Home
Jobs

575 Security+ Jobs - Page 9

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Position Summary... Job Description Summary Demonstrates up-to-date expertise and applies this to the development, execution, and improvement of action plans by providing expert advice and guidance to others in the application of information and best practices; supporting and aligning efforts to meet customer and business needs; and building commitment for perspectives and rationales. Provides and supports the implementation of business solutions by building relationships and partnerships with key stakeholders; identifying business needs; determining and carrying out necessary processes and practices; monitoring progress and results; recognizing and capitalizing on improvement opportunities; and adapting to competing demands, organizational changes, and new responsibilities. Models compliance with company policies and procedures and supports company mission, values, and standards of ethics and integrity by incorporating these into the development and implementation of business plans; using the Open Door Policy; and demonstrating and assisting others with how to apply these in executing business processes and practices. What you'll do... About Team: This is the team that powers services and applications to manage Customer Orders, Trip Lifecycle, Delivery Partners Profile and Work Assignment in a friction-less, predictableway. Build reusable Saa S products and services that manage Customer accounts and Identities and power end-to-end account creation, login, session, profile and membership journey. What you'll do: Coding, unit testing, building high performance and scalable applications that meet the needs of millions of Walmart-International customers, in the areas of supply chain management ; Customer experience. You also get to collaborate with team members to develop best practices and client requirements for the software. In this role it would be important for you to professionally maintain all codes and create updates regularly to address the customers and companys concerns You will show your skills in analysing and testing programs/products before formal launch to ensure flawless performance Troubleshooting coding problems quickly and efficiently will offer you a chance to grow your skills in a high-pace, high-impact environment. Software security is of prime importance and by developing programs that monitor sharing of private information, you will be able to add tremendous credibility to your work You will be called upon to support the coaching and training of other team members to ensure all employees are confident in the use of software applications What you'll bring: Minimum 3+ years of object-oriented programming experience in Java. Exposure to cloud infrastructure, such as Open Stack, Azure, GCP, or AWS Strong computer science fundamentals in data structures and algorithms Excellent oral and written communication skills. About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. Thats what we do at Walmart Global Tech. Were a team of software engineers, data scientists, cybersecurity experts and service professionalswithin the worlds leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasingtheir first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale,impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approachhelps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include ahost of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Equal Opportunity Employer: Walmart, Inc. is an Equal Opportunity Employer By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing uniquestyles, experiences, identities, ideas and opinions while being welcoming of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 2years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 4 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, Network+, GISF, GSEC, CISSP, or CCSP, Master’s degree in Computer Science, Information Technology, Engineering, Information Systems, Cybersecurity, or related area Primary Location... 4,5,6, 7 Floor, Building 10, Sez, Cessna Business Park, Kadubeesanahalli Village, Varthur Hobli , India R-2106168 Show more Show less

Posted 1 week ago

Apply

10.0 years

0 Lacs

Bhubaneswar, Odisha, India

On-site

Linkedin logo

📍 Location: 3rd Floor, F3, Ryan Tower, Technology Corridor, Near Trident Academy, Chandaka Industrial Estate, Infocity, Chandrasekharpur, Bhubaneswar, Odisha – 751024 🏢 Company: Threatsys Technologies Private Limited 🏢 About the Company Threatsys Technologies Private Limited is a forward-thinking cybersecurity company headquartered in Bhubaneswar, India. We specialise in delivering comprehensive, tailored cybersecurity solutions to businesses, government agencies, and institutions. Our expertise includes Vulnerability Assessment & Penetration Testing (VAPT), Security Operations Centre (SOC) services, threat intelligence, incident response, cloud and network security, and cyber forensics. At Threatsys, we combine advanced technologies with deep industry knowledge to help organisations identify vulnerabilities, respond swiftly to incidents, and build resilient security postures. Our mission is to empower clients to confidently protect their digital assets and maintain trust in an increasingly complex cyber landscape. Educational Qualifications: Bachelor’s Degree in: Cybersecurity Computer Science Information Technology Business Administration Or a related technical field Preferred: Master’s in Business Administration (MBA) or a Master's in Information Security for senior roles. Professional Certifications (Recommended): Cybersecurity Certifications (to build technical credibility): CompTIA Security+ Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) Certified Information Security Manager (CISM) Sales or Business Certifications (to support strategic and sales functions): HubSpot Inbound Sales Certification Salesforce Sales Cloud Consultant Certification Strategic Selling, SPIN Selling, or Challenger Sales Training Relevant Experience: 5–10 years of combined experience in: Cybersecurity (technical, pre-sales, or product-related) B2B technology sales (preferably in IT or cybersecurity) Proven track record of: Meeting or exceeding sales targets Selling complex technical solutions to enterprise clients Managing end-to-end sales pipelines (lead generation to closing) Working with cross-functional teams (technical, product, marketing) Preferred: Experience with channel partners, resellers, or MSSPs (Managed Security Service Providers). Core Skills Required: Technical Knowledge: Understanding of cybersecurity solutions: Network security (firewalls, VPNs, IDS/IPS) Endpoint protection (EDR/XDR) Cloud security (AWS, Azure) Identity and Access Management (IAM) SIEM/SOC operations Familiarity with compliance frameworks: NIST, ISO 27001, PCI-DSS, GDPR, HIPAA Sales & Management Skills: Strategic planning and business development Account-based selling and lead nurturing Proposal and contract negotiation Sales pipeline management (CRM tools like Salesforce, HubSpot) Forecasting and reporting to leadership Soft Skills: Excellent communication and presentation skills Strong interpersonal and relationship-building abilities Ability to translate technical solutions into business value Leadership and team management skills High emotional intelligence and adaptability Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What You’ll Be Doing... The Verizon Product Security Team ensures security by design product engineering and architecture for both consumer and business products. As a Compliance and Vulnerability Management Engineer, you will have in-depth experience across the cyber security domain and the ability to apply this knowledge to drive cross-organizational initiatives. As an individual contributor, you will be responsible to conduct compliance and vulnerability assessments using Verizon tools and systems, and develop action plans to improve the security posture of Verizon systems. Drive for multiple cyber security technical projects focused on Compliance and Vulnerability Management areas covering relevant Verizon policies and standards. In partnership with various business units, help review, update, refine their compliance and vulnerability management commitments. Own and drive open security issues (open vulnerabilities/compliance/risk items) to resolution. Effectively communicate key successes/wins and other significant project statuses. Capture and report key metrics related to projects. Identify opportunities to streamline processes and create efficiencies. Support leadership with executive reporting. Manage several different projects and work streams at the same time effectively. Ability to work independently with limited supervision. What We’re Looking For... You’re driven to pinpoint a problem and tenacious about finding a solution. You’re organized and pay attention to details. You are the person that others rely on. You are accountable and follow through with a sense of urgency. You’ll Need To Have Bachelor’s degree or four or more years of work experience. Experience in cybersecurity, with a focus on compliance and vulnerability management Technical knowledge of information security fundamentals, best practices and industry standards. Experience in managing projects in cyber security domains including security compliance, vulnerability management, application security, cloud security and risk management. Knowledge of the cyber security domain. Proficiency in vulnerability assessment tools and techniques Hands on experience with SAST, DAST, OSS, Tenable, Containers security scans and understanding of the reported vulnerabilities. Working with the stakeholders to resolve the vulnerabilities and guide the development team to fix. Experience performing cyber security-related compliance and vulnerability management tasks. Understanding of WAF and configuring WAF rules is a plus. Understanding of the software development lifecycle (SDLC) and quality assurance processes. Excellent communication, interpersonal, verbal, and written skills. Even better if you have one or more of the following: Master's degree in Cybersecurity or a related field Experience with application development Knowledge of scripting languages (e.g., Python, PowerShell) Familiarity with DevSecOps practices Experience in a large enterprise environment Additional certifications such as CISSP, CISM, CEH, ISO 27001, CompTIA Security+, Any AWS certifications. Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Show more Show less

Posted 1 week ago

Apply

2.0 years

0 Lacs

Kochi, Kerala, India

On-site

Linkedin logo

Key Responsibilities: Deliver engaging and practical cybersecurity training sessions to students, covering key topics such as network security, ethical hacking, threat analysis, risk management, and security best practices. Create and update training materials, presentations, and lab exercises to ensure high-quality, up-to-date content. Provide hands-on guidance to students, including troubleshooting technical issues and clarifying cybersecurity concepts. Assess student performance through assignments, quizzes, and evaluations, and provide constructive feedback. Stay current with the latest trends, tools, and certifications in cybersecurity. Collaborate with the curriculum development team to enhance training programs. Participate in internal meetings and contribute to continuous improvement of the training process. Requirements: Bachelor’s degree in Computer Science, Information Technology, or a related field. 1–2 years of experience in cybersecurity roles or cybersecurity training. Strong understanding of cybersecurity fundamentals, tools, and methodologies. Experience with common cybersecurity tools, such as firewalls, antivirus solutions, vulnerability scanners, and SIEM tools. Excellent communication and presentation skills. Ability to simplify complex technical concepts for beginners. Relevant certifications (such as CEH, CompTIA Security+, or similar) are a plus. How to Apply: Share your resume at hr@techmindz.com Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Kurla, Maharashtra, India

On-site

Linkedin logo

At Black & Veatch, our employee-owners go beyond the project. For over a century, we have been breaking down social, economic and geographic barriers by making life's critical resources accessible to all. Working with us, you will help provide critical expertise as we, along with our valued clients, deliver solutions that positively impact communities around the world. Our professionals are our greatest asset, and we believe nothing is more important than the health, happiness and professional growth of our employee-owners. With a focus on flexible work-life balance options, an expanding and diverse workforce, and limitless career growth opportunities, we will give you our best to help you give us your best, and together we can build a world of difference. Req Id : 106000 Opportunity Type : Staff Relocation eligible : No Full time/Part time : Full-Time Contract Hire Only for this Project : No Visa Sponsorship Available: No Job Summary The Industrial Cybersecurity Analyst contributes to technical consulting projects and implementation services for critical infrastructure clients. The Industrial Cybersecurity Analyst leverages their technical and industry knowledge of OT networks and industrial cybersecurity to contribute to the completion of multiple engagement phases. In this role, you will assess/support clients’ security posture, develop recommendations to enhance their programs and technologies, and implement recommendations outlined in master plans. This role blends technical capabilities with analysis and technical support. The role requires a wide range of duties, including onsite/online assessments, compliance and standards reviews, security architecture analyses, plan development, and technology implementation and integration. The role also supporting our Industrial Cyber Security Lead in analysis, risk management workshops, as well as the ability to write a customer maturity analysis. The Industrial Cybersecurity Analyst demonstrates capabilities with minimal level of oversight from more senior level professionals. The scope and size of projects they contribute to are generally medium to large in size or they may own a small to moderate portion of a larger project. Key Responsibilities Technical Consulting and Implementation Capabilities: Assess people, process, and technical dimensions of client cybersecurity posture Develops and write master plans that combine analyses, reviews, and recommendations of client industrial cyber programs, technologies, and networks Assist workshops, data collection, tabletop exercises and client interviews Assist asset and vulnerability scanning of customer networks, including the installation of scanning and monitoring technologies Assist walk-downs of client sites to assess cyber and physical security postures Applies industrial cybersecurity standards and regulatory requirements (e.g., NERC CIP, NIST, IE62443) to customer programs Assist technical (e.g., segmentation, hardening, technology integration) and programmatic (e.g., policies, response plans) implementation of master plans and recommendations Contributes to quality review on own engagements Develop applicable knowledge bases by using best practices to redefine tools and techniques. Outline specific performance measures, targets, and goals to articulate the business case for realized efficiencies or added value Challenge client’s current strategy and direction through persuasive discussions. Define competitive advantage and achievable value to the client through use of the strategic change components and metrics. Formulate issue-based hypotheses and develop analytical plan for testing. Contribute to analysis of impact of strategic changes by defining linkages and interdependencies. Utilize specialized knowledge to produce complex work products and solutions across all phases of an engagement Anticipate and resolve technical problems with minimal technical assistance from others Develop, present, and defend conclusions, recommendations, and implementation plans Identify technical issues impacting an engagement and proposes solutions Analyze and apply best practices knowledge of the industry Contribute to the development of service packages as part of the team’s service offerings Management Responsibilities Individual Contributor Preferred Qualifications Bachelor's Degree or relevant work experience Has managed/supported significant engagements Experience applying common OT standards and regulations (e.g., NIST, IE6433, CMMC, NERC CIP) 5+ years in a technical/consulting environment All applicants must be able to complete pre-employment onboarding requirements (if selected) which may include any/all of the following: criminal/civil background check, drug screen, and motor vehicle records search, in compliance with any applicable laws and regulations. Knowledge of business continuity planning and disaster recovery Knowledge of anti-virus and anti-spam technologies Knowledge of technology asset management Knowledge of technology hardware and software platforms and systems Skill in analytical and technical documentation Skill in verbal and written communication Skill in articulating complex, technical information to both technical and non-technical audiences Skill in analyzing significant volumes of detailed information and understanding the security implications Skill in understanding complex systems across diverse technical platforms Intermediate skill level in Microsoft office and software update tools Intermediate skill level in secure content, network security and web filtering software Intermediate skill level in security vulnerability scanning tools Ability to balance and manage competing high priority work demands Ability to build relationships and foster teamwork Ability to work in a team environment Ability to conduct sensitive security investigations and maintain confidentiality Preferred Qualifications Experience at customer sites Proven experience with OT penetration testing and/or red teaming Experience with OT Security-by-design and/or new OT in construction Proven ability to install monitoring technologies (e.g., Nozomi, Dragos, Tenable, Claroty) Experience scoping technical projects Proven ability to assess security architectures of OT networks Direct experience in planning and facilitating risk workshops, table-top exercises, and other client-facing work sessions Experience conducting maturity and technical assessments Proven team leadership and management experience Graduate degree preferred Certifications Other relevant cybersecurity certifications (e.g., Nozomi, Fortinet, Dragos, Tenable) – preferred CompTIA Security+ SANS Certificate in relevant to OT Cyber Security such as GICSP, GICP, ACS, GSEC, GRID, GCIH, CEH, CISM CISSP ISA/IEC 62443 suite of certifications Work Environment/Physical Demands BandV Office Environment or Client Site Work involves frequent finger/hand manipulation in using a keyboard and mouse. Work may involve stairs, walking, long moments of standing. Minimum Qualifications Bachelor’s Degree or relevant work experience. 4+ years experience in a business/consulting environment. All applicants must be able to complete pre-employment onboarding requirements (if selected) which may include any/all of the following: criminal/civil background check, drug screen, and motor vehicle records search, in compliance with any applicable laws and regulations. Certifications Certifications related to area of expertise, where applicable preferred. Work Environment/Physical Demands Normal office environment Competencies Action oriented Interpersonal savvy Customer focus Salary Plan CST: Consulting Job Grade 003 BVH, Inc., its subsidiaries and its affiliated companies, complies with all Equal Employment Opportunity (EEO) affirmative action laws and regulations. Black & Veatch does not discriminate on the basis of age, race, religion, color, sex, national origin, marital status, genetic information, sexual orientation, gender Identity and expression, disability, veteran status, pregnancy status or other status protected by law. Black & Veatch is committed to being an employer of choice by creating a valuable work experience that keeps our people engaged, productive, safe and healthy. We offer professionals an array of health and welfare benefits that vary based on their geographic region and employment status. This may include health, life accident and disability insurances, paid time off, financial programs and more. Professionals may also be eligible for a performance-based bonus program. By valuing diverse voices and perspectives, we cultivate an authentically inclusive environment for professionals and are able to provide innovative and effective solutions for clients. Show more Show less

Posted 1 week ago

Apply

3.0 years

0 Lacs

Delhi, India

Remote

Linkedin logo

Overview WELCOME TO SITA We're the team that keeps airports moving, airlines flying smoothly, and borders open. Our tech and communication innovations are the secret behind the success of the world's air travel industry. You'll find us at 95% of international hubs. We partner closely with over 2,500 transportation and government clients, each with their own unique needs and challenges. Our goal is to find fresh solutions and cutting-edge tech to make their operations run like clockwork. Want to be a part of something big? Are you ready to love your job? The adventure begins right here, with you, at SITA. PURPOSE To assure SITA's competitive strength and business growth through the provision of the highest quality technical Service Operations to SITA customers. Perform all Service Operations activities according to SITA standards and procedures maximizing customer satisfaction by the delivery of first class support activities.n- Perform all Service Operations activities according to SITA standards and procedures maximizing customer satisfaction by the delivery of first class support activities. Provide the highest level of Service Operation availability ensuring Systems and Products are properly configured and maintained. To manage and assist the Service Operations team to ensure service delivery quality is maintained through direct assistance in implementing and improving working processes and procedures. What You Will Do Providing support for Border Control devices such as Automated Border Control Gates and Kiosks deploy at multiple locations around the World, mainting continuity across these service and making sure the local teams can be supported remotely in restoring and maintaining service availability to meet customer and user needs to keep passengers moving safely and quickly through airport security. As Portfolio Senior Support Specialist, you will work closely with development teams in an agile manner ensuring Border Automated Border Control (ABC) Products and Infrastructure are maintained to the highest standard. We are looking for a skilled Windows and Application Support Engineer to provide robust support for our organization's Windows infrastructure and applications. The ideal candidate will have hands-on experience in remotely managing Windows servers, troubleshooting application issues, and maintaining system security and performance and supporting local support teams remotely in the management and running of the ABC Products deployed at airports around the World. This role is essential in ensuring the smooth running of passenger flows through airports and ports, working with the local teams and working in isolation to address technical issues promptly, and optimizing our infrastructure to support business operations. In addition, you will be responsible for supporting the junior members of the team who would be responsible for the general maintenance of the service around key service availability activities such as patching and deployment management. Key Responsibilities Remote Operational Maintenance and Support Perform initiative-taking system monitoring, identifying, and addressing potential issues in ABC gates and kiosks before they affect operations. System Monitoring and Reporting Utilize monitoring tools to assess system availability, performance, and any potential security risks. Maintain detailed logs in the ticketing system, documenting incidents, resolutions, and service updates for compliance and continuous improvement. Continuous Improvement and Collaboration** Work closely with the central IT support and engineering teams to identify trends and recurring issues, proposing improvements in system reliability and reducing service disruptions. Stay up to date on system upgrades, new features, and emerging technologies relevant to border control and self-service kiosks. System Administration: Maintain, monitor, and manage Windows-based systems, including Windows Server and desktop environments. Implement updates, patches, and configuration changes to ensure optimal performance and security. Perform regular system backups and recovery processes as needed. Application Support: Provide technical support for in-house and third-party applications, diagnosing and resolving application-level issues. Manage application installations, configurations, and updates. Troubleshoot application errors and work with relevant stakeholders for resolution. Incident and Problem Management: Known Issues DB Reports Respond to technical incidents promptly, ensuring minimal downtime for users. Perform root cause analysis and implement preventive measures to reduce future issues. Document incidents, problems, and resolutions in the incident tracking system. User Support: Provide support to end-users for Windows and application-related issues, offering solutions to increase productivity. Educate and train users on Windows and application functionalities. Performance Optimization and Monitoring: Run basic performance report - Around capacity planning. Use monitoring tools to analyze system performance and identify potential issues. Optimize system configurations for improved efficiency and performance. Security and Compliance: Patching Enforce security protocols and best practices across Windows systems and applications. Conduct regular security audits and ensure compliance with organizational and regulatory standards. Assist in disaster recovery planning and testing. Required Skills And Qualifications Educational Background: Bachelor’s degree in Computer Science, Information Technology, or related field, or equivalent work experience. Technical Skills: Proficient in Windows Server and Windows OS (Windows 10, 11, Windows Server 2016/2019/2022). Familiarity with Active Directory, DNS, DHCP, Group Policy, and other Windows administration tools. Experience with application support, installation, and troubleshooting. Strong understanding of networking concepts, including TCP/IP, firewalls, and VPN. Strong Remote support diagnosis and support skills. Desirable Skills: Understanding and implementation of SRE Best Practices Experience with PowerShell or other scripting tools for automation. Familiarity with monitoring tools (e.g., Nagios, SolarWinds, or similar). Knowledge of cloud platforms (AWS, Azure, or Google Cloud) is an advantage. Linux Airport Devices such as Automated Gates and Kiosks Soft Skills: Strong analytical and problem-solving skills. Excellent verbal and written communication skills. Ability to work independently and as part of a team. Customer-focused attitude with a commitment to high-quality support. Additional Requirements Must be eligible to work in India and able to pass required background checks. Availability for shift work, including nights, weekends, and holidays, with flexibility to respond to urgent issues. Working Conditions Environment**: Office-based, central support hub in Delhi, India, providing remote support for multiple global airport locations. Physical Requirements**: Primarily desk-based work, with requirements for extended periods of monitoring and remote troubleshooting. Qualifications Experience Minimum of 3 years of experience in Windows system administration and application support. Proven experience troubleshooting and resolving technical issues in a Windows environment. Experience in a support role within an enterprise or mid-sized organization is preferred. Certifications (Preferred) Microsoft Certified: Windows Server Hybrid Administrator Associate or similar. CompTIA Network+ or CompTIA Security+. ITIL Foundation or other relevant IT Service Management certification. What We Offer SITA’s workplace is all about diversity, many different countries and cultures are represented in our workforce. We collaborate in our impressive offices, embracing a hybrid work format. As part of our global benefits, we offer: 🏡 Work Flexibility: Work from home up to 2 days/week (depending on your Team's needs). You may wish to flex your arrival time at the office, to beat the rush hours or you may want to leave the office earlier to pick up your kids from school or to go to your favorite game: We support you in being open about your needs and routine with you manager. 🌿 Employee Wellbeing: Employee Assistance Program (EAP) provided by SITA is a yearly free service for practical advice in any part of your life. 🚀 Professional Development: Unleash your potential with our training offers via Coursera! 🌎 Flex-location: Benefit for 30 working days from anywhere around the world each year! 🙌🏽 Competitive benefits according to the local market SITA is an Equal Opportunity Employer and values a diverse workforce. In support of our Employment Equity Program, women, aboriginal people, members of visible minorities, and/or persons with disabilities are encouraged to apply and self-identify in the application process. Show more Show less

Posted 1 week ago

Apply

2.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Join a team dedicated to supporting the crucial mission of improving health outcomes. At Merative, you can apply your skills – and grow new ones – with colleagues who have deep expertise in health and technology. Merative provides data, analytics and software for the health industry. Our clients include providers, health plans, employers, life sciences companies and governments around the world. With industry-leading products and focused innovation, we help customers improve decision-making and performance so that together, we drive real progress in health. Learn more at merative.com We are seeking an experienced and proactive Sr. Analyst, Information Security Operations to join our team and help safeguard our organization’s data, systems, and networks. This critical role involves the development, implementation, and management of security controls and measures designed to intercept and prevent internal and external attacks, safeguarding our email, data, e-commerce, and web-based systems. The ideal candidate will possess strong technical expertise in network security, vulnerability assessments, penetration testing, and incident response. In this role, you will play a key part in identifying potential threats, performing cybersecurity audits, and responding to breaches while ensuring compliance with cybersecurity policies and best practices. The Sr. Analyst is essential for maintaining the integrity of our systems and protecting sensitive information across the organization. Key Responsibilities: Develop and Execute Security Controls: Design, implement, and manage security measures to prevent unauthorized access to systems and networks. Implement effective countermeasures to combat internal and external threats. Manage Firewalls and Encryption Protocols: Maintain and configure hardware, software, network firewalls, and encryption protocols to protect critical infrastructure and data. Administer Cybersecurity Policies: Administer and enforce policies controlling both physical and virtual access to systems, ensuring they align with industry standards and organizational goals. Conduct Security Audits and Testing: Perform network security audits, vulnerability assessments, and system testing to identify weaknesses. Evaluate system security configurations for efficacy and compliance with cybersecurity standards. Penetration Testing and Vulnerability Assessments: Conduct penetration tests and vulnerability assessments of applications, operating systems, and networks to proactively identify risks and vulnerabilities. Incident Response and Breach Management: Monitor for, respond to, and mitigate cybersecurity breaches and incidents. Identify intrusions and take action to isolate, block, and remove unauthorized access. Research and Threat Analysis: Conduct research on emerging cybersecurity threats, analyze root causes of incidents, and develop strategies to prevent future breaches. Security Solution Implementation: Assist in the creation and implementation of security solutions that enhance system defense mechanisms, addressing both known and evolving security challenges. Business Impact Communication: Communicate with management regarding the impact of security incidents, breaches, or attempted intrusions on the business. Report on the potential loss, alteration, or destruction of data or systems. Collaboration: Work in collaboration with internal teams or external Professional Services and Outsourcing functions to ensure security solutions meet organizational needs. Skills & Qualifications: Experience: 2- 3+ years of experience in cybersecurity, information security operations, or a similar role within a corporate environment. Technical Expertise: Strong proficiency in security protocols, firewalls, encryption, penetration testing, network security, and vulnerability management. Knowledge of Security Tools: Familiarity with various security testing tools, intrusion detection systems (IDS), and security incident management platforms. Incident Response: Hands-on experience in managing and responding to cybersecurity incidents, intrusions, and breaches. Penetration Testing: Proven expertise in conducting penetration tests and vulnerability assessments to identify and remediate security risks. Compliance & Standards: Knowledge of cybersecurity regulations and frameworks (e.g., GDPR, NIST, ISO 27001, PCI DSS) and experience in ensuring compliance. Problem-Solving: Strong analytical and troubleshooting skills, with the ability to analyze security incidents and determine root causes. Communication Skills: Strong ability to communicate complex security issues to non-technical stakeholders and provide actionable insights for business leadership. Preferred Qualifications: Bachelor’s degree in Information Security, Computer Science, or related field. Relevant cybersecurity certifications (e.g., CISSP, CEH, CompTIA Security+, OSCP). Familiarity with cloud security and hosted network environments. Experience with secure development practices and collaboration with software engineering teams on cybersecurity. Knowledge of securing web-based solutions and e-commerce platforms. Work Environment & Additional Information: Ability to work independently and as part of a team to achieve security objectives and improve overall security posture. The role is client-focused and may involve external interactions depending on business needs. Why Join Us? This is an exciting opportunity for an experienced cybersecurity professional to make a significant impact on an organization’s information security infrastructure. If you’re looking to work in a fast-paced, innovative environment with opportunities to grow and develop your skills, this role is perfect for you. We offer competitive salaries, benefits, and a collaborative team environment where your contributions will help drive our company’s security initiatives forward. It is the policy of Merative to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, HIV status, or any other characteristic protected by federal, state or local law. In addition, Merative will provide reasonable accommodations for qualified individuals with disabilities. Show more Show less

Posted 1 week ago

Apply

3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Us We are a global climate technologies company engineered for sustainability. We create sustainable and efficient residential, commercial and industrial spaces through HVACR technologies. We protect temperature-sensitive goods throughout the cold chain. And we bring comfort to people globally. Best-in-class engineering, design and manufacturing combined with category-leading brands in compression, controls, software and monitoring solutions result in next-generation climate technology that is built for the needs of the world ahead. Whether you are a professional looking for a career change, an undergraduate student exploring your first opportunity, or recent graduate with an advanced degree, we have opportunities that will allow you to innovate, be challenged and make an impact. Join our team and start your journey today! Job Title Security Analyst Reports to Sr. Manager Job Purpose As a Security Analyst , you will be a key member of our Global Cybersecurity Team, helping to strengthen Copeland’s cybersecurity posture. This role involves monitoring tools and dashboards, identifying and mitigating security vulnerabilities, and collaborating with teams to address risks effectively. You will also contribute to continuously improving our vulnerability management processes and play an active role in ensuring our IT systems remain secure. Key Responsibilities Monitor security tools and dashboards to identify vulnerabilities, assess risks, and propose compensating controls to reduce threats. Communicate findings to appropriate teams and track vulnerabilities through resolution. Create detailed vulnerability reports for technical teams and summary reports for management. Collaborate with IT and development teams to prioritize and remediate vulnerabilities. Maintain an up-to-date database of vulnerabilities, including their status and remediation progress. Contribute to the development and improvement of vulnerability management processes and tools. Duties And Responsibilities Support product security programs, projects, and initiatives to align with organizational security objectives. Lead small to medium-scale security initiatives, ensuring timely and successful execution. Collaborate with business units and engineering teams to implement security policies, establish sustainable processes, and enhance compliance while reducing risk. Identify and address gaps within the cybersecurity program, applying your expertise to strengthen the organization’s security posture. Conduct security scans, validate vulnerabilities through penetration testing, and retest fixes to ensure effectiveness. Recommend and participate in initiatives to prevent repeated vulnerability findings. Provide support for cybersecurity projects, technical discussions, and collaborative meetings. Respond to and assist in resolving outputs from security tools and engagement activities. Qualifications Bachelor’s degree in Engineering, Computer Science, or related discipline 3+ years of experience in vulnerability assessment, penetration testing, or cybersecurity. Hands-on experience with vulnerability scanning tools and remediation processes. Knowledge of networking, operating systems (Windows, Linux), and application security. Some experience with programming or scripting and familiarity with DevSecOps practices. Experience with vulnerability frameworks (NIST, CVSS, etc.) Proficient in MS Office (Word, Excel, PowerPoint, etc.) Strong communication skills, with the ability to deliver clear oral, written, and visual presentations. Strong organizational skills, with the ability to plan, prioritize, and align tasks effectively. Customer-focused mindset with a strong eagerness to learn and grow. SANS GIAC, Network+, Security+ or other industry certifications preferred Key Competencies Customer Focus, Tech Savvy, Action Oriented, Collaborates, Communicates Effectively, Instills Trust, Being Resilient Our Commitment to Our People Across the globe, we are united by a singular Purpose: Sustainability is no small ambition. That’s why everything we do is geared toward a sustainable future—for our generation and all those to come. Through groundbreaking innovations, HVACR technology and cold chain solutions, we are reducing carbon emissions and improving energy efficiency in spaces of all sizes, from residential to commercial to industrial. Our employees are our greatest strength. We believe that our culture of passion, openness, and collaboration empowers us to work toward the same goal - to make the world a better place. We invest in the end-to-end development of our people, beginning at onboarding and through senior leadership, so they can thrive personally and professionally. Flexible and competitive benefits plans offer the right options to meet your individual/family needs. We provide employees with flexible time off plans, including paid parental leave (maternal and paternal), vacation and holiday leave. Together, we have the opportunity – and the power – to continue to revolutionize the technology behind air conditioning, heating and refrigeration, and cultivate a better future. Learn more about us and how you can join our team! Our Commitment to Inclusion & Belonging At Copeland, we cultivate a strong sense of inclusion and belonging where individuals of all backgrounds, and with diverse perspectives, are embraced and treated fairly to enable a stronger workforce. Our employee resource groups play an important role in culture and community building at Copeland. Equal Opportunity Employer Copeland is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, age, marital status, political affiliation, sexual orientation, gender identity, genetic information, disability or protected veteran status. We are committed to providing a workplace free of any discrimination or harassment. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderābād

On-site

Splunk, a Cisco company, is building a safer and more resilient digital world with an end-to-end full stack platform made for a hybrid, multi-cloud world. Leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable. Our customers love our technology, but it's our caring employees that make Splunk stand out as an amazing career destination. No matter where in the world or what level of the organization, we approach our work with kindness. So bring your work experience, problem-solving skills and talent, of course, but also bring your joy, your passion and all the things that make you, you. Come help organizations be their best, while you reach new heights with a team that has your back. Role Summary Are you passionate about tackling sophisticated, high-impact security challenges at scale? Join our dynamic Software Security Engineering team and work alongside product development teams to embed ground breaking secure software practices across the entire Splunk product portfolio. In this role, you'll dive deep into identifying evolving vulnerability patterns, analyze real-world attack tactics, and craft innovative security solutions that safeguard Splunk’s industry-leading products. Collaborating with Product Security, Risk, and Compliance teams, you’ll play a pivotal role in ensuring Splunk not only meets but exceeds new policy and regulatory requirements. Get ready to make a tangible impact on the future of security at Splunk! Meet the Global Security Team Splunk is here to build a safer and more resilient digital world. The world's leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable. While customers love our technology, it's our people that make Splunk stand out as an amazing career destination and why we've won so many awards as a best place to work. If you become a Splunker, we want your whole, authentic self, what we call your "million data points". So bring your work experience, problem-solving skills and talent, of course, but also bring your joy, your passion and all the things that make you, you. What you'll get to do Analyze and Innovate: Identify emerging code vulnerability trends and research real-world attack patterns to stay ahead of evolving security threats. Develop Cutting-Edge Solutions: Design and implement sophisticated security mechanisms that protect Splunk’s products from vulnerabilities and attacks. Collaborate Across Teams: Work closely with Product Development, Product Security, Risk, and Compliance teams to ensure security is woven into every phase of the software development lifecycle. Shape Security Strategy: Contribute to crafting Splunk’s security strategy by integrating secure coding standards and vulnerability management into the product pipeline. Drive Regulatory Excellence: Ensure Splunk remains proactive and aligned with the latest policy and regulatory requirements. Must-have Qualifications 4 Plus years in software security, with a deep understanding of secure coding practices, vulnerability management, and common security flaws (e.g., OWASP Top 10). 4 Plus years of programming in languages such as Python, Java, C++, or Go, and the ability to identify and remediate security issues in code. Understanding of risk management principles and popular regulatory requirements (e.g., FEDRAMP, HIPAA, SOC 2) and how they impact security and software development. Analytical and problem-solving abilities to address sophisticated security challenges at scale. Bachelors degree in Computer Science, Security, or equivalent work experience. Nice-to-have Qualifications We’ve taken special care to separate the must-have qualifications from the nice-to-haves. “Nice-to-have” means just that: Nice. To. Have. So, don’t worry if you can’t check off every box. We’re not hiring a list of bullet points–we’re interested in the whole you. Familiarity with threat modeling techniques. Experience implementing security tooling and automation within software build pipelines. Proven track record to work effectively in cross-functional teams to implement security practices. Security certifications such as CompTIA Security+ or GIAC Security Essentials. Splunk is an Equal Opportunity Employer Splunk, a Cisco company, is an Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis.

Posted 1 week ago

Apply

3.0 years

0 - 0 Lacs

India

On-site

About Company Veye is a leading independent equities research firm dedicated to helping its clients improve their investment results through unbiased and precise recommendations around buying, selling or holding stocks. Veye - Australian Stock Market Research Firm | ASX buy Recommendations Job Summary We are seeking a highly skilled Cyber Security and IT Expert to protect our organization's digital assets and ensure robust IT infrastructure management. The ideal candidate will be responsible for identifying and mitigating security threats, implementing cybersecurity measures, maintaining IT systems, and ensuring compliance with industry standards Key Responsibilities / Cybersecurity Responsibilities: Monitor networks and systems for security breaches, intrusions, and unusual activities. Conduct regular vulnerability assessments and penetration testing. Develop, implement, and enforce security policies, procedures, and best practices. Manage firewalls, antivirus software, and intrusion detection/prevention systems (IDS/IPS). Respond to and investigate security incidents and breaches, including forensic analysis and root cause identification. Stay current with the latest security trends, threats, and technology solutions. Ensure compliance with data protection laws. IT Management Responsibilities: Oversee the installation, configuration, and maintenance of hardware and software systems. Manage IT infrastructure including servers, networks, and cloud services. Provide technical support and training to staff on cybersecurity awareness and IT tools. Monitor system performance and implement upgrades as necessary. Administer user access, permissions, and accounts in accordance with IT security policies. Maintain backups and disaster recovery plans. Qualifications: Education: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. Relevant certifications (preferred): CISSP, CISM, CompTIA Security+, CEH, CCNA, Microsoft Certified: Azure Security Engineer, etc. Experience: Minimum 3–5 years of professional experience in cybersecurity and IT systems management. Proven track record of managing IT infrastructure and implementing cybersecurity frameworks. Technical Skills: Proficiency in firewalls, antivirus tools, SIEM systems, and endpoint protection. Experience with network protocols, VPNs, and encryption technologies. Knowledge of operating systems (Windows, Linux, macOS), Active Directory, and Office 365. Familiarity with cloud platforms (AWS, Azure, Google Cloud) and security practices. Strong scripting and automation skills (e.g., PowerShell, Python, Bash) is a plus. Soft Skills: Excellent analytical and problem-solving skills. Strong communication and interpersonal skills. Ability to work independently and as part of a team. High attention to detail and a proactive approach to risk management. Note: Morning Shift [Shift Timing: 07:00 IST to 14:30 Hrs. IST] Work Mode - Work from office - 5.5 days per week [48 Hrs.] E Mail – hr@veye.co.in Travel: No Cab Facility or Travel Reimbursement Job Types: Full-time, Permanent Pay: ₹30,000.00 - ₹60,000.00 per month Schedule: Fixed shift Morning shift Work Location: In person

Posted 1 week ago

Apply

8.0 years

15 - 25 Lacs

Noida

Remote

Experience- 8+ years Shift Timing: 24/7 Job Summary: An experienced professional to set up SOC L1 operations, including processes, procedures, and team integration. The role requires collaboration with Cadence SOC L2/L3 teams and the ability to establish a fully operational L1 framework. Candidate should be SME in various tools being used in SOC ecosystem in Cadence – Splunk, Devo and Sentinel One Key Responsibilities: Design and implement SOC L1 workflows, processes, and escalation paths. Onboard and guide the L1 team, ensuring alignment with L2/L3 operations. Develop SOPs, incident response playbooks, and documentation. Configure monitoring tools and dashboards for effective threat management. Provide full-time onsite support for 6-8 weeks, transitioning to part-time remote. Qualifications: Proven experience in SOC operations and team setup. Strong knowledge of SOC tools (e.g., SIEM) and cybersecurity frameworks Excellent documentation and communication skills. Relevant certifications (e.g., Security+, CSA) are a plus. Job Type: Full-time Pay: ₹1,500,000.00 - ₹2,500,000.00 per year Schedule: Rotational shift Ability to commute/relocate: Noida, Uttar Pradesh: Reliably commute or planning to relocate before starting work (Required) Application Question(s): What is your current CTC? What is your expected CTC? What is your notice period? What is your current location? Which level are you supporting? How many years of experience do you have in SOC tools (e.g., SIEM) and cybersecurity frameworks? How many years of experience do you have in SOC operations? Do you have experience in Splunk and Sentinel One? Are you comfortable with the 24/7 support? Experience: total work: 8 years (Required) Work Location: In person

Posted 1 week ago

Apply

3.0 - 5.0 years

4 - 6 Lacs

Noida, New Delhi, Gurugram

Work from Office

Naukri logo

Incident handling, forensic analysis, and VAPT SIEM tools cybersecurity frameworks Log analysis, monitoring, detecting and investigating security incidents and breaches. CEH,CSA,CompTIA Security+,GCIH,security incidents

Posted 1 week ago

Apply

0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

🌟 Your Mission Join our team to safeguard and optimize critical infrastructure! You’ll master monitoring tools (Zabbix, Grafana, Cacti), harden Linux systems, and ensure seamless DNS/logging services—all while growing under expert mentorship. ⚙️ Key Responsibilities Enhance Monitoring Systems: Customize Zabbix dashboards/triggers & optimize alerts (email/WhatsApp/Telegram). Maintain Linux Infrastructure: Administer Ubuntu/RHEL servers, apply security patches, and tune performance. Secure Critical Services: Harden DNS (BIND/PowerDNS), Syslog, and TACACS+ servers with SSL/TLS. Automate & Optimize: Write shell scripts, manage DB backups, and upgrade monitoring platforms (Cacti, Report Portal). Security Compliance: Enforce firewalls, disable root access, and ensure encrypted backups. 🛠️ Who You Are Foundational Skills: Linux/Unix administration (Ubuntu, CentOS, or RHEL). Exposure to Zabbix/Grafana/Cacti (or similar monitoring tools). Basic scripting (Bash/Python). Understanding of DNS, Syslog, or network security concepts. Growth Mindset: Eager to learn DevOps practices, CI/CD, and advanced security hardening. Education: Degree in Computer Science, IT, or related field (or equivalent hands-on experience). Nice-to-Have: Familiarity with MySQL/PostgreSQL. Basic knowledge of SSL/TLS or firewalls (iptables/firewalld). Certifications (e.g., RHCSA, CCNA, Security+). 🌈 Why Join Us? Mentorship: Learn from senior engineers in infrastructure and security. Impact: Secure systems used by thousands daily. Tech Stack: Modern tools (Grafana, Git, Ansible) + DevOps exposure. Growth: Path to mid/senior roles with supported upskilling. 📬 Apply Now! → Message me directly to discuss this role! → Tag someone who'd be a great fit #JuniorDev #InfrastructureJobs #CyberSecurityCareer #LinuxJobs #TechMentorship #ITCareer #DevOps #EntryLevelTech #Hiring #Networking Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Associate Security Platform Engineer is an entry level subject matter expert, responsible for learning how to facilitate problem resolution and mentoring for the overall team. This role performs operational security tasks such as performance and availability monitoring, log monitoring, security incident detection and response, security event reporting, and content maintenance (tuning). The Associate Security Platform Engineer is responsible for detecting and monitoring escalated threats and suspicious activity affecting the organization's technology domain (servers, networks, appliances and all infrastructure supporting production applications for the enterprise, as well as development environments). What You'll Be Doing Key Responsibilities: Works as part of a 24/7 team working on rotational shifts. Works as part of Platform and Content Engineering handling tunings, stake holder requests, escalations, reporting, trainings. Administers the organization's security tools to gather security logs from environment. Lifecycle management of the supported security tools/technologies, Break-fix, Patching, Live update. Adheres to SOPs and notify stake holders on log flow/log format issues. Documents best practices. Identifies opportunities to make automations which will help the incident response team. Performs security incident handling and response from several vectors including End Point Protection and Enterprise Detection and response tools, attack analysis, malware analysis, network forensics, computer forensics, and a broad range of skills in LAN technologies, Windows and Linux O/S’s, and general security infrastructure. Knowledge and Attributes: Entry level knowledge on implementation and monitoring of any SIEM or security tools/technologies. Entry level knowledge on security architecture, worked across different security technologies. Customer service orientated and pro-active thinking. Ability to problem solve and is highly driven and self-organized. Great attention to detail. Good analytical and logical thinking. Excellent spoken and written communication skills. Team player with the ability to work well with others and in group with colleagues and stakeholders. Academic Qualifications and Certifications: Bachelor's degree or equivalent in Information Technology or related field. Relevant level of Networking certifications such as CCNA, JNCIA, ACCA, PCNSA, CCSA etc. preferred. Relevant level of Security certifications such as AZ-500, SC-200, Security+, CEH etc. will be added advantage. Required Experience: Entry level experience in Security technologies like (Firewall, IPS, IDS, Proxy etc.). Entry level experience in technical support to clients. Entry level experience in diagnosis and troubleshooting. Entry level experience providing remote support in Security Technologies. Entry level experience in SOC/CSIRT Operations. Entry level experience in handling security incidents end to end. Entry level experience in Security engineering. Workplace type: Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today. Show more Show less

Posted 1 week ago

Apply

0.0 - 8.0 years

0 Lacs

Noida, Uttar Pradesh

Remote

Indeed logo

Experience- 8+ years Shift Timing: 24/7 Job Summary: An experienced professional to set up SOC L1 operations, including processes, procedures, and team integration. The role requires collaboration with Cadence SOC L2/L3 teams and the ability to establish a fully operational L1 framework. Candidate should be SME in various tools being used in SOC ecosystem in Cadence – Splunk, Devo and Sentinel One Key Responsibilities: Design and implement SOC L1 workflows, processes, and escalation paths. Onboard and guide the L1 team, ensuring alignment with L2/L3 operations. Develop SOPs, incident response playbooks, and documentation. Configure monitoring tools and dashboards for effective threat management. Provide full-time onsite support for 6-8 weeks, transitioning to part-time remote. Qualifications: Proven experience in SOC operations and team setup. Strong knowledge of SOC tools (e.g., SIEM) and cybersecurity frameworks Excellent documentation and communication skills. Relevant certifications (e.g., Security+, CSA) are a plus. Job Type: Full-time Pay: ₹1,500,000.00 - ₹2,500,000.00 per year Schedule: Rotational shift Ability to commute/relocate: Noida, Uttar Pradesh: Reliably commute or planning to relocate before starting work (Required) Application Question(s): What is your current CTC? What is your expected CTC? What is your notice period? What is your current location? Which level are you supporting? How many years of experience do you have in SOC tools (e.g., SIEM) and cybersecurity frameworks? How many years of experience do you have in SOC operations? Do you have experience in Splunk and Sentinel One? Are you comfortable with the 24/7 support? Experience: total work: 8 years (Required) Work Location: In person

Posted 1 week ago

Apply

2.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Linkedin logo

Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! Qualys, a leading cybersecurity firm, is seeking an experienced Senior Technical Support Engineer for Security Applications to resolve global customer and partner service requests promptly. Collaborate across teams for high customer satisfaction in a secure environment. Ideal for security enthusiasts with solid networking skills. Lead in resolving technical issues, provide top-tier support, and contribute to world-class assistance. Responsibilities: Promptly resolve global customer and partner service requests in a highly secured environment. Collaborate with cross-functional teams for high customer satisfaction. Provide support via phone, email, and MS Teams for Product modules over the SaaS platform. Ensure friendly and professional customer interactions throughout the service life cycle. Act as the main point of contact for technical issues, collaborating directly with Development and QA teams. Thrive in a challenging and dynamic environment, delivering world-class support and technical solutions. Qualifications: 2+ years of technical support experience. Experience in Vulnerability Management and Web Application Security/Firewall application support. In-depth TCP/IP understanding and LAN/WAN infrastructure knowledge. Strong foundation in Windows and/or solid Linux/Unix experience in an enterprise environment. Familiarity with common OS services (IIS, BIND, Apache, AD, WINS, Samba, SSH). Knowledge of firewalls, Intrusion Detection System technologies, and Network Vulnerability Scanners. Outstanding troubleshooting and analytical skills. Excellent written and verbal communication skills. Bachelor of Science in Computer Science or equivalent experience. Networking: OSI Layer understanding. Knowledge of broadcast domain vs. collision domain. Familiarity with different records zones in DNS and how it works. Understanding of SSL Handshake and TCP/IP Handshake. Proficiency in ARP, DHCP, proxy servers, and DNS cache clearing. Differentiation between TCP and UDP, and protocols & their workings. Linux/Unix: Understanding of the boot process and run levels. Various ways to assign an IP address to a Unix/Linux/Debian machine. Proficient in checking running processes, hidden files, and installing packages. Knowledge of sudo, permissions, file systems, and SSH banner. Windows: Insight into the Windows boot process and control panel basics. Understanding of UAC, registry hives, and remote registry manipulation tools. Knowledge of kernel mode vs. user mode, Active Directory, and Group Policies. Familiarity with Kerberos and NTLM authentication, Procmon, and service control manager. Security: Understanding of vulnerabilities, the vulnerability cycle, and exploits. Knowledge of malware types (virus, trojan, worm) and False/True Positive/Negative concepts. Understanding of False Positive, False Negative, True Positive, and True Negative in the security context. Preferred: Experience with packet capture review and diagnosis. Previous API support and Regex knowledge. Scripting experience (Bash, Python). Knowledge of major web server software, UNIX/Windows web services, and diverse platforms. Oracle and Microsoft SQL knowledge. CCNA, MCSE, CISSP, CompTIA Security+, and CEH certifications are highly desirable. Experience with Customer Support and Development Tools (Salesforce, Jira, etc.). Preferred Candidates With a CDAC Background. Willing to work in 24/7 rotational shifts. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Company Description WissenHive is an online platform that offers comprehensive training in CyberSecurity, covering offensive, defensive, and forensics domains. The company focuses on providing practical knowledge and real-world experience to its learners through courses, boot camps, challenge labs, and a CTF platform. WissenHive aims to bridge the skills gap in cybersecurity and enhance technical workforce development. Role Description This is a contract Cyber Security Trainer role located on-site in Noida. The Cyber Security Trainer will be responsible for delivering training sessions, developing curriculum, and creating educational content. The role involves mentoring students, conducting workshops, and assessing their progress in mastering cybersecurity concepts and techniques. Qualifications Application Security and Malware Analysis skills Experience in Cybersecurity, Network Security, and Information Security Strong understanding of cybersecurity principles and best practices Ability to explain complex technical concepts in a clear and concise manner Certifications such as CEH, or CompTIA Security+ are a plus Bachelor's degree in Computer Science, Information Technology, or related field Show more Show less

Posted 1 week ago

Apply

2.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Title: IT Administrator with Networking & Server Administration Location : Hyderabad Experience : 6 months – 2 years Job Type: Paid Internship About Us: Instaresz Business Services Pvt Ltd is a forward-thinking, fast-growing technology company that thrives on innovative solutions. We are currently looking for an experienced IT Administrator who will take responsibility for managing and maintaining the network infrastructure, servers, and systems while ensuring smooth day-to-day IT operations across the organization. Key Responsibilities: Set up, configure, and maintain LAN/WAN networks, routers, switches, firewalls, and VPNs. Administer Windows/Linux servers, Active Directory, DNS, DHCP, and user access controls. Manage software and OS package installations using tools like apt, yum, dnf, and rpm. Monitor and troubleshoot network and system performance issues. Maintain web, file, mail, and database servers (Apache, Nginx, Postfix, MySQL, etc.). Implement and monitor IT security measures including firewalls, antivirus, and access policies. Perform system backups, restore processes, and support disaster recovery plans. Support virtualization platforms (VMware, Hyper-V) and assist with basic cloud infrastructure (AWS, Azure). Automate tasks using PowerShell or Bash scripting. Document IT procedures, configurations, and network diagrams. Required Skills & Qualifications: Proven Experience in IT system administration, networking, and server management. Hands-on Knowledge of networking protocols, IP addressing, subnetting, and VPNs. Experience with network devices such as routers, switches, and firewalls. Proficient in Windows Server (Active Directory, Group Policies, DNS, DHCP) and Linux administration (Ubuntu, CentOS, RHEL). In-depth knowledge of server administration , including web servers (Apache, Nginx), databases (MySQL, PostgreSQL), and mail servers (Postfix, Exchange). Experience with package management tools (apt, yum, dnf, rpm). Familiarity with cloud platforms (AWS, Azure) and virtualization tools (VMware, Hyper-V). Strong understanding of IT security practices , including firewalls, antivirus, VPNs, and access management. Scripting skills for automation (PowerShell, Bash). Excellent problem-solving and troubleshooting abilities. Preferred Certifications: CompTIA Network+ CompTIA Security+ Microsoft Certified: Windows Server / Azure Administrator Cisco Certified Network Associate (CCNA) Red Hat Certified System Administrator (RHCSA) ITIL Foundation (For IT Service Management) Additional Skills (Good to Have): Experience with containerization technologies (Docker, Kubernetes). Knowledge of Version Control Systems (Git). Why Join Us: Competitive salary and performance-based incentives Dynamic and collaborative work environment Opportunities for learning and growth Exposure to cutting-edge technologies and industry trends Show more Show less

Posted 1 week ago

Apply

3.0 years

0 Lacs

Thiruvananthapuram, Kerala, India

On-site

Linkedin logo

Role: Technical Executive - Network & Web Security Location: Thiruvananthapuram, Kerala, India Experience: 3 - 5 Years Salary Range: INR 12,00,000 - 14,00,000 per annum Notice Period: Immediate to 30 Day’s About Company: It one of the leading Digital Systems & Services Integrator company in South Asia. We accelerate Customer’s Business Transformation Journey through our competence in Consulting, Integration and Security, delivering Next-Gen Digital Infrastructure Technologies, Solutions and Services. About The Role We are seeking a highly skilled and proactive Technical Executive specializing in Network and Web Security to join our team in Thiruvananthapuram . This role is crucial for ensuring the secure operation of web gateways, zero-trust environments, and data loss prevention (DLP) solutions. You will be responsible for implementing, supporting, and troubleshooting advanced security solutions, working closely with various teams to maintain high standards of security and operational excellence. Responsibilities & Key Performance Indicators (KPIs) Configuration Management: Create, verify, and manage configuration changes to Secure Web Gateway (SWG), zero-trust, and Data Loss Prevention (DLP) solutions. Incident Resolution: Provide advanced troubleshooting and effective resolution of network and web security incidents. Root Cause Analysis (RCA): Perform detailed Root Cause Analysis for recurring issues and implement comprehensive corrective and preventive actions to enhance system stability. Collaboration & Improvement: Collaborate effectively with Original Equipment Manufacturers (OEMs) and other technical teams for complex issue resolution, system enhancements, and continuous improvements. Meeting Participation: Actively participate in quarterly and monthly review meetings to discuss deployment status, new features, and ongoing Business As Usual (BAU) operations. Documentation: Develop and maintain detailed documentation, including cookbooks, run books, Standard Operating Procedures (SOPs), and configuration guides, ensuring knowledge transfer and operational efficiency. Integration Support: Support the integration of the Security Service Edge (SSE) platform with other technologies and cloud solutions to build a cohesive security ecosystem. Continuous Learning: Proactively upskill with any new or added features released by OEMs, ensuring you stay updated with the latest security technologies and trends. Escalation Handling: Demonstrate flexibility and readiness to work during escalations, providing timely and effective support to resolve critical issues. Must-Have Skills Networking Fundamentals: Strong understanding of networking concepts, including TCP/IP, routing, and firewalls. Zero-Trust Architecture: Solid understanding and practical experience with zero-trust architecture principles for web security. Secure Web Gateway & DLP: Proven experience in the implementation and support of Secure Web Gateway (SWG) and Data Loss Prevention (DLP) solutions. Troubleshooting Expertise: Hands-on experience with troubleshooting complex network and security issues. Incident Management: Experience with incident management, Root Cause Analysis (RCA), and forensic activities in a security context. System Management: Proficiency in performing system updates, upgrades, and configuration management for security tools. Zscaler Proficiency: Direct experience with Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) platforms. Certification (Preferred): Zscaler certification. Good-to-Have Skills Strong analytical and problem-solving skills. Excellent communication and documentation skills. Other relevant security certifications (e.g., CompTIA Security+, CCNA Security, CISSP). Academic Qualifications Graduate (bachelor’s degree in a relevant field such as Computer Science, Information Technology, or Engineering is preferred). Skills: zero-trust architecture,networking fundamentals,troubleshooting expertise,technical executive - network & web security,secure web gateway & dlp,tcp/ip, routing, and firewalls,secure web gateway,data loss prevention,incident management,zscaler proficiency,system management,zscaler certification Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

Roles & Responsibilities: Professional Services Delivery Network Security Engineer L4 Network Security Engineer L4: Key Responsibilities Proven expertise in configuring and managing Cisco ASA, Palo Alto, Fortinet & Juniper firewalls Firewall & Security: Advanced configuration and troubleshooting of firewalls (Cisco ASA, Palo Alto, Fortinet), VPNs (IPSec, SSL), IDS/IPS Demonstrated ability to implement advanced features on Palo Alto firewalls, including converting Layer 4 to Layer 7 traffic Hands-on experience with F5 Load Balancers and NetScaler Load Balancing & Redundancy: Implementing solutions using F5, Citrix NetScaler, HA/Failover systems Demonstrated ability to manage and execute complex firewall migrations and load balancer migrations in dynamic environments , ensuring minimal disruption and adherence to best practices. Routing & Switching: Deep expertise with protocols like BGP, OSPF, EIGRP, MPLS, STP, VXLAN, etc NSX,CDN,CASB, SD-WAN / SDN: Deep knowledge of software-defined networking platforms (Cisco SD-WAN, VMware NSX) Network Automation: Scripting (Python, Ansible, Terraform) to automate configurations and monitoring Lead the design, implementation of firewall and load balancing solutions for clients Create and review all technical diagrams of infrastructure using Visio or Smart draw Work directly with Clients/PMs to understand their network security needs and translate them into effective technical solutions Stakeholder Communication: Translating technical issues into business-impact language for management or clients Knowledge of NSX,CDN,CASB will be added advantage Linux & Virtualization skills will be added advantage Preferred Certifications: Cisco Certified Network Professional (CCNP Security) or equivalent, CCIE or equivalent Palo Alto Networks Certified Network Security Engineer (PCNSE) or equivalent F5 Certified Administrator or equivalent certification CompTIA: Network+, Security+ Linux & Virtualization certifications will be added advantage Full project life-cycle experience and knowledge of best-practice project methodologies Stakeholder Communication: Translating technical issues into business-impact language for management or clients. Show more Show less

Posted 1 week ago

Apply

3.0 - 5.0 years

12 - 15 Lacs

Hyderabad, Chennai

Work from Office

Naukri logo

Preferred Candidate Profile:- Bachelors degree in Computer Science, Information Security, or related field. 3-6 years of experience in DevOps or Security Engineering roles. Relevant certifications such as CISSP, CEH, Security+ (preferred). Hands-on experience with cloud security across AWS, Azure, or GCP . Proficiency in scripting languages such as Python, Java, or Bash . Strong understanding of DevSecOps practices , threat modeling, and risk assessment. Excellent problem-solving skills and the ability to work in a fast-paced, collaborative environment.

Posted 1 week ago

Apply

0 years

0 Lacs

Kanayannur, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cyber Governance Risk and Compliance Consultant - Senior The opportunity This is a role where no two days are the same – so you’ll find yourself taking on plenty of new responsibilities as you go. You’ll work alongside clients and colleagues, balancing your time between developing security strategies, designing security and privacy controls, advising client stakeholders, facilitating workshops and supporting business development. Your Key Responsibilities As a Cyber GRC Professional in our Cyber Security practice, you will be occupied in the following domains: a) Strategy, b) Risk, c) Compliance. As part of our team strategy you will be expected to take on responsibility and initiative early, providing you with real experience working with a wide range of major clients in EY. You will be taking responsibility for the quality of your work, while continually developing your personal and professional skills through formal training, hands-on experience and coaching. Skills And Attributes For Success To qualify for the role, you must have: Degree, or equivalent, in Information Security, Cyber Security, Information Technology, Informatics, or other similar and technical areas Evidence of self-motivation to continuously develop in the areas of cybersecurity Good organizational and time management skills with the ability to prioritize and complete multiple complex projects under tight deadlines Ability to translate security issues into business risks Excellent interpersonal skills and ability to work effectively within a team at all hierarchical levels Willingness to research client inquiries and emerging issues, including regulations, industry practices, and new technologies Experience, knowledge and strong interest in information and cyber security domains are essential for this role Experience on Cyber Governance, Risk & Compliance (GRC), Cyber risk assessments & management methodologies Experience on assessing, designing and implementing security strategies, governance frameworks over processes and controls, allowing organisations to optimally manage cyber security Experience on design and implementation of security policies, procedures, standards and controls in line with regulation and/or current standards, such as ISO27001, NIST, SANS etc. Experience in data classification exercises and controls / mechanisms enforcement Working knowledge of control frameworks such as ISO 27001/27002, COBIT, NIST, ITIL, etc. Ability to conduct Security regulatory and compliance assessment independently Hands on with assessment report preparation and presenting to senior technical and business stakeholders Hand on knowledge of excel, PowerPoint and word Articulative and confident in presentation to senior stakeholders Ability to lead workstreams or dedicated portions of projects Cyber maturity assessments, recommendations, roadmap and strategy creation knowledge of use of and risks related to modern and emerging technologies Cybersecurity audit Ability to plan and deliver cyber security training and awareness Ideally, you’ll also have: Security-related qualifications / certifications such as CISSP, SSCP, CISM, ISO27001 lead implementer or auditor, CompTIA Security+, are desirable Experience in Third Party Risk Management (TPRM) and / or vendor risk assessment engagements Experience in design and implementation of Information Security Management Systems (i.e. security policies, procedures and guidelines) according to leading International Standards Security-related vendor / technology certifications are desirable EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. Encryption Engineer Today’s world is fueled by vast amounts of information which makes data more valuable than ever before. Best security practices have informed many organizations to take full control of their cryptographic keys which encrypt data on-premises and in the cloud rather than leaving those responsibilities to cloud providers or third-party companies. Protecting data in information systems is central to this role, and everyone in EY Information Security has a critical role to play. Join a global team of almost 900 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Encryption Engineer will be a member of the Cryptography team within the Information Security Identity and Access Management Services (IAMS) team. This Engineer will deploy, configure and maintain a centralized key management tool and ensure that storage of sensitive key material reside only in a Hardware Security Module (HSM). Your Key Responsibilities Deploy and configure enterprise key management and HSM tools, which will centralize key lifecycle administration across the global EY platform for data at rest and data in transit. Your responsibilities include: Deploy and configure the Firm’s enterprise key management tools. Deploy and configure the Firm’s Hardware Security Module. Implement process automations as it relates to enterprise key management and HSM administration. Maintain and update the enterprise key management tools to support new business requirements while maintaining the fundamentals of a centralised key management service. Support integration of HSMs to support Apache, Nginx, Windows IIS and Java keystores. Support cloud application teams in centralizing storage of sensitive key material in proprietary repositories such as Azure Key Vault (AKV) and Goggle Cloud Key Management Services while aligning to the overall EY key management strategy. Provide Level 3 and 4 support to operational team on key management which has a direct impact of the Recovery Time Objective (RTO). Document operational procedures for deployment and configuration of security appliance. Update system configuration runbook regularly. Lead HSM engineering and enterprise key management efforts across the internal infrastructure and cloud environments. Work with cross functional teams and collaborate with IAM Operations. Research on impact of future computer security standard such as Federal Information Processing Standard 140-3 (FIPS 140-3), Cryptographic Module Validation Program (CMVP), Common Criteria (ISO/IEC 15408) on EY KMS strategy. Research on business problems that can be solved by a quantum computer faster than a classical computer and suggest areas in EY KMS strategy which require updates. Provide subject matter expertise on HSM, FIPS, CMVP, ISO/IEC 15408 to project teams, and other audiences as needed Skills And Attributes For Success A successful candidate for this role impacts EY business by deploying and configuring security tools recommended in EY key management strategy. As such, candidates must possess: Experience with Key Management Life Cycle - Key Generation, Storage, Distribution, Backup, Rotation, Revocation, Destruction, etc. Experience with major enterprise key management system as well as cloud based key management services Hands on experience and knowledge of TLS, PKI, HSMs, KMIP, Digital Certificate Management, Azure Key Vault, and transparent database encryption Experience with FIPS 140-2 compliance requirements and implementation Experience in security key management, security standards, cryptography, certificate management lifecycle and PKI Understanding of cloud computing architecture, technical design, and implementation To qualify for the role, you must have Degree in Computer Science, Computer Engineering or 5 years Security Engineering Experience or equivalent 3+ years’ experience in enterprise key management, HSM configuration, application layer encryption, and transparent data encryption Ideally, you’ll also have Experience working with diverse, globally distributed teams Ability to work well in a highly matrixed environment yet builds credibility to drive execution outside of direct chain of command while working across all organizational levels. Strong analytical and problem-solving skills. A security industry certification such as Security+, Network+, Cryptography Certification. Ability to work independently or with a team, under minimum supervision What We Look For A successful candidate for this role would be expected to think like an Engineer. Thinking like an engineer means looking at situations from multiple lenses. It means persistence, originality and apply technical concepts rather than popular opinion. Networking with key stakeholders and sponsors, cross-teaming across the organization is required for this role, as such we would look out for relationship builder. As an engineer slowing down to enjoy the process rather than fixating on its conclusion is key in this role. What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Confidence: We will provide you the insights, coaching and self-assurance in your decision making that the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories. Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. Encryption Engineer Today’s world is fueled by vast amounts of information which makes data more valuable than ever before. Best security practices have informed many organizations to take full control of their cryptographic keys which encrypt data on-premises and in the cloud rather than leaving those responsibilities to cloud providers or third-party companies. Protecting data in information systems is central to this role, and everyone in EY Information Security has a critical role to play. Join a global team of almost 900 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Encryption Engineer will be a member of the Cryptography team within the Information Security Identity and Access Management Services (IAMS) team. This Engineer will deploy, configure and maintain a centralized key management tool and ensure that storage of sensitive key material reside only in a Hardware Security Module (HSM). Your Key Responsibilities Deploy and configure enterprise key management and HSM tools, which will centralize key lifecycle administration across the global EY platform for data at rest and data in transit. Your responsibilities include: Deploy and configure the Firm’s enterprise key management tools. Deploy and configure the Firm’s Hardware Security Module. Implement process automations as it relates to enterprise key management and HSM administration. Maintain and update the enterprise key management tools to support new business requirements while maintaining the fundamentals of a centralised key management service. Support integration of HSMs to support Apache, Nginx, Windows IIS and Java keystores. Support cloud application teams in centralizing storage of sensitive key material in proprietary repositories such as Azure Key Vault (AKV) and Goggle Cloud Key Management Services while aligning to the overall EY key management strategy. Provide Level 3 and 4 support to operational team on key management which has a direct impact of the Recovery Time Objective (RTO). Document operational procedures for deployment and configuration of security appliance. Update system configuration runbook regularly. Lead HSM engineering and enterprise key management efforts across the internal infrastructure and cloud environments. Work with cross functional teams and collaborate with IAM Operations. Research on impact of future computer security standard such as Federal Information Processing Standard 140-3 (FIPS 140-3), Cryptographic Module Validation Program (CMVP), Common Criteria (ISO/IEC 15408) on EY KMS strategy. Research on business problems that can be solved by a quantum computer faster than a classical computer and suggest areas in EY KMS strategy which require updates. Provide subject matter expertise on HSM, FIPS, CMVP, ISO/IEC 15408 to project teams, and other audiences as needed Skills And Attributes For Success A successful candidate for this role impacts EY business by deploying and configuring security tools recommended in EY key management strategy. As such, candidates must possess: Experience with Key Management Life Cycle - Key Generation, Storage, Distribution, Backup, Rotation, Revocation, Destruction, etc. Experience with major enterprise key management system as well as cloud based key management services Hands on experience and knowledge of TLS, PKI, HSMs, KMIP, Digital Certificate Management, Azure Key Vault, and transparent database encryption Experience with FIPS 140-2 compliance requirements and implementation Experience in security key management, security standards, cryptography, certificate management lifecycle and PKI Understanding of cloud computing architecture, technical design, and implementation To qualify for the role, you must have Degree in Computer Science, Computer Engineering or 5 years Security Engineering Experience or equivalent 3+ years’ experience in enterprise key management, HSM configuration, application layer encryption, and transparent data encryption Ideally, you’ll also have Experience working with diverse, globally distributed teams Ability to work well in a highly matrixed environment yet builds credibility to drive execution outside of direct chain of command while working across all organizational levels. Strong analytical and problem-solving skills. A security industry certification such as Security+, Network+, Cryptography Certification. Ability to work independently or with a team, under minimum supervision What We Look For A successful candidate for this role would be expected to think like an Engineer. Thinking like an engineer means looking at situations from multiple lenses. It means persistence, originality and apply technical concepts rather than popular opinion. Networking with key stakeholders and sponsors, cross-teaming across the organization is required for this role, as such we would look out for relationship builder. As an engineer slowing down to enjoy the process rather than fixating on its conclusion is key in this role. What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Confidence: We will provide you the insights, coaching and self-assurance in your decision making that the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Karnataka, India

On-site

Linkedin logo

About BPM: BPM is a full-service accounting firm providing comprehensive assurance, tax, and consulting services to clients globally. We are one of the largest California-based accounting firms and have built our success by focusing on our clients and our people. Our client base encompasses a complex array of sophisticated clients that keep our staff intellectually challenged every day. Our people-centered culture and firm motto “Because People Matter” has allowed us to be consistently recognized as one of the Best Places to Work in the Bay Area. We are dedicated to providing meaningful careers for all of our employees along with fostering an environment that allows an integrated lifestyle. Our flexible culture allows our professionals to live a balanced lifestyle between their work responsibilities and personal commitments. Burr Pilger Mayer India Pvt. Ltd. (BPM India) is a subsidiary of BPM LLP. Founded in 1986, BPM is one of the largest California-based accounting and consulting firms, ranking in the top 35 in the country. With 14 different office locations, BPM serves emerging and mid-cap businesses as well as high-net-worth individuals in a broad range of industries, including financial services, technology, life science, manufacturing, food, wine and craft brewing, automotive, nonprofits, real estate and construction. The Firm’s International Tax Practice is one of the largest on the West Coast and its well-recognized SEC practice serves approximately 35 public reporting companies, mostly in the technology industry. About the role: The IT Security Analyst performs two core functions for BPM. The first is the day-to-day operations of the in-place security solutions, while the second is identifying, investigating, and resolving security incidents detected by those systems. Secondary tasks may include implementing new security solutions, creating and maintaining policies, standards, baselines, guidelines, and procedures, conducting vulnerability audits and assessments, and assisting with E-Discovery. The IT Security Analyst is expected to be fully aware of the enterprise’s security goals established by its stated policies, procedures, and guidelines and to uphold those goals. Responsibilities: Strategy & Planning Participate in the planning and design of enterprise security architecture under the direction of the IT Security Manager, where appropriate. Participate in creating and maintaining enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager, where appropriate. Acquisition & Deployment Maintain up-to-date detailed knowledge of the IT security industry, including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors. Recommend additional security solutions or enhancements to existing solutions to improve overall enterprise security. Deploy, integrate, and initial configure all new security solutions and enhancements to existing security solutions, following standard best operating procedures generically and the enterprise’s security documents specifically. Operational Management Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether under direct control (i.e., security tools) or not (e.g., workstations, servers, network devices). Maintain operational configurations of all in-place security solutions per the established baselines. Monitor all in-place security solutions for efficient and appropriate operations. Review logs and reports of all in-place devices, whether they are under direct control (i.e., security tools) or not (e.g., workstations, servers, network devices). Interpret the implications of that activity and devise plans for appropriate resolution. Participate in investigations into problematic activity. Participate in E-Discovery projects. Participate in the design and execution of vulnerability assessments, penetration tests, and security audits. Provide on-call support for end users for all in-place security solutions. Position Requirements: College diploma or university degree in Computer Science and/or two years equivalent work experience. One or more of the following certifications: GIAC Information Security Fundamentals Microsoft Certified Systems Administrator: Security GIAC Certified Intrusion Analyst Certification (GCIA) Associate of (ISC)2 Palo Alto Network Certified Network Security Engineer CompTIA Security+ Knowledge & Experience: Extensive experience working in a SOC environment or handling incidents and breaches. Experience with Palo Alto firewalls, intrusion detection systems, intrusion prevention systems, anti-virus software, data encryption, and other industry-standard techniques and practices. Working technical knowledge of network, PC, and platform operating systems Strong understanding of networking, including network traffic analysis. Familiarity with switches, routers, and Firewalls. Experience with current systems software, protocols, and standards. Experience in E-Discovery, including content searches and relevant procedures and practices. Strong understanding of applicable practices and laws relating to data privacy and protection. Personal Attributes: Proven analytical and problem-solving abilities. Ability to effectively prioritize and execute tasks in a high-pressure environment. Good written, oral, and interpersonal communication skills. Ability to conduct research into IT security issues and products as required. Ability to present ideas in business-friendly and user-friendly language. Highly self-motivated and directed. Keen attention to detail. Team-oriented and skilled in working within a collaborative environment. Show more Show less

Posted 1 week ago

Apply

Exploring Security+ Jobs in India

Security+ is a highly sought-after certification in the IT industry, especially in the field of cybersecurity. In India, the demand for security+ professionals is on the rise as companies focus on enhancing their security measures to protect sensitive data and prevent cyber attacks. Job seekers with security+ certification have a competitive edge in the job market and can explore various opportunities in this field.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Mumbai
  5. Delhi

These cities are known for their thriving IT industries and offer numerous job opportunities for security+ professionals.

Average Salary Range

The average salary range for security+ professionals in India varies based on experience and expertise. Entry-level positions may offer salaries ranging from INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 10-15 lakhs per annum.

Career Path

A typical career progression in the security+ field may include roles such as: - Junior Security Analyst - Security Consultant - Security Architect - Chief Information Security Officer

As professionals gain experience and expertise, they can move up the career ladder and take on more challenging and rewarding roles.

Related Skills

In addition to security+, professionals in this field are often expected to have skills in: - Network Security - Information Security Management - Penetration Testing - Risk Assessment - Incident Response

Having a combination of these skills can enhance job prospects and open up more opportunities in the cybersecurity domain.

Interview Questions

  • What is the difference between symmetric and asymmetric encryption? (medium)
  • Explain the concept of a firewall and its importance in network security. (basic)
  • How do you handle a security breach in an organization? (advanced)
  • What is the role of encryption in data security? (basic)
  • Can you explain the concept of zero-day vulnerability? (medium)
  • How would you secure a wireless network from potential threats? (medium)
  • Describe the steps involved in a security risk assessment. (advanced)
  • What are the common types of cyber attacks and how can they be prevented? (medium)
  • Explain the concept of multi-factor authentication. (basic)
  • How do you stay updated with the latest security trends and technologies? (basic)
  • What is the importance of regular security audits in an organization? (medium)
  • How would you respond to a ransomware attack on a company's systems? (advanced)
  • Can you explain the concept of a VPN and its role in securing network communications? (basic)
  • Describe the process of conducting a penetration test on a system. (medium)
  • How do you ensure compliance with data protection regulations such as GDPR? (advanced)
  • What is the role of a Security Information and Event Management (SIEM) system in cybersecurity? (medium)
  • How would you secure an IoT (Internet of Things) device from potential security threats? (medium)
  • Explain the concept of social engineering in the context of cybersecurity. (basic)
  • What are the key elements of a cybersecurity policy for an organization? (basic)
  • How do you prioritize security vulnerabilities for remediation in a large-scale network? (advanced)
  • Can you explain the difference between white-box and black-box testing in security assessments? (medium)
  • Describe a recent security project you worked on and the challenges you faced. (advanced)
  • How would you educate employees in an organization about the importance of cybersecurity? (basic)
  • What steps would you take to secure a cloud-based infrastructure from cyber threats? (medium)
  • How do you handle sensitive data securely in a remote work environment? (basic)

Closing Remark

As you explore job opportunities in the security+ domain in India, remember to showcase your skills, knowledge, and experience confidently during interviews. Prepare well, stay updated with the latest trends in cybersecurity, and showcase your passion for securing digital assets. With dedication and perseverance, you can build a successful career in the dynamic field of cybersecurity. Good luck with your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies