Home
Jobs

575 Security+ Jobs - Page 8

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0 years

0 Lacs

Hyderābād

Remote

Hyderabad, India Chennai, India Job ID: R-1076715 Apply prior to the end date: June 21st, 2025 When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's brand reputation and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. What we’re looking for… Verizon is seeking an innovative and driven leader to enhance our threat defense capabilities and mature our current processes within Verizon's unique security landscape. This Incident Management Analyst role offers a fast-paced, collaborative environment defending Verizon from current and future cyber threats, playing a critical role in Verizon’s enterprise computing defense. Analysts must be agile, willing to learn and teach others, highly organized, communicate effectively, and think outside of the box to operate effectively in an ever-changing threat landscape. This role ensures continuous improvement of our cybersecurity posture by capturing lessons learned, analyzing incident response effectiveness, and driving actionable remediations.. Responsibilities: Utilizing and adhering to defined workflow and processes driving the Incident Management and mitigation efforts. Owning, executing and driving all incidents to resolution using strong facilitation, organization, and time management skills. Partnering with Cyber Security stakeholders and coordinating remediation activities throughout the Verizon organization and its lines of business as a part of Cyber Incident Handling and After Action Remediation. Being able to communicate effectively with all levels of business including technical and non-technical audiences. Collecting and documenting information to support Incident Response activities; including but not limited to artifacts, action items, timelines, and impacted elements. Documenting results of the cyber threat analysis/investigation including containment, recovery, and remediation efforts. Leveraging various techniques and capacities to support Cyber Incident Response and non-cyber activities. Enhancing and advancing the defensive capabilities of Advanced Cyber Defense (ACD) and its subsequent ability to defend the Verizon Enterprise. Recommending solutions to optimize both technical and process/procedure aspects of the end to end incident lifecycle. Collaborating with Threat Intelligence, Threat Hunt, DFIR, and SOC teams to integrate relevant data into after action reviews and post-incident evaluations. Tracking the implementation of post-incident recommendations and ensuring timely resolution of identified gaps, risks, or weaknesses. Producing and maintaining detailed reports summarizing lessons learned, trends, and strategic insights for leadership Providing training and mentoring of junior team members. Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. You’ll need to have: Bachelor’s degree or four or more years of work experience. Eight or more years of relevant work experience. Security operations and/or Incident Handling experience Willing to work occasionally on late nights and weekends. Even better if you have one or more of the following : Bachelor degree. Related Certification (A+, Network+, Security+, CISSP, GCIH, GCFA, GCFE, GNFA, GREM). Information Assurance or Cyber Experience in the Telecommunications industry. Experience working in a Security Operations Center (SOC) with focus on Computer Network Defense (CND). Experience with dynamic and/or malware analysis. Experience in Cyber Intelligence or related disciplines. Experience with enterprise antivirus, EDR, IDS, Full Packet Capture, and Host/Network Forensics Tools. Knowledge of Networking (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture. Experience executing various Incident Response Frameworks and Handling Procedures. Program and Scripting Experience. Experience with Regex. Strong knowledge of Operating Systems: Windows, Unix/Linux, and OSX Operating Systems. Experience and knowledge of cyber risks and threats related to cyber attackers. Ability to manage multiple priorities in a dynamic environment. If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISO Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Apply Now Save Saved Open sharing options Share Related Jobs Analyst III-Threat Intel Save Hyderabad, India, +1 other location Technology Analyst IV-Threat Intel Save Hyderabad, India, +1 other location Technology Digital Forensics and Incident Response Analyst Save Temple Terrace, Florida, +3 other locations Technology Shaping the future. Connect with the best and brightest to help innovate and operate some of the world’s largest platforms and networks.

Posted 1 week ago

Apply

0 years

6 - 9 Lacs

Hyderābād

Remote

Hyderabad, India Chennai, India Job ID: R-1076713 Apply prior to the end date: June 21st, 2025 When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's employees, customers, brand reputation, and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. What we’re looking for... Verizon is looking for an innovative and motivated professional who will be responsible for safeguarding the Verizon enterprise. This individual will work on identified threats and will neutralize them through proactive hunting and detection, incident response and mitigation strategies, and ensure continuous operation of Verizon’s on-prem and cloud environments. The Digital Forensics & Incident Response role is an opportunity to work in a fast paced collaborative environment defending Verizon from current and future cyber threats. This position plays a critical role in Verizon’s enterprise computing defense. Executing the Incident Response Lifecycle to drive threat remediation and identify strategic countermeasures improving future defenses. Operating as a trusted advisor on threat analysis during incidents for incident management teams and other stakeholders by following cybersecurity response methodologies such as the NIST CyberSecurity Framework. Serving as a primary point of contact during assigned on-call shifts, responding promptly to incidents, escalations, and critical alerts to minimize downtime and mitigate risks to the enterprise. Deploying security tools and leveraging logs and endpoint forensic analysis in order to complete a detailed and accurate assessment of security alerts and threats affecting the Verizon enterprise and cloud infrastructure. Assisting with the development of security controls for multiple platforms via automated capabilities by using advanced analysis and forensic techniques. Driving identification, analysis, and remediation activities to ensure compliance with relevant regulatory requirements, industry standards, and best practices related to security and data privacy. Providing assistance and analytical evaluations for high-priority and significant security incidents, including composing extensive and comprehensive analysis summaries and facilitating incident-related discussions. Identifying gaps in detections and collaborating with teams across Cyber Security to mitigate threats and improve the overall security posture. Recommending ways to mature and advance the preventive and defensive capabilities of the TMC. This includes leveraging data and knowledge to clearly communicate the use case for alert creation. Collaborating with cross-functional teams to respond, identify, and analyze the root cause of a cybersecurity incident. Conducting risk assessments, in-depth analysis, and forensic investigations to determine the root cause and impact of incidents. Enhancing, and/or implementing DFIR playbooks to ensure cohesive response repeatability. Assisting with producing operational read-outs and case reviews for peers and leadership that accurately capture the effectiveness of the DFIR organization. Continuously honing to build and maintain knowledge, skills, and abilities needed to maintain proficiency in producing thorough and accurate digital forensic analysis. Enhancing techniques, workflows and processes of security controls, compliance assessments, and DFIR procedures to drive the TMC operational and strategic growth (continuous improvement). Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. You’ll need to have: Bachelor's degree or four or more years of work experience. Four or more years of relevant experience required, demonstrated through work experience and/or military experience. Experience working in Digital Forensic, Incident Response, and/or a Security Operations Center (SOC) environment(s). Even better if you have one or more of the following: Awareness of cyber based adversarial frameworks including MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain. Proficient knowledge of the cyber threat landscape including types of adversaries, campaigns, and the motivations that drive them. Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents. Programming and Scripting Experience to enhance automations, ad-hoc forensic analysis and speed-up response times. Previous experience with log aggregation platforms such as Splunk, Elastic, Snowflake, LogRhythm, etc. Proficient in understanding Operating Systems and their architectures: Windows, Unix/Linux, and MacOS Operating Systems Demonstrates leadership and mentoring skills to help advance the overall capabilities of the TMC organization. Ability to work in a highly collaborative environment needing strong communication, presentation, and leadership-like skills Exhibits initiative, follow-up and follow through with commitments Certifications like: Network+, Security+, CISSP, EnCE, CFCE, C|EH, C|HFI, GCFA, GCFE, GCIH and/or cloud-specific security certifications (e.g. AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Cloud Certified Professional Cloud Security Engineer) If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISO Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Apply Now Save Saved Open sharing options Share Related Jobs Analyst IV-Threat Intel Save Hyderabad, India, +1 other location Technology Analyst IV-Threat Intel Save Hyderabad, India, +1 other location Technology Digital Forensics and Incident Response Analyst Save Temple Terrace, Florida, +3 other locations Technology Shaping the future. Connect with the best and brightest to help innovate and operate some of the world’s largest platforms and networks.

Posted 1 week ago

Apply

0 years

0 Lacs

India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cyber Risk and Compliance Consultant - Senior The opportunity This is a role where no two days are the same – so you’ll find yourself taking on plenty of new responsibilities as you go. You’ll work alongside clients and colleagues, balancing your time between developing security strategies, designing security and privacy controls, advising client stakeholders, facilitating workshops and supporting business development. Your key responsibilities As a Cyber GRC Professional in our Cyber Security practice, you will be occupied in the following domains: a) Strategy, b) Risk, c) Compliance. As part of our team strategy you will be expected to take on responsibility and initiative early, providing you with real experience working with a wide range of major clients in EY. You will be taking responsibility for the quality of your work, while continually developing your personal and professional skills through formal training, hands-on experience and coaching. Skills and attributes for success To qualify for the role, you must have: Degree, or equivalent, in Information Security, Cyber Security, Information Technology, Informatics, or other similar and technical areas Evidence of self-motivation to continuously develop in the areas of cybersecurity Good organizational and time management skills with the ability to prioritize and complete multiple complex projects under tight deadlines Ability to translate security issues into business risks Excellent interpersonal skills and ability to work effectively within a team at all hierarchical levels Willingness to research client inquiries and emerging issues, including regulations, industry practices, and new technologies Experience, knowledge and strong interest in information and cyber security domains are essential for this role Experience on Cyber Governance, Risk & Compliance (GRC), Cyber risk assessments & management methodologies Experience on assessing, designing and implementing security strategies, governance frameworks over processes and controls, allowing organisations to optimally manage cyber security Experience on design and implementation of security policies, procedures, standards and controls in line with regulation and/or current standards, such as ISO27001, NIST, SANS etc. Experience in data classification exercises and controls / mechanisms enforcement Working knowledge of control frameworks such as ISO 27001/27002, COBIT, NIST, ITIL, etc. Ability to conduct Security regulatory and compliance assessment independently Hands on with assessment report preparation and presenting to senior technical and business stakeholders Hand on knowledge of excel, PowerPoint and word Articulative and confident in presentation to senior stakeholders Ability to lead workstreams or dedicated portions of projects Cyber maturity assessments, recommendations, roadmap and strategy creation knowledge of use of and risks related to modern and emerging technologies Cybersecurity audit Ability to plan and deliver cyber security training and awareness Ideally, you’ll also have: Security-related qualifications / certifications such as CISSP, SSCP, CISM, ISO27001 lead implementer or auditor, CompTIA Security+, are desirable Experience in Third Party Risk Management (TPRM) and / or vendor risk assessment engagements Experience in design and implementation of Information Security Management Systems (i.e. security policies, procedures and guidelines) according to leading International Standards Security-related vendor / technology certifications are desirable EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

0 years

0 - 0 Lacs

Thiruvananthapuram

On-site

We are a leading Training Institute committed to building a skilled digital workforce. We are currently looking for a Cyber Security Trainer who can educate and empower learners with real-world cyber defense techniques and strategies. Key Responsibilities: Deliver interactive training sessions on Cyber Security Fundamentals, Ethical Hacking, Network Security, Threat Detection , and Penetration Testing . Cover tools and platforms like Kali Linux, Wireshark, Metasploit, Nmap , etc. Create and maintain training content, hands-on labs, case studies, and assessments. Guide students on industry best practices, compliance standards (ISO, NIST), and incident response. Stay updated with the latest security threats, tools, and technologies. Requirements: Strong hands-on experience in cyber security, ethical hacking, or IT security roles. Proficiency in security tools, Linux OS, and networking concepts. Prior experience in training/mentoring preferred. Excellent communication and teaching skills. Ability to deliver both beginner and advanced-level training. Preferred Qualifications: Certifications like CEH, CompTIA Security+, CISSP, OSCP are a plus. Experience in cloud security, DevSecOps, or security audits. Familiarity with cyber law and regulatory frameworks (GDPR, HIPAA, etc.). Job Types: Full-time, Permanent Pay: ₹10,228.99 - ₹32,802.78 per month Schedule: Day shift Ability to commute/relocate: Thiruvananthapuram, Kerala: Reliably commute or planning to relocate before starting work (Preferred) Work Location: In person

Posted 1 week ago

Apply

1.0 years

0 - 0 Lacs

Cochin

On-site

Key Responsibilities: Deliver engaging and practical cybersecurity training sessions to students, covering key topics such as network security, ethical hacking, threat analysis, risk management, and security best practices. Create and update training materials, presentations, and lab exercises to ensure high-quality, up-to-date content. Provide hands-on guidance to students, including troubleshooting technical issues and clarifying cybersecurity concepts. Assess student performance through assignments, quizzes, and evaluations, and provide constructive feedback. Stay current with the latest trends, tools, and certifications in cybersecurity. Collaborate with the curriculum development team to enhance training programs. Participate in internal meetings and contribute to continuous improvement of the training process. Requirements: Bachelor’s degree in Computer Science, Information Technology, or a related field. 1–2 years of experience in cybersecurity roles or cybersecurity training. Strong understanding of cybersecurity fundamentals, tools, and methodologies. Experience with common cybersecurity tools, such as firewalls, antivirus solutions, vulnerability scanners, and SIEM tools. Excellent communication and presentation skills. Ability to simplify complex technical concepts for beginners. Relevant certifications (such as CEH, CompTIA Security+, or similar) are a plus. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹40,000.00 per month Benefits: Health insurance Schedule: Day shift Monday to Friday Weekend availability Supplemental Pay: Overtime pay Experience: Cybersecurity: 1 year (Required) Language: English (Preferred) Work Location: In person Expected Start Date: 09/06/2025

Posted 1 week ago

Apply

0 years

0 - 0 Lacs

Cochin

Remote

Job Title: IT Support Specialist Job Summary: We're seeking an experienced IT Support Specialist to join our team. The successful candidate will provide technical support, configure and troubleshoot various systems, and maintain our IT infrastructure. Key Responsibilities: 1. Technical Support: Provide technical support and assistance to users via phone, email, or remote support tools. 2. CCTV Systems: Configure, troubleshoot, and maintain CCTV systems, including IP cameras, DVR/NVR setups, and remote access configurations. 3. Network Devices: Manage and maintain network devices, such as Access Points, Routers, Firewalls, and Switches. 4. Remote Support: Utilize remote support tools, such as AnyDesk and TeamViewer, to diagnose and resolve issues on user devices. 5. WordPress Websites: Configure, maintain, and troubleshoot WordPress websites and related plugins. 6. Email Configurations: Set up and troubleshoot email configurations, including SMTP, IMAP, and POP3. 7. AWS Services: Experience with AWS services, such as EC2, S3, RDS, and more. 8. Domain Management: Manage domain registrations, DNS configurations, transfers, and renewals, including SSL certificates. 9. DNS Records: Configure and manage DNS records, including MX, A, CNAME, and TXT records. 10. IT Asset Management: Maintain accurate records and inventory of IT assets, including hardware and software. 11. Stay Updated: Stay current with the latest technology trends to enhance our IT systems and services. Requirements: 1. Bachelor's Degree: Bachelor's degree in Information Technology, Computer Science, or a related field (preferred) or equivalent experience. 2. Proven Experience: Proven experience in technical support, IT support, or a similar role. 3. Technical Skills: Experience with Microsoft 365, Zoho, and DND telecommunications systems. Nice to Have: 1. Certifications: Relevant certifications, such as CompTIA A+, Network+, or Security+, are a plus. 2. Experience with NAS Devices: Experience with NAS devices, such as Synology, is desirable. If you're a motivated and experienced IT professional looking for a challenging role, please submit your application, including your resume and a cover letter, to [insert contact information]. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹25,000.00 per month Shift: Day shift Work Days: Monday to Friday Work Location: In person

Posted 1 week ago

Apply

5.0 years

7 - 9 Lacs

Gurgaon

On-site

Overview: Keysight is on the forefront of technology innovation, delivering breakthroughs and trusted insights in electronic design, simulation, prototyping, test, manufacturing, and optimization. Our ~15,000 employees create world-class solutions in communications, 5G, automotive, energy, quantum, aerospace, defense, and semiconductor markets for customers in over 100 countries. Learn more about what we do. Our award-winning culture embraces a bold vision of where technology can take us and a passion for tackling challenging problems with industry-first solutions. We believe that when people feel a sense of belonging, they can be more creative, innovative, and thrive at all points in their careers. Responsibilities: Cybersecurity SOC Analyst – Tier1 (SOC-Security Operation Center) The Cybersecurity Analyst will be responsible for the handling, and escalation of, alerts which require technical triage and analysis. This may include web attacks, malware infections, and phishing campaigns, which have been identified by the Information Risk & Security team’s technology stack. Functional Responsibilities Experience Monitoring SIEM solutions and a variety of other security devices found in a SOC environment (e.g. Behavioral Analytics tools, IDS/IPS, log management tools, and security analytics platforms. • Creating and maintaining documentation for security event processing. • Acknowledge and handle the incoming security alerts. Use the internal ticketing system and dashboards to update the tickets/alerts accordingly and escalating them to the appropriate teams if necessary. Assist the Incident Response team on alerts escalated to them by the SOC team. • Develop/Update and follow Standard Operating Procedures (SOPs) and Playbooks to handle standard and out-of-band alerts. Report to the Incident Response Team quickly and efficiently regarding urgent matters. • Ensure ticket queues are always within satisfactory limits and all tickets are updated. • Provide On-Call Support for emergency or high severity issues. Liaise with partner teams and end-users for security related tickets and activities. Qualifications: Bachelor's degree in Conputer Science / Electrical & Electronics / IT Engineering ; MCA Excellent verbal and written communication skills. Excellent analytical and problem-solving skills required. Minimum of 5+ years of experience in a SOC or Cybersecurity. Equivalent Certifications (Network+, Security+, CySA+, GSEC, GMON, etc.) Experience working with SIEMs and evaluating SIEM alerts, EDR , NDR Experience leveraging core security and infrastructure technologies during investigations (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS) Key Competencies Ability to think with a security mindset. The successful candidate has a good IT background with good level knowledge of multiple relevant security practice areas (anti-malware solutions, patch and vulnerability management, network security; monitoring; endpoint, etc.) • Knowledge of TCP/IP Protocols, network analysis, and network/security applications. • Good knowledge of various security tools and monitoring devices; e.g. able to read and understand IDS/IPS/Firewall/Proxy logs and determine the current state of play. Experience in correlating malware infections with attack vectors to determine the extent of security and data compromise. Ability to work in a time-sensitive environment; must be detail oriented and able to multitask to meet deadlines and company objectives. Experience in large, geographically diverse enterprise networks. Ability to build lasting relationships with partner teams and stakeholders. Strong written and oral communication skills, including the ability to interact directly with customers that do not have an IT background. Documentation; experience in writing reports and documenting tickets efficiently and accurately. Careers Privacy Statement***Keysight is an Equal Opportunity Employer.***

Posted 1 week ago

Apply

2.0 years

0 Lacs

India

On-site

Today Secret Unspecified Unspecified macdill air force, FL (ON-SITE/OFFICE) Overview Spathe Systems is seeking a Learning Management Systems (LMS) Specialist for the Joint Special Operations University (JSOU) mission in support of United States Special Operations Command (USSOCOM). Spathe Systems is a rapidly growing SOF led, 8(a) defense contractor headquartered in Tampa, FL with offices in Fayetteville, NC and strategic partner locations in Virginia Beach and Coronado. As a small business with a tight nit family feel, Spathe empowers its employees to solve problems and make decisions. Responsibilities Clearance: Secret Job Description: SPATHE is looking for qualified personnel to support a multi-year contract with the Joint Special Operations University (JSOU) mission in support of USSOCOM. As the LMS specialist, provide the SPATHE Task Lead LMS subject matter expertise that assists in the execution of JSOU's educational support services with emphasis on military studies. The candidate shall perform the following tasks: Have current IAT Level II Security+ CE information assurance certification to perform LMS administrative functions in accordance with DoDD 8570.01-M, Information Assurance Workforce Improvement Program. DoDD Baseline Certifications can be found : DoD Approved 8570 Baseline Certifications - DoD Cyber Exchange Provides the university with the administration, delivery, and content management of online courseware and technical online course support for faculty and students using the learning management system Coordinates and continuously improves LMS admin processes and activities cross-functionally to create best possible learning experience for the users Resolves actions for LMS technical support to students and/or faculty regarding the LMS Keeps current with external LMS trends and developments and applies learning to improve LMS processes Keeps current of new feature releases and determines how those changes impact the LMS and university processes Creates roles, securities, and permissions associated with LMS access Creates and manages user structures including the creation of user groups Identifies future strategic development opportunities for the LMS as well as organizational needs and requirements for new LMS solutions or integrations Assists the review, testing, and implementation of LMS updates and enhancements Develops and executes quality assurance and performance testing Publishes courses and ensures those courses are appropriately cataloged and learners have the proper access Monitors successful completion of courses and looks for negative trends that could indicate any potential issues with the course Analyzes course reporting data and recommends strategic direction to management Generates and interprets system reports, generalizes findings, and makes recommendations for process and utilization improvements Proactively analyzes data to identify trends and uses this information to improve learning and development programs Works to ensure LMS content is backed up, archived, disabled, and deleted as directed by the government lead Provides support to users (i.e., trainers, managers, and learners) and assists them in using the LMS Provides first-tier troubleshooting assistance for users regarding logging in to the LMS and accessing courses Creates user memberships as needed and assigns appropriate access Supports and monitors incoming tickets for issues that include answering questions and troubleshooting problems for users Collaborates with IT and the LMS administration community to manage the course asset library Collaborates with IT on escalations and tickets requiring resolution from the LMS vendor Collaborates with IT on troubleshooting and resolving system functionality issues Provides support to the IT Software Administrator for LMS system migrations, integrations, and change management Notify the Government lead immediately upon discovery of any LMS service outage and assist the Government lead in working with LMS provider to restore functionality Work with Government lead to implement Government-approved strategies, processes, and procedures regarding the categorization, retention, and accessibility of data in the e-Campus system Work with JSOU instructional designers to incorporate courseware into new course iterations per designated JSOU policy or guidance Develop and produce system-wide reports using internal and external reporting tools Coordinate with vendor on scheduled upgrades to LMS and other software support packages Qualifications BA/BS in information systems, instructional technology, or related field required (degree must be from a regionally accredited U.S. college/university or internationally recognized college/university); OR Certified training in a related field with a BA/BA degree. Certified in AICC and SCORM protocols Qualified in HTML5, CSS, and JavaScript Certified in eLearning authoring tools (Storyline 60, Captivate, etc.) a plus Possession of CompTIA Security+ 2+ years of experience with administration of Blackboard Learning Management Systems Have current Blackboard LMS administration certification Work Location: JSOU Campus, MacDill AFB, FL Benefits: Health Insurance Dental Insurance Retirement Plan Paid Time O ff 11 Federal Holidays Schedule: 0800-1700 Mon-Fri adjusted hours as needed. Travel: Travel is minimal to various l ocations. T ravel as initiated by written tasking . T ravel is not expected to exceed more than 15%. Position ID : MJ012LMS GROUP ID: 90986062 R Recruiter APPLY NOW

Posted 1 week ago

Apply

5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Assystem Stup is a full-service project delivery consultancy company offering master planning, comprehensive building design, engineering and project management services. We serve many clients in decarbonised energy, transportation, cities & territories, buildings and commercial, institutional, recreational and manufacturing facility infrastructures. As part of Assystem Group, we combine strong expertise in engineering, project management and digitalisation to serve our clients worldwide. Job Description Leading efforts to counter security breaches and anticipating and reducing the likelihood of future security alerts, incidents, and disasters. Defining, planning, implementing, maintaining, and upgrading security measures, policies, and controls. Writing reports and providing insights on the efficacy of the current security policies, incident responses, disaster recovery plans, and other security-related information. Assisting with the creation of updates and training programs to secure the network and train the employees. Keeping the security systems up to date. Monitoring security access and maintaining the relevant data. Conducting vulnerability testing and risk analyses to assess security and performing internal and external security audits. Analyzing security breaches to identify the cause and to update incidence responses and disaster recovery plans. Verifying and coordinating security plans with outside vendors. Creating procedures for IT employees and training them in security awareness. Qualifications A Bachelor's degree in computer science, programming, or related field. 5-10 years' experience in the field, such as security administration. Advanced training certifications may be advantageous. Security+ CySA+ Certified Ethical Hacker (CEH) Certified in Risk and Information Systems Control (CRISC) Certified Information Systems Auditor (CISA) Certified Information Systems Security Professional (CISSP) The ability to work in a high-stress environment. Excellent verbal and written communication skills, interpersonal, and teaching skills. Good anticipation, analytical, and problem-solving skills. The ability to remain current on the latest technology and best practices in information security. Additional Information Threat Hunting Malware Analysis Threat Intelligence Ethical hacking Penetration testing Intrusion prevention Incident response Computer forensics Reverse engineering In addition, it is expected to have expertise in cyber security, firewalls, network security, information assurance, Linux, UNIX, security information and event management (SIEM), application security, security engineering, and security architecture. They must also keep up with the latest trends in cyber security. Knowledge of at least one of the following languages: C, C++, Python, Shell, etc. would be preferred. We are committed to equal treatment of candidates and promote, as well as foster all forms of diversity within our company. We believe that bringing together people with different backgrounds and perspectives is essential for creating innovative and impactful solutions. Skills, talent, and our people’s ability to dare are the only things that matter !. Bring your unique contributions and help us shape the future. Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Assystem Stup is a full-service project delivery consultancy company offering master planning, comprehensive building design, engineering and project management services. We serve many clients in decarbonised energy, transportation, cities & territories, buildings and commercial, institutional, recreational and manufacturing facility infrastructures. As part of Assystem Group, we combine strong expertise in engineering, project management and digitalisation to serve our clients worldwide. Job Description Leading efforts to counter security breaches and anticipating and reducing the likelihood of future security alerts, incidents, and disasters. Defining, planning, implementing, maintaining, and upgrading security measures, policies, and controls. Writing reports and providing insights on the efficacy of the current security policies, incident responses, disaster recovery plans, and other security-related information. Assisting with the creation of updates and training programs to secure the network and train the employees. Keeping the security systems up to date. Monitoring security access and maintaining the relevant data. Conducting vulnerability testing and risk analyses to assess security and performing internal and external security audits. Analyzing security breaches to identify the cause and to update incidence responses and disaster recovery plans. Verifying and coordinating security plans with outside vendors. Creating procedures for IT employees and training them in security awareness. Qualifications A Bachelor's degree in computer science, programming, or related field. 5-10 years' experience in the field, such as security administration. Advanced training certifications may be advantageous. Security+ CySA+ Certified Ethical Hacker (CEH) Certified in Risk and Information Systems Control (CRISC) Certified Information Systems Auditor (CISA) Certified Information Systems Security Professional (CISSP) The ability to work in a high-stress environment. Excellent verbal and written communication skills, interpersonal, and teaching skills. Good anticipation, analytical, and problem-solving skills. The ability to remain current on the latest technology and best practices in information security. Additional Information Threat Hunting Malware Analysis Threat Intelligence Ethical hacking Penetration testing Intrusion prevention Incident response Computer forensics Reverse engineering In addition, it is expected to have expertise in cyber security, firewalls, network security, information assurance, Linux, UNIX, security information and event management (SIEM), application security, security engineering, and security architecture. They must also keep up with the latest trends in cyber security. Knowledge of at least one of the following languages: C, C++, Python, Shell, etc. would be preferred. We are committed to equal treatment of candidates and promote, as well as foster all forms of diversity within our company. We believe that bringing together people with different backgrounds and perspectives is essential for creating innovative and impactful solutions. Skills, talent, and our people’s ability to dare are the only things that matter !. Bring your unique contributions and help us shape the future. Show more Show less

Posted 1 week ago

Apply

2.0 years

0 Lacs

Kanpur, Uttar Pradesh, India

On-site

Linkedin logo

Description We are looking for a motivated and detail-oriented System Engineer to join our IT Security team. The ideal candidate will assist in monitoring and responding to cybersecurity alerts, supporting incident response efforts, helping to develop and enforce security policies, conducting cybersecurity awareness initiatives, and coordinating with government and industry cybersecurity bodies. Responsibilitie sManage and coordinate responses to cybersecurity incidents, including identifying, analysing, and mitigating the impact of security threats and breaches .Contribute to the development and implementation of IT security policies, ensure organizational compliance, and periodically review policies to align with evolving threats and technologies .Organize training sessions, simulations, and awareness campaigns to educate employees on cybersecurity best practices and protocols .Maintain communication with CERT-In and other relevant government and industry organizations to stay informed about emerging threats and collaborate on security initiatives .Stay updated with current cybersecurity trends, participate in relevant training, earn certifications (e.g., CISSP, CEH, CISM), and attend industry conferences . Eligibili tyBachelor's degree in Computer Science, Information Technology, or a related field (or equivalent practical experience ).Strong understanding of Networking, Operating Systems, System Administration, Threats, and Vulnerabilitie s.Familiarity with cybersecurity frameworks such as NIST, ISO 27001, and CIS Control s.Knowledge of national and international cybersecurity standards, regulations, and best practice s.Professional, courteous, cooperative, and a team player with a high level of integrit y.Excellent communication, presentation, negotiation, and interpersonal skill s.Experience and maturity in interacting with senior stakeholders and building trusted relationship s.Proven ability to manage internal and external communications during and after security incident s.Minimum of 2 years’ experience in security technologies as a Support Engineer or Analys t.Experience in analysing logs from multiple sources (e.g., network devices, servers, applications) to detect and respond to security incident s.Skilled in developing and executing incident response plans, with knowledge of forensics, threat hunting, and investigative technique s.Ability to gather, interpret, and apply cyber threat intelligence to strengthen security postur e.Proficient in scripting languages like Python and PowerShell for automation and tool developmen t.Experience in patch management to ensure systems are secure and up to dat e. Desired Eligibil ityProfessional certifications such as CISSP, CISM, CEH, CompTIA Security+, or similar recognized credentia ls. Tr avelAs and when required, across the country for project execution and monitoring, as well as for coordination with geographically distributed te ams. Communic ationSubmit a cover letter summarising your experience in relevant technologies and software, along with a resume and the Latest passport-size photog raph. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Managed Services Information Security Analyst is a seasoned subject matter expert, responsible for working with security tools and other security teams to monitor, analyze, interpret and report on the incoming client data for the purpose of delivering security information and recommendations to the clients, enabling the organization to deliver the contracted security services. This role includes performing tasks such as security incident detection and response, security event reporting, threat hunting, content maintenance (tuning) and interacting with clients to ensure their understanding of the information generated, recommending client system changes as well as answering security related queries from the clients. What You'll Be Doing Key Responsibilities: Works as part of a global Cyber Defense Centre (CDC) team that works 24/7 on rotational shifts. Works with client stakeholders and relevant internal teams to tune the MSSP platform and client SIEM to enable more efficient detection, analysis and reporting. Monitors security tools to review and analyze security logs from client environments. Generates continuous improvement ideas for supported security tools/technologies, to enable improvements to the company services, employee experience and client experience. Adheres to SOPs, customer Run Books and standard processes to ensure a globally consistent delivery whilst also proposing changes and improvements to these standards. Utilizes and documents best practices and amends existing documentation as required. Identifies opportunities to make automations which will help the clients and security delivery teams. Performs security incident handling and response from several vectors including End Point Protection and Enterprise Detection and response tools, attack analysis, malware analysis, network forensics, computer forensics., Utilizes a broad range of skills in LAN technologies, Windows and Linux O/S’s, and general security infrastructure. Ensures usage of knowledge articles in incident diagnosis and resolution and assists with updating as and when required. Performs defined tasks to inform and monitor service delivery against service level agreements and maintain records of relevant information. Undertakes threat hunting activities across both individual client estates, as well as cross client hunting. Manages unresolved incidents and follows up until incidents are resolved. Works closely with client delivery teams to support their activities related to client delivery. Cooperates closely with colleagues to share knowledge and build a cohesive and effective team environment, benefiting the individual, the business and the client. Performs any other related task as required. Customer interactions and attending bridge calls to work with customers and relative technical teams. Understanding of threat hunt methodologies and perform threat hunting. Knowledge and Attributes: Seasoned knowledge on implementation and monitoring of a company supported SIEM or security tools/technologies/concepts. Seasoned knowledge on security architecture, worked across different security technologies. Seasoned knowledge and understanding of the operation of modern computer systems and networks and how they can be compromised. Displays excellent customer service orientation and pro-active thinking. Displays problem solving abilities and is highly driven and self-organized. Excellent attention to detail. Excellent analytical and logical thinking. Excellent spoken and written communication abilities. Team player with the ability to work well with others and in group with colleagues and stakeholders. Ability to remain calm in pressurized situations. Ability to keep current on emerging trends and new technologies in area of specialization. Academic Qualifications and Certifications: Bachelor's degree or relevant qualification in Information Technology or Computing or a related field. Security certifications such as (but not limited to) AZ-500, SC-200, Security+, CEH, CISSP, CISM or similar Certification in different networking technologies such as CCNA, JNCIA, ACCA, PCNSA, CCSA is advantageous. Required Experience: Seasoned experience in SOC Analysis Operations. Seasoned experience in SIEM usage for investigations. Seasoned experience in Security technologies such as (but not limited to) Firewall, IPS, IDS, Proxy. Seasoned experience in dealing with technical support to clients. Seasoned experience in handling security incidents end to end. Seasoned experience in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots and other security tools. Seasoned experience in Security Analysis or Engineering preferably gained within a global services organization. Workplace type: Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today. Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

Overview Keysight is on the forefront of technology innovation, delivering breakthroughs and trusted insights in electronic design, simulation, prototyping, test, manufacturing, and optimization. Our ~15,000 employees create world-class solutions in communications, 5G, automotive, energy, quantum, aerospace, defense, and semiconductor markets for customers in over 100 countries. Learn more about what we do. Our award-winning culture embraces a bold vision of where technology can take us and a passion for tackling challenging problems with industry-first solutions. We believe that when people feel a sense of belonging, they can be more creative, innovative, and thrive at all points in their careers. Responsibilities Cybersecurity SOC Analyst – Tier1 (SOC-Security Operation Center) The Cybersecurity Analyst will be responsible for the handling, and escalation of, alerts which require technical triage and analysis. This may include web attacks, malware infections, and phishing campaigns, which have been identified by the Information Risk & Security team’s technology stack. Functional Responsibilities Experience Monitoring SIEM solutions and a variety of other security devices found in a SOC environment (e.g. Behavioral Analytics tools, IDS/IPS, log management tools, and security analytics platforms. Creating and maintaining documentation for security event processing. Acknowledge and handle the incoming security alerts. Use the internal ticketing system and dashboards to update the tickets/alerts accordingly and escalating them to the appropriate teams if necessary. Assist the Incident Response team on alerts escalated to them by the SOC team. Develop/Update and follow Standard Operating Procedures (SOPs) and Playbooks to handle standard and out-of-band alerts. Report to the Incident Response Team quickly and efficiently regarding urgent matters. Ensure ticket queues are always within satisfactory limits and all tickets are updated. Provide On-Call Support for emergency or high severity issues. Liaise with partner teams and end-users for security related tickets and activities. Qualifications Bachelor's degree in Conputer Science / Electrical & Electronics / IT Engineering ; MCA Excellent verbal and written communication skills. Excellent analytical and problem-solving skills required. Minimum of 5+ years of experience in a SOC or Cybersecurity. Equivalent Certifications (Network+, Security+, CySA+, GSEC, GMON, etc.) Experience working with SIEMs and evaluating SIEM alerts, EDR , NDR Experience leveraging core security and infrastructure technologies during investigations (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS) Key Competencies Ability to think with a security mindset. The successful candidate has a good IT background with good level knowledge of multiple relevant security practice areas (anti-malware solutions, patch and vulnerability management, network security; monitoring; endpoint, etc.) Knowledge of TCP/IP Protocols, network analysis, and network/security applications. Good knowledge of various security tools and monitoring devices; e.g. able to read and understand IDS/IPS/Firewall/Proxy logs and determine the current state of play. Experience in correlating malware infections with attack vectors to determine the extent of security and data compromise. Ability to work in a time-sensitive environment; must be detail oriented and able to multitask to meet deadlines and company objectives. Experience in large, geographically diverse enterprise networks. Ability to build lasting relationships with partner teams and stakeholders. Strong written and oral communication skills, including the ability to interact directly with customers that do not have an IT background. Documentation; experience in writing reports and documenting tickets efficiently and accurately. Careers Privacy Statement***Keysight is an Equal Opportunity Employer.*** Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Ranchi, Jharkhand, India

On-site

Linkedin logo

Company Description We suggest you enter details here. Role Description This is a full-time on-site role located in Ranchi for an Information Technology Specialist at Krishna Maruti Ltd. The Information Technology Specialist will be responsible for network administration, troubleshooting, network security, and providing customer service support. Qualifications Network Administration and Troubleshooting skills Information Technology and Network Security knowledge Customer Service experience Ability to work effectively in a team environment Strong problem-solving skills Excellent communication and interpersonal skills Relevant certifications like CompTIA A+, Network+, Security+ are a plus Show more Show less

Posted 1 week ago

Apply

6.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Position Summary... Demonstrates up-to-date expertise and applies this to the development, execution, and improvement of action plans by providing expert advice and guidance to others in the application of information and best practices; supporting and aligning efforts to meet customer and business needs; and building commitment for perspectives and rationales. Provides and supports the implementation of business solutions by building relationships and partnerships with key stakeholders; identifying business needs; determining and carrying out necessary processes and practices; monitoring progress and results; recognizing and capitalizing on improvement opportunities; and adapting to competing demands, organizational changes, and new responsibilities. Models compliance with company policies and procedures and supports company mission, values, and standards of ethics and integrity by incorporating these into the development and implementation of business plans; using the Open Door Policy; and demonstrating and assisting others with how to apply these in executing business processes and practices. What you'll do... About The Team Our team is responsible for design, development, and operations of Walmart Fulfillment System (WFS), designed to attract new marketplace sellers to increase assortment, speed up delivery, and monetize out Omnichannel Supply Chain assets. This position is focused more on how to bring in Operational Excellence and look at opportunities to bring in improvements in the current WFS eco-system by building new Tools ; Capabilities as well as look for Automation opportunities. This will also include ensuring that every feature release of WFS has adequate Alerts ; Monitoring and Observability Dashboards setup. What You’ll Do: Through this role you have an opportunity to develop software and work on Automation that meets and exceeds the needs of the Sellers, Internal Teams and the Company Contribute to and review technical designs of software solutions Contribute to and follow development best practices such as version control, unit testing, continuous integration, performance and security testing, and appropriate documentation You will show your skills in analyzing and testing programs/products before formal launch to ensure flawless performance Software security is of prime importance and by developing programs that monitor sharing of private information, you will be able to add tremendous credibility to your work Collaborate with developers to implement solutions, resolve problems and perform code reviews You also get to collaborate with team members to develop best practices and client requirements for the software. Works with stakeholders following the Agile Scrums of development process You will also be required to seek ways to improve the software and its effectiveness You will be called upon to support the coaching and training of other team members to ensure all employees are confident in the use of software applications What You’ll bring: Bachelors degree in Computer Science or related technical field 6 to 10 years of experience in developing Enterprise applications using Java, Spring-boot, REST, Kafka 2+ years of experience in Distributed systems and large scale application development and design Extensive hands-on experience building microservices using java Working knowledge on SQL/No-SQL database technologies such as Oracle, Cassandra, Hive and Caching solutions (Couchbase, Memcached) Exposure to Cloud (AWS/Azure) ; Kubernetes Working with continuous integration and related tools like Jenkins, Maven Experience in messaging system like MQ or Kafka or Azure EventHub Experience in production system operations (logging, telemetry, alerting etc.) Experience working on Grafana, Prometheus, Splunk, XMatters or similar tools Additional Qualifications: Large scale distributed systems experience, including scalability and fault tolerance Scripting knowledge that are executed daily to refresh data feeds from multiple system A continuous drive to explore, improve, enhance, automate and optimize systems and tools Strong computer science fundamentals in data structures and algorithms Must be able to work effectively in a team setting as well as individually Ability to communicate and collaborate with external teams and stakeholders Excellent oral and written communication skills About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. That’s what we do at Walmart Global Tech. We’re a team of software engineers, data scientists, cybersecurity expert's and service professionals within the world’s leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Belonging We aim to create a culture where every associate feels valued for who they are, rooted in respect for the individual. Our goal is to foster a sense of belonging, to create opportunities for all our associates, customers and suppliers, and to be a Walmart for everyone. At Walmart, our vision is "everyone included." By fostering a workplace culture where everyone is—and feels—included, everyone wins. Our associates and customers reflect the makeup of all 19 countries where we operate. By making Walmart a welcoming place where all people feel like they belong, we’re able to engage associates, strengthen our business, improve our ability to serve customers, and support the communities where we operate. Equal Opportunity Employer Walmart, Inc., is an Equal Opportunities Employer – By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing unique styles, experiences, identities, ideas and opinions – while being inclusive of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 3years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 5 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, GISF, CISSP, CCSP, or GSEC, Master’s degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 1 year’s experience leading information security or cybersecurity projects Information Technology - CISCO Certification - Certification Primary Location... 4,5,6, 7 Floor, Building 10, Sez, Cessna Business Park, Kadubeesanahalli Village, Varthur Hobli , India R-2147338 Show more Show less

Posted 1 week ago

Apply

0.0 years

0 Lacs

Thiruvananthapuram, Kerala

On-site

Indeed logo

We are a leading Training Institute committed to building a skilled digital workforce. We are currently looking for a Cyber Security Trainer who can educate and empower learners with real-world cyber defense techniques and strategies. Key Responsibilities: Deliver interactive training sessions on Cyber Security Fundamentals, Ethical Hacking, Network Security, Threat Detection , and Penetration Testing . Cover tools and platforms like Kali Linux, Wireshark, Metasploit, Nmap , etc. Create and maintain training content, hands-on labs, case studies, and assessments. Guide students on industry best practices, compliance standards (ISO, NIST), and incident response. Stay updated with the latest security threats, tools, and technologies. Requirements: Strong hands-on experience in cyber security, ethical hacking, or IT security roles. Proficiency in security tools, Linux OS, and networking concepts. Prior experience in training/mentoring preferred. Excellent communication and teaching skills. Ability to deliver both beginner and advanced-level training. Preferred Qualifications: Certifications like CEH, CompTIA Security+, CISSP, OSCP are a plus. Experience in cloud security, DevSecOps, or security audits. Familiarity with cyber law and regulatory frameworks (GDPR, HIPAA, etc.). Job Types: Full-time, Permanent Pay: ₹10,228.99 - ₹32,802.78 per month Schedule: Day shift Ability to commute/relocate: Thiruvananthapuram, Kerala: Reliably commute or planning to relocate before starting work (Preferred) Work Location: In person

Posted 1 week ago

Apply

5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Overview Keysight is on the forefront of technology innovation, delivering breakthroughs and trusted insights in electronic design, simulation, prototyping, test, manufacturing, and optimization. Our ~15,000 employees create world-class solutions in communications, 5G, automotive, energy, quantum, aerospace, defense, and semiconductor markets for customers in over 100 countries. Learn more about what we do. Our award-winning culture embraces a bold vision of where technology can take us and a passion for tackling challenging problems with industry-first solutions. We believe that when people feel a sense of belonging, they can be more creative, innovative, and thrive at all points in their careers. Responsibilities Cybersecurity SOC Analyst - Tier1 (SOC-Security Operation Center) The Cybersecurity Analyst will be responsible for the handling, and escalation of, alerts which require technical triage and analysis. This may include web attacks, malware infections, and phishing campaigns, which have been identified by the Information Risk & Security team’s technology stack. Functional Responsibilities Experience Monitoring SIEM solutions and a variety of other security devices found in a SOC environment (e.g. Behavioral Analytics tools, IDS/IPS, log management tools, and security analytics platforms. Creating and maintaining documentation for security event processing. Acknowledge and handle the incoming security alerts. Use the internal ticketing system and dashboards to update the tickets/alerts accordingly and escalating them to the appropriate teams if necessary. Assist the Incident Response team on alerts escalated to them by the SOC team. Develop/Update and follow Standard Operating Procedures (SOPs) and Playbooks to handle standard and out-of-band alerts. Report to the Incident Response Team quickly and efficiently regarding urgent matters. Ensure ticket queues are always within satisfactory limits and all tickets are updated. Provide On-Call Support for emergency or high severity issues. Liaise with partner teams and end-users for security related tickets and activities. Qualifications Bachelor's degree in Conputer Science / Electrical & Electronics / IT Engineering ; MCA Excellent verbal and written communication skills. Excellent analytical and problem-solving skills required. Minimum of 5+ years of experience in a SOC or Cybersecurity. Equivalent Certifications (Network+, Security+, CySA+, GSEC, GMON, etc.) Experience working with SIEMs and evaluating SIEM alerts, EDR , NDR Experience leveraging core security and infrastructure technologies during investigations (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS) Key Competencies Ability to think with a security mindset. The successful candidate has a good IT background with good level knowledge of multiple relevant security practice areas (anti-malware solutions, patch and vulnerability management, network security; monitoring; endpoint, etc.) Knowledge of TCP/IP Protocols, network analysis, and network/security applications. Good knowledge of various security tools and monitoring devices; e.g. able to read and understand IDS/IPS/Firewall/Proxy logs and determine the current state of play. Experience in correlating malware infections with attack vectors to determine the extent of security and data compromise. Ability to work in a time-sensitive environment; must be detail oriented and able to multitask to meet deadlines and company objectives. Experience in large, geographically diverse enterprise networks. Ability to build lasting relationships with partner teams and stakeholders. Strong written and oral communication skills, including the ability to interact directly with customers that do not have an IT background. Documentation; experience in writing reports and documenting tickets efficiently and accurately. Careers Privacy Statement***Keysight is an Equal Opportunity Employer.*** Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's brand reputation and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. What we’re looking for… Verizon is seeking an innovative and driven leader to enhance our threat defense capabilities and mature our current processes within Verizon's unique security landscape. This Incident Management Analyst role offers a fast-paced, collaborative environment defending Verizon from current and future cyber threats, playing a critical role in Verizon’s enterprise computing defense. Analysts must be agile, willing to learn and teach others, highly organized, communicate effectively, and think outside of the box to operate effectively in an ever-changing threat landscape. This role ensures continuous improvement of our cybersecurity posture by capturing lessons learned, analyzing incident response effectiveness, and driving actionable remediations.. Responsibilities Utilizing and adhering to defined workflow and processes driving the Incident Management and mitigation efforts. Owning, executing and driving all incidents to resolution using strong facilitation, organization, and time management skills. Partnering with Cyber Security stakeholders and coordinating remediation activities throughout the Verizon organization and its lines of business as a part of Cyber Incident Handling and After Action Remediation. Being able to communicate effectively with all levels of business including technical and non-technical audiences. Collecting and documenting information to support Incident Response activities; including but not limited to artifacts, action items, timelines, and impacted elements. Documenting results of the cyber threat analysis/investigation including containment, recovery, and remediation efforts. Leveraging various techniques and capacities to support Cyber Incident Response and non-cyber activities. Enhancing and advancing the defensive capabilities of Advanced Cyber Defense (ACD) and its subsequent ability to defend the Verizon Enterprise. Recommending solutions to optimize both technical and process/procedure aspects of the end to end incident lifecycle. Collaborating with Threat Intelligence, Threat Hunt, DFIR, and SOC teams to integrate relevant data into after action reviews and post-incident evaluations. Tracking the implementation of post-incident recommendations and ensuring timely resolution of identified gaps, risks, or weaknesses. Producing and maintaining detailed reports summarizing lessons learned, trends, and strategic insights for leadership Providing training and mentoring of junior team members. Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. You’ll Need To Have Bachelor’s degree or four or more years of work experience. Eight or more years of relevant work experience. Security operations and/or Incident Handling experience Willing to work occasionally on late nights and weekends. Even better if you have one or more of the following : Bachelor degree. Related Certification (A+, Network+, Security+, CISSP, GCIH, GCFA, GCFE, GNFA, GREM). Information Assurance or Cyber Experience in the Telecommunications industry. Experience working in a Security Operations Center (SOC) with focus on Computer Network Defense (CND). Experience with dynamic and/or malware analysis. Experience in Cyber Intelligence or related disciplines. Experience with enterprise antivirus, EDR, IDS, Full Packet Capture, and Host/Network Forensics Tools. Knowledge of Networking (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture. Experience executing various Incident Response Frameworks and Handling Procedures. Program and Scripting Experience. Experience with Regex. Strong knowledge of Operating Systems: Windows, Unix/Linux, and OSX Operating Systems. Experience and knowledge of cyber risks and threats related to cyber attackers. Ability to manage multiple priorities in a dynamic environment. If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISO Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's employees, customers, brand reputation, and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. What we’re looking for... Verizon is looking for an innovative and motivated professional who will be responsible for safeguarding the Verizon enterprise. This individual will work on identified threats and will neutralize them through proactive hunting and detection, incident response and mitigation strategies, and ensure continuous operation of Verizon’s on-prem and cloud environments. The Digital Forensics & Incident Response role is an opportunity to work in a fast paced collaborative environment defending Verizon from current and future cyber threats. This position plays a critical role in Verizon’s enterprise computing defense. Executing the Incident Response Lifecycle to drive threat remediation and identify strategic countermeasures improving future defenses. Operating as a trusted advisor on threat analysis during incidents for incident management teams and other stakeholders by following cybersecurity response methodologies such as the NIST CyberSecurity Framework. Serving as a primary point of contact during assigned on-call shifts, responding promptly to incidents, escalations, and critical alerts to minimize downtime and mitigate risks to the enterprise. Deploying security tools and leveraging logs and endpoint forensic analysis in order to complete a detailed and accurate assessment of security alerts and threats affecting the Verizon enterprise and cloud infrastructure. Assisting with the development of security controls for multiple platforms via automated capabilities by using advanced analysis and forensic techniques. Driving identification, analysis, and remediation activities to ensure compliance with relevant regulatory requirements, industry standards, and best practices related to security and data privacy. Providing assistance and analytical evaluations for high-priority and significant security incidents, including composing extensive and comprehensive analysis summaries and facilitating incident-related discussions. Identifying gaps in detections and collaborating with teams across Cyber Security to mitigate threats and improve the overall security posture. Recommending ways to mature and advance the preventive and defensive capabilities of the TMC. This includes leveraging data and knowledge to clearly communicate the use case for alert creation. Collaborating with cross-functional teams to respond, identify, and analyze the root cause of a cybersecurity incident. Conducting risk assessments, in-depth analysis, and forensic investigations to determine the root cause and impact of incidents. Enhancing, and/or implementing DFIR playbooks to ensure cohesive response repeatability. Assisting with producing operational read-outs and case reviews for peers and leadership that accurately capture the effectiveness of the DFIR organization. Continuously honing to build and maintain knowledge, skills, and abilities needed to maintain proficiency in producing thorough and accurate digital forensic analysis. Enhancing techniques, workflows and processes of security controls, compliance assessments, and DFIR procedures to drive the TMC operational and strategic growth (continuous improvement). Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. You’ll Need To Have Bachelor's degree or four or more years of work experience. Four or more years of relevant experience required, demonstrated through work experience and/or military experience. Experience working in Digital Forensic, Incident Response, and/or a Security Operations Center (SOC) environment(s). Even better if you have one or more of the following: Awareness of cyber based adversarial frameworks including MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain. Proficient knowledge of the cyber threat landscape including types of adversaries, campaigns, and the motivations that drive them. Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents. Programming and Scripting Experience to enhance automations, ad-hoc forensic analysis and speed-up response times. Previous experience with log aggregation platforms such as Splunk, Elastic, Snowflake, LogRhythm, etc. Proficient in understanding Operating Systems and their architectures: Windows, Unix/Linux, and MacOS Operating Systems Demonstrates leadership and mentoring skills to help advance the overall capabilities of the TMC organization. Ability to work in a highly collaborative environment needing strong communication, presentation, and leadership-like skills Exhibits initiative, follow-up and follow through with commitments Certifications like: Network+, Security+, CISSP, EnCE, CFCE, C|EH, C|HFI, GCFA, GCFE, GCIH and/or cloud-specific security certifications (e.g. AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Cloud Certified Professional Cloud Security Engineer) If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISO Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's brand reputation and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. What we’re looking for… Verizon is seeking an innovative and driven leader to enhance our threat defense capabilities and mature our current processes within Verizon's unique security landscape. This Incident Management Analyst role offers a fast-paced, collaborative environment defending Verizon from current and future cyber threats, playing a critical role in Verizon’s enterprise computing defense. Analysts must be agile, willing to learn and teach others, highly organized, communicate effectively, and think outside of the box to operate effectively in an ever-changing threat landscape. This role ensures continuous improvement of our cybersecurity posture by capturing lessons learned, analyzing incident response effectiveness, and driving actionable remediations.. Responsibilities Utilizing and adhering to defined workflow and processes driving the Incident Management and mitigation efforts. Owning, executing and driving all incidents to resolution using strong facilitation, organization, and time management skills. Partnering with Cyber Security stakeholders and coordinating remediation activities throughout the Verizon organization and its lines of business as a part of Cyber Incident Handling and After Action Remediation. Being able to communicate effectively with all levels of business including technical and non-technical audiences. Collecting and documenting information to support Incident Response activities; including but not limited to artifacts, action items, timelines, and impacted elements. Documenting results of the cyber threat analysis/investigation including containment, recovery, and remediation efforts. Leveraging various techniques and capacities to support Cyber Incident Response and non-cyber activities. Enhancing and advancing the defensive capabilities of Advanced Cyber Defense (ACD) and its subsequent ability to defend the Verizon Enterprise. Recommending solutions to optimize both technical and process/procedure aspects of the end to end incident lifecycle. Collaborating with Threat Intelligence, Threat Hunt, DFIR, and SOC teams to integrate relevant data into after action reviews and post-incident evaluations. Tracking the implementation of post-incident recommendations and ensuring timely resolution of identified gaps, risks, or weaknesses. Producing and maintaining detailed reports summarizing lessons learned, trends, and strategic insights for leadership Providing training and mentoring of junior team members. Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. You’ll Need To Have Bachelor’s degree or four or more years of work experience. Eight or more years of relevant work experience. Security operations and/or Incident Handling experience Willing to work occasionally on late nights and weekends. Even better if you have one or more of the following : Bachelor degree. Related Certification (A+, Network+, Security+, CISSP, GCIH, GCFA, GCFE, GNFA, GREM). Information Assurance or Cyber Experience in the Telecommunications industry. Experience working in a Security Operations Center (SOC) with focus on Computer Network Defense (CND). Experience with dynamic and/or malware analysis. Experience in Cyber Intelligence or related disciplines. Experience with enterprise antivirus, EDR, IDS, Full Packet Capture, and Host/Network Forensics Tools. Knowledge of Networking (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture. Experience executing various Incident Response Frameworks and Handling Procedures. Program and Scripting Experience. Experience with Regex. Strong knowledge of Operating Systems: Windows, Unix/Linux, and OSX Operating Systems. Experience and knowledge of cyber risks and threats related to cyber attackers. Ability to manage multiple priorities in a dynamic environment. If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISO Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's brand reputation and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. Responsibilities Performing day-to-day operations as a trusted advisor on advanced threat hunt for team Leading "hunt missions" using threat intelligence, data from multiple sources and results of brainstorming sessions to discover evidence of threats, insider misconduct, or anomalous behavior Utilizing advanced threat hunting techniques and tools to detect, analyze, and respond to anomalous activities. This includes Identifying threat actor groups and characterizing suspicious behaviors as well as being able to identify traits, C2, and develop network and host-based IOCs or IOAs. Finding evidence of threats or suspicious behavior, and leveraging data to improve controls and processes; this will require a blend of investigative, analytical, security, and technical skills to be successful. Evaluating and making recommendations on security tools and technologies needed to analyze potential threats to determine impact, scope, and recovery. Ensuring gaps in detections are socialized with Cyber Security stakeholders; this includes identifying dependencies, recommendations, and collaborating to mitigate threats. Reviewing outcomes of incident lessons learned, root cause analysis, and on-demand compliance audits to ensure repeatable and sustainable processes are established, followed or adjusted when necessary. Acting as subject matter expert in internal and external audit reviews. This includes producing and presenting artifacts and executive summaries to support the overall mission of the TMC. Participating in Purple Team, Threat Hunt, and tabletop exercises. Working closely with key cross-functional stakeholders to develop and utilize proactive and mitigating measures to prevent, detect and respond to potential threats to Verizon on prem and cloud environments. Presenting executive-level operational read-outs, metrics, and case reviews that accurately capture the effectiveness of the threat hunt team. This includes leveraging internal data, threat trends, and operational metrics to clearly communicate the Verizon landscape to senior executives, to include the Chief Information Security Officer. Developing and executing long-term and short-term strategic goals and ensuring proper updates are socialized to appropriate stakeholders. Mentoring and advising team members by educating them on advanced techniques to help drive the operational and strategic growth of the organization. Promoting an environment of collaboration and individual accountability when it comes to problem-solving, decision-making, and process improvements. Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. What we’re looking for… Verizon is looking for an innovative and driven leader who will be responsible for enhancing our existing threat defense capabilities and maturing our current processes within Verizon's unique security landscape. This threat hunter role will work in the TMC’s fast paced collaborative environment and is required to be adaptable, utilize both strategic and tactical techniques, and think creatively to effectively navigate the evolving threat landscape. This individual will take the initiative to identify and neutralize threats through proactive hunting and detection, improve incident response and mitigation strategies, and ensure continuous operations to safeguard Verizon from current and future cyber threats. The position will support threat hunting, digital forensics, and incident responder duties. You’ll Need To Have Bachelor's degree or six or more years of work experience Two or more years of experience in cybersecurity, with a focus on threat hunting, cloud security (AWS, GCP, Azure, OCI), and incident response Even better if you have one or more of the following: Demonstrated experience as a key member of a security operations team (SOC, Incident Response, Threat Intel, Malware Analysis, IDS/IPS Analysis, etc.) Comprehensive knowledge utilizing system, cloud, application and network logs. High-level understanding of Operating Systems: Windows, Unix/Linux, and OSX Operating Systems in support of identifying security incidents. Proficient knowledge of the cyber threat landscape including types of adversaries, campaigns, and the motivations that drive them. Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents. Fundamental understanding of tactics, technologies, and procedures related to Cyber Crime, Malware, Botnets, Hacktivism, Social Engineering, APT or Insider Threat Knowledgeable with Regular Expressions, YARA and SIGMA rules, AQL and KQL type and at least one common scripting language (PERL, Python, Powershell) Knowledge on query structures like Strong understanding of cyber based adversarial frameworks including MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain. Certifications like: Network+, Security+, CISSP, CISM, GCIH, GCFA, GCFE, GREM and/or or cloud-specific certifications (ex: AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Cloud Certified Professional Cloud Security Engineer) If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISO Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's employees, customers, brand reputation, and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. What we’re looking for... Verizon is looking for an innovative and motivated professional who will be responsible for safeguarding the Verizon enterprise. This individual will work on identified threats and will neutralize them through proactive hunting and detection, incident response and mitigation strategies, and ensure continuous operation of Verizon’s on-prem and cloud environments. The Digital Forensics & Incident Response role is an opportunity to work in a fast paced collaborative environment defending Verizon from current and future cyber threats. This position plays a critical role in Verizon’s enterprise computing defense. Executing the Incident Response Lifecycle to drive threat remediation and identify strategic countermeasures improving future defenses. Operating as a trusted advisor on threat analysis during incidents for incident management teams and other stakeholders by following cybersecurity response methodologies such as the NIST CyberSecurity Framework. Serving as a primary point of contact during assigned on-call shifts, responding promptly to incidents, escalations, and critical alerts to minimize downtime and mitigate risks to the enterprise. Deploying security tools and leveraging logs and endpoint forensic analysis in order to complete a detailed and accurate assessment of security alerts and threats affecting the Verizon enterprise and cloud infrastructure. Assisting with the development of security controls for multiple platforms via automated capabilities by using advanced analysis and forensic techniques. Driving identification, analysis, and remediation activities to ensure compliance with relevant regulatory requirements, industry standards, and best practices related to security and data privacy. Providing assistance and analytical evaluations for high-priority and significant security incidents, including composing extensive and comprehensive analysis summaries and facilitating incident-related discussions. Identifying gaps in detections and collaborating with teams across Cyber Security to mitigate threats and improve the overall security posture. Recommending ways to mature and advance the preventive and defensive capabilities of the TMC. This includes leveraging data and knowledge to clearly communicate the use case for alert creation. Collaborating with cross-functional teams to respond, identify, and analyze the root cause of a cybersecurity incident. Conducting risk assessments, in-depth analysis, and forensic investigations to determine the root cause and impact of incidents. Enhancing, and/or implementing DFIR playbooks to ensure cohesive response repeatability. Assisting with producing operational read-outs and case reviews for peers and leadership that accurately capture the effectiveness of the DFIR organization. Continuously honing to build and maintain knowledge, skills, and abilities needed to maintain proficiency in producing thorough and accurate digital forensic analysis. Enhancing techniques, workflows and processes of security controls, compliance assessments, and DFIR procedures to drive the TMC operational and strategic growth (continuous improvement). Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. You’ll Need To Have Bachelor's degree or four or more years of work experience. Four or more years of relevant experience required, demonstrated through work experience and/or military experience. Experience working in Digital Forensic, Incident Response, and/or a Security Operations Center (SOC) environment(s). Even better if you have one or more of the following: Awareness of cyber based adversarial frameworks including MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain. Proficient knowledge of the cyber threat landscape including types of adversaries, campaigns, and the motivations that drive them. Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents. Programming and Scripting Experience to enhance automations, ad-hoc forensic analysis and speed-up response times. Previous experience with log aggregation platforms such as Splunk, Elastic, Snowflake, LogRhythm, etc. Proficient in understanding Operating Systems and their architectures: Windows, Unix/Linux, and MacOS Operating Systems Demonstrates leadership and mentoring skills to help advance the overall capabilities of the TMC organization. Ability to work in a highly collaborative environment needing strong communication, presentation, and leadership-like skills Exhibits initiative, follow-up and follow through with commitments Certifications like: Network+, Security+, CISSP, EnCE, CFCE, C|EH, C|HFI, GCFA, GCFE, GCIH and/or cloud-specific security certifications (e.g. AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Cloud Certified Professional Cloud Security Engineer) If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISO Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Show more Show less

Posted 1 week ago

Apply

6.0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

Sonatype is the software supply chain security company. We provide the world’s best end-to-end software supply chain security solution, combining the only proactive protection against malicious open source, the only enterprise grade SBOM management and the leading open source dependency management platform. This empowers enterprises to create and maintain secure, quality, and innovative software at scale. As founders of Nexus Repository and stewards of Maven Central, the world’s largest repository of Java open-source software, we are software pioneers and our open source expertise is unmatched. We empower innovation with an unparalleled commitment to build faster, safer software and harness AI and data intelligence to mitigate risk, maximize efficiencies, and drive powerful software development. More than 2,000 organizations, including 70% of the Fortune 100 and 15 million software developers, rely on Sonatype to optimize their software supply chains. A Day in the Job As a Senior IT Helpdesk Technician at Sonatype, no two days are exactly the same—but here’s what a typical day might look like: Fielding and responding to helpdesk requests submitted via email, Slack, and our ticketing system, ensuring timely triage, resolution, or escalation in line with SLAs. Supporting both remote and onsite employees, assisting with access issues, device setups, application support, and general troubleshooting across Windows, macOS, and SaaS platforms. Documenting resolutions and runbooks for recurring issues to strengthen our knowledge base and improve future response times. Updating project statuses and task progress within Jira or Zendesk, collaborating with cross-functional teams on ongoing IT initiatives. Participating in weekly team check-ins and async updates to stay aligned with IT priorities, project deadlines, and ticket trends. Providing coverage for teammates during absences, ensuring continuity of support across all time zones where our employees operate. Managing hardware inventory and software licensing, including shipping devices to remote users, tracking asset status, and coordinating with vendors when needed. Identifying patterns in support tickets to recommend and implement improvements or proactive solutions that reduce recurring issues. Collaborating with security and compliance stakeholders to uphold IT policies and support secure, scalable practices. This role requires strong ownership, attention to detail, and a service-first mindset—our team only succeeds when you do. Core Key Soft Skills Empathy & Patience - Understands user frustration, listens without judgment, and calmly guides them through issues — regardless of technical ability. Curiosity & Continuous Learning - Growth Mindset. Self-driven to explore, learn, and improve — whether it’s a new tool, an unfamiliar issue, or an opportunity to optimize a process. Strong Communication Skills - Explains complex technical problems clearly to non-technical users; adapts tone and approach depending on the audience. Accountability & Follow-Through - Takes ownership of issues from start to finish, keeps users informed, and doesn’t let things “fall through the cracks.” Emotional Intelligence Under Pressure - Maintains composure and professionalism during high-stress situations or when dealing with upset users. Team Collaboration & Mentoring - Actively supports colleagues, shares knowledge, and contributes to a culture of trust and mutual respect. Service-Oriented Mindset - Focuses on user experience, not just ticket closure — always aiming to resolve the root cause, not just the symptom. Communication - Fluency in the English language - spoken and written Required Technical Skills (macOS-Centric & Cross-Platform) macOS Diagnostic & Support Expertise Deep familiarity with macOS system architecture, Console logs, Activity Monitor, Disk Utility, and Terminal for troubleshooting. Experience with FileVault, system permissions, keychains, software updates, and MDM-enrolled devices. Troubleshooting common tools like Zoom, Slack, Microsoft Office365, Google Workspace, and printing/network issues. Device Management Experience Comfortable with tools like InTune for Windows and Jamf, Kandji, or Mosyle for macOS deployment, patching, and policy enforcement. Experience supporting iOS and other Apple ecosystem devices is a plus. Basic Cross-Platform Support Familiarity with supporting Windows devices as needed. Advanced Understanding of network basics: Ethernet and Wi-Fi troubleshooting, VPN usage, DNS/DHCP. IT Ticketing Systems & Support Processes Proficient in using and optimizing IT ticketing tools (e.g., Jira Service Desk, Zendesk, or ServiceNow). Skilled in prioritizing, categorizing, escalating, and documenting incidents with an SLA-aware mindset. Mastery of English reading and writing skills is required. Security Awareness & Best Practices Enforces secure end-user behavior (e.g., MFA, passkey, phishing recognition, secure password practices). Familiar with endpoint protection, encryption (FileVault), and basic compliance considerations. Certifications & Experience Experience: 4–6+ years in IT support, ideally in fast-paced software development and user-first environments with Windows and MacOS endpoints, Okta for IAM/SSO, and Google Workspace for productivity apps. Certifications (Nice to Have): Apple Certified Support Professional (ACSP) ITIL Foundation CompTIA A+ or Security+ LI-AL1 At Sonatype, we value diversity and inclusivity. We offer perks such as parental leave, diversity and inclusion working groups, and flexible working practices to allow our employees to show up as their whole selves. We are an equal-opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. If you have a disability or special need that requires accommodation, please do not hesitate to let us know. Show more Show less

Posted 1 week ago

Apply

4.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Position Summary... What you'll do... Skillset: Java with Devops Job Description Summary: Responsible for building, automating, and maintaining high-performance, scalable, and reliable cloud-based systems that support millions of Walmart business users and suppliers within the Enterprise Business Services. About Team: Walmart’s Enterprise Business Services (EBS) is a powerhouse of several exceptional teams delivering world-class technology solutions and services making a profound impact at every level of Walmart. As a key part of Walmart Global Tech, our teams set the bar for operational excellence and leverage emerging technology to support millions of customers, associates, and stakeholders worldwide. Each time an associate turns on their laptop, a customer makes a purchase, a new supplier is onboarded, the company closes the books, physical and legal risk is avoided, and when we pay our associates consistently and accurately, that is EBS. Joining EBS means embarking on a journey of limitless growth, relentless innovation, and the chance to set new industry standards that shape the future of Walmart. What you'll do: You are responsible for coding, unit testing, building high performance and scalable applications that meet the demands of Walmart home office users and suppliers across the world. You are responsible for automating deployments, monitoring systems, and ensuring high availability and performance of cloud-based applications and infrastructure. You are expected to be an intellectually curious engineer who is passionate about accounting, supply chain and technology in general. What you'll bring: You have 4 to 8 years of experience in software engineering and DevOps with a strong foundation in Java and Spring Boot. Strong knowledge of CI/CD pipelines, infrastructure as code, and system automation. Hands-on experience with Java 14 or above, including lambda functions and related technologies. Proficiency in writing modular and testable code and test cases using frameworks like Junit, Mockito and MockMVC Strong debugging, profiling, and performance tuning skills. Experience with microservices architecture and a solid understanding of distributed systems and cloud-native design principles. Hands-on experience with Spring Boot, RESTful services, and containerization tools like Docker and Kubernetes. Experience with cloud platforms, especially Azure and GCP, including services like Compute Engine, App Services, Cloud Functions, and monitoring tools. Proficiency in infrastructure automation tools such as Terraform, Ansible, or ARM templates. Experience with monitoring and alerting tools like Prometheus, Grafana, Splunk, and cloud-native monitoring solutions. Familiarity with relational and NoSQL databases, including Cosmos DB. Experience with messaging and pub/sub systems like Kafka. Strong experience with CI/CD tools such as Jenkins, GitHub Actions, Maven, and Gradle. Prior exposure to cloud security, cost optimization, and operational excellence in cloud environments is a plus. Experience in frontend technologies like React, Angular, and JavaScript is preferable and considered a plus. About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. That’s what we do at Walmart Global Tech. We’re a team of software engineers, data scientists, cybersecurity expert's and service professionals within the world’s leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Belonging We aim to create a culture where every associate feels valued for who they are, rooted in respect for the individual. Our goal is to foster a sense of belonging, to create opportunities for all our associates, customers and suppliers, and to be a Walmart for everyone. At Walmart, our vision is "everyone included." By fostering a workplace culture where everyone is—and feels—included, everyone wins. Our associates and customers reflect the makeup of all 19 countries where we operate. By making Walmart a welcoming place where all people feel like they belong, we’re able to engage associates, strengthen our business, improve our ability to serve customers, and support the communities where we operate. Equal Opportunity Employer Walmart, Inc., is an Equal Opportunities Employer – By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing unique styles, experiences, identities, ideas and opinions – while being inclusive of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 2years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 4 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, Network+, GISF, GSEC, CISSP, or CCSP, Master’s degree in Computer Science, Information Technology, Engineering, Information Systems, Cybersecurity, or related area Primary Location... Rmz Millenia Business Park, No 143, Campus 1B (1St -6Th Floor), Dr. Mgr Road, (North Veeranam Salai) Perungudi , India R-2197068 Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Position Summary... Senior, Software Engineer | Front-End Demonstrates up-to-date expertise and applies this to the development, execution, and improvement of action plans by providing expert advice and guidance to others in the application of information and best practices; supporting and aligning efforts to meet customer and business needs; and building commitment for perspectives and rationales. Provides and supports the implementation of business solutions by building relationships and partnerships with key stakeholders; identifying business needs; determining and carrying out necessary processes and practices; monitoring progress and results; recognizing and capitalizing on improvement opportunities; and adapting to competing demands, organizational changes, and new responsibilities. Models compliance with company policies and procedures and supports company mission, values, and standards of ethics and integrity by incorporating these into the development and implementation of business plans; using the Open Door Policy; and demonstrating and assisting others with how to apply these in executing business processes and practices. What you'll do... About Team: U.S. Omni Technology: This business closely partners with our U.S and International stores and e Commerce business to serve customers by empowering associates, stores and merchants with technology innovation. Walmart provides the deep assortment that our customers appreciate whether theyre shopping online at Walmart.com, through one of our mobile apps or shopping in a store. The focus areas include customer, stores and associates, in-store service, merchant tools, merchant data science and search ; personalization. Our team is responsible for design, development, and operations of large-scale Catalog and Partner Platforms operating high scale. We interact with multiple teams across the company to provide scalable robust technical solutions. Must Have: React JS,, Java Script, Type Script, Node.js Graph QL. Good to have: Micro front-end architecture exposure. What you'll do: Work closely with our product, design, architects, and development lead, and UX teams to create amazing and intuitive UI experiences. Document and develop best practices for development, and deployment of applications, and works with members to foster growth within the team. Participate in medium complex and cross-functional projects by reviewing project requirements and translating them into technical solutions. Build high quality code by conducting unit testing and enhancing design to prevent re-occurrences of defects. Ensure on-time delivery and communicate status and issues to team members and stakeholders. Demonstrate up-to-date expertise and applies this to the development, execution, and improvement of action plans. Contribute to all phases of the development life cycle and write well-designed, testable, efficient code. Troubleshoot business and production issues by gathering and evaluating information. Strive for continuous improvement in efficiency. Troubleshoot business and production issues by gathering information (for example, issue, impact, criticality, possible root cause); engaging support teams to assist in the resolution of issues; formulating an action plan; performing actions as designated in the plan; interpreting the results to determine further action; performs root cause analysis to prevent future occurrence of issues; and completing online documentation. What you'll bring: Bachelors degree or masters degree with 7+ years of experience in Computer Science or related field. Experience building customizable, reusable, accessible cross-platform and dynamic frontend components using React JS, Java Script, Type Script, Node.js/Express.js, Graph QL, dashboarding ; charting experience. Experience building a responsive, cross-browser compatible and high-performance micro frontend web application. Proven ability in implementing best/excellent practices and Design Patterns like promises, application flow control, event/error/AJAX handling, Rx JS, observables, and Redux. Must have strong knowledge ; hands-on experience UI components. Demonstrated ownership for development and design of a few modules/features in a product. Experience in implementing UI analytics to report customer behaviour and improve UI accordingly. Hands on development skills to prototype technical solutions. Ability to adapt to change quickly, willingness to learn new and emerging technologies. Good to have: Micro front end architecture exposure. Strong understanding of Agile methodology and leveraging SDLC tools to improve development CI/CD, and testing efficiency (JIRA, Jenkins, GIT, JUnit, Selenium, Lint) Experience with Azure Cloud Stack, GCP or other cloud stacks. Knowledge of open-source libraries, design patterns and micro-service architecture. Writing functional tests using tools such as Cypress is an added advantage. Strong creative, collaboration, and communication skills Ability to work independently and as a team player. A constant desire to improve, learn more and take things to the next level and a passion for adopting the latest industry best practices. About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. That’s what we do at Walmart Global Tech. We’re a team of software engineers, data scientists, cybersecurity expert's and service professionals within the world’s leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Belonging We aim to create a culture where every associate feels valued for who they are, rooted in respect for the individual. Our goal is to foster a sense of belonging, to create opportunities for all our associates, customers and suppliers, and to be a Walmart for everyone. At Walmart, our vision is "everyone included." By fostering a workplace culture where everyone is—and feels—included, everyone wins. Our associates and customers reflect the makeup of all 19 countries where we operate. By making Walmart a welcoming place where all people feel like they belong, we’re able to engage associates, strengthen our business, improve our ability to serve customers, and support the communities where we operate. Equal Opportunity Employer Walmart, Inc., is an Equal Opportunities Employer – By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing unique styles, experiences, identities, ideas and opinions – while being inclusive of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 3years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 5 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, GISF, CISSP, CCSP, or GSEC, Master’s degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 1 year’s experience leading information security or cybersecurity projects Information Technology - CISCO Certification - Certification Primary Location... 4,5,6, 7 Floor, Building 10, Sez, Cessna Business Park, Kadubeesanahalli Village, Varthur Hobli , India R-2146478 Show more Show less

Posted 1 week ago

Apply

Exploring Security+ Jobs in India

Security+ is a highly sought-after certification in the IT industry, especially in the field of cybersecurity. In India, the demand for security+ professionals is on the rise as companies focus on enhancing their security measures to protect sensitive data and prevent cyber attacks. Job seekers with security+ certification have a competitive edge in the job market and can explore various opportunities in this field.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Mumbai
  5. Delhi

These cities are known for their thriving IT industries and offer numerous job opportunities for security+ professionals.

Average Salary Range

The average salary range for security+ professionals in India varies based on experience and expertise. Entry-level positions may offer salaries ranging from INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 10-15 lakhs per annum.

Career Path

A typical career progression in the security+ field may include roles such as: - Junior Security Analyst - Security Consultant - Security Architect - Chief Information Security Officer

As professionals gain experience and expertise, they can move up the career ladder and take on more challenging and rewarding roles.

Related Skills

In addition to security+, professionals in this field are often expected to have skills in: - Network Security - Information Security Management - Penetration Testing - Risk Assessment - Incident Response

Having a combination of these skills can enhance job prospects and open up more opportunities in the cybersecurity domain.

Interview Questions

  • What is the difference between symmetric and asymmetric encryption? (medium)
  • Explain the concept of a firewall and its importance in network security. (basic)
  • How do you handle a security breach in an organization? (advanced)
  • What is the role of encryption in data security? (basic)
  • Can you explain the concept of zero-day vulnerability? (medium)
  • How would you secure a wireless network from potential threats? (medium)
  • Describe the steps involved in a security risk assessment. (advanced)
  • What are the common types of cyber attacks and how can they be prevented? (medium)
  • Explain the concept of multi-factor authentication. (basic)
  • How do you stay updated with the latest security trends and technologies? (basic)
  • What is the importance of regular security audits in an organization? (medium)
  • How would you respond to a ransomware attack on a company's systems? (advanced)
  • Can you explain the concept of a VPN and its role in securing network communications? (basic)
  • Describe the process of conducting a penetration test on a system. (medium)
  • How do you ensure compliance with data protection regulations such as GDPR? (advanced)
  • What is the role of a Security Information and Event Management (SIEM) system in cybersecurity? (medium)
  • How would you secure an IoT (Internet of Things) device from potential security threats? (medium)
  • Explain the concept of social engineering in the context of cybersecurity. (basic)
  • What are the key elements of a cybersecurity policy for an organization? (basic)
  • How do you prioritize security vulnerabilities for remediation in a large-scale network? (advanced)
  • Can you explain the difference between white-box and black-box testing in security assessments? (medium)
  • Describe a recent security project you worked on and the challenges you faced. (advanced)
  • How would you educate employees in an organization about the importance of cybersecurity? (basic)
  • What steps would you take to secure a cloud-based infrastructure from cyber threats? (medium)
  • How do you handle sensitive data securely in a remote work environment? (basic)

Closing Remark

As you explore job opportunities in the security+ domain in India, remember to showcase your skills, knowledge, and experience confidently during interviews. Prepare well, stay updated with the latest trends in cybersecurity, and showcase your passion for securing digital assets. With dedication and perseverance, you can build a successful career in the dynamic field of cybersecurity. Good luck with your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies