Home
Jobs
Companies
Resume

575 Security+ Jobs - Page 6

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

6.0 years

4 - 6 Lacs

Bengaluru

On-site

Rockwell Automation is a global technology leader focused on helping the world’s manufacturers be more productive, sustainable, and agile. With more than 28,000 employees who make the world better every day, we know we have something special. Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that’s you we would love to have you join us! Job Description Job Summary: In this role, you will be an integral part of the IT organization. The candidate need to have a demonstrated understanding of Information Security, Computer Networking, the Software Development Life Cycle (SDLC) and an extensive experience in interacting with customers. Candidate must have Security Information and Event Management (SIEM) expertise and be willing to get trained on the company platform and products. You will report to the Cyber Security Manager. Your Responsibilities: This is a technical, hands-on role to focus on maintaining the SIEM platform, working with team members and stakeholders as well as training and enabling teams for successful adoption of the SIEM platform. Manage platform, agent, and app\add-on log source integration upgrades. Develop alerts, reports, data models, dashboards, and connectors to support custom user requirements. Recognise patterns and inconsistencies that could indicate complex cyber-attacks. Develop SIEM correlation rules to detect new threats beyond current capabilities. Assist with designing and documenting work processes. Perform log file analysis as and when required. Develop recommendations in collaboration with other team members to maximise Enterprise capabilities in prevention, detection, analysis, containment, eradication, and recovery from cyber-attacks. Contribute to CTI (Cyber Threat Intelligence) data gathering, reporting, and analysis activities. Leverage automation and orchestration solutions to automate repetitive tasks. Research and explore new avenues to by using the latest technologies and cybersecurity standards. The Essentials - You Will Have: Bachelor's degree in cyber security, Computer Science, Information Systems, Software Engineering, Computer Engineering or related field, or equivalent work experience. Typically requires a minimum of 6 years of experience in the Information Security field. 1+ years of experience in SIEM and UEBA solutions such as Splunk, LogRhythm and Elastic. Understanding of log collection methodologies and aggregation techniques such as Syslog, NXlog and Windows Event Forwarding. Working knowledge of cloud platforms such as AWS, Azure and GCP. The Preferred - You Might Also Have: Strong knowledge of at least one programming or scripting language (ex. Python, PowerShell, PHP, Perl) is preferrable. Understanding of security models and frameworks (ex. MITRE ATT&CK, MITRE D3FEND, Cyber Kill Chain (CKC)). Demonstrated experience providing customer-driven solutions or service. Ability to communicate effectively with all levels of an organisation from Engineering, Operations to C-level audiences. Security certifications (Security+, GSEC, GCIH, GCIA, CISSP, NCSF etc.) will be an added advantage. Sentinel and Datalake experience are preferrable. Familiar with Risk-based Alerting (RBA) frameworks and implementation. Experienced in architecting, planning, deploying, and using SIEM or UEBA platforms. Experienced in integrating or using endpoint security and host-based intrusion detection solutions. Extensive knowledge and understanding of directory services. Demonstrated experience in one of the following fields Cyber Threat Intelligence, Incident Response, or Computer Forensics is preferrable. Having solid knowledge of one or more programming or scripting language such as Python, PowerShell, PHP and Perl is preferrable. What We Offer: Our benefits package includes … Comprehensive mindfulness programmes with a premium membership to Calm. Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching programme – Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program. Personalised wellbeing programmes through our OnTrack programme. On-demand digital course library for professional development. ... and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. #LI-Hybrid #LI-RS1 Rockwell Automation’s hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office.

Posted 1 week ago

Apply

6.0 years

3 - 7 Lacs

Bengaluru

On-site

We help the world run better At SAP, we enable you to bring out your best. Our company culture is focused on collaboration and a shared passion to help the world run better. How? We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences, values flexibility, and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative, caring team environment with a strong focus on learning and development, recognition for your individual contributions, and a variety of benefit options for you to choose from. WHAT YOU'LL DO: As part of this global team, you’ll be involved in projects and services including bug bounty programs where you can: Combine technical expertise with communication skills to effectively manage time sensitive and confidential product vulnerability reports. Advise and work closely with researchers and the engineering teams to drive the timely delivery of security patches. Work closely with stakeholders in ensuring an aligned delivery of security advisories to customers. WHAT YOU BRING: 6 to 10 years of total experience with 4+ years of relevant experience in Security domain. Bachelor or master’s degree in computer science, information systems, or a related engineering discipline with enthusiasm for cybersecurity and Artificial Intelligence(AI). Fundamental understanding of AI concepts, including machine learning, deep learning, natural language processing, and data analytics. Awareness of common AI algorithms and models, their applications, and limitations. Deep understanding on AI relevant security vulnerabilities and ability to interpret using right metrics. Stay current with the latest advancements in AI, ML, and cybersecurity. Conduct continuous research on emerging threats and vulnerabilities related to AI to improve knowledge base and support stakeholders. Provide technical guidance and training on AI-related security initiatives. Hands-on experience in using tools like Burp Suite is preferred Industry specific security related certifications (e.g., Security+, CEH, CISSP, OSCP, CISA, CCSK) preferred. Any relevant AI/ML certifications preferred. Excellent problem-solving and analytical skills. Strong communication and teamwork abilities with Skills to communicate technical concepts and AI insights to non-technical stakeholders. Ability to work in a fast-paced, dynamic environment and manage multiple tasks simultaneously. MEET YOUR TEAM: The SAP Security Patch Quality Assurance Team is a dynamic international team comprising experienced security experts that manage the quality assurance of the security patches for vulnerabilities reported by independent security researchers, customers, partners together with engineering teams across SAP #QualityAssurance, #SAPApplicationSecurity, #SAPSecurityNotes, #SecurityResearchers, #0-days, #SecurityExploits, #PatchManagement, #AI Bring out your best SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, you can bring out your best. We win with inclusion SAP’s culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone – regardless of background – feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world. SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team: Careers@sap.com For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program, according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training. EOE AA M/F/Vet/Disability: Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, age, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability. Successful candidates might be required to undergo a background verification with an external vendor. Requisition ID: 418729 | Work Area: Solution and Product Management | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid.

Posted 1 week ago

Apply

3.0 years

0 Lacs

Chennai

Remote

About Us: Barry-Wehmiller is a diversified global supplier of engineering consulting and manufacturing technology for the packaging, corrugating, sheeting and paper-converting industries. By blending people-centric leadership with disciplined operational strategies and purpose-driven growth, Barry-Wehmiller has become a $3 billion organization with nearly 12,000 team members united by a common belief: to use the power of business to build a better world. Job Description: About Barry Wehmiller: - Barry Wehmiller Companies is a global supplier of manufacturing technology and services based in St. Louis Missouri. Although it was founded in 1885 as a maker of machinery for the brewing industry, since 1987 Barry-Wehmiller has acquired more than 80 companies that provide equipment and services for a variety of industries: packaging, paper converting, sheeting, corrugating, engineering, and IT consulting. In 2016 it was ranked no. 10 on the St. Louis Business Journal's list of the city's Top 150 Privately Held Companies. We believe our culture differentiates us from other firms. In India, Barry-Wehmiller operates as a hub of innovation and collaboration, housing our Global Competency Center (GCC) and other strategic functions. The GCC, based in Chennai, is an Engineering Center of Excellence that supports all Barry-Wehmiller divisions globally. The center focuses on areas such as design and development in mechanical, electrical, and controls engineering, software development, and additive manufacturing. We believe in: Ownership – You’ll drive features end-to-end, from design to deployment. Flexibility – A friendly, results-oriented culture that respects your time. Empowerment – Your insights are valued, and your work makes a visible difference. Learning & Growth – You’ll work on complex challenges with smart, passionate peers—and have the support to level up continually. If you’re ready to bring your best thinking to the table and grow in a high-impact, future-focused environment, we’d love to hear from you. Job Description: The Enterprise IT Service Desk Workstation Vulnerability Analyst’s role is to help secure the company’s workstations against vulnerabilities. This will be done through analyzing scan data, researching vulnerabilities, and providing mitigation for said vulnerabilities within SLA timelines. Additionally, deployment of mitigations may be required. The Workstation Vulnerability Analyst will also need to present findings to IT leadership. Job Specifications: Proven analytical and problem-solving abilities. Ability to effectively prioritize and execute tasks in a fast-paced environment. Ability to shift between tasks as priorities change Strong written and oral communication skills. Strong troubleshooting skills and knowledge of IT hardware and software. Ability to conduct research into software issues and products as required. Strong organizational skills with keen attention to detail. Basic understanding of security principles, protocols, and technologies. Familiarity with vulnerability assessment tools (e.g., Nessus/Tenable, Qualys, OpenVAS) is a plus. Principal Duties and Responsibilities (Essential Functions): Analyze the results of vulnerability scans Understand business criticality of various systems Prioritize work based on risk Complete work within deadlines Assist in identifying and assessing vulnerabilities in the organization's systems, networks, and applications. Support the development and implementation of remediation plans to address identified vulnerabilities. Participate in regular vulnerability assessments and penetration tests to identify new security risks. Monitor security alerts and incidents and assist in determining the impact and necessary response. Assist with rollback if necessary Document and report on remediation activities, including progress and outcomes. Investigate and remediate malfunctioning security agents Function and communicate in a global support team. Analyze root cause and implement corrective solutions. Collaborate with IT, security, and development teams to ensure timely and effective remediation. When necessary, contact third-party software and PC equipment vendors. Maintain knowledge of current IT trends and advancements. Stay informed about the latest security threats, vulnerabilities, and mitigation techniques. Provide support to other teams on vulnerability management best practices. Required Education and Experience: An associate degree in the field of computer science or management information systems, and/or 3-5 years of related work experience is preferred. 3-5 years of vulnerability remediation preferred; experience with patch management and scripting is a plus. Experience working in a team-oriented, collaborative environment. Relevant certifications (e.g., CompTIA Security+, CEH) are a plus but not required. Travel: Travel could be up to 15% (in the country) as needed for remote support. What is it for you? This role is more than just a job. It’s an opportunity to be part of a global team that values people excellence, innovative solutions, and operational excellence. Barry-Wehmiller provides a unique environment where you can grow your skills, work on impactful projects, and collaborate with some of the brightest minds in the industry. In addition, we are deeply committed to your personal and professional growth, fostering a culture that helps you achieve your full potential. To understand more about our people-first philosophy, you may like to watch this short video by our CEO, Mr. Bob Chapman , on Truly Human Leadership : Watch the video At Barry-Wehmiller we recognize that people come with a wealth of experience and talent beyond just the technical requirements of a job. If your experience is close to what you see listed here, please still consider applying. We know that our differences often can bring about innovation, excellence and meaningful work—therefore, people from all backgrounds are encouraged to apply to our positions. Please let us know if you require reasonable accommodations during the interview process. Company: BW Corporate US

Posted 1 week ago

Apply

4.0 years

0 Lacs

Noida

On-site

Job Description: Essential Job Functions: Support security assessments, audits, and vulnerability scans, contributing to report generation and action items. Monitor security events and incidents, escalating as required and assisting in containment. Assist with the implementation of security policies and standards. Collaborate with the security team on documentation and process improvement. Participate in incident response activities, including investigations and reporting. Stay informed about emerging security threats and best practices. Contribute to security awareness training efforts. Seek opportunities for professional development in the security field. Basic Qualifications: Bachelor's degree in a relevant field or equivalent combination of education and experience Typically, 4+ years of relevant work experience in industry, with a minimum of 1+ years in a similar role Proven experience in information security analysis Proficiencies in security technologies and risk assessment A continuous learner that stays abreast with industry knowledge and technology Other Qualifications: Advanced degree in a relevant field is a plus Relevant certifications such as CompTIA Security+, CEH, or equivalent are a plus Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 1 week ago

Apply

4.0 years

0 Lacs

Calcutta

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security - DPP- Risk – Consulting – Senior As part of our EY-Cyber security in the Risk Consulting team, your role will be primarily responsible for the daily monitoring and/or maintenance of the enterprise Data Protection tools/solutions. The main duties of the person in this role will include proper care and administration of the Data Protection tools, monitoring and responding to the alerts that generate from the tool. This person will interface with IT Operations, Network Operations, Infrastructure teams, Legal, Risk Management, etc. The opportunity We’re looking for Security Analyst in the Risk Consulting team to work on various privacy/data protection related projects for our customers across the globe. In line with EY’s commitment to quality, consultant shall confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, consultant shall help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your key responsibilities Build DATA PROTECTION solution concepts and deployment requirements Deploying DATA PROTECTION tools and implementation of endpoint protection. Work with vendors to support the DATA PROTECTION technology (troubleshooting, upgrades, etc.) Administration of the Data Protection tools which includes configuring policies, upgrading and patching, etc. Monitor and respond to alerts generated from the Data Protection systems and other technologies Understand and follow the incident response process through event escalations Respond to escalations by the Incident Response Team Follow processes to maintain the leading DATA LOSS PREVENTION/CASB system Assisting clients in privacy related incident response activities. Supporting the client’s team by acting as an interim team member (e.g., security officer, security manager, security analyst.) Skills and attributes for success Should be a good team player. Excellent verbal and written communication skill. Proficient Documentation and Power Point skills Good social, communication and technical writing skills Should interface with internal and external clients. Strong analytical/problem solving skills. Ability to prioritize tasks and work accurately under pressure to meet deadlines. Should understand and follow workplace policies and procedures. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. To qualify for the role, you must have Bachelor's or Master’s degree in Computer Science, Information Systems, Engineering or a related field. At least 4-6 years of experience in supporting Data Security Technology. At least 4-6 years of experience in two or more of the following: Information Security concepts related to Governance, Risk & Compliance Data Loss Prevention, CASB Technology support and Event Handling Experience of Administration of the DLP, CASB tools which includes configuring policies, upgrading and patching for leading vendors. (Digital Guardium, McAfee, Forcepoint, Netskope, Symantec CloudSOC, MCAS etc.) MS Purview/ CASB (Netskope/MS/Symantec). Knowledge of Digital Guardium is a Must. Technical/Vendor certification will be added advantage. Experience in utilizing and good knowledge of other data protection technology like Endpoint Security Suite, EDR, ATP will be added advantage. Maintain current data protection and privacy expertise, skills and competences. Ability to independently research and solve technical issues. Demonstrated integrity in a professional environment. Knowledge of core Information Security concepts related to Governance, Risk & Compliance. Ability to work in and adapt to a changing environment. Extend required support for any reported data protection and privacy incidents such as information breaches and leakages. Ability to communicate in a clear and concise manner. Ideally, you’ll also have Professional certificate or be actively pursuing related professional certifications such as the CompTia Security+, CEH, CISSP or Vendor/Technical certification. If not, certified candidates are expected to complete one of the business required certifications within 12 months of hire. To expect some weekend work and 20%-30% travel based on job requirement. What we look for A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills. An opportunity to be a part of market-leading, multi-disciplinary team of 1400 + professionals, in the only integrated global transaction business worldwide. Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries What working at EY offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

8.0 years

0 Lacs

Indore, Madhya Pradesh, India

On-site

Linkedin logo

EXPERIENCE: 5 – 8 Years RESPONSIBILITIES (INCLUDES TASKS AND AUTHORITIES): Key Responsibilities Detect, identify, and promptly alert on potential attacks, intrusions, anomalous activities, and misuse, distinguishing them from benign events. Conduct research, analysis, and correlation across diverse data sets to identify indications and warnings of threats. Analyze network alerts from multiple sources and determine their root causes and potential impact. Provide daily summary reports of relevant network and security events. Notify and coordinate with managers and incident responders, clearly articulating event history, status, and potential business impact as per the incident response plan. Analyze and report on system security posture trends. Assess access controls based on the principles of least privilege and need-to-know. Perform vulnerability management, including scanning, analysis, and follow-up on critical vulnerabilities. Lead and participate in incident response activities, including root cause analysis and remediation recommendations. Develop, review, and maintain SIEM correlation rules and incident response playbooks. Provide mentorship and guidance to L1 SOC analysts, reviewing and escalating tickets as needed. Stay current with emerging threats, vulnerabilities, and regulatory security requirements. Required Skills & Experience 2–4 years of experience in a SOC environment, with at least 1 year in a Level 2 (L2) role Proficiency in Splunk SIEM: log analysis, rule creation, dashboarding, and incident investigation1 Hands-on experience with Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms. Strong knowledge of network security protocols, intrusion detection/prevention systems (IDS/IPS), and firewall/VPN technologies Ability to perform packet-level analysis using tools such as Wireshark or tcpdump Experience in malware analysis, digital forensics, and threat intelligence platforms1 Familiarity with authentication, authorization, and access control methods. Strong understanding of incident response and handling methodologies. Experience interpreting data from network tools (e.g., nslookup, ping, traceroute). Knowledge of Windows/Unix ports, services, and operating system command-line tools. Understanding of key security management concepts (e.g., patch management, release management). Excellent analytical, problem-solving, and communication skills Experience in documenting and reporting security incidents and trends. CERTIFICATIONS(Any three): Relevant certifications such as SPLUNK, Certified SOC Analyst (CSA) , CompTIA Security+: TECHNICAL SKILLS /COMPETENCIES: MANDATORY Experience with SIEM (e.g. Splunk, XDR) SIEM tools (e.g., Splunk, QRadar) Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) Firewall and VPN technologies Threat intelligence platforms & Endpoint detection and response tools Hands-on experience with Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms. Strong knowledge of network security protocols, intrusion detection/prevention systems (IDS/IPS), and firewall/VPN technologiesa Show more Show less

Posted 1 week ago

Apply

130.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Dentsply Sirona is the world’s largest manufacturer of professional dental products and technologies, with a 130-year history of innovation and service to the dental industry and patients worldwide. Dentsply Sirona develops, manufactures, and markets a comprehensive solutions offering including dental and oral health products as well as other consumable medical devices under a strong portfolio of world class brands. Dentsply Sirona’s products provide innovative, high-quality and effective solutions to advance patient care and deliver better and safer dentistry. Dentsply Sirona’s global headquarters is located in Charlotte, North Carolina, USA. The company’s shares are listed in the United States on NASDAQ under the symbol XRAY. Bringing out the best in people As advanced as dentistry is today, we are dedicated to making it even better. Our people have a passion for innovation and are committed to applying it to improve dental care. We live and breathe high performance, working as one global team, bringing out the best in each other for the benefit of dental patients, and the professionals who serve them. If you want to grow and develop as a part of a team that is shaping an industry, then we’re looking for the best to join us. Working At Dentsply Sirona You Are Able To Develop faster - with our commitment to the best professional development. Perform better - as part of a high-performance, empowering culture. Shape an industry - with a market leader that continues to drive innovation. Make a difference -by helping improve oral health worldwide. Scope The Senior Security Analyst is responsible for maintaining security systems, implementing process automation, and responding to security incidents. They must have a thorough understanding of both cloud-based and on-prem environments and threats. They serve as an escalation point for incident response and the support of security toolsets. They must be capable of working on multiple projects and alerts with general supervision. Key Responsibilities Administer, monitor, and maintain cloud-based and on-prem security systems. Coordinate the implementation and upgrade of security systems. Administer, monitor, and maintain automated security response tools. Develop and maintain automated security processes and workflows. Investigate and remediate security related alerts for both cloud-based and on-prem systems. Investigate and remediate security policy violations. Research threat actors, tactics, techniques, procedures, malware, and other IOCs. Engineer and tune custom alerts for security systems. Research emerging security technologies and make recommendations to influence security initiatives. Assist with documentation and training related to security systems. Act as an escalation point and mentor for junior analysts. Act as an escalation point and oversee relationship with hosted SOC. Act as a technical point of contact during security incidents. Prepare security reports for benchmarking security efficiency. Collaborate with cross-functional teams to support security initiatives of varying complexity. Typical Background Education: BS/BA Degree in Computer Information Systems, Computer Science, Information Systems Management, or equivalent professional experience Certifications/Licensing: COMPTIA Security+, CEH, CISSP, GIAC Security Essentials, CCNA Security, Google Professional Cloud Security Engineer Years and Type of Experience: 6+ years of experience in Information Systems with at least 2 years of formal experience in Cyber Security. Excellent English written and spoken communication skills with the ability to explain technical information to non-technical people. Key Required Skills, Knowledge And Capabilities Experience with the Microsoft Suite of Security Tools. Experience with configuration and management of security solutions for Google Cloud, Microsoft Azure, and/or Amazon Web Services. Experience with configuration and management of endpoint security solutions including EDR and DLP. Experience with process and security automation. Experience with SIEM configuration, alert tuning, and KQL. Experience with configuration and management of Office 365 services and security solutions. Experience with incident response. Must have excellent technical writing and research skills. Experience with Microsoft Windows, Linux, and macOS. Willing to work non-standard hours and be on-call. Team player. Ability to work with ambiguity. Resilience to change. Communication skills. Integrity. Open minded, respectful, empathetic ability to work in a multicultural environment. Analytical thinking, problem solving. Dentsply Sirona is an Equal Opportunity/ Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, sexual orientation, disability, or protected Veteran status. We appreciate your interest in Dentsply Sirona. If you need assistance with completing the online application due to a disability, please send an accommodation request to careers@dentsplysirona.com. Please be sure to include “Accommodation Request” in the subject. Show more Show less

Posted 1 week ago

Apply

2.0 years

0 Lacs

Jaipur, Rajasthan, India

On-site

Linkedin logo

Job Profile: Cyber Security Trainer/Mentor or Ethical Hacking Trainer/Mentor Job Location: Jaipur, Rajasthan Experience Required: 2+ Years About the Company: WsCube Tech is a Vernacular Upskilling Edtech offering Tech-powered Career Acceleration Programs and Courses developing Job-ready Professionals for Global workforce needs. WsCube Tech aims to create scalable impact and competitive-participation-shift with its Vernacular Tech-enabled Bridging Interfaces & Job-Oriented Skill Training Programs. In next 5 years, the Company aims to disrupt Career Readiness for over 100 Million Career Aspirants in deep demographics of “Bharat“ and set them competitively ready with hands-on skills to crack global career opportunities. WsCube Tech aims to combat the Learning Language barrier & Skill Mentorship lacuna with its Vernacular “Upskilling Bharat” Proposition. Website Link: https://www.wscubetech.com/ YouTube Channel Link: https://www.youtube.com/@wscubetech Position Overview : The Cyber Security Trainer is responsible for designing, developing, and delivering training programs that educate individuals and organizations on best practices in cyber security. This role involves creating comprehensive training materials, conducting engaging training sessions, and ensuring participants gain the necessary skills to protect their digital assets effectively. Key Responsibilities: Design, develop, and deliver cyber security training programs. Create and conduct training for various skill levels. Develop and update training materials. Design hands-on lab sessions and simulations. Develop assessment tools to evaluate knowledge and skills. Provide feedback and track participant progress. Stay updated on the latest cyber security developments. Attend industry events and network with professionals. Tailor training programs to meet specific client needs. Offer post-training support and consultation. Ensure training aligns with regulatory requirements and industry standards. Educate participants on compliance issues. Collect and analyze feedback to improve training. Innovate training methods and content. Collaborate with professionals to develop training solutions. Share best practices and new techniques. Qualifications: Bachelor’s degree in relevant field. Certifications like CISSP, CISM, CompTIA Security+, or similar. Proven experience in cyber security and training. Excellent presentation and communication skills. Strong analytical and problem-solving abilities. Ability to simplify complex concepts. Proficient with training tools and technologies. Strong organizational skills. Passionate, detail-oriented, and adaptable. Show more Show less

Posted 1 week ago

Apply

10.0 years

0 Lacs

Uttar Pradesh, India

Remote

Linkedin logo

Job Title: Security and IT Engineer Experience: 10+ years Location: Noida Department: Information Technology About Mulberri: Mulberri is an InsurTech startup transforming the business insurance landscape with AI, LLM, and Agentic AI solutions. Our products, such as CertBerri (AI-powered certificate of insurance automation) and IngestBerri (intelligent data ingestion for underwriting and compliance), are redefining efficiency for brokers, insurers, and businesses. Job Overview: We are seeking an experienced and proactive Security and IT Engineer to lead our IT security operations and support functions. This role is pivotal in safeguarding our digital assets, ensuring compliance, and providing reliable IT support across the organization. The ideal candidate will have a strong background in security frameworks, IT infrastructure, and user support. Key Responsibilities: Security Operations: • Support compliance initiatives (SOC 2, GDPR, etc.) through secure access control, encryption, and logging practices. • Monitor and respond vulnerabilities, and incidents. • Set up, maintain, and monitor intrusion detection and prevention systems. Network & IT Security: • Monitor and maintain VPN, firewall rules, and zero trust access configurations. • Administer and support MDM platforms like JAMF (for macOS) and Microsoft Intune (for Windows). • Ensure device compliance policies, patch management, encryption, and remote wipe capabilities are in place. IT Support: • Assist with user provisioning, hardware troubleshooting, and system access requests. • Handle secure onboarding/offboarding, SSO, and IAM tooling integrations (good to have) Qualifications: • Proven experience in IT operations and cybersecurity. • Strong knowledge of compliance standards (e.g., SOC 2, GDPR). • Hands-on experience with VPNs, firewalls, MDM solutions, and zero trust architecture. • Familiarity with JAMF, Microsoft Intune, SSO, and IAM platforms. • Excellent problem-solving, communication, and organizational skills. Preferred Certifications: • CISSP, CISM, CompTIA Security+, or equivalent certifications are advantageous Why Join Mulberri? • Be part of a fast-growing InsurTech startup revolutionizing the industry with AI & LLM. • Work on cutting-edge AI-driven insurance products with a direct impact on the market. • Collaborate with global teams and gain hands-on experience in the US insurance ecosystem. • Work from our Delhi/NCR office and be part of a dynamic and innovative team. • Drop your resume at radhika@mulberri.io. Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Linkedin logo

Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! Qualys, a leading cybersecurity firm, is seeking an experienced Senior Technical Support Engineer for Security Applications to resolve global customer and partner service requests promptly. Collaborate across teams for high customer satisfaction in a secure environment. Ideal for security enthusiasts with solid networking skills. Lead in resolving technical issues, provide top-tier support, and contribute to world-class assistance. Responsibilities: Promptly resolve global customer and partner service requests in a highly secured environment. Collaborate with cross-functional teams for high customer satisfaction. Provide support via phone, email, and MS Teams for Product modules over the SaaS platform. Ensure friendly and professional customer interactions throughout the service life cycle. Act as the main point of contact for technical issues, collaborating directly with Development and QA teams. Thrive in a challenging and dynamic environment, delivering world-class support and technical solutions. Qualifications: 5+ years of technical support experience. Experience in Vulnerability Management and Web Application Security/Firewall application support. In-depth TCP/IP understanding and LAN/WAN infrastructure knowledge. Strong foundation in Windows and/or solid Linux/Unix experience in an enterprise environment. Familiarity with common OS services (IIS, BIND, Apache, AD, WINS, Samba, SSH). Knowledge of firewalls, Intrusion Detection System technologies, and Network Vulnerability Scanners. Outstanding troubleshooting and analytical skills. Excellent written and verbal communication skills. Bachelor of Science in Computer Science or equivalent experience. Networking: OSI Layer understanding. Knowledge of broadcast domain vs. collision domain. Familiarity with different records zones in DNS and how it works. Understanding of SSL Handshake and TCP/IP Handshake. Proficiency in ARP, DHCP, proxy servers, and DNS cache clearing. Differentiation between TCP and UDP, and protocols & their workings. Linux/Unix: Understanding of the boot process and run levels. Various ways to assign an IP address to a Unix/Linux/Debian machine. Proficient in checking running processes, hidden files, and installing packages. Knowledge of sudo, permissions, file systems, and SSH banner. Windows: Insight into the Windows boot process and control panel basics. Understanding of UAC, registry hives, and remote registry manipulation tools. Knowledge of kernel mode vs. user mode, Active Directory, and Group Policies. Familiarity with Kerberos and NTLM authentication, Procmon, and service control manager. Security: Understanding of vulnerabilities, the vulnerability cycle, and exploits. Knowledge of malware types (virus, trojan, worm) and False/True Positive/Negative concepts. Understanding of False Positive, False Negative, True Positive, and True Negative in the security context. Preferred: Experience with packet capture review and diagnosis. Previous API support and Regex knowledge. Scripting experience (Bash, Python). Knowledge of major web server software, UNIX/Windows web services, and diverse platforms. Oracle and Microsoft SQL knowledge. CCNA, MCSE, CISSP, CompTIA Security+, and CEH certifications are highly desirable. Experience with Customer Support and Development Tools (Salesforce, Jira, etc.). Willing to work in 24/7 rotational shifts. Show more Show less

Posted 1 week ago

Apply

0.0 - 2.0 years

0 Lacs

Kochi, Kerala

On-site

Indeed logo

The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Requirements Must-haves: 2-3 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Knowledge of creating and modifying the dashboards. Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows Deep Knowledge in SIEM, Ticketing tool, EDR, Vulnerability Management, MimeCast, DMARC tool. Excellent written and verbal communication skills. Good to have: · Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others Main Responsibilities Tier 1 SOC analysts are incident responders, remediating serious attacks escalated from junior analyst, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments(CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Leading efforts to counter SLA breaches and anticipating the likelihood of future security alerts,incidents. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone),based on the security event severity and suspicious activities, escalate to managed service support teams, tier 2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when newthreats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. · Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Keep updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats in security perspective. Other responsibilities and additional duties as assigned by the security management team or service delivery manager. Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting Job Types: Full-time, Permanent Pay: Up to ₹70,000.00 per month Benefits: Internet reimbursement Schedule: Day shift Supplemental Pay: Performance bonus Application Question(s): Do you have any experience in SIEM Tools? Experience: minimum: 2 years (Required) Language: English (Required) Location: Kochi, Kerala (Required) Work Location: In person

Posted 1 week ago

Apply

5.0 years

0 Lacs

Indore, Madhya Pradesh, India

On-site

Linkedin logo

Skills: SIEM TOOLS, VPN technologies, SPLUNK, IDS/IPS, SOC environment, XDR, Windows/Unix ports, EXPERIENCE: 5 8 Years Key Responsibilities RESPONSIBILITIES (INCLUDES TASKS AND AUTHORITIES): Detect, identify, and promptly alert on potential attacks, intrusions, anomalous activities, and misuse, distinguishing them from benign events. Conduct research, analysis, and correlation across diverse data sets to identify indications and warnings of threats. Analyze network alerts from multiple sources and determine their root causes and potential impact. Provide daily summary reports of relevant network and security events. Notify and coordinate with managers and incident responders, clearly articulating event history, status, and potential business impact as per the incident response plan. Analyze and report on system security posture trends. Assess access controls based on the principles of least privilege and need-to-know. Perform vulnerability management, including scanning, analysis, and follow-up on critical vulnerabilities. Lead and participate in incident response activities, including root cause analysis and remediation recommendations. Develop, review, and maintain SIEM correlation rules and incident response playbooks. Provide mentorship and guidance to L1 SOC analysts, reviewing and escalating tickets as needed. Stay current with emerging threats, vulnerabilities, and regulatory security requirements. Required Skills & Experience 24 years of experience in a SOC environment, with at least 1 year in a Level 2 (L2) role Proficiency in Splunk SIEM: log analysis, rule creation, dashboarding, and incident investigation1 Hands-on experience with Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms. Strong knowledge of network security protocols, intrusion detection/prevention systems (IDS/IPS), and firewall/VPN technologies Ability to perform packet-level analysis using tools such as Wireshark or tcpdump Experience in malware analysis, digital forensics, and threat intelligence platforms1 Familiarity with authentication, authorization, and access control methods. Strong understanding of incident response and handling methodologies. Experience interpreting data from network tools (e.g., nslookup, ping, traceroute). Knowledge of Windows/Unix ports, services, and operating system command-line tools. Understanding of key security management concepts (e.g., patch management, release management). Excellent analytical, problem-solving, and communication skills Experience in documenting and reporting security incidents and trends. CERTIFICATIONS(Any Three) Relevant certifications such as SPLUNK, Certified SOC Analyst (CSA) , CompTIA Security+: Technical Skills /Competencies MANDATORY Experience with SIEM (e.g. Splunk, XDR) SIEM tools (e.g., Splunk, QRadar) Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) Firewall and VPN technologies Threat intelligence platforms & Endpoint detection and response tools Hands-on experience with Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) platforms. Strong knowledge of network security protocols, intrusion detection/prevention systems (IDS/IPS), and firewall/VPN technologies Show more Show less

Posted 1 week ago

Apply

4.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Job Description Essential Job Functions: Support security assessments, audits, and vulnerability scans, contributing to report generation and action items. Monitor security events and incidents, escalating as required and assisting in containment. Assist with the implementation of security policies and standards. Collaborate with the security team on documentation and process improvement. Participate in incident response activities, including investigations and reporting. Stay informed about emerging security threats and best practices. Contribute to security awareness training efforts. Seek opportunities for professional development in the security field. Basic Qualifications Bachelor's degree in a relevant field or equivalent combination of education and experience Typically, 4+ years of relevant work experience in industry, with a minimum of 1+ years in a similar role Proven experience in information security analysis Proficiencies in security technologies and risk assessment A continuous learner that stays abreast with industry knowledge and technology Other Qualifications Advanced degree in a relevant field is a plus Relevant certifications such as CompTIA Security+, CEH, or equivalent are a plus Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here . Show more Show less

Posted 1 week ago

Apply

7.0 years

3 - 4 Lacs

Bengaluru

On-site

We help the world run better At SAP, we enable you to bring out your best. Our company culture is focused on collaboration and a shared passion to help the world run better. How? We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences, values flexibility, and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative, caring team environment with a strong focus on learning and development, recognition for your individual contributions, and a variety of benefit options for you to choose from. Summary An SAP Global Cyber Incident Response and Recovery Investigator plays a critical role in safeguarding SAP’s digital enterprise. As a front-line defender, the Investigator is responsible for triaging security events identified by monitoring tools, analyzing data to assess severity and urgency, and conducting initial evaluations to determine whether a cyberattack is underway. When a potential incident is identified, the Investigator works closely with Global Security Operations to scope the impact, coordinate containment efforts, and support forensic investigations to uncover the nature and details of the attack. What you'll do Our Global Cyber Security Incident Response and Recovery Investigator are our first line of response for security event and incidents with a global scope. They are responsible for triaging security alerts detected by Enterprise Detection and SIEM, analyzing available data to determine scope, severity, and priority to determine follow on actions, which could include escalation to a IR Investigator. In escalation cases, they then work in a supportive capacity to further validate if a cyber-attack is occurring, scoping the extent of a suspected attack, coordinating efforts to contain attacks, supporting forensic investigations to determine the details around an attack, and providing guidance on remediation actions. In this role, you will: Conduct initial assessments and help drive root cause analysis. Contribute to the development of attack remediation and response strategies. Coordinate escalation handling and communication across teams. Triage operational security processes, including phishing response. Assist in maintaining and improving incident handling documentation—such as playbooks, runbooks, and standard operating procedures. Collaborate with Detection and SIEM teams to enhance detection logic and alert accuracy. Support forensic investigations with technical insights and evidence collection. Analysing cloud logs and telemetry for signs of compromise (e.g., CloudTrail, VPC Flow Logs, Azure Activity Logs). Leverage your offensive knowledge to identify gaps, simulate attacks, and drive improvements in detection, response, and hardening strategies. We value hands-on practitioners—our environment includes sandboxing, red vs. blue testing, or adversary emulation frameworks (e.g., MITRE ATT&CK, CALDERA, Atomic Red Team) and opportunities to build tooling or simulate attack chains. What you bring We are seeking analytical and detail-oriented critical thinkers who are solution-focused and thrive in dynamic environments. The ideal candidate should be a fast learner with the ability to adapt quickly and respond effectively to changing circumstances. Preferred Technical Skills and Experience: Experience: 7–10+ years in a cyber incident investigation role or equivalent combination of education, certifications, and relevant training. Certifications - Industry-recognized certifications such as Security+, GCIA, GCIH, CISSP (or equivalent). Strong understanding of Advanced Persistent Threat (APT) actors, their tools, techniques, and procedures (TTPs), as well as threat modelling frameworks. Proficiency in TCP/IP communications and knowledge of core network protocols and applications such as DNS, HTTP, and SMB. Operating Systems & Forensics: In-depth knowledge of forensic artifacts across one or more platforms: Windows/Active Directory (file systems, registry, memory artifacts) Unix/Linux (file systems, memory artifacts) macOS (file systems, memory artifacts) Specialized Domains (any of the following): Cyber incident response in cloud, mobile, web application, or database environments Cybersecurity automation and orchestration Web servers and web applications Cloud Platforms: Deep familiarity with AWS, Azure, and/or GCP — with an emphasis on security posture, logging, and IR tooling. Experience conducting incident response and post-incident forensics in cloud environments. Understanding of cloud-native service abuse and misconfigurations (IAM, serverless, container runtime attacks). Security Infrastructure Tools: (SIEM, IDS, EDR, DNS, other Deception technologies) Proficiency in scripting languages such as PowerShell, Python, or Bash . Bring out your best SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, you can bring out your best. We win with inclusion SAP’s culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone – regardless of background – feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world. SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team: Careers@sap.com For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program, according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training. EOE AA M/F/Vet/Disability: Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, age, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability. Successful candidates might be required to undergo a background verification with an external vendor. Requisition ID: 411769 | Work Area: Information Technology | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid.

Posted 1 week ago

Apply

2.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Title: IT Administrator with Networking & Server Administration Location : Hyderabad Experience : 6 months – 2 years Job Type: Paid Internship About Us: Instaresz Business Services Pvt Ltd is a forward-thinking, fast-growing technology company that thrives on innovative solutions. We are currently looking for an experienced IT Administrator who will take responsibility for managing and maintaining the network infrastructure, servers, and systems while ensuring smooth day-to-day IT operations across the organization. Key Responsibilities: Set up, configure, and maintain LAN/WAN networks, routers, switches, firewalls, and VPNs. Administer Windows/Linux servers, Active Directory, DNS, DHCP, and user access controls. Manage software and OS package installations using tools like apt, yum, dnf, and rpm. Monitor and troubleshoot network and system performance issues. Maintain web, file, mail, and database servers (Apache, Nginx, Postfix, MySQL, etc.). Implement and monitor IT security measures including firewalls, antivirus, and access policies. Perform system backups, restore processes, and support disaster recovery plans. Support virtualization platforms (VMware, Hyper-V) and assist with basic cloud infrastructure (AWS, Azure). Automate tasks using PowerShell or Bash scripting. Document IT procedures, configurations, and network diagrams. Required Skills & Qualifications: Proven Experience in IT system administration, networking, and server management. Hands-on Knowledge of networking protocols, IP addressing, subnetting, and VPNs. Experience with network devices such as routers, switches, and firewalls. Proficient in Windows Server (Active Directory, Group Policies, DNS, DHCP) and Linux administration (Ubuntu, CentOS, RHEL). In-depth knowledge of server administration , including web servers (Apache, Nginx), databases (MySQL, PostgreSQL), and mail servers (Postfix, Exchange). Experience with package management tools (apt, yum, dnf, rpm). Familiarity with cloud platforms (AWS, Azure) and virtualization tools (VMware, Hyper-V). Strong understanding of IT security practices , including firewalls, antivirus, VPNs, and access management. Scripting skills for automation (PowerShell, Bash). Excellent problem-solving and troubleshooting abilities. Preferred Certifications: CompTIA Network+ CompTIA Security+ Microsoft Certified: Windows Server / Azure Administrator Cisco Certified Network Associate (CCNA) Red Hat Certified System Administrator (RHCSA) ITIL Foundation (For IT Service Management) Additional Skills (Good to Have): Experience with containerization technologies (Docker, Kubernetes). Knowledge of Version Control Systems (Git). Why Join Us: Competitive salary and performance-based incentives Dynamic and collaborative work environment Opportunities for learning and growth Exposure to cutting-edge technologies and industry trends Show more Show less

Posted 1 week ago

Apply

0 years

0 - 0 Lacs

India

Remote

Key Responsibilities Technical Support & Troubleshooting : Diagnose and resolve issues related to CCTV cameras, DVR/NVR systems, and associated software. Provide assistance to clients via phone, email, or remote access tools. pathsgroup.com Installation & Configuration : Set up and configure CCTV systems, including cameras and recording equipment, ensuring optimal coverage and functionality. expertia.ai System Maintenance : Conduct routine inspections and maintenance to ensure continuous operation of CCTV systems. Perform necessary repairs or upgrades as needed. expertia.ai Client Training & Documentation : Provide training to clients on system operation. Maintain detailed records of installations, maintenance activities, and technical issues. expertia.ai Collaboration : Work closely with sales and technical teams to identify and resolve system issues. Stay updated with the latest advancements in CCTV technology. expertia.ai Required Skills & Qualifications Technical Expertise : Proficiency in CCTV systems, including knowledge of cameras, recorders, and surveillance software. Familiarity with networking principles and IP camera systems. pathsgroup.comaceda.co.uk+2expertia.ai+2superworks.com+2 Problem-Solving Abilities : Strong analytical skills to diagnose and resolve technical issues efficiently. pathsgroup.com Communication Skills : Excellent verbal and written communication to effectively assist clients and document technical information. Educational Background : A degree or diploma in Electrical Engineering, Information Technology, or a related field is often preferred. expertia.ai Certifications : Certifications such as CompTIA Security+, CCNA, or vendor-specific credentials can be advantageous. Job Type: Full-time Pay: ₹20,000.00 - ₹30,000.00 per month Shift: Day shift Work Location: In person

Posted 1 week ago

Apply

3.0 years

0 Lacs

Navi Mumbai, Maharashtra, India

Remote

Linkedin logo

About TaskUs: TaskUs is a provider of outsourced digital services and next-generation customer experience to fast-growing technology companies, helping its clients represent, protect and grow their brands. Leveraging a cloud-based infrastructure, TaskUs serves clients in the fastest-growing sectors, including social media, e-commerce, gaming, streaming media, food delivery, ride-sharing, HiTech, FinTech, and HealthTech. The People First culture at TaskUs has enabled the company to expand its workforce to approximately 45,000 employees globally. Presently, we have a presence in twenty-three locations across twelve countries, which include the Philippines, India, and the United States. It started with one ridiculously good idea to create a different breed of Business Processing Outsourcing (BPO)! We at TaskUs understand that achieving growth for our partners requires a culture of constant motion, exploring new technologies, being ready to handle any challenge at a moment's notice, and mastering consistency in an ever-changing world. What We Offer: At TaskUs, we prioritize our employees' well-being by offering competitive industry salaries and comprehensive benefits packages. Our commitment to a People First culture is reflected in the various departments we have established, including Total Rewards, Wellness, HR, and Diversity. We take pride in our inclusive environment and positive impact on the community. Moreover, we actively encourage internal mobility and professional growth at all stages of an employee's career within TaskUs. Join our team today and experience firsthand our dedication to supporting People First. Taskus is seeking a highly skilled Team leader Remote Desktop Support Technician with a minimum of 3years of relevant experience supporting international clients. As a Team Leader Remote Desktop Support Technician, you will play a vital role in ensuring the seamless operation of our clients' IT systems by handling team, resolving technical issues and delivering exceptional customer service to a global user base. Key Responsibilities :- Handling team of Remote technical support engineers, you will manage the day-to-day planning and operations of your team. This includes making sure that each of your Teammates delivers on their Service Level Agreement (SLA) and achieve their Key Performance Indicators (KPIs). As Team Leader, you are in charge of managing the team and making sure everyone adheres to their schedules. You must be organized and be able to handle responsibility. To be able to train and help in the development of your team, by conducting team huddles, coaching sessions, and recognizing weaknesses - so you can offer solutions to help them improve and grow. Through that, your team will be able to deliver a superior customer experience - which is the main thrust of your department. Provide remote technical support to international clients via phone, email, chat, and remote desktop tools. Troubleshoot and resolve hardware and software issues related to desktops, laptops, printers, and peripherals. Install, configure, and maintain operating systems, software applications, and security patches. Set up and configure VPN connections for secure remote access. Implement and support multi-factor authentication (MFA) solutions, including Yubikey. Collaborate effectively with cross-functional teams across different time zones to escalate and resolve complex technical issues. Document support tickets, solutions, and troubleshooting procedures in Jira or similar ticketing systems. Provide training and guidance to international end-users on IT best practices and procedures. Stay updated on emerging technologies and industry trends to continuously improve service delivery and enhance client satisfaction. Requirements:- Minimum of 2 years of experience as a team leader in remote desktop support, preferably with international clients . Proficiency in using remote support tools and technologies. Strong troubleshooting skills with the ability to diagnose and resolve technical issues efficiently. Experience with MFA solutions, such as Yubikey, and VPN technologies. Excellent communication skills and cultural sensitivity to effectively interact with clients from diverse backgrounds. Ability to work independently and collaborate effectively in a remote team environment. Experience using collaboration tools like Slack for communication and Jira for ticket management. Preferred Qualifications:- Bachelor's degree in Computer Science, Information Technology, or related field. Certifications in relevant technologies (e.g., CompTIA A+, Network+, Security+). Experience supporting a diverse range of operating systems, including Windows, macOS, and Linux. How We Partner To Protect You: TaskUs will neither solicit money from you during your application process nor require any form of payment in order to proceed with your application. Kindly ensure that you are always in communication with only authorized recruiters of TaskUs. DEI: In TaskUs we believe that innovation and higher performance are brought by people from all walks of life. We welcome applicants of different backgrounds, demographics, and circumstances. Inclusive and equitable practices are our responsibility as a business. TaskUs is committed to providing equal access to opportunities. If you need reasonable accommodations in any part of the hiring process, please let us know. We invite you to explore all TaskUs career opportunities and apply through the provided URL https://www.taskus.com/careers/ . Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

Role Description Role Overview: We are seeking an experienced SIEM Platform Support Engineer to ensure the reliability, performance, and continuous improvement of our cybersecurity platforms. In this key role, you will provide hands-on technical support, manage platform maintenance, and collaborate closely with cross-functional teams to strengthen our security infrastructure. Your efforts will directly contribute to maintaining a resilient, secure, and high-performing environment. Key Responsibilities Deliver expert-level technical support for cybersecurity platforms, diagnosing and resolving incidents and issues in a timely manner. Monitor system health and performance metrics; proactively identify and resolve bottlenecks and inefficiencies. Conduct routine platform maintenance, including patch management, version upgrades, and configuration updates. Collaborate with security analysts, engineers, and infrastructure teams to implement enhancements and align platform capabilities with organizational security goals. Maintain comprehensive documentation for troubleshooting processes, system configurations, and support knowledge bases. Ensure all systems adhere to internal security policies, compliance standards, and industry best practices. Participate in an on-call rotation to address critical incidents and ensure 24/7 operational continuity. Qualifications Minimum of 7 years of experience in platform support, systems administration, or a related technical support role. Proficient in administering and troubleshooting Windows and Linux operating systems, with a solid understanding of networking fundamentals. Hands-on experience with SIEM platforms (e.g., Splunk, IBM QRadar, or similar). Strong analytical and problem-solving skills with a methodical and detail-oriented approach. Excellent communication skills with the ability to convey technical information clearly and effectively. Proven ability to work independently as well as collaboratively in a team environment. Industry certifications such as CompTIA Security+, Microsoft Certified: Azure Administrator, or similar are highly desirable. Skills SIEM Platform Admin Show more Show less

Posted 1 week ago

Apply

8.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Hi , Please find attached the JD for both Cloud Security position . Cloud Security – 8+ years – Chennai/Hyderabad /Pune/Gurgaon Must-Have Skills 1. 5+ years in public cloud (AWS, Azure) 2. Strong cloud and network security knowledge 3. Experience with security tools (vulnerability scanners, IDS/IPS, firewalls, endpoint protection) 4. CI/CD and automated security testing 5. Proficient in scripting/programming (Python, Bash) 6. Experience with Unix/Linux and networking 7. Strong collaboration and communication skills Good-to-Have Skills 1. Cloud access provisioning & automation 2. Log management, SQL, dashboards, reporting 3. Security architecture review & recommendations 4. Database programming/administration 5. Experience with security process documentation 6. Ability to act as a security SME. Cloud Security+ Aws – 6 to 8 years – Pune – JD attached . whatsapp -- wa.me/+918757966669 Show more Show less

Posted 1 week ago

Apply

3.0 years

0 Lacs

Sahibzada Ajit Singh Nagar, Punjab, India

On-site

Linkedin logo

About Us We are a global climate technologies company engineered for sustainability. We create sustainable and efficient residential, commercial and industrial spaces through HVACR technologies. We protect temperature-sensitive goods throughout the cold chain. And we bring comfort to people globally. Best-in-class engineering, design and manufacturing combined with category-leading brands in compression, controls, software and monitoring solutions result in next-generation climate technology that is built for the needs of the world ahead. Whether you are a professional looking for a career change, an undergraduate student exploring your first opportunity, or recent graduate with an advanced degree, we have opportunities that will allow you to innovate, be challenged and make an impact. Join our team and start your journey today! Principal Functional Responsibilities Develop, implement, and maintain cybersecurity policies, standards, and procedures in alignment with industry frameworks and regulatory requirements. Conduct risk assessments, security control evaluations, and gap analyses to identify and mitigate risks. Support internal and external audits, ensuring compliance with frameworks such as NIST CSF, ISO 27001, CIS Controls, SOC 2, and regulatory obligations. Assist in the management of third-party risk assessments and vendor security evaluations. Track, monitor, and report on cybersecurity risks, controls, and compliance metrics. Work with cross-functional teams to ensure security controls are embedded in business processes and IT operations. Develop and maintain risk registers, compliance documentation, and audit evidence repositories. Provide cybersecurity awareness training and guidance to employees on security best practices and compliance requirements. Stay current with evolving cybersecurity threats, regulatory changes, and best practices to enhance the organization's security and compliance posture. Basic Requirements Bachelor’s degree in computer science, Information Systems, or related degree plus three (3+) years of experience or equivalent combination of education and experience. Strong knowledge of security and risk management frameworks like NIST CSF, CIS Critical Security Controls, ISO 27001, NIST 800-53, FAIR, and CIS Must possess excellent oral and written communication skills and the ability to communicate in technical and business terms. Additionally, must be comfortable developing presentations and delivering them to senior management. 3+ years of experience in cybersecurity, governance, risk, and compliance. Experience conducting risk assessments, control evaluations, and compliance audits. Strong knowledge of cybersecurity best practices, policies, and procedures. Excellent analytical, problem-solving, and communication skills. Ability to work independently and collaboratively in a dynamic environment. Professional certifications in IT and Cybersecurity a plus (e.g., Security+, GCRP, CGRC etc.). Preferred Requirements Bachelor’s degree in computer science, Information Systems, or related degree plus eight (3-4) years of experience or equivalent combination of education and experience 3-4 years of experience in Cybersecurity roles (i.e., incident response, security operations, application security, etc.) Ability to simultaneously handle multiple projects and adjust to changing priorities while multitasking effectively. Self-starter, strong initiative, critical thinker, self-directed with a proven track record to collaborate and inspire change. Experience designing and implementing cybersecurity reporting and metrics (i.e., KPI/KRI development) Fluent in English; additional languages are a plus. Competencies Tech Savvy: Anticipating and adopting innovations in business-building digital and technology applications. Optimizes Work Processes: Knowing the most effective and efficient processes to get things done, focusing on continuous improvement. Plans & Aligns: Planning and prioritizing work to meet commitments aligned with the interpersonal goals. Business Insight: Applying knowledge of business and the marketplace to advance the organization’s goals. Communicates Effectively: Developing and delivering multi-mode communications that clearly understand the different audiences' unique needs. Our Commitment to Our People Across the globe, we are united by a singular Purpose: Sustainability is no small ambition. That’s why everything we do is geared toward a sustainable future—for our generation and all those to come. Through groundbreaking innovations, HVACR technology and cold chain solutions, we are reducing carbon emissions and improving energy efficiency in spaces of all sizes, from residential to commercial to industrial. Our employees are our greatest strength. We believe that our culture of passion, openness, and collaboration empowers us to work toward the same goal - to make the world a better place. We invest in the end-to-end development of our people, beginning at onboarding and through senior leadership, so they can thrive personally and professionally. Flexible and competitive benefits plans offer the right options to meet your individual/family needs. We provide employees with flexible time off plans, including paid parental leave (maternal and paternal), vacation and holiday leave. Together, we have the opportunity – and the power – to continue to revolutionize the technology behind air conditioning, heating and refrigeration, and cultivate a better future. Learn more about us and how you can join our team! Our Commitment to Inclusion & Belonging At Copeland, we cultivate a strong sense of inclusion and belonging where individuals of all backgrounds, and with diverse perspectives, are embraced and treated fairly to enable a stronger workforce. Our employee resource groups play an important role in culture and community building at Copeland. Equal Opportunity Employer Copeland is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, age, marital status, political affiliation, sexual orientation, gender identity, genetic information, disability or protected veteran status. We are committed to providing a workplace free of any discrimination or harassment. Show more Show less

Posted 1 week ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Location: Bangalore, India Experience: 3-6 years About Us At Nurix AI, we envision a world powered by super-intelligent AI agents that transform how businesses engage with customers. Our cutting-edge AI agents do more than just solve problems, they create opportunities. From suggesting next purchases to boosting revenue while maintaining customer satisfaction, to analyzing vast datasets for actionable insights, our technologies shape your business and product strategies. By resolving queries with precision and delivering highly personalized interactions, we redefine the customer experience and drive measurable impact. Nurix.ai is at the forefront of AI innovation, developing cutting-edge AI and LLM solutions to enhance productivity and automation. Backed by $27.5M in seed funding, we are building next-gen AI-driven applications that redefine human-machine collaboration. We are looking for a Technical Lead to spearhead our AI engineering efforts and drive product innovation. We are pioneering the AI revolution as India’s first scaled AI services company. We deliver cutting-edge AI and LLM solutions tailored for the dynamic needs of the modern world. Backed by robust funding we are a vibrant, young team set on redefining technological boundaries. Join us in shaping the future. Join us in building the future, where every interaction is smarter, faster and more impactful. The Opportunity This is more than just a security role; it's a chance to build an information security function at Nurix AI, a rapidly scaling AI startup. With our exponential growth and our use of sophisticated AI, LLMs, and multi-cloud infrastructure (AWS, GCP, Azure), we need a seasoned expert to establish and champion a world-class security posture. Our customers are entrusting us with their data in an era of heightened security concerns, and your role will be pivotal in maintaining and strengthening that trust. You will be instrumental in fortifying our defenses at Nurix AI, proactively addressing the unique security challenges of AI and LLMs, and ensuring our innovative solutions are secure by design. What You'll Do (Key Responsibilities) Roles & Responsibilities (What you’ll be doing): Execute penetration tests on web apps, APIs, and mobile applications, then deliver detailed vulnerability assessments and clear remediation advice. Perform both manual and automated secure code reviews—primarily in Java, Python, and JavaScript. Build Python-based security automation tools to broaden test coverage, cut manual work, and speed up assessments. Partner with engineering teams to resolve security issues quickly within rapid release cycles. Develop and maintain threat models, applying proven techniques to surface and address design-level risks early. Champion a security-first culture by coaching developers on secure coding, common weaknesses, and attack vectors, while clearly presenting findings to all stakeholders. What You Bring To The Table 2-5 years of hands-on experience in application security, penetration testing, or a closely related field. Deep expertise with testing tools such as Burp Suite, OWASP ZAP, Semgrep, MobSF, Jadx-GUI, and other mobile security frameworks. Proven ability to embed security across the SDLC, leveraging modern DevSecOps pipelines and tooling. Strong command of secure-coding fundamentals, the OWASP Top 10, CWE catalog, and common exploit techniques. Solid scripting and automation skills—Python preferred. Excellent communication and stakeholder-management capabilities. A passion for continual learning and staying ahead of emerging threats. Bonus Skills Master’s degree in Cybersecurity or a related field. Industry-recognized security certifications such as CISSP, CISM, CCSP, CEH, or CompTIA Security+, or specific cloud security certifications (AWS, GCP, Azure). Experience in a rapidly scaling technology startup. Strong working knowledge of global and Indian data privacy frameworks (e.g., GDPR, HIPAA, DPDP Act ). Experience building a security function from the ground up. Bonus points for credentials like OSCP, OSWE, CRTP, or a noteworthy bug-bounty / CTF track record. What We Offer Opportunity to work on cutting-edge generative AI projects with leading clients. A dynamic and inclusive work environment that promotes professional growth and development. Competitive salary and benefits package, including opportunities for continuous learning and skill enhancement. If you are passionate about leveraging generative AI to drive business transformation and have the expertise to lead complex projects, we invite you to apply and join our innovative team. Show more Show less

Posted 1 week ago

Apply

6.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Information Security Lead at Nurix AI Location: Bangalore, India Experience: 6-10 years About Us At Nurix AI, we envision a world powered by super-intelligent AI agents that transform how businesses engage with customers. Our cutting-edge AI agents do more than just solve problems, they create opportunities. From suggesting next purchases to boosting revenue while maintaining customer satisfaction, to analyzing vast datasets for actionable insights, our technologies shape your business and product strategies. By resolving queries with precision and delivering highly personalized interactions, we redefine the customer experience and drive measurable impact. Nurix.ai is at the forefront of AI innovation, developing cutting-edge AI and LLM solutions to enhance productivity and automation. Backed by $27.5M in seed funding, we are building next-gen AI-driven applications that redefine human-machine collaboration. We are looking for a Technical Lead to spearhead our AI engineering efforts and drive product innovation. We are pioneering the AI revolution as India’s first scaled AI services company. We deliver cutting-edge AI and LLM solutions tailored for the dynamic needs of the modern world. Backed by robust funding we are a vibrant, young team set on redefining technological boundaries. Join us in shaping the future. Join us in building the future, where every interaction is smarter, faster and more impactful. The Opportunity This role involves building and leading the information security function at Nurix AI. The company is experiencing rapid growth and requires a seasoned expert to establish a world-class security posture. The role focuses on addressing the unique security challenges of AI, LLMs, and multi-cloud infrastructure, ensuring innovative solutions are secure by design. Key Responsibilities Security Strategy & Architecture: Design and implement a comprehensive information security strategy, with a focus on AI/ML workloads, LLMs, conversational AI, and multi-cloud infrastructure (AWS, GCP, Azure). Threat Management & Incident Response: Establish threat detection, vulnerability management, and incident response capabilities. AI & LLM Security: Implement security best practices for the AI/ML development lifecycle, including data security, model integrity, and adversarial attack mitigation for LLMs. Cloud Security Governance: Develop and enforce security controls across multi-cloud environments. DevSecOps Leadership: Embed security best practices throughout the SDLC and CI/CD pipelines. Policy, Compliance & Risk Management: Develop and enforce security policies aligned with international standards and data protection laws. Conduct risk assessments on internal systems, vendors, and AI solutions. Security Operations & Tooling: Oversee the use of security tools (SIEM, EDR, vulnerability scanners). Security Awareness & Culture: Drive a culture of security awareness. Customer Trust & Advocacy: Serve as a security subject matter expert. Vendor Management: (Requires significant experience) Understanding of Global Compliances. Required Qualifications Bachelor’s degree in Computer Science, Cybersecurity, or related field. 6-10 years of experience in Information Security, with a focus on cloud environments and complex software systems. Deep expertise in AI/ML security, including risks associated with LLMs, data pipelines, and conversational AI. Proven experience in designing and managing security in multi-cloud environments (AWS, GCP, Azure). Hands-on experience with security tools (SIEM, EDR, vulnerability scanning). Understanding of securing APIs, containers, microservices, and CI/CD pipelines. Knowledge of security frameworks and standards (OWASP, MITRE ATT&CK, ISO 27001, SOC 2). Experience in developing security policies, conducting risk assessments, and managing incident response. Excellent communication, leadership, and project management skills. Preferred Skills (Bonus Points) Master’s degree in Cybersecurity or related field. Security certifications (CISSP, CISM, CCSP, CEH, CompTIA Security+, cloud security certifications). Experience in a rapidly scaling technology startup. Strong knowledge of global and Indian data privacy frameworks (GDPR, HIPAA, DPDP Act). Experience building a security function from the ground up. What We Offer The opportunity to work in a fast-paced, innovative company that is changing the way industries operate. A dynamic work environment with ample opportunities for professional growth and advancement. Attractive salary, equity options, and benefits package. A chance to be at the forefront of the AI and technology revolution with a team of passionate, like-minded professionals. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Maharashtra, India

On-site

Linkedin logo

Key Responsibilities JOB DESCRIPTION Identity and Access Management (IAM) Design, implement, and manage IAM frameworks, ensuring secure access control across on-premises and cloud environments. Administer user accounts, roles, and permissions following the principle of least privilege. Perform periodic access reviews and audits to ensure compliance with organizational policies. Manage single sign-on (SSO), multi-factor authentication (MFA), and identity federation solutions. Collaborate with application teams to implement secure authentication and authorization protocols. Vulnerability Management Conduct regular vulnerability scans across infrastructure, applications, and endpoints using tools such as Qualys, Nessus, or equivalent. Analyze vulnerability reports, prioritize risks, and coordinate remediation efforts with relevant teams. Maintain and improve patch management processes to address identified vulnerabilities. Monitor and track emerging threats, ensuring timely implementation of mitigation measures. Create and present vulnerability management dashboards and reports for stakeholders. Security Operations Monitor and respond to security incidents, ensuring quick containment and resolution. Configure and manage security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. Conduct root cause analysis for incidents and implement preventive measures. Ensure compliance with security standards such as ISO 27001, NIST, or CIS benchmarks. Develop and update runbooks and incident response procedures. Collaboration and Governance Work closely with DevOps, infrastructure, and application teams to integrate security best practices. Participate in security assessments, audits, and risk analysis exercises. Support the development and enforcement of security policies and standards. Provide security awareness training to teams and stakeholders. Documentation and Reporting Maintain comprehensive documentation of IAM workflows, security processes, and vulnerability management activities. Provide periodic compliance and risk reports to management and relevant stakeholders. Qualifications And Skills Proven experience in IAM, vulnerability management, and security operations. Strong knowledge of identity management tools and vulnerability scanning tools (e.g., Qualys). Proficiency in configuring and managing security tools such as firewalls, IDS/IPS, and endpoint security solutions. Familiarity with cloud security practices across platforms like AWS, Azure, or Google Cloud. Strong analytical and problem-solving skills with attention to detail. Relevant certifications such as CISSP, CISM, CompTIA Security+, or GIAC are highly desirable. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cyber Governance Risk and Compliance Consultant - Senior The opportunity This is a role where no two days are the same – so you’ll find yourself taking on plenty of new responsibilities as you go. You’ll work alongside clients and colleagues, balancing your time between developing security strategies, designing security and privacy controls, advising client stakeholders, facilitating workshops and supporting business development. Your key responsibilities As a Cyber GRC Professional in our Cyber Security practice, you will be occupied in the following domains: a) Strategy, b) Risk, c) Compliance. As part of our team strategy you will be expected to take on responsibility and initiative early, providing you with real experience working with a wide range of major clients in EY. You will be taking responsibility for the quality of your work, while continually developing your personal and professional skills through formal training, hands-on experience and coaching. Skills and attributes for success To qualify for the role, you must have: Degree, or equivalent, in Information Security, Cyber Security, Information Technology, Informatics, or other similar and technical areas Evidence of self-motivation to continuously develop in the areas of cybersecurity Good organizational and time management skills with the ability to prioritize and complete multiple complex projects under tight deadlines Ability to translate security issues into business risks Excellent interpersonal skills and ability to work effectively within a team at all hierarchical levels Willingness to research client inquiries and emerging issues, including regulations, industry practices, and new technologies Experience, knowledge and strong interest in information and cyber security domains are essential for this role Experience on Cyber Governance, Risk & Compliance (GRC), Cyber risk assessments & management methodologies Experience on assessing, designing and implementing security strategies, governance frameworks over processes and controls, allowing organisations to optimally manage cyber security Experience on design and implementation of security policies, procedures, standards and controls in line with regulation and/or current standards, such as ISO27001, NIST, SANS etc. Experience in data classification exercises and controls / mechanisms enforcement Working knowledge of control frameworks such as ISO 27001/27002, COBIT, NIST, ITIL, etc. Ability to conduct Security regulatory and compliance assessment independently Hands on with assessment report preparation and presenting to senior technical and business stakeholders Hand on knowledge of excel, PowerPoint and word Articulative and confident in presentation to senior stakeholders Ability to lead workstreams or dedicated portions of projects Cyber maturity assessments, recommendations, roadmap and strategy creation knowledge of use of and risks related to modern and emerging technologies Cybersecurity audit Ability to plan and deliver cyber security training and awareness Ideally, you’ll also have: Security-related qualifications / certifications such as CISSP, SSCP, CISM, ISO27001 lead implementer or auditor, CompTIA Security+, are desirable Experience in Third Party Risk Management (TPRM) and / or vendor risk assessment engagements Experience in design and implementation of Information Security Management Systems (i.e. security policies, procedures and guidelines) according to leading International Standards Security-related vendor / technology certifications are desirable EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

3.0 years

3 - 6 Lacs

Bengaluru

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Portfolio Compliance Enablement Compliance Specialist Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of over 1000 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team help protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The Opportunity As a Senior Associate in the Information Security Portfolio Compliance Enablement function, you will support EY's commitment to secure digital services by helping to ensure compliance with Information Security policies. This role involves actively participating in projects to strengthen risk management, collaborating with various business teams, and contributing to the maintenance of the technology compliance posture through detailed work and analysis. You will also assist in aligning data protection, privacy, and software development practices with legal and regulatory standards. Key Responsibilities Contribute to projects that aim to improve EY's risk posture and compliance with Information Security policies. Assist in developing and implementing compliance strategies and remediation plans. Manage delivery of one or more processes and/or solutions with a focus on quality and effective risk management. Support the translation of technical vulnerabilities into business risk terms for clear communication to stakeholders. Participate in the use and enhancement of compliance assessment toolkits. Be involved in assessments for technology infrastructure, applications, and third-party dependencies. Collaborate with compliance specialists and contribute expertise to specific projects and initiatives. Skills and Attributes for Success Experience in compliance management within Information Security. Ability to understand the impact of security requirements on business operations. Good organizational skills and a proactive approach to problem-solving. Effective communication skills for building relationships and promoting compliance with security policies. Experience in conducting risk assessments, supporting remediation strategies, and writing technical documentation Familiarity with technical infrastructure, applications, and compliance frameworks. To Qualify for the Role, You Must Have A minimum of 3 years of experience in Cyber Security, Information Security, or a related field. A degree in Cyber Security, Information Security, Computer Science, or a related discipline. Certifications such as Security+, Network+, CRISC, CISSP, CISM, CISA, or equivalent are desirable. Knowledge of information security standards like ISO 27001/27002, NIST, PCI DSS. Awareness of regulatory requirements such as PCI, SOX, HIPAA, GDPR. Strong communication skills and the ability to work effectively within a team. Ideally, You’ll Also Have Strong analytical and decision-making skills. The ability to adapt to new challenges and evolving project requirements. Strong interpersonal skills and the ability to communicate technical concepts effectively. Experience with GRC platforms like RSA Archer or IBM Open Pages is beneficial. What we look for We are looking for individuals with a passion for information security and demonstrated ability to apply their knowledge to new and emerging technologies that are supporting the growth strategy of a global professional services firm. What we offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies