and content. Collaborate with professionals to develop training solutions. Share best practices and new techniques. Qualifications: Bachelor’s degree in relevant field. Certifications like CISSP, CISM, CompTIA Security+, or similar. Proven experience in cyber security and training. Excellent presentation and communication skills. Strong analytical and problem-solving abilities. Ability to simplify complex concepts. Proficient with training tools and technologies. Strong organizational skills. Passionate, detail-oriented, and adaptable. Show more Show less
Posted 1 week ago
10.0 years
0 Lacs
Uttar Pradesh, India
Remote
Job Title: Security and IT Engineer Experience: 10+ years Location: Noida Department: Information Technology About Mulberri: Mulberri is an InsurTech startup transforming the business insurance landscape with AI, LLM, and Agentic AI solutions. Our products, such as CertBerri (AI-powered certificate of insurance automation) and IngestBerri (intelligent data ingestion for underwriting and compliance), are redefining efficiency for brokers, insurers, and businesses. Job Overview: We are seeking an experienced and proactive Security and IT Engineer to lead our IT security operations and support functions. This role is pivotal in safeguarding our digital assets, ensuring compliance, and providing reliable IT support across the organization. The ideal candidate will have a strong background in security frameworks, IT infrastructure, and user support. Key Responsibilities: Security Operations: • Support compliance initiatives (SOC 2, GDPR, etc.) through secure access control, encryption, and logging practices. • Monitor and respond vulnerabilities, and incidents. • Set up, maintain, and monitor intrusion detection and prevention systems. Network & IT Security: • Monitor and maintain VPN, firewall rules, and zero trust access configurations. • Administer and support MDM platforms like JAMF (for macOS) and Microsoft Intune (for Windows). • Ensure device compliance policies, patch management, encryption, and remote wipe capabilities are in place. IT Support: • Assist with user provisioning, hardware troubleshooting, and system access requests. • Handle secure onboarding/offboarding, SSO, and IAM tooling integrations (good to have) Qualifications: • Proven experience in IT operations and cybersecurity. • Strong knowledge of compliance standards (e.g., SOC 2, GDPR). • Hands-on experience with VPNs, firewalls, MDM solutions, and zero trust architecture. • Familiarity with JAMF, Microsoft Intune, SSO, and IAM platforms. • Excellent problem-solving, communication, and organizational skills. Preferred Certifications: • CISSP, CISM, CompTIA Security+, or equivalent certifications are advantageous Why Join Mulberri? • Be part of a fast-growing InsurTech startup revolutionizing the industry with AI & LLM. • Work on cutting-edge AI-driven insurance products with a direct impact on the market. • Collaborate with global teams and gain hands-on experience in the US insurance ecosystem. • Work from our Delhi/NCR office and be part of a dynamic and innovative team. • Drop your resume at radhika@mulberri.io. Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Pune, Maharashtra, India
Remote
Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! Qualys, a leading cybersecurity firm, is seeking an experienced Senior Technical Support Engineer for Security Applications to resolve global customer and partner service requests promptly. Collaborate across teams for high customer satisfaction in a secure environment. Ideal for security enthusiasts with solid networking skills. Lead in resolving technical issues, provide top-tier support, and contribute to world-class assistance. Responsibilities: Promptly resolve global customer and partner service requests in a highly secured environment. Collaborate with cross-functional teams for high customer satisfaction. Provide support via phone, email, and MS Teams for Product modules over the SaaS platform. Ensure friendly and professional customer interactions throughout the service life cycle. Act as the main point of contact for technical issues, collaborating directly with Development and QA teams. Thrive in a challenging and dynamic environment, delivering world-class support and technical solutions. Qualifications: 5+ years of technical support experience. Experience in Vulnerability Management and Web Application Security/Firewall application support. In-depth TCP/IP understanding and LAN/WAN infrastructure knowledge. Strong foundation in Windows and/or solid Linux/Unix experience in an enterprise environment. Familiarity with common OS services (IIS, BIND, Apache, AD, WINS, Samba, SSH). Knowledge of firewalls, Intrusion Detection System technologies, and Network Vulnerability Scanners. Outstanding troubleshooting and analytical skills. Excellent written and verbal communication skills. Bachelor of Science in Computer Science or equivalent experience. Networking: OSI Layer understanding. Knowledge of broadcast domain vs. collision domain. Familiarity with different records zones in DNS and how it works. Understanding of SSL Handshake and TCP/IP Handshake. Proficiency in ARP, DHCP, proxy servers, and DNS cache clearing. Differentiation between TCP and UDP, and protocols & their workings. Linux/Unix: Understanding of the boot process and run levels. Various ways to assign an IP address to a Unix/Linux/Debian machine. Proficient in checking running processes, hidden files, and installing packages. Knowledge of sudo, permissions, file systems, and SSH banner. Windows: Insight into the Windows boot process and control panel basics. Understanding of UAC, registry hives, and remote registry manipulation tools. Knowledge of kernel mode vs. user mode, Active Directory, and Group Policies. Familiarity with Kerberos and NTLM authentication, Procmon, and service control manager. Security: Understanding of vulnerabilities, the vulnerability cycle, and exploits. Knowledge of malware types (virus, trojan, worm) and False/True Positive/Negative concepts. Understanding of False Positive, False Negative, True Positive, and True Negative in the security context. Preferred: Experience with packet capture review and diagnosis. Previous API support and Regex knowledge. Scripting experience (Bash, Python). Knowledge of major web server software, UNIX/Windows web services, and diverse platforms. Oracle and Microsoft SQL knowledge. CCNA, MCSE, CISSP, CompTIA Security+, and CEH certifications are highly desirable. Experience with Customer Support and Development Tools (Salesforce, Jira, etc.). Willing to work in 24/7 rotational shifts. Show more Show less
Posted 1 week ago
0.0 - 2.0 years
0 Lacs
Kochi, Kerala
On-site
The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Requirements Must-haves: 2-3 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Knowledge of creating and modifying the dashboards. Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows Deep Knowledge in SIEM, Ticketing tool, EDR, Vulnerability Management, MimeCast, DMARC tool. Excellent written and verbal communication skills. Good to have: · Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others Main Responsibilities Tier 1 SOC analysts are incident responders, remediating serious attacks escalated from junior analyst, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments(CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Leading efforts to counter SLA breaches and anticipating the likelihood of future security alerts,incidents. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone),based on the security event severity and suspicious activities, escalate to managed service support teams, tier 2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when newthreats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. · Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Keep updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats in security perspective. Other responsibilities and additional duties as assigned by the security management team or service delivery manager. Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting Job Types: Full-time, Permanent Pay: Up to ₹70,000.00 per month Benefits: Internet reimbursement Schedule: Day shift Supplemental Pay: Performance bonus Application Question(s): Do you have any experience in SIEM Tools? Experience: minimum: 2 years (Required) Language: English (Required) Location: Kochi, Kerala (Required) Work Location: In person
Posted 1 week ago
5.0 years
0 Lacs
Indore, Madhya Pradesh, India
On-site
Skills: SIEM TOOLS, VPN technologies, SPLUNK, IDS/IPS, SOC environment, XDR, Windows/Unix ports, EXPERIENCE: 5 8 Years Key Responsibilities RESPONSIBILITIES (INCLUDES TASKS AND AUTHORITIES): Detect, identify, and promptly alert on potential attacks, intrusions, anomalous activities, and misuse, distinguishing them from benign events. Conduct research, analysis, and correlation across diverse data sets to identify indications and warnings of threats. Analyze network alerts from multiple sources and determine their root causes and potential impact. Provide daily summary reports of relevant network and security events. Notify and coordinate with managers and incident responders, clearly articulating event history, status, and potential business impact as per the incident response plan. Analyze and report on system security posture trends. Assess access controls based on the principles of least privilege and need-to-know. Perform vulnerability management, including scanning, analysis, and follow-up on critical vulnerabilities. Lead and participate in incident response activities, including root cause analysis and remediation recommendations. Develop, review, and maintain SIEM correlation rules and incident response playbooks. Provide mentorship and guidance to L1 SOC analysts, reviewing and escalating tickets as needed. Stay current with emerging threats, vulnerabilities, and regulatory security requirements. Required Skills & Experience 24 years of experience in a SOC environment, with at least 1 year in a Level 2 (L2) role Proficiency in Splunk SIEM: log analysis, rule creation, dashboarding, and incident investigation1 Hands-on experience with Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms. Strong knowledge of network security protocols, intrusion detection/prevention systems (IDS/IPS), and firewall/VPN technologies Ability to perform packet-level analysis using tools such as Wireshark or tcpdump Experience in malware analysis, digital forensics, and threat intelligence platforms1 Familiarity with authentication, authorization, and access control methods. Strong understanding of incident response and handling methodologies. Experience interpreting data from network tools (e.g., nslookup, ping, traceroute). Knowledge of Windows/Unix ports, services, and operating system command-line tools. Understanding of key security management concepts (e.g., patch management, release management). Excellent analytical, problem-solving, and communication skills Experience in documenting and reporting security incidents and trends. CERTIFICATIONS(Any Three) Relevant certifications such as SPLUNK, Certified SOC Analyst (CSA) , CompTIA Security+: Technical Skills /Competencies MANDATORY Experience with SIEM (e.g. Splunk, XDR) SIEM tools (e.g., Splunk, QRadar) Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) Firewall and VPN technologies Threat intelligence platforms & Endpoint detection and response tools Hands-on experience with Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms. Strong knowledge of network security protocols, intrusion detection/prevention systems (IDS/IPS), and firewall/VPN technologies Show more Show less
Posted 1 week ago
4.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Job Description Essential Job Functions: Support security assessments, audits, and vulnerability scans, contributing to report generation and action items. Monitor security events and incidents, escalating as required and assisting in containment. Assist with the implementation of security policies and standards. Collaborate with the security team on documentation and process improvement. Participate in incident response activities, including investigations and reporting. Stay informed about emerging security threats and best practices. Contribute to security awareness training efforts. Seek opportunities for professional development in the security field. Basic Qualifications Bachelor's degree in a relevant field or equivalent combination of education and experience Typically, 4+ years of relevant work experience in industry, with a minimum of 1+ years in a similar role Proven experience in information security analysis Proficiencies in security technologies and risk assessment A continuous learner that stays abreast with industry knowledge and technology Other Qualifications Advanced degree in a relevant field is a plus Relevant certifications such as CompTIA Security+, CEH, or equivalent are a plus Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here . Show more Show less
Posted 1 week ago
7.0 years
3 - 4 Lacs
Bengaluru
On-site
We help the world run better At SAP, we enable you to bring out your best. Our company culture is focused on collaboration and a shared passion to help the world run better. How? We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences, values flexibility, and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative, caring team environment with a strong focus on learning and development, recognition for your individual contributions, and a variety of benefit options for you to choose from. Summary An SAP Global Cyber Incident Response and Recovery Investigator plays a critical role in safeguarding SAP’s digital enterprise. As a front-line defender, the Investigator is responsible for triaging security events identified by monitoring tools, analyzing data to assess severity and urgency, and conducting initial evaluations to determine whether a cyberattack is underway. When a potential incident is identified, the Investigator works closely with Global Security Operations to scope the impact, coordinate containment efforts, and support forensic investigations to uncover the nature and details of the attack. What you'll do Our Global Cyber Security Incident Response and Recovery Investigator are our first line of response for security event and incidents with a global scope. They are responsible for triaging security alerts detected by Enterprise Detection and SIEM, analyzing available data to determine scope, severity, and priority to determine follow on actions, which could include escalation to a IR Investigator. In escalation cases, they then work in a supportive capacity to further validate if a cyber-attack is occurring, scoping the extent of a suspected attack, coordinating efforts to contain attacks, supporting forensic investigations to determine the details around an attack, and providing guidance on remediation actions. In this role, you will: Conduct initial assessments and help drive root cause analysis. Contribute to the development of attack remediation and response strategies. Coordinate escalation handling and communication across teams. Triage operational security processes, including phishing response. Assist in maintaining and improving incident handling documentation—such as playbooks, runbooks, and standard operating procedures. Collaborate with Detection and SIEM teams to enhance detection logic and alert accuracy. Support forensic investigations with technical insights and evidence collection. Analysing cloud logs and telemetry for signs of compromise (e.g., CloudTrail, VPC Flow Logs, Azure Activity Logs). Leverage your offensive knowledge to identify gaps, simulate attacks, and drive improvements in detection, response, and hardening strategies. We value hands-on practitioners—our environment includes sandboxing, red vs. blue testing, or adversary emulation frameworks (e.g., MITRE ATT&CK, CALDERA, Atomic Red Team) and opportunities to build tooling or simulate attack chains. What you bring We are seeking analytical and detail-oriented critical thinkers who are solution-focused and thrive in dynamic environments. The ideal candidate should be a fast learner with the ability to adapt quickly and respond effectively to changing circumstances. Preferred Technical Skills and Experience: Experience: 7–10+ years in a cyber incident investigation role or equivalent combination of education, certifications, and relevant training. Certifications - Industry-recognized certifications such as Security+, GCIA, GCIH, CISSP (or equivalent). Strong understanding of Advanced Persistent Threat (APT) actors, their tools, techniques, and procedures (TTPs), as well as threat modelling frameworks. Proficiency in TCP/IP communications and knowledge of core network protocols and applications such as DNS, HTTP, and SMB. Operating Systems & Forensics: In-depth knowledge of forensic artifacts across one or more platforms: Windows/Active Directory (file systems, registry, memory artifacts) Unix/Linux (file systems, memory artifacts) macOS (file systems, memory artifacts) Specialized Domains (any of the following): Cyber incident response in cloud, mobile, web application, or database environments Cybersecurity automation and orchestration Web servers and web applications Cloud Platforms: Deep familiarity with AWS, Azure, and/or GCP — with an emphasis on security posture, logging, and IR tooling. Experience conducting incident response and post-incident forensics in cloud environments. Understanding of cloud-native service abuse and misconfigurations (IAM, serverless, container runtime attacks). Security Infrastructure Tools: (SIEM, IDS, EDR, DNS, other Deception technologies) Proficiency in scripting languages such as PowerShell, Python, or Bash . Bring out your best SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, you can bring out your best. We win with inclusion SAP’s culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone – regardless of background – feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world. SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team: Careers@sap.com For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program, according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training. EOE AA M/F/Vet/Disability: Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, age, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability. Successful candidates might be required to undergo a background verification with an external vendor. Requisition ID: 411769 | Work Area: Information Technology | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid.
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2