Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 6.0 years
0 Lacs
chennai, tamil nadu
On-site
The Applications Development Intermediate Programmer Analyst position is an intermediate level role where you will be responsible for participating in the establishment and implementation of new or revised application systems and programs in coordination with the Technology team. Your main objective will be to contribute to applications systems analysis and programming activities. Your responsibilities will include utilizing your knowledge of applications development procedures and concepts to identify necessary system enhancements, consulting with users and recommending programming solutions, analyzing applications for vulnerabilities and security issues, and serving as an advisor to lower level analysts. You will also be expected to identify problems, make evaluative judgements, and implement solutions with limited supervision. As an Intermediate Programmer Analyst, you should have 2-5 years of relevant experience in the Financial Service industry, intermediate level experience in Applications Development, clear and concise communication skills, problem-solving abilities, and the capacity to work under pressure and manage deadlines effectively. The ideal candidate will have a Bachelor's degree or equivalent experience. This job description serves as a high-level overview of the responsibilities involved, and additional duties may be assigned as needed. Please note that this position falls under the Technology Job Family Group, specifically in the Applications Development Job Family, and is a full-time role. If you have a disability and require accommodations to utilize our search tools or apply for a career opportunity, please review Accessibility at Citi. For more information on Citigroup's EEO Policy Statement and your rights, please refer to the respective documents.,
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
navi mumbai, maharashtra
On-site
You will be responsible for managing Information Security Projects, Audits, assessments, and other related activities. This includes performing Technology Risk Assessments for processes and technologies, as well as developing and reviewing Information Security (IS) standards and guidelines for new technologies. You will conduct periodic audits and assessments as per the Infosec calendar. Your role will involve setting IS Standards, Checklists, and Guidelines such as IS guidelines and any supporting templates, Standards for Technology Risk Assessments (TRA), and managing internal/third-party Ethical hacking/Vulnerability Assessment/Penetration Testing, Red Team assessment activities. You will create methodologies/checklists for performing TRA and establish approval matrices based on the results. Additionally, you will be responsible for BCP/DR standards, Application security, Vendor risk assessment standards, IS-related training standards, and Security testing baselines. You will liaise with business teams to define roles within each application based on business requirements and review training/skill set requirements for the SOC/LAM/DLP teams. Your tasks will include performing daily InfoSec operational activities like FnF Clearance, approvals, and conducting or participating in Cyber security drills as required. You will monitor and manage Information/Cyber Security Incidents, assign detailed responsibilities and action steps during cyber crises, and identify active risks and threat vectors related to cyber crises. Moreover, you will support response and investigation activities during cyber crises, review regulatory impact and compliance obligations, and handle any other tasks, activities, or projects delegated by the Chief Risk Officer (CRO) or Chief Information Security Officer (CISO).,
Posted 1 week ago
8.0 - 10.0 years
4 - 8 Lacs
Faridabad
Work from Office
.Candidate should have 8-10 years of experience in SAP S/4 HANA ,GRC,BOBJ,BW/4HANA,HANA security and IBP security. 2.Experience in S/4 HANA Fiori role administration and troubleshooting Fiori access issues. 3.Working experience on SAP HANA Database security user administration and role administration. 4.Design, Develop and maintain BW row level security (Analysis Authorizations) and roles. 5.Experience in design and development of HANA analytical/SQL privileges based on BW models. 6.Design and create HANA roles for access to analytical and object privileges 7.Develop and maintain SAP Business Objects security (BO ) and integration with BW 8.Transportation of Security Objects/Roles within HANA Landscape Design. 9.Experience in user administration and roles administration of IBP application. 10.Experience in Permission and attribute filters for IBP roles. 11.Experience in SAP GRC Access Controls is preferred. .Candidate should have 8-10 years of experience in SAP S/4 HANA ,GRC,BOBJ,BW/4HANA,HANA security and IBP security. 2.Experience in S/4 HANA Fiori role administration and troubleshooting Fiori access issues. 3.Working experience on SAP HANA Database security user administration and role administration. 4.Design, Develop and maintain BW row level security (Analysis Authorizations) and roles. 5.Experience in design and development of HANA analytical/SQL privileges based on BW models. 6.Design and create HANA roles for access to analytical and object privileges 7.Develop and maintain SAP Business Objects security (BO ) and integration with BW 8.Transportation of Security Objects/Roles within HANA Landscape Design. 9.Experience in user administration and roles administration of IBP application. 10.Experience in Permission and attribute filters for IBP roles. 11.Experience in SAP GRC Access Controls is preferred.
Posted 1 week ago
5.0 - 8.0 years
5 - 8 Lacs
Hyderabad, Telangana, India
On-site
Responsibilities Conduct varied security reviews and assessments to ensure compliance with enterprise standards. Apply security judgment to approve/deny/escalate requests based on risk and policy alignment. Collaborate with internal teams, vendors, and business units to provide security guidance and facilitate informed decision-making. Identify and implement opportunities to automate workflows, streamline processes, and improve operational efficiency Develop an understanding of Google's internal security frameworks, controls, and policies. Minimum qualifications: Bachelor's degree or equivalent practical experience. 2 years of experience in analyzing cyber threats. Experience in security analysis, security assessment, risk analysis. Preferred qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. 5 years of experience in security operations or assurance. Experience in automation and cybersecurity. Experience in conducting security assessments or reviews to assess underlying risk. Proficiency in automation, process optimization, and security tools to improve assessment efficiency. Excellent written and verbal communication skills for clear and concise reporting.
Posted 1 week ago
3.0 - 5.0 years
15 - 25 Lacs
Bengaluru
Work from Office
Role Overview: The OT Security Analyst – Level 2 (L2) plays a pivotal role in defending operational technology (OT) environments against evolving cyber threats. This role requires a deep understanding of security incident analysis, threat detection, and incident response, specifically tailored to Industrial Control Systems (ICS) and OT networks. The analyst will investigate complex security incidents within the OT infrastructure, collaborate with IT/OT teams, and enhance security posture through actionable insights. ________________________________________ Key Responsibilities: • Conduct in-depth analysis of security events and incidents within OT environments, leveraging SIEM and OT-specific monitoring tools. • Perform root cause analysis and develop incident timelines to support forensics and remediation efforts. • Apply standard incident response frameworks (e.g., NIST, MITRE ATT&CK for ICS, Cyber Kill Chain) for threat classification and response. • Use threat intelligence platforms and sandbox environments to investigate malware and suspicious artifacts in OT networks. • Analyze access logs, network traffic, and protocol behaviours across OT systems (e.g., SCADA, DCS, PLCs). • Support investigations related to unauthorized device communications, anomalous behaviours, or compromised industrial assets. • Collaborate with OT security engineers and external vendors to escalate and remediate incidents. • Refine alert rules and detection logic to reduce false positives and improve signal-to-noise ratio in OT SOC operations. • Document incident findings and support continuous improvement of the OT SOC playbooks and knowledgebase. • Liaise with the IT SOC and CIR (Cyber Incident Response) teams to align incident handling and cross-domain investigations. • Participate in threat hunting activities tailored for OT environments using behavioural analysis and attack-path simulation. ________________________________________ Technical Skills & Knowledge: • Strong understanding of OT/ICS protocols (Modbus, DNP3, OPC, etc.) and industrial network topologies. • Hands-on experience with OT cybersecurity tools and platforms (e.g., Nozomi Networks, Claroty, Dragos). • Familiar with ISA/IEC 62443, NIST SP 800-82, NIST CSF, and ISO 27001 compliance requirements for OT. • Proficiency in using SIEM systems (e.g., Microsoft Sentinel, Splunk, QRadar) for log correlation and event triage. • Understanding of firewalls, WAFs, proxies, and network segmentation principles in OT. • Working knowledge of tools such as THOR Scanner, VMRay, or Recorded Future is a plus. • Experience in vulnerability management and patch advisory for OT assets with limited patch cycles. ________________________________________ Nice to Have: • Exposure to Red Team/Blue Team exercises focused on OT/ICS. • Familiarity with GRC platforms and risk assessment tools tailored to OT.
Posted 1 week ago
3.0 - 5.0 years
5 - 9 Lacs
Bengaluru
Work from Office
The ideal candidate will have a strong background in IT Services & Consulting and excellent analytical skills. Roles and Responsibility Collaborate with cross-functional teams to identify and prioritize project requirements. Develop and maintain complex data models and reports using various tools and technologies. Analyze large datasets to extract insights and trends, and provide recommendations to stakeholders. Design and implement process improvements to increase efficiency and productivity. Develop and maintain technical documentation for projects and processes. Provide training and support to junior team members on new tools and technologies. Job Requirements Strong understanding of IT Services & Consulting industry trends and technologies. Excellent analytical and problem-solving skills with attention to detail. Ability to work collaboratively in a team environment and communicate effectively with stakeholders. Strong technical skills including data modeling, reporting, and visualization. Experience with process improvement methodologies and tools. Strong technical documentation and communication skills. Mandatory Skills: IDAM Security Consulting. Experience: 3-5 Years.
Posted 1 week ago
5.0 - 6.0 years
4 - 8 Lacs
Navi Mumbai
Work from Office
Job Role: Information Security L2 Experience: 5 to 6 Experience. Hands-on Experience on Checkpoint firewall 80.xx and cloud guard and Cisco ASA 55XX and FTD. Hands-on Experience on O365 EOP and Email proxys and web proxys. Hands-on Experience on any IPS devices. Hands-on Experience on Mcafee EPO. Hands-on Experience on Cisco umbrella. Experience on working ticketing tool. Good communication & Presenting skill Technical. Aware of Firewall Upgradation process. Maintaining firewalls, virtual private networks, web protocols, and email security. Reporting the security analysis and monitoring findings. Hands-on experience on DC, DR, AWS connectivity. BE / BTech 5/6 yrs experience of the domain
Posted 1 week ago
4.0 - 6.0 years
6 - 10 Lacs
Chennai
Work from Office
Role Description As a Senior DevOps Security Specialist at Incedo, you will be responsible for designing and implementing security solutions for DevOps environments. You will work with development and operations teams to design and implement security solutions that are integrated into the DevOps process. You will be skilled in tools such as GitLab or Jenkins and have experience with security architecture design patterns such as identity and access management and secure coding practices. Roles & Responsibilities: Collaborating with DevOps teams to identify security vulnerabilities and risks Designing and implementing security controls and procedures for DevOps processes Conducting security audits and risk assessments Developing and maintaining security documentation and policies Providing guidance and mentorship to junior DevOps Security Specialists Staying up-to-date with industry trends and best practices in DevOps Security as technologies involved may include Kubernetes, Docker, Terraform, Ansible, Chef, Puppet, Jenkins, Git, AWS, Azure, and Google Cloud Platform. Technical Skills Skills Requirements: Knowledge of security standards and best practices for cloud platforms such as AWS, Azure, or GCP Experience in designing and implementing security controls for CI/CD pipelines and infrastructure Familiarity with security tools such as vulnerability scanners, intrusion detection and prevention systems (IDPS), and firewalls Knowledge of scripting languages such as Python, Bash, or PowerShell Must have excellent communication skills and be able to communicate complex technical information to non-technical stakeholders in a clear and concise manner. Must understand the company's long-term vision and align with it. Provide leadership, guidance, and support to team members, ensuring the successful completion of tasks, and promoting a positive work environment that fosters collaboration and productivity, taking responsibility of the whole team. Nice-to-have skills Qualifications 4-6 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
telangana
On-site
As the market leader in the asset servicing sector since our inception in 1948, Citco has been at the forefront of innovation and expansion, shaping the future of the industry. From initially working with hedge funds to now serving all alternatives, corporations, and private clients, our organization has experienced significant growth across asset classes and geographies. This pattern of progress is something we are committed to maintaining as we move forward, always placing a high priority on our performance. Therefore, if you are seeking to excel in your field and be a pioneer in the industry, we extend a warm welcome to Citco. Fund Administration is at the core of Citco's business, and our alternative asset and accounting services are highly respected in the industry. Our continuous investment in learning and technology solutions ensures that our team is well-equipped to deliver a seamless client experience. Your role at Citco will involve providing US tax compliance services for private equity funds or hedge funds, and investment partnership clients with various investment strategies and fund structures. You will be responsible for tasks such as computing taxable income and tax adjustments, conducting security analysis, tax allocations, preparation of US tax forms, analyzing transactions for US tax consequences, handling tax reporting for investors and tax filings, interfacing with other areas of the firm, contributing to the delivery of Schedule K1s to investors in a timely manner, developing knowledge of US business tax, delivering high-quality products, working on various projects within the tax department, being cross-trained, and assisting in special projects as needed. To excel in this role, you should hold a degree in Accounting, Finance, Economics, or a related discipline, be fluent in English (both written and verbal), possess strong skills in MS Excel including familiarity with formulas, macros, and pivot tables, have the ability to quickly learn various software applications, and be a proactive team player with excellent communication skills. At Citco, we value your well-being and offer a range of benefits, training, education support, and flexible working arrangements to help you succeed in your career while maintaining a healthy work-life balance. We are committed to diversity and inclusive hiring practices, welcoming applications from individuals from diverse backgrounds. Additionally, we encourage people with disabilities to apply, and accommodations are available upon request for candidates participating in the selection process.,
Posted 1 week ago
6.0 - 10.0 years
0 Lacs
noida, uttar pradesh
On-site
You will be joining NTT DATA as an Information Security-Management - Security Analysis Specialist Advisor in Noida, Uttar Pradesh (IN-UP), India (IN). In this role, you will be responsible for ensuring the seamless delivery of all information security services to the customer. Your key duties will include delivering information security services in compliance with contracts and standards, assisting clients in defining and implementing security policies, strategies, and procedures, and participating in strategic design processes to align security with business requirements. Additionally, you will support the implementation of security governance frameworks, collaborate with clients to review and monitor adherence to security policies and standards, and facilitate audits to ensure compliance. Your role will also involve performing risk reviews, developing risk treatment plans, and incorporating threat intelligence into risk management strategies. You will be expected to drive remediation efforts related to information security, identify weaknesses in current operations, and ensure information security operations meet standards. To qualify for this role, you should have at least 6 years of relevant experience, knowledge of standards/regulations impacting information security, and experience with internal and external audits. Preferred qualifications include certifications such as CISSP, SSCP, CISM, or CEH, customer relationship management experience, and knowledge of systems and network administration. NTT DATA is a trusted global innovator of business and technology services, serving 75% of the Fortune Global 100. As a Global Top Employer, NTT DATA is committed to helping clients innovate, optimize, and transform for long-term success. With experts in more than 50 countries and a robust partner ecosystem, NTT DATA offers services in consulting, data and artificial intelligence, industry solutions, and digital infrastructure. As a part of the NTT Group, NTT DATA invests in R&D to support organizations and society in moving confidently into the digital future. Visit us at us.nttdata.com.,
Posted 2 weeks ago
6.0 - 10.0 years
0 Lacs
pune, maharashtra
On-site
As an Information Security-Management - Security Analysis Specialist Advisor at NTT DATA, your primary responsibility is to ensure the seamless delivery of all information security services provided to the customer. You will collaborate with clients to understand, anticipate, and recommend risk mitigation strategies while promoting overall information security protection for the customer's assets. Your role involves aligning information security with the customer's business strategy, security policies, and regulatory requirements to enhance protection and reduce risk. Key Responsibilities: - Deliver information security services to customers in compliance with contractual and regulatory requirements such as ISO, PCI, and SOX. - Assist clients in defining and implementing information security policies, strategies, and procedures to maintain confidentiality, integrity, and availability of their environment and data. - Participate in the strategic design process to translate security and business requirements into operational processes and systems. - Identify, review, and recommend information security improvements aligned with customer business goals. - Support the implementation of security governance frameworks and ensure adherence to security policies, procedures, and standards. - Conduct compliance reviews, prepare for audits, and facilitate audit processes in alignment with client requirements. - Perform risk assessments, develop risk treatment plans, and incorporate threat intelligence into risk management strategies. - Drive remediation efforts related to information security incidents, audits, and assessments. - Identify security weaknesses and gaps in customer operations and work collaboratively to enhance information security standards. - Review service management reports for information security tickets and ensure SLAs are met. Required Qualifications: - 6+ years of relevant experience in information security. - Knowledge of standards and regulations impacting information security (e.g., PCI, HIPAA, SOX). - Applied knowledge of risk management concepts. - Experience with internal and external audits, contract compliance, and quality initiatives. Preferences: - Certification in CISSP, SSCP, CISM, or CEH. - Undergraduate or graduate degree. - Customer relationship management experience at the senior level. - Strong knowledge of systems and network administration, including Active Directory and network security principles. - Thorough understanding of server and desktop configurations for system protection against unauthorized access. About NTT DATA: NTT DATA is a global innovator of business and technology services, serving Fortune Global 100 clients and committed to long-term success through innovation and optimization. With experts in over 50 countries, NTT DATA offers consulting, AI, industry solutions, and digital infrastructure services. As part of the NTT Group, NTT DATA invests in R&D to support organizations in their digital transformation journey. If you are passionate about information security, risk management, and client collaboration, join us at NTT DATA to drive innovation and transformation for our global clients. Apply now to be part of our inclusive and forward-thinking organization in Pune, Maharashtra, India.,
Posted 2 weeks ago
8.0 - 12.0 years
0 Lacs
pune, maharashtra
On-site
As part of Finance, Markets and Credit Risk Technology at Citi, you will play a crucial role in enabling the bank to achieve its day-to-day and long-term growth goals. By providing services, technical solutions, and infrastructure, you will contribute to the execution of Citis Strategy and help the bank comply with regulatory mandates. Your work will empower various businesses within Citi to achieve their current and long-term goals. In Finance, Market and Credit Risk Technology (FMCRT), we are at the forefront of technological innovation. You will be working on products and initiatives that align with Citis strategic architecture principles and facilitate the integration of multiple global functions within the bank, including Finance, Risk, and Controllers. Joining our team means being part of a strategic group that develops, enhances, supports, and maintains solutions for Finance Technology. You will have the opportunity to participate in technical discussions, brainstorming sessions, and contribute ideas and strategies for existing and future platforms. This role offers exposure to Wholesale and Retail business operations across data, risk, and finance. You will work on diverse Finance platforms and contribute to re-architecture and re-platforming initiatives using low code automation platforms. As a key member of the team, your responsibilities will include developing and maintaining Appian applications, understanding their inter-relationships with other systems, and ensuring compliance with core Appian concepts. You will conduct testing, debugging, and write basic code for design specifications. Additionally, you will consult with users, clients, and technology groups, recommend programming solutions, and support customer exposure systems. To excel in this role, you should have 8-12 years of relevant experience in implementing IT solutions using Appian. You must possess intermediate level experience in an Applications Development role and demonstrate clear and concise written and verbal communication skills. Problem-solving, decision-making abilities, and the capacity to work under pressure are essential qualities for success in this position. A Bachelors degree or equivalent experience is required for this role. As you navigate through your daily tasks, you will be expected to identify and resolve issues, assess risks, and act as a subject matter expert for senior stakeholders and team members. By applying your technical expertise and adhering to Citis policies and regulations, you will contribute to safeguarding the firm's reputation and assets. This job description offers a broad overview of the responsibilities involved. Additional job-related duties may be assigned as needed to support the team and the organization's objectives.,
Posted 2 weeks ago
2.0 - 6.0 years
0 Lacs
hyderabad, telangana
On-site
As a member of the Product Security Engineering (PSE) team within the Cloud CISO organization at Google, you will have the opportunity to contribute to ensuring the security of every product shipped by Cloud and enhancing the security assurance levels of the underlying infrastructure. Your role will involve collaborating with product teams to develop more secure products by implementing security measures by design and default, providing tools, patterns, and frameworks, and enhancing the expertise of embedded security leads. Your responsibilities will include researching innovative detection techniques to prevent and mitigate abusive activities such as outbound security attacks, botnet, DDoS, and other malicious behaviors that breach Google Cloud Platform's (GCP) Terms of Service. You will be tasked with developing fidelity detection mechanisms to identify malicious activities based on raw network and host level telemetry, as well as analyzing logs and packets to enhance the accuracy of detections. Additionally, you will be involved in hunting for threats and abusers and responding effectively to safeguard Google and its users from potential attacks. The ideal candidate for this role should possess a Bachelor's degree or equivalent practical experience, with at least 5 years of experience in security analysis, network security, intrusion detection system, threat intelligence, or threat detection. A minimum of 2 years of experience as a technical security professional, particularly in digital forensics or systems administration, is required. Proficiency in executive or customer stakeholder management and communication, along with a data-driven approach to solving information security challenges, is essential. Preferred qualifications for this position include a Master's degree in Computer Science or a related field, knowledge of defensive security concepts such as adversity tactics and techniques, MITRE ATT&CK framework, and logging practices. Familiarity with networking and internet protocols (e.g., TCP/IP, HTTP, SSL) and experience in analyzing malicious network traffic will be advantageous. Strong organizational and multitasking skills are highly desirable for effectively managing responsibilities in a global and cross-functional environment. Join us in our mission to accelerate digital transformation for organizations worldwide through Google Cloud, where we offer enterprise-grade solutions leveraging cutting-edge technology and tools to help developers build sustainably. Become a part of a dynamic team dedicated to protecting Google and its users from potential threats, while maintaining trust and reputation for the brand and company globally.,
Posted 2 weeks ago
4.0 - 9.0 years
7 - 17 Lacs
Bengaluru
Work from Office
About this Role: Wells Fargo is seeking a Senior Information Security Analyst. Responsibilities : This position is a Senior Information Security Analyst performing the role of an Application Security Champion who will be responsible for reviewing security requirements and security design submissions by application teams. Reviewing security requirements and security design submissions by application teams. Submissions will either be approved or rejected based on evaluation and comparison to systems of record. Provide information security consultation to improve awareness and compliance with Enterprise Application Security Program (EASP) policy, processes, and standards. Perform remediation of security assessment review issues and reporting to support EASP risk management. Provide guidance and direction in reviewing assessment findings and mitigating controls to optimize application security. Validate SAST, DAST and SCA scans and recommend the fix for application teams. Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals. Interact with teammates across all Lines of Business. Required Qualifications: 4+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education Desired Skills: 2+ years of experience as application security champion 2+ years of experience in at least one of the following practices like Security Requirements, Application Threat Modeling, Static Analysis, Application Security Risk Assessments, Security Design requirements. Knowledge and experience in identifying and suggesting mitigations to OWASP top 10, CWE/SANS top 25 to development teams. Ability to manage multiple priorities in a fast-paced dynamic environment. Advanced problem solving skills, ability to develop effective long-term solutions to problems. Excellent verbal and written communication skills Excellent inter-personal skills contributing to cordial team environment Knowledge and understanding of secure SDLC (System Development Life Cycle) methodologies. Experience in drafting application security coding standards. Ability to manage highly complex issues and negotiate solutions. Knowledge and understanding of Application security threat management and mitigation domain. Application security experience with banking/financial services applications. Certified in Industry renowned certifications like CISSP, CSSLP, CEH etc. Job Expectations: This position will also be responsible to work with software development partners, business system consultants and LOB leads to perform security assessments on variety of applications to identify security defects and provide remediation recommendation by following the processes and policies. Submissions will either be approved or rejected based on evaluation and comparison to systems of record.
Posted 2 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Bengaluru
Work from Office
Administering and maintaining Deep security systems to ensure the security of IT Infrastructure Monitoring and analysing security alerts to identify potential threats. Ensure proper integration with existing system Troubleshooting and debugging of Problems related to TrendMicro Deep security manager and agent TrendMicro Deep Security Agent management (Agent Installation, Reconciliation, Troubleshooting etc. Fine-tuning of policies in Deep security features such as FIM, Log Inspection, IPS, Firewall, A Developing and updating security policies and procedures related to Deep security (SOP, SCD, NDA etc.) Anti-malware module etc Log monitoring and incident investigation. Maintaining, generating & analysing all deep security related reports Manager version upgradation and capacity management. Should take up with OEM in case of any Deep security related issue reported Ensuring compliance with industry standards, regulations and best practice Mandatory Skills: Antivirus Microsoft EDR XDR Experience : 5-8 Years.
Posted 2 weeks ago
5.0 - 10.0 years
4 - 8 Lacs
Bengaluru
Work from Office
Your role We are looking for an experienced and strategic Detection Engineer across India. The ideal candidate will have a strong background in cybersecurity, detection and Splunk Enterprise Security. Develop and maintain cyber threat detection and hunting capabilities for Organization. Actively research, innovate and uplift in the areas of threat detection and hunting. Develop and maintain attack & use case models against Organizations environment and systems for the purposes of detection and monitoring use cases. Build and maintain continuous validation and assurance of the detection and hunting pipeline. Maximise detection visibility, coverage, and return-on-investment to maintain a defensible architecture across the business. Develop threat/attack models to depict and model detection of known attack vectors. Work with Threat Intelligence, Incident Response and Cyber Orchestration teams to prioritise and develop detection and orchestration capability. Work with the Red Team to actively test and validate detection capabilities Your Profile 5+ years of experience in a CSOC, Cyber detection, Threat Hunting and/or SOAR development role. 5+ years developing detections within a SIEM environment. Experience working with security tools such as endpoint detection and response systems, network anomaly detection, etc. Designing and implementing threat/attack modelling to derive abuse cases, detection logic and automation course of actions. Well versed in the development of detection and hunting strategies for a broad range of cyber threats, including malware, DDOS, hacking, phishing, lateral movement and data exfiltration in the Financial Services sector or similar. Knowledge of the frameworks like NIST Cybersecurity framework, MITRE ATT&CK, Lockheed Martin Cyber Kill Chain or similar methodologies is required What you"ll love about working here You can shape yourcareerwith us. We offer a range of career paths and internal opportunities within Capgemini group. You will also get personalized career guidance from our leaders. You will get comprehensive wellness benefits including health checks, telemedicine, insurance with top-ups, elder care, partner coverage or new parent support via flexible work. At Capgemini, you can work on cutting-edge projectsin tech and engineering with industry leaders or createsolutionsto overcome societal and environmental challenges
Posted 2 weeks ago
3.0 - 6.0 years
3 - 6 Lacs
Chennai, Tamil Nadu, India
On-site
Job Summary Photon Infotech P Ltd is looking for Security Analyst to join our dynamic team and embark on a rewarding career journey 1. Conducting security assessments: You will be responsible for conducting security assessments of systems, networks, and applications to identify vulnerabilities, risks, and threats. 2. Analyzing security events: You will be responsible for analyzing security events and logs to identify potential security incidents and to detect malicious activity. 3. Developing and implementing security policies and procedures: You will be responsible for developing and implementing security policies and procedures that align with the organization's security strategy and compliance requirements. 4. Managing security tools and technologies: You will be responsible for managing security tools and technologies such as firewalls, intrusion detection/prevention systems, and security information.
Posted 2 weeks ago
4.0 - 8.0 years
7 - 11 Lacs
Chennai
Work from Office
Software Testing Manager About the Team: ZTrust revolutionizes user onboarding with seamless Omnichannel Identity & Access Management, ensuring swift, effortless, and secure app access. It simplifies security across applications, while making password policy creation a breeze. Bid farewell to complexity and embrace efficiency with ZTrust. What you can look forward to as Software Testing Manager (m/f/d): Second-line support for Service Desk and OPS, special care first-line support for field test customers (FT engineers) & Thorough incident analysis Inter-departmental escalation of problems (R&D, hosting, customizing & integration) Evaluate functional analysis documents, create and maintain training documentation & Train Service Desk on new features before every major release Update and maintain knowledge base and service trees with known issues and guidelines Define customer acceptance criteria, create and update test scripts for new software features and validate new software and hardware in field test environment Report, follow up and escalate issues with R&D, hosting, customizing & integration & Plan and execute occasional field visits at field test customers for new software or hardware Approve or disapprove the release of new features, changes and hosting setup & Communicate and coordinate the extended field test rollout Your profile as Software Testing Manager (m/f/d): Communicative and customer-oriented & Team player, strong cooperation skills Highly analytical, precise, eye for details & Planning and coordination skills Experience with incident handling / problem resolution management & Experience with software and hardware development Experience with ICT and electronics & Good English speaking and writing skills Knowledge in Regression , smoke, integration, UI testing & Knowledge in automation testing is an added advantage Why should you choose ZF Group in India? Innovative Environment: ZF is at the forefront of technological advancements, offering a dynamic and innovative work environment that encourages creativity and growth. Diverse and Inclusive Culture: ZF fosters a diverse and inclusive workplace where all employees are valued and respected, promoting a culture of collaboration and mutual support. Career Development: ZF is committed to the professional growth of its employees, offering extensive training programs, career development opportunities, and a clear path for advancement. Global Presence: As a part of a global leader in driveline and chassis technology, ZF provides opportunities to work on international projects and collaborate with teams worldwide. Sustainability Focus: ZF is dedicated to sustainability and environmental responsibility, actively working towards creating eco-friendly solutions and reducing its carbon footprint. Employee Well-being: ZF prioritizes the well-being of its employees, providing comprehensive health and wellness programs, flexible work arrangements, and a supportive work-life balance. Be part of our ZF team as Software Testing Manager and apply now! Contact Sowmya Nagarathinam
Posted 2 weeks ago
4.0 - 9.0 years
6 - 11 Lacs
Bengaluru
Work from Office
Job Description: Essential Job Functions: Support security assessments, audits, and vulnerability scans, contributing to report generation and action items. Monitor security events and incidents, escalating as required and assisting in containment. Assist with the implementation of security policies and standards. Collaborate with the security team on documentation and process improvement. Participate in incident response activities, including investigations and reporting. Stay informed about emerging security threats and best practices. Contribute to security awareness training efforts. Seek opportunities for professional development in the security field. Basic Qualifications: Bachelors degree in a relevant field or equivalent combination of education and experience Typically, 4+ years of relevant work experience in industry, with a minimum of 1+ years in a similar role Proven experience in information security analysis Proficiencies in security technologies and risk assessment A continuous learner that stays abreast with industry knowledge and technology Other Qualifications: Advanced degree in a relevant field is a plus Relevant certifications such as CompTIA Security+, CEH, or equivalent are a plus At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We re committed to fostering an inclusive environment where everyone can thrive. Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
pune, maharashtra
On-site
As an Intelligence Analyst at Fortinet, you will be part of the Cyber Threat Intelligence (CTI) Collections/Analysis team, a dedicated group of skilled analysts, collectors, and specialists committed to safeguarding customers and their assets from external threats. Leveraging our advanced hybrid intelligence platforms and methodologies, your primary role will involve utilizing your writing and editing abilities to contribute to the generation of actionable intelligence for our client base. This includes assessing existing and emerging threats related to cybercrime and various forms of malicious exploitation. Your responsibilities will include monitoring and analyzing cybersecurity events, incidents, and vulnerability reports sourced from multiple outlets. You will be involved in reviewing and interpreting data from various sources such as OSINT, Darknet, and TECHINT. Collaborating closely with the Internal Research team, you will help identify threats specific to individual customers and create tailored analytical reports based on your findings. Additionally, you will be responsible for producing regular Security Trend reports using information from the internal threat repository and collaborating with customer points of contact to understand their threat landscape and customize service delivery accordingly. Furthermore, you will play a crucial role in monitoring, analyzing, and reporting on cybersecurity events, intrusion events, security incidents, and other indicators of potential threats. Adhering to operational security best practices is essential to safeguard sources and methods effectively. To excel in this role, you should possess strong fundamentals in Information Security, a solid understanding of Cyber Threat Intelligence, and the ability to produce high-quality Security Analysis reports. Your skill set should include the capacity to comprehend and analyze various threat vectors proficiently, along with knowledge of cyber threats, malware, APTs, exploits, etc. Familiarity with the DarkNet, DeepWeb, as well as open-source, social media, and other platforms of cyber-criminal activity is highly beneficial. Strong communication skills in English, along with the ability to engage effectively with diverse clients and articulate technical details clearly and concisely, are essential. A willingness to learn new technologies and skills, adapt to evolving circumstances, and innovate as needed is paramount. Previous experience in a Security Operations Center (SOC) environment or Cyber Crime Research will be advantageous, although not mandatory. Possession of certifications such as CEH, OSCP, or other cybersecurity credentials is a plus, while programming/scripting knowledge would be considered an additional asset. Maintaining the utmost discretion and confidentiality is crucial in this role. Proficiency in languages such as English, Hindi, and any other international languages like Arabic, Russian, Japanese, Chinese, German, or Italian would be advantageous.,
Posted 2 weeks ago
3.0 - 5.0 years
3 - 8 Lacs
Bengaluru
Work from Office
Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L2 Analyst has responsibility to closely track the incidents and support for closure. 10.Working with logsource and usecase management in integrating log sources and developing & testing usecase 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Developing SOP / instruction manual for L1 team 13.Guiding L1 team for triage/analysis and assist in clousure of cybersecurity alert and incidents 14.Handle XDR alerts and followup with customer team for agent updates 15.Escalate more complex incidents to L3 SME for deeper analysis. Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.3-5 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques. Preferred technical and professional experience Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications
Posted 2 weeks ago
2.0 - 7.0 years
1 - 5 Lacs
Kolkata, Hyderabad, Pune
Work from Office
Security Trust Analyst1 Job Title: Security Trust Analyst Location: Bangalore, India Work Mode: Hybrid (Minimum 2 days/week from office) About the Role We are seeking a Security Trust Analyst to join our Global Trust Office as an individual contributor. In this hands-on role, you will work closely with sales teams and internal security functions to demonstrate that our security and compliance controls meet industry-leading standards. You will also engage with cross-functional stakeholders across Compliance, Legal, Privacy, Product, and Engineering teams. The ideal candidate is detail-oriented, collaborative, and passionate about cybersecurity and compliance, with a strong understanding of industry frameworks such as ISO 27001, PCI DSS, and AICPA SOC . Key Responsibilities Perform first-line review of incoming Trust Office cases in Salesforce, validate case accuracy, and assign for further action. Respond to requests from internal sales teams regarding security and compliance inquiries from customers and prospects. Prepare and distribute weekly reports from Salesforce. Manage distribution of Security and Trust Assurance Packets (STAP) to customers and prospects. Collaborate with internal teams (Security, Product, Engineering, etc.) to communicate and support DocuSigns compliance posture. Contribute to continuous improvement initiatives within the Global Trust Office. Perform additional tasks and responsibilities as assigned. Support after-hours requests on an as-needed basis. What Youll Bring Basic Qualifications: Bachelors degree or equivalent work experience in Computer Science, Cybersecurity, GRC (Governance, Risk & Compliance), or related field. Minimum 2 years of relevant experience in cybersecurity or compliance-related roles. Familiarity with security and compliance frameworks such as:SSAE16, ISO 27001, NIST, PCI DSS, SOC, SIG, CSA, HIPAA, HITRUST, FedRAMP. Experience working in a SaaS or cloud solutions environment. Proficiency with Salesforce and Google Workspace tools. Strong analytical, communication, and presentation skills. Detail-oriented with excellent organizational and time management skills. Comfortable working across cross-functional teams and stakeholders. Strong passion for continuous learning and improvement. Understanding of the role of supply chain security in customer assurance. Work Environment Hybrid Work Model: This is a hybrid position requiring a presence in the Bangalore office a minimum of 2 days per week , with flexibility for remote work based on team and business needs. Location - Pune,Hyderabad,Kolkata,Jaipur,Chandigarh
Posted 2 weeks ago
2.0 - 4.0 years
2 - 4 Lacs
Mumbai
Work from Office
Minimum 2-4 years of experience in Security Operations Centre Experience across SOC domains use case creation, incident management, threat hunting, threat intelligence etc. Solid understanding of cyber security, network security, end point security concepts Good understanding of recent cyber threats, latest attack vectors Must have experience in any one SIEM (Splunk), EDR and SOAR solution Must have experience in leading/managing SOC shifts Experience in shift roster creation, resource management etc. Will be responsible for critical incident investigation, use case review, mentoring Shift Leads, SLA management etc.
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
As a Security Analyst/Engineer, you will be responsible for supporting the security operations of the organization by assisting in the monitoring, detection, and response to security incidents. This role offers a blend of security analysis and engineering tasks, providing a progression from foundational knowledge to more advanced responsibilities, enabling you to contribute significantly to the organization's cybersecurity efforts. You will be involved in various key responsibilities, including security monitoring and analysis. This involves monitoring security events and alerts from sources such as SIEM, IDS/IPS, antivirus systems, and endpoint detection platforms. Additionally, you will conduct initial analysis of security events, collaborate with senior analysts to investigate and respond to security incidents like malware infections, phishing attempts, and unauthorized access. In incident response activities, you will provide technical assistance during security incidents for containment, eradication, and recovery efforts. You will also document incident response procedures, develop post-incident reports, and implement proactive measures to enhance incident detection and response capabilities, such as developing playbooks for common attack scenarios. Supporting the vulnerability management process will be part of your responsibilities, including assisting in vulnerability scanning, assessment, and remediation efforts. You will help prioritize and track the resolution of identified vulnerabilities, collaborate with system owners and IT teams for timely patching and mitigation, and conduct security assessments and penetration tests to identify weaknesses in systems, applications, and network infrastructure. Furthermore, you will assist in the administration and configuration of security tools and technologies, participate in evaluating and testing new security technologies, optimize the configuration and tuning of security tools, and recommend enhancements based on industry best practices and organizational requirements. You will also support security awareness and training initiatives by assisting in the development of educational materials and delivering security awareness briefings to staff. The ideal candidate should have a Bachelor's degree in computer science, Information Security, or related field, along with 3-5 years of experience in a cybersecurity role. Strong understanding of cybersecurity principles, proficiency in security tools and technologies, excellent analytical and problem-solving skills, effective communication, and stakeholder management abilities are essential. Certifications such as CompTIA Security+, CEH, or equivalent are a plus. Demonstrated experience in conducting security analysis, incident response, and vulnerability management in a complex environment, hands-on experience with security tool optimization, security assessments, and penetration testing, as well as a proven track record of incident response efforts are desired qualifications for this role. This position offers a valuable opportunity for career growth and development in the field of cybersecurity, with the possibility to progress into more specialized roles such as Senior Security Analyst, Incident Responder, or Security Engineer. Continued learning and professional certifications will be encouraged to enhance skills and knowledge in the cybersecurity domain. Joining the global cyber security team at Carmeuse will provide you with the opportunity to contribute to the organization's digitalization strategy while ensuring security. Working with a team of regional senior security managers and cyber architects, you will be involved in security design, delivery, and operations to safeguard Carmeuse's digital IT & OT footprint, participating in innovative initiatives to strengthen operations. Reporting to Victor Alexandrescu, the leader of the team, you will benefit from his extensive experience and practical knowledge. Victor's management style focuses on efficiency, continuous improvement, and proactive problem-solving, aiming to optimize processes and enhance team performance. The organization offers a permanent contract, flexible working hours, home working policy, competitive salary package and benefits, growth opportunities, strong HR and training policy, and work-life balance. The recruitment process includes steps such as resume and cover letter analysis by Georges Mensah-Boateng, a first "Teams" interview with personality questionnaires, a second interview with Victor Alexandrescu and Aurelie Mordant, and a final interview with Stavros Georgakopoulos, Rusty Gavin, and Eugene Marchenko to assess your suitability for the role.,
Posted 3 weeks ago
8.0 - 12.0 years
10 - 15 Lacs
Mumbai, Bengaluru
Work from Office
Your role We are seeking a proactive and experienced Security Operations Center (SOC) professional to join our cybersecurity team with 4+ years of experience . Depending on the level (Analyst, Lead, or Manager), the role will involve monitoring, analyzing, and responding to security incidents, managing SOC operations, and leading threat detection and response initiatives. Monitor SIEM systems and security tools for suspicious activity. Analyze and respond to security incidents and threats. Stay updated on threat intelligence and attack trends. Review logs from firewalls, IDS/IPS, and antivirus tools. Escalate critical incidents and document findings. Support vulnerability management and remediation tracking. Configure and tune security tools like SIEM and EDR. Ensure compliance with security policies and audits. Collaborate with IT and network teams on investigations. Contribute to process improvements and incident playbooks. Lead and mentor junior analysts (for Lead/Manager roles). Your profile SIEM (e.g., Splunk, QRadar, ArcSight) Incident Response /Log Analysis Threat Intelligence Scripting (Python, PowerShell) for automation EDR tools (e.g., CrowdStrike, Carbon Black) What you''ll love about working here You can shape yourcareerwith us. We offer a range of career paths and internal opportunities within Capgemini group. You will also get personalized career guidance from our leaders. You will get comprehensive wellness benefits including health checks, telemedicine, insurance with top-ups, elder care, partner coverage or new parent support via flexible work. At Capgemini, you can work oncutting-edge projectsin tech and engineering with industry leaders or createsolutionsto overcome societal and environmental challenges. Location - Bengaluru,Mumbai,,Pune
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough