Jobs
Interviews

239 Security Analysis Jobs - Page 3

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

7 - 12 Lacs

pune

Work from Office

Implement and manage cybersecurity controls and measures to protect organizational assets. Conduct vulnerability assessments and penetration testing. Respond to and investigate security incidents and breaches. Stay up-to-date with the latest threats and security technologies. Location - Pan India.

Posted 2 weeks ago

Apply

5.0 - 10.0 years

13 - 17 Lacs

gurugram

Hybrid

Job Profile Summary Perform real-time monitoring and analysis of security events from multiple sources. Identify source or cause and provide recommendations for secure infrastructure through policy, practices, risk management, engineering, and improved operations. Responsible for adhering to company security policies and procedures and any other relevant policies and standards as directed. Critical Competencies Excellence: Exceeds expectations by consistently demonstrating accountability, discipline, high performance, and a proven track record of exceptional results Customer-driven: Prioritizes customer needs and satisfaction through collaborative and proactive problem-solving, and an unwavering commitment to customer success Expertise: Possesses deep understanding of customer needs and continually grows and enhances skills to provide customer-focused solutions Agility: Quickly adapts and responds to dynamic customer needs and expectations through innovative solutions. Compassion: Cultivates a positive and supportive environment to effectively work together towards a common goal, fostering trust within Rackspace and with external stakeholders Key Responsibilities Other Incidental tasks related to the job, as necessary. Monitor and analyze log files from a variety of sources, including but not limited to NIDS, HIDS, firewall logs, and system logs (Windows and Unix) to identify possible threats to network security Triage security events: assess the priority and determine risk Receive escalations of events from lower level analysts Use the Cyber Kill Chain, current intelligence information, and investigative techniques to proactively review customers environments searching for anomalous behavior Identify, modify, and manipulate applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files) Reconstruct cyber events, assess cyber threat and scope of impact, identify and track any internal lateral or external movement, and develop response solutions Interact with security community to obtain technical cyber threat intelligence; track cyber threat actors/campaigns based on technical analysis and open source/third party intelligence Research and track new exploits and cyber threats; conduct cursory and/or in-depth computer forensic investigations (i.e. packet captures, endpoint behaviors, etc.), or collaborate with peers when appropriate for hand-offs/escalations Conduct analysis of malicious code and weaponized documents through behavioral analysis or reverse engineering. Communicate and report on key intelligence, analysis and response activities, relevant metrics, and KPIs Work as a part of an Incident Response Team to investigate and remediate active threats while accurately documenting results using standard incident response techniques and the incident response process Knowledge Intermediate knowledge of various Compliance Regulations/ Standards; PCI, ISO27001, Audit Standard #70, Safe Harbor, HIPPA and FISMA Intermediate knowledge of IT Risk Management, Governance, Risk and Compliance, Information Security, Data Privacy, Vendor Management, and/or Business Continuity Management Skills Analytical Skills Cloud Computing Cybersecurity Database Management ERP Software Skills Audit Skills Investigative Skills Low Voltage Cabling Network/Systems Skills Process Improvement Project Management Risk Assessment/Management Strategic Planning Vendor Management Certifications Sec+, GSEC, and Net+ certifications required Prefer completion of, or work toward, SANS GIAC/GCIA/GCIH/GCFA, etc. or other network/system security certifications Experience 5 - 7 years of experience in the field of role required

Posted 2 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

chennai, tamil nadu

On-site

As an Identity Access Management (IAM) Analyst at UST in Chennai, you will be responsible for executing IAM controls related to the identity lifecycle. This includes handling access requests, access administration, termination monitoring, and access reconciliation. You will also be conducting role and user access certifications for applications and systems to ensure compliance with SOX (Sarbanes-Oxley) and SOC requirements. In this role, you will play a crucial part in maintaining and updating Standard Operating Procedures (SOPs) to reflect any process or system changes. Your contribution to process improvement initiatives will be vital in enhancing efficiency and ensuring compliance within the organization. Proficiency in Excel is required, especially for conducting manual audits and data reviews. Key Skills: - IAM - Security Analysis - Identity Access Management - Governance About UST: UST is a global digital transformation solutions provider with a track record of over 20 years. By collaborating with leading companies worldwide, UST aims to drive real impact through transformation. With a focus on technology, people, and purpose, UST partners with clients from the initial design phase to operational implementation. Deep domain expertise and a future-proof philosophy guide UST in embedding innovation and agility into their clients" organizations. With a presence in 30 countries and a team of over 30,000 employees, UST is dedicated to creating boundless impact and touching billions of lives in the process.,

Posted 2 weeks ago

Apply

2.0 - 6.0 years

0 Lacs

maharashtra

On-site

As the Junior Regional Controller at Pinkerton, you will play a crucial role in driving the development and standardization of security policies and programs to safeguard corporate business operations. You will have the opportunity to represent Pinkerton's core values of integrity, vigilance, and excellence while ensuring the safety and security of client members, visitors, and operations. Your responsibilities will include monitoring and responding to security and safety-related events that may impact client members, visitors, and operations. You will be required to provide exceptional customer service and deliver desirable outcomes to resolve issues for internal customers. Additionally, you will be responsible for live monitoring of electronic security systems to detect unauthorized entry or criminal activity that may pose a threat to employees, customer confidential information, assets, or business operations at the client site. As the primary point of contact for employees and relevant parties, you will handle incident reporting, emergency assistance requests, and security-related advice related to the client site. It will be your duty to escalate any incidents, events, or environmental conditions that could adversely impact the client's interests to senior management. Furthermore, you will conduct security analysis of identified incidents and share detailed reports with the Security Analyst Supervisor. To be successful in this role, you should have experience working with global teams and at least two to three years of experience in Global Command Centre operations. A Graduation/Bachelor's degree or equivalent education with formal security education is required. Effective written and verbal communication skills, the ability to work well in a team, adaptability to evolving environments, attention to detail, and the capability to facilitate progressive change are essential qualities for this position. Maintaining confidentiality, possessing good analytical skills, and being able to travel as required are also important aspects of this role. In terms of working conditions, you should be able to effectively perform all essential functions with or without reasonable accommodation. Regular computer usage, occasional reaching and lifting of small objects, operating office equipment, frequent sitting, standing, and walking, as well as travel as needed, are part of the working conditions for this role.,

Posted 2 weeks ago

Apply

2.0 - 6.0 years

0 Lacs

haryana

On-site

As an Associate Information Security (Vulnerability Assessment and Penetration Testing), you will join our dynamic cyber security team in Gurgaon. Your primary responsibility will be to assist in conducting vulnerability assessments and penetration testing on various systems, networks, and applications. This position is well-suited for recent graduates or individuals seeking to kickstart their career in cyber security, offering valuable hands-on experience and guidance from seasoned professionals. Key Responsibilities: - Conduct Vulnerability Assessments: You will help identify and assess vulnerabilities in systems, applications, and networks by utilizing a variety of tools and techniques for scanning and analyzing security weaknesses. - Penetration Testing: Assist in planning and executing penetration tests on web applications, networks, and other systems. Document and report security issues and vulnerabilities uncovered during testing. - Security Analysis and Reporting: Analyze assessment and testing results to pinpoint potential security risks. Contribute to the development of comprehensive reports containing findings, risk analysis, and recommended corrective actions. - Collaboration and Support: Collaborate closely with senior analysts and team members to grasp project requirements and goals. Provide assistance in implementing necessary security measures and solutions. - Learning and Development: Engage in training sessions, workshops, and certification programs to enhance your technical skills. Stay abreast of the latest security trends, tools, and best practices. Required Qualifications: - Educational Background: Hold a Bachelor's degree in Computer Science, Information Technology, Cyber Security, or a related field. - Technical Skills: Possess a basic understanding of networking, operating systems, and web applications. Have 2 to 4 years of total experience. Familiarity with common security tools such as Nmap, Wireshark, Metasploit, Burp Suite. Basic knowledge of programming/scripting languages like Python and Bash. This role offers an exciting opportunity to grow your career in cyber security and make significant contributions to our team.,

Posted 2 weeks ago

Apply

4.0 - 8.0 years

18 - 25 Lacs

bengaluru

Work from Office

Position: Sr Security Analyst At FireCompass, we are building a team that wants to make a difference globally: team players, thinkers, hackers, builders, and hustlers who challenge the status quo and who want to change the world. We believe in creating something that is challenging and exciting and that will have a tremendous impact on our customers and the security industry as a whole. If you share our passion for innovation and want to create a difference, we want to talk to you. About Us: FireCompass is an advanced AI-based Offensive Security Platform. It uses Agentic AI to combine Automated Pen Testing, Attack Surface Management (ASM), and Continuous Automated Red Teaming (CART) along with human expertise. FireCompass ensures near-zero false positives and prioritizes exploitable risks using automated multi-stage attack trees. FireCompass has been recognized as a leader by Gartner, Forrester, GigaOm, IDC, and RSAC 365 Innovation Showcase. FireCompass holds a USPTO-awarded patent for its groundbreaking Automated Red Teaming technology and is trusted by top enterprises, including Fortune 1000 companies. Roles & Responsibilities: Perform Open Source Intelligence (OSINT) on the target organization Lead Penetration Testing and Red Teaming on target attack surfaces Suggest Proper Remediations Cloud Penetration Testing and Security Audit Perform Vulnerability Revalidations Research on new attack vectors, attack paths, tools, and techniques. Building Security Tools Write blog posts and papers related to new attack vectors, threat hunting, and threat analysis Required Skills: Good Fundamentals of Computer Science and Information Security Hands-on in at least one Programming Language (Python / Go / JavaScript frameworks) Linux shell scripting Excellent in Web Security Penetration Testing covering OWASP Top 10 Good Track record in finding complex and high-threat vulnerabilities Excellent understanding of Network Protocols TCP/IP, HTTP, SSL, and WebSockets Good Understanding of Browser Security, such as Content Security Policy Understanding of Docker Security, Kubernetes Security, and Cloud Security Excellent communication skills Self-Learner and Self-Motivated Good to Have Excellent Vulnerability Findings (Bug Bounty or CVE) Received a Bug bounty for complex multi-stage vulnerabilities Experience in research blogs and/or speaking engagements, Conference Speaker Experience in solving or creating CTF (Capture the Flag) challenges Reverse Engineering and Fuzzing More Details: Experience: 3-5+ years experience Salary: Fixed & variable based on experience & last drawn CTC (Depending on Candidate's Profile 18-26 LPA ) No of Vacancies: 2 Working Days: 5 Days Education: UG: Graduation with CS/IS specialization or equivalent. (Mandatory) PG: ME/MTech/MS with CS/IS specialization or equivalent. (Optional) Certifications: OSCP / CRTP / CRTE or similar Certification Mandatory

Posted 2 weeks ago

Apply

4.0 - 7.0 years

7 - 11 Lacs

mumbai, pune, chennai

Work from Office

Security Assessments and Audits: Conduct comprehensive security assessments, threat modeling, and architecture reviews to identify vulnerabilities in applications, infrastructure, and cloud environments. Vulnerability Management: Manage and optimize code scanning tools (SAST, DAST), and other security tools to detect, prioritize, and remediate vulnerabilities. Security Architecture and Design: Design and implement robust security architectures for cloud environments (e.g., AWS, EKS), and applications, ensuring they align with best practices and compliance requirements. Security Policy and Procedures: Develop, implement, and maintain security policies, procedures, and standards to ensure comprehensive protection and compliance.

Posted 2 weeks ago

Apply

2.0 - 6.0 years

0 Lacs

hyderabad, telangana

On-site

You should have a Bachelor's degree or equivalent practical experience along with 2 years of experience in analyzing cyber threats. Additionally, experience in security analysis, security assessment, and risk analysis is required for this role. A preferred qualification for this position includes a Bachelor's degree in Computer Science, Information Technology, or a related field. You should also have at least 5 years of experience in security operations or assurance, as well as experience in automation and cybersecurity. Experience in conducting security assessments or reviews to assess underlying risk, proficiency in automation, process optimization, and security tools to improve assessment efficiency, and excellent written and verbal communication skills for clear and concise reporting are also preferred. The job role involves working with the Enterprise Security Operations (ESO) team, who manage infrastructure security operations globally across Google using process improvements and automation. The team's work covers all aspects of information security and offers opportunities for growth and deeper investment in various security domains. The Core team is responsible for building the technical foundation behind Google's flagship products. They serve as owners and advocates for the design elements, developer platforms, product components, and infrastructure at Google. The Core team looks across Google's products to create central solutions, remove technical barriers, and enhance existing systems. This team plays a crucial role in driving innovation and impacting important technical decisions across the company. Your responsibilities in this role will include conducting various security reviews and assessments to ensure compliance with enterprise standards, applying security judgment to approve/deny/escalate requests based on risk and policy alignment, collaborating with internal teams, vendors, and business units to provide security guidance and facilitate informed decision-making, identifying and implementing opportunities to automate workflows, streamline processes, and improve operational efficiency, and developing an understanding of Google's internal security frameworks, controls, and policies.,

Posted 2 weeks ago

Apply

2.0 - 6.0 years

0 Lacs

chennai, tamil nadu

On-site

As an Identity Access Management (IAM) Specialist, you will be responsible for executing IAM controls related to the identity lifecycle. This includes handling access requests, access administration, termination monitoring, and access reconciliation. You will also be required to perform role and user access certifications for applications and systems to ensure compliance with SOX (Sarbanes-Oxley) and SOC requirements. In this role, you will play a key part in maintaining and updating Standard Operating Procedures (SOPs) to accurately reflect any process or system changes. Additionally, your contributions to process improvement initiatives will be vital in enhancing efficiency and ensuring compliance within the organization. To excel in this position, proficiency in Excel is essential, especially for conducting manual audits and data reviews. Your expertise in IAM, Security Analysis, and governance will be crucial in effectively carrying out your responsibilities and contributing to the overall success of the IAM function.,

Posted 2 weeks ago

Apply

1.0 - 5.0 years

0 Lacs

pune, maharashtra

On-site

The Junior SOC Controller at Pinkerton plays a crucial role in driving the development and standardization of security policies and programs to safeguard corporate business operations. As a representative of Pinkerton's core values of integrity, vigilance, and excellence, you will monitor and respond to security and safety-related events that may impact client members, visitors, and operations. Your commitment to customer service and delivering desirable outcomes will be essential in resolving issues for internal customers. Your responsibilities will include live monitoring of electronic security systems to detect unauthorized entry or criminal activity in client office premises, ensuring the safety of employees, customer confidential information, assets, and business operations at the client site. You will also serve as a primary point of contact for employees and other relevant parties seeking to report incidents, request emergency assistance, or seek security-related advice related to the client site. It will be your duty to escalate any incidents, events, or environmental conditions that could adversely impact the client's interest to senior management. Additionally, you will conduct security analysis of identified incidents and share detailed reports with the Security Analyst Supervisor. Your role will also involve collaborating with global teams, requiring one to two years of experience in Global Command Centre operations. A graduation or bachelor's degree, along with formal security education, is preferred. Effective written and verbal communication skills, the ability to serve as an effective team member, attention to detail and accuracy, flexibility to adapt to evolving environments, and the capability to facilitate progressive change are crucial for success in this role. Maintaining confidentiality when handling sensitive information and possessing good analytical skills are also essential. In this role, you will work in a dynamic environment that may require occasional reaching and lifting of small objects, operating office equipment, and regular computer usage. You should be prepared for frequent sitting, standing, and walking, as well as occasional travel as needed. Your dedication to upholding Pinkerton's values and commitment to excellence will be instrumental in fulfilling the responsibilities of the Junior SOC Controller role.,

Posted 2 weeks ago

Apply

3.0 - 8.0 years

4 - 8 Lacs

bengaluru

Work from Office

About The Role Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time educationRole Summary :The SOC Analyst plays a critical role in the first line of cyber defense by monitoring and triaging security alerts generated by Microsoft Sentinel. This role is responsible for identifying potential threats through continuous monitoring of security dashboards, performing initial analysis, executing predefined response actions, and escalating incidents based on severity. The analyst will work closely with L2/L3 analysts to ensure timely escalation and incident closure while maintaining accuracy and SLA adherence. This role is ideal for individuals developing their skills in SIEM operations and security monitoring with a focus on Microsofts security ecosystem. Roles & Responsibilities- Monitor Microsoft Sentinel dashboards and respond to alerts.- Perform initial triage, classification, and correlation of security events.- Trigger and monitor predefined SOAR playbooks.- Create and update incident tickets with all required details.- Escalate validated incidents to L2/L3 teams for deeper investigation.- Support daily SOC health checks and Sentinel connector status reviews Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM) Operations.- Strong understanding of incident response processes and procedures.- Experience with security monitoring tools and techniques.- Knowledge of compliance frameworks and regulations related to cybersecurity.- Ability to analyze security incidents and provide actionable insights.- Experience in SOC / IT security.- Basic knowledge of Microsoft Sentinel and KQL.- Familiarity with Defender for Endpoint, Identity, and Microsoft 365 Security.- Ability to follow runbooks, good verbal and written communication. Additional Information:- The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

1.0 - 3.0 years

2 - 5 Lacs

bengaluru

Work from Office

The Security Trust Analyst uses this understanding of security and sales enablement along with skills in program management to identify patterns and gaps in Security Trust operations. The Security Trust Analyst will work with the team in order to collaborate on planning, gather requirements, and monitor and deliver on trust operations. This will be an exciting opportunity to grow in the role and contribute to RingCentrals security posture. As a member of the team, creative thinking, a solid work ethic, and a passion for security and trust are a must. The Security Trust Analyst bridges the gap between security and privacy teams who provide trust information, and field teams who require this information for sales enablement. To succeed in this role you must have experience in: Responsibilities Use templates to report on team GNIs and generally perform Project Management support activities.Develop, monitor, and report on platform and service metrics. Support teams workload on Fresh Service tickets, which cover a wide range of Security domains and customer requirements for information. Partner with security and privacy stakeholders to help improve Security Trust assets and processes. Communicate and collaborate with cross-functional teams on Security Trust, including third-party risk management, tool monitoring, and evidence gathering. Qualifications Degree in Computer Science or other related field or equivalent work experience 1 - 3 years of related experience in security Knowledge and Skills Solid written and verbal communication skills Critical thinking and problem-solving abilities Attention to detail in a well-controlled environment Good understanding of basic statics and Machine Learning techniques Experience with integration of data from multiple data sources Knowledge of security and trust principles, including third-party risk management, preferred PowerBI or Tableau experience is a plus What we offer: Mediclaim benefits Paid holidays Casual/Sick leave Privilege leave Bereavement leave Maternity & Paternity leave Wellness programs & coaching Employee referral bonus Professional development allowances Night shift allowances.

Posted 3 weeks ago

Apply

5.0 - 7.0 years

3 - 5 Lacs

pune

Work from Office

Employment Type: Full-time Job Description: We are looking for an experienced Senior System Security Administrator with 8+ years of expertise in managing, securing, and optimizing enterprise systems. The candidate will focus on Active Directory (AD), Antivirus solutions with Endpoint Detection and Response (AV-EDR), and DNS & DHCP services. This role requires advanced troubleshooting skills, a deep understanding of system security principles, and relevant industry certifications. Roles and Responsibilities • Design, implement, and manage multi-domain Active Directory environments. • Develop and enforce AD policies, including Group Policy Objects (GPOs), user and device management, and OU structures. • Ensure AD security by implementing privileged access management, auditing, and securing domain controllers. • Troubleshoot and resolve AD replication, authentication, and authorization issues. • Deploy, manage, and optimize enterprise AV-EDR solutions (e.g., CrowdStrike, Sophos). • Monitor, detect, and respond to endpoint security threats and vulnerabilities. • Conduct regular updates, patching, and fine-tuning of AV-EDR policies. • Perform threat analysis, incident response, and root cause investigation for endpoint-related incidents. • Configure and maintain enterprise DNS and DHCP systems (e.g., Infoblox, Windows Server). • Ensure high availability, redundancy, and fault tolerance of DNS & DHCP services. • Implement DNSSEC, IPAM solutions, and other security measures to prevent spoofing,

Posted 3 weeks ago

Apply

2.0 - 6.0 years

0 Lacs

pune, maharashtra

On-site

The Applications Development Intermediate Programmer Analyst position at our organization entails participating in the establishment and implementation of new or revised application systems and programs in coordination with the Technology team. Your primary responsibility will be contributing to applications systems analysis and programming activities. You will utilize your knowledge of applications development procedures and concepts, along with basic knowledge of other technical areas, to identify and define necessary system enhancements. This includes using script tools, analyzing/interpreting code, consulting with users, clients, and other technology groups on issues, and recommending programming solutions. Additionally, you will be involved in installing and supporting customer exposure systems and applying fundamental knowledge of programming languages for design specifications. As an Intermediate Programmer Analyst, you will play a key role in analyzing applications to identify vulnerabilities and security issues, conducting testing and debugging, and serving as an advisor or coach to new or lower-level analysts. You will be expected to identify problems, analyze information, and make evaluative judgments to recommend and implement solutions. Your role will also involve resolving issues by identifying and selecting solutions through the application of acquired technical experience, guided by precedents. This position requires the ability to operate with a limited level of direct supervision, exercise independence of judgment and autonomy, and act as a subject matter expert to senior stakeholders and/or other team members. You will need to appropriately assess risk when making business decisions, demonstrating particular consideration for the firm's reputation and safeguarding Citigroup, its clients, and assets by ensuring compliance with applicable laws, rules, and regulations. Qualifications: - 2-5 years of relevant experience in the Financial Service industry - Intermediate level experience in an Applications Development role - Consistently demonstrates clear and concise written and verbal communication - Demonstrated problem-solving and decision-making skills - Ability to work under pressure and manage deadlines or unexpected changes in expectations or requirements Education: - Bachelor's degree/University degree or equivalent experience Please note that this job description offers a high-level overview of the work performed. Additional job-related duties may be assigned as required.,

Posted 3 weeks ago

Apply

4.0 - 8.0 years

7 - 11 Lacs

chennai

Work from Office

Software Testing Manager About the Team: ZTrust revolutionizes user onboarding with seamless Omnichannel Identity & Access Management, ensuring swift, effortless, and secure app access. It simplifies security across applications, while making password policy creation a breeze. Bid farewell to complexity and embrace efficiency with ZTrust. What you can look forward to as Software Testing Manager (m/f/d): Second-line support for Service Desk and OPS, special care first-line support for field test customers (FT engineers) & Thorough incident analysis Inter-departmental escalation of problems (R&D, hosting, customizing & integration) Evaluate functional analysis documents, create and maintain training documentation & Train Service Desk on new features before every major release Update and maintain knowledge base and service trees with known issues and guidelines Define customer acceptance criteria, create and update test scripts for new software features and validate new software and hardware in field test environment Report, follow up and escalate issues with R&D, hosting, customizing & integration & Plan and execute occasional field visits at field test customers for new software or hardware Approve or disapprove the release of new features, changes and hosting setup & Communicate and coordinate the extended field test rollout Your profile as Software Testing Manager (m/f/d): Communicative and customer-oriented & Team player, strong cooperation skills Highly analytical, precise, eye for details & Planning and coordination skills Experience with incident handling / problem resolution management & Experience with software and hardware development Experience with ICT and electronics & Good English speaking and writing skills Knowledge in Regression , smoke, integration, UI testing & Knowledge in automation testing is an added advantage

Posted 3 weeks ago

Apply

2.0 - 7.0 years

7 - 17 Lacs

bengaluru

Work from Office

About this role: Wells Fargo is seeking a Information Security Analyst. In this role, you will: Participate and identify security risks companywide and ensure that appropriate data security procedures and products are implemented Maintain an awareness of bank security policies and government regulations pertaining to information security Review the development, testing, and implementation of security plans, products, and control techniques Develop and implement security standards, procedures, and guidelines for multiple platforms and diverse systems environments Investigate and recommend appropriate corrective actions for data security incidents Identify regulatory changes that will affect information security policy, standards, procedures, and recommend appropriate changes Provide security consulting and project management services on highly complex information security projects and issues Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals Interact with internal customers Receive direction from leaders and exercise independent judgment while developing the knowledge to understand function, policies, procedures, and compliance requirements Required Qualifications: 2+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education Desired Qualifications: Bachelor of Engineering Degree, preferably of Computer science or Information Technology 2+ years hands on experience on provisioning on Databases. Experienced on managing access, roles, and security of databases. Must have strong knowledge in/or SQL, Oracle, Teradata, Sybase and DB2 platforms. Must have hands-on experience on/or SQL Server Management Studio, SQL Developer, Teradata SQL Assistant, Sybase ASE, DB2 Good to have any one Database Administration/Information Security certification (Security +, CISSP, CIAM)IAM vendor-based certifications (CyberArk, Oracle, IBM) certified. Knowledge and experience with any IAM, Provisioning, role management and certification tool Job Expectations: Owns, tracks, and resolves database related incidents tickets submitted to Enterprise Access Management in the ServiceNow tool. Provides basic and complex technical support for routine security-related issues. Owns, tracks, and resolves database related project requests. Responds to Database related alerts and escalations during business hours; participates in a rotation schedule for providing after business hours support working with fellow Database Information Security Analysts, Database Administrators or Engineering staff to come up with strategic solutions to recurring problems. Shift timings: 1.30 10.30 PM 3 Days Work from Office

Posted 3 weeks ago

Apply

4.0 - 9.0 years

7 - 17 Lacs

hyderabad, bengaluru

Work from Office

About this role: Wells Fargo is seeking a Senior Information Security Analyst. In this role, you will: Perform issue lifecycle management, understand control gaps, develop controls and documentation for IAM Perform remediation of security assessment review issues, complex ad hoc data, and reporting to support information security risk management Provide guidance and direction in reviewing assessment findings and mitigating controls to optimize information security Identify and direct information asset portfolio reconciliations and certifications Provide advanced data aggregation and data of information security risk exposure Develop and deliver Information Security Education Awareness and Training in accordance with the Enterprise Information Security Program standards Review draft and proposed control standards for business impact and recommend modifications or clarifications as required Conduct security control testing and consultation with stakeholders Evaluate and interpret internal and Enterprise Information Security policies, processes and standards, and provide recommendations to improve them Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals Interact with internal customers Serve as a mentor to less experienced staff Required Qualifications: 4+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education Desired Qualifications: 4+ years of Experience in Risk and controls, controls testing, IT audits. 4+ yrs of experience in tech risk and controls, tech audits, ITGC, controls testing, operational risk framework, design effectiveness and operating effectiveness. Work location - Bangalore Hyderabad.

Posted 3 weeks ago

Apply

2.0 - 7.0 years

7 - 17 Lacs

hyderabad

Work from Office

About this role: Wells Fargo is seeking a Information Security Analyst. In this role, you will: Participate and identify security risks companywide and ensure that appropriate data security procedures and products are implemented Maintain an awareness of bank security policies and government regulations pertaining to information security Review the development, testing, and implementation of security plans, products, and control techniques Develop and implement security standards, procedures, and guidelines for multiple platforms and diverse systems environments Investigate and recommend appropriate corrective actions for data security incidents Identify regulatory changes that will affect information security policy, standards, procedures, and recommend appropriate changes Provide security consulting and project management services on highly complex information security projects and issues Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals Interact with internal customers Receive direction from leaders and exercise independent judgment while developing the knowledge to understand function, policies, procedures, and compliance requirements Required Qualifications: 2+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education Desired Qualifications: Bachelor of Engineering Degree, preferably of Computer science or Information Technology 2+ years of IAM, information security, Access Administration and provisioning Enterprise Applications Knowledge and experience with any IAM, Provisioning, role management and certification tool Knowledge and experience on Applications Infrastructure in a Large Enterprise environment. Strong knowledge and understanding of information security and IAM practices and policies. Experience with Service Delivery and SLAs/KPIs monitoring. Proven ability for high volume/high quality results Ability to interact with integrity and a high level of professionalism with all levels of team members and management. Knowledge on formal risk management methodology regulatory guidelines required for financial service organizations information security compliance/policies and ability to identify & contribute towards mitigating risks. Strong verbal, written, and interpersonal communication skills. Excellent customer service skills. Ability to research and correspond with customers, responding to their questions and concerns with detailed information. Ability to make timely and independent decisions while working in a fast-paced and results-driven environment. Strong problem solving and analytical skills with high attention to detail and accuracy. Ability to work effectively, as well as independently, in team environment. Ability to take an active role in the education, mentoring and training of less experienced team members. Strong documentation skills with the ability to collect, organize, analyze, update and disseminate significant amounts of information with attention to detail and accuracy. Strong time management skills with ability to participate in multiple projects/work streams simultaneously. Proven experience in identifying and resolving customer and production issues. Maintains familiarity with internal departmental and bank procedures and policies. Knowledge/Skills/Ability in advanced Microsoft Office (Word, Excel, Outlook, PowerPoint, Access, and Project) skills. Must be flexible to work in shifts & be available for business meetings/team deliverables within/outside of ones shift. Must have leadership skills, to be resilient and drive changes. Ability to maintain composure under pressure and deadlines in a dynamic environment. Working knowledge ticketing tools like Service Now etc. Any one Information Security certification (Security +, CISSP, CIAM) or IAM vendor- based certifications (CyberArk, Oracle, IBM) Banking Domain Experience Ability to assess current processes/procedures and make recommendations for efficiency. Proven experience in mentoring less experienced team members Basic troubleshooting skills over UNIX Database Mainframe Active Directory. Exposure on escalation processes/matrix and ability to prioritize tasks. Basic knowledge on programming languages like Python, VBA etc.

Posted 3 weeks ago

Apply

5.0 - 10.0 years

5 - 15 Lacs

bengaluru

Work from Office

Description: • Create execution plan • Carry out design and architecture phase • Validate implementation of the secure appliance • Integrate security measures with the edge devices • Validation of the implementation with stakeholders • Pen testing as required Requirements: • Creating a secure device which interfaces with all devices and handles all outbound and inbound communications. • Facilitates hosting of customer specific security requirements like AV, end point monitoring agents etc. • Understand requirements from Alcon and it’s end customers • Create execution plan • Carry out design and architecture phase • Validate implementation of the secure appliance • Integrate security measures with the edge devices • Validation of the implementation with stakeholders • Pen testing as required Job Responsibilities: • Understand requirements from Client and it’s end customers • Create execution plan • Carry out design and architecture phase • Validate implementation of the secure appliance • Integrate security measures with the edge devices • Validation of the implementation with stakeholders • Pen testing as required What We Offer: Exciting Projects: We focus on industries like High-Tech, communication, media, healthcare, retail and telecom. Our customer list is full of fantastic global brands and leaders who love what we build for them. Collaborative Environment: You Can expand your skills by collaborating with a diverse team of highly talented people in an open, laidback environment — or even abroad in one of our global centers or client facilities! Work-Life Balance: GlobalLogic prioritizes work-life balance, which is why we offer flexible work schedules, opportunities to work from home, and paid time off and holidays. Professional Development: Our dedicated Learning & Development team regularly organizes Communication skills training(GL Vantage, Toast Master),Stress Management program, professional certifications, and technical and soft skill trainings. Excellent Benefits: We provide our employees with competitive salaries, family medical insurance, Group Term Life Insurance, Group Personal Accident Insurance , NPS(National Pension Scheme ), Periodic health awareness program, extended maternity leave, annual performance bonuses, and referral bonuses. Fun Perks: We want you to love where you work, which is why we host sports events, cultural activities, offer food on subsidies rates, Corporate parties. Our vibrant offices also include dedicated GL Zones, rooftop decks and GL Club where you can drink coffee or tea with your colleagues over a game of table and offer discounts for popular stores and restaurants!

Posted 3 weeks ago

Apply

1.0 - 3.0 years

1 - 3 Lacs

pune, maharashtra, india

On-site

ISA Primary Responsibilities: L1 Analyst experienced in Azure Sentinel. Preferred certification- SC 200. Open and track incidents based on suspicious alerts and/or logs in accordance with the intervention protocol of each client. Monitor the networks of clients using our SIEM, ensure the availability of said infrastructure and recommend solutions that would improve the security posture of the clients. Produce the required monthly reports. Compile and produce weekly vulnerability reports. Answer and respond to calls for support on incident. ISA Qualification: University Degree in IT or College degree with 2 years of relevant IT experience. Proficiency in communication protocols found on modern networks (ICMP, IP, UDP, TCP, ARP, HTTP, HTTPS/SSL, SNMP, POP, etc. ) Sound knowledge of network security topics Ability to analyze, assess vulnerabilities and provide recommendations One or more of the following security certifications: CEH, GISF, Security+, SSCP will be considered an asset Other security certifications will be considered an asset Experience with SIEM & Incident handling will be considered an asset ISA Skills and Experience: Client-focused approach with excellent communication in English Strong analysis, organizational and documentation skills Flexibility and adaptability to change Sense of urgency, resourcefulness and initiative

Posted 3 weeks ago

Apply

4.0 - 9.0 years

7 - 17 Lacs

bengaluru

Work from Office

About this Role: Wells Fargo is seeking a Senior Information Security Analyst. Responsibilities : This position is a Senior Information Security Analyst performing the role of an Application Security Champion who will be responsible for reviewing security requirements and security design submissions by application teams. Reviewing security requirements and security design submissions by application teams. Submissions will either be approved or rejected based on evaluation and comparison to systems of record. Provide information security consultation to improve awareness and compliance with Enterprise Application Security Program (EASP) policy, processes, and standards. Perform remediation of security assessment review issues and reporting to support EASP risk management. Provide guidance and direction in reviewing assessment findings and mitigating controls to optimize application security. Validate SAST, DAST and SCA scans and recommend the fix for application teams. Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals. Interact with teammates across all Lines of Business. Required Qualifications: 4+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education Desired Skills: 2+ years of experience as application security champion 2+ years of experience in at least one of the following practices like Security Requirements, Application Threat Modeling, Static Analysis, Application Security Risk Assessments, Security Design requirements. Knowledge and experience in identifying and suggesting mitigations to OWASP top 10, CWE/SANS top 25 to development teams. Ability to manage multiple priorities in a fast-paced dynamic environment. Advanced problem solving skills, ability to develop effective long-term solutions to problems. Excellent verbal and written communication skills Excellent inter-personal skills contributing to cordial team environment Knowledge and understanding of secure SDLC (System Development Life Cycle) methodologies. Experience in drafting application security coding standards. Ability to manage highly complex issues and negotiate solutions. Knowledge and understanding of Application security threat management and mitigation domain. Application security experience with banking/financial services applications. Certified in Industry renowned certifications like CISSP, CSSLP, CEH etc. Job Expectations: This position will also be responsible to work with software development partners, business system consultants and LOB leads to perform security assessments on variety of applications to identify security defects and provide remediation recommendation by following the processes and policies. Submissions will either be approved or rejected based on evaluation and comparison to systems of record.

Posted 3 weeks ago

Apply

4.0 - 8.0 years

9 - 19 Lacs

pune, chennai, bengaluru

Hybrid

Role & responsibilities 1 1 . Vulnerability Assessment & Management. Coordinate with IT teams to patch systems and applications based on critical vulnerabilities. Assess and mitigate security risks associated with new software, systems, and third-party services. 2. Compliance & Risk Management Ensure compliance with industry standards (ISO 27001, NIST, GDPR, SOC 2) and regulatory requirements. Perform risk assessments to evaluate the effectiveness of existing security controls. Work with internal teams to implement best practices for secure configurations and data protection. 3. Security Architecture & Implementation Assist in designing and implementing secure architectures for cloud, on-premises, and hybrid environments. Evaluate and recommend new cybersecurity tools and technologies. Preferred candidate profile Experience: 4-8 Years Location: Pune / Chennai / Bangalore Employment Type: Permanent Full Time Mandatory Skill: Vulnerability Assessment & Management, Security Architecture & Implementation *** Looking up for candidates who can join in 0-30 Days max **** (Please don't apply if you are NP is more than 30 days) If you are interested in above JD kindly share resume to lakshmi.naidu@citiustech.com with below details: Total Experience: Relevant Experience: Current CTC: Expected CTC: Notice Period: Current Location

Posted 3 weeks ago

Apply

9.0 - 12.0 years

27 - 35 Lacs

telangana

Work from Office

Secondary skill Experience with security tools and technologies (e.g., SIEM, IDS/IPS, firewalls). Familiarity with DevSecOps practices. Missions We are seeking a skilled Cloud Security Analyst to join our team. The ideal candidate will have extensive experience in cloud security, particularly with Azure, AWS, and Microsoft 365 (M365). This role involves ensuring the security of our cloud infrastructure, identifying and mitigating risks, and implementing best practices to protect our data and systems Design, implement, and manage security measures for cloud environments (Azure, AWS, M365). Monitor cloud infrastructure for security breaches and respond to incidents. Conduct regular security assessments and audits. Develop and enforce security policies and procedures. Collaborate with IT and development teams to ensure secure deployment of applications. Stay updated with the latest security trends and threats. Responsible to managed cloud operational security Review users request on Azure and provide approval or implement required configuration (ex admin consent (permissions to internal or external applications to access Cloud Tenant with the user account)) Azure access reviews configuration and follow-up (report on non-completed reviews, send reminder to reviewers and reschedule access reviews) Monitor and provide report on Conditional access group exception groups Monitor and report on security alerts (Defender for Cloud) not managed by SG SOC. Provide training and guidance to staff on cloud security best practices. Profile Strong organizational, analytical and reporting as well as determination skills Previous experience of network security components administration Experience with security tools and technologies (e.g., SIEM, IDS/IPS, firewalls). Familiarity with DevSecOps practice

Posted 3 weeks ago

Apply

4.0 - 6.0 years

12 - 18 Lacs

chennai

Work from Office

Role Description As a Senior DevOps Security Specialist at Incedo, you will be responsible for designing and implementing security solutions for DevOps environments. You will work with development and operations teams to design and implement security solutions that are integrated into the DevOps process. You will be skilled in tools such as GitLab or Jenkins and have experience with security architecture design patterns such as identity and access management and secure coding practices. Roles & Responsibilities: Collaborating with DevOps teams to identify security vulnerabilities and risks Designing and implementing security controls and procedures for DevOps processes Conducting security audits and risk assessments Developing and maintaining security documentation and policies Providing guidance and mentorship to junior DevOps Security Specialists Staying up-to-date with industry trends and best practices in DevOps Security as technologies involved may include Kubernetes, Docker, Terraform, Ansible, Chef, Puppet, Jenkins, Git, AWS, Azure, and Google Cloud Platform. Technical Skills Skills Requirements: Knowledge of security standards and best practices for cloud platforms such as AWS, Azure, or GCP Experience in designing and implementing security controls for CI/CD pipelines and infrastructure Familiarity with security tools such as vulnerability scanners, intrusion detection and prevention systems (IDPS), and firewalls Knowledge of scripting languages such as Python, Bash, or PowerShell Must have excellent communication skills and be able to communicate complex technical information to non-technical stakeholders in a clear and concise manner. Must understand the company's long-term vision and align with it. Provide leadership, guidance, and support to team members, ensuring the successful completion of tasks, and promoting a positive work environment that fosters collaboration and productivity, taking responsibility of the whole team. Nice-to-have skills Qualifications 4-6 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred

Posted 4 weeks ago

Apply

2.0 - 6.0 years

0 Lacs

pune, maharashtra

On-site

The Applications Development Intermediate Programmer Analyst position is an intermediate level role responsible for contributing to the establishment and implementation of new or updated application systems and programs in collaboration with the Technology team. Your main objective will be to participate in applications systems analysis and programming activities. You will utilize your knowledge of applications development procedures, concepts, and basic understanding of technical areas to identify necessary system enhancements. This includes using script tools, analyzing code, and defining system improvements. You will also consult with users, clients, and technology groups to address issues, recommend programming solutions, and provide support for customer exposure systems. Additionally, you will apply your programming language expertise to create design specifications and analyze applications for vulnerabilities and security issues, followed by testing and debugging. In this role, you will act as an advisor or coach to new or lower-level analysts, identify problems, analyze information, and make recommendations for solutions. You will need to demonstrate independence of judgment, exercise autonomy, and serve as a subject matter expert to senior stakeholders and team members. Furthermore, you will be responsible for assessing risks in business decisions, maintaining compliance with laws and regulations, upholding ethical standards, and managing control issues with transparency. Qualifications: - 2-5 years of relevant experience in the Financial Service industry - Intermediate level experience in Applications Development role - Clear and concise written and verbal communication skills - Strong problem-solving and decision-making abilities - Capability to work under pressure, manage deadlines, and adapt to unexpected changes in expectations or requirements Education: - Bachelor's degree/University degree or equivalent experience Please note that this job description offers a general overview of the tasks involved. Additional job-related duties may be assigned as necessary. This role falls under the Technology Job Family Group, specifically in the Applications Development Job Family, and is a full-time position.,

Posted 4 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies