Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
8.0 - 10.0 years
10 - 12 Lacs
Mumbai
Work from Office
Req ID: 326830 We are currently seeking a Security Architect to join our team in Bangalore, Karntaka (IN-KA), India (IN). Job Title / Role: GCP & GKE Staff Engineer NTT DATA Services strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now. We are currently seeking a Digital Engineering Lead Engineer to join our team in Bangalore, Karntaka (IN-KA), India (IN). Job Description: Primary Skill: Professional Cloud Security Engineer & Cloud-Infrastructure-Google Cloud Platform Related experience: 5+ years of experience in cloud security engineering and automation Total Experience: 8+ Years Must have GCP Solution Architect Certification & Professional Cloud Security Engineer Mandatory Skills: Technical Qualification/ Knowledge: This role supports operational security, control configuration, and secure design practices for GCP workloads. Roles & Responsibilities Implement GCP security controls: IAM, VPC security, VPNs, KMS, Cloud Armor, and secure networking. Manage GCP identity and access, including SSO, MFA, and federated IDP configurations. Monitor workloads using Cloud Operations Suite and escalate anomalies. Conduct basic threat modelling, vulnerability scanning, and patching processes. Automate security audits and compliance controls using Terraform and Cloud Shell scripting. Assist architects in deploying and maintaining secure-by-default infrastructure. Support audit preparation, policy enforcement, and evidence gathering. Collaborate with cross-functional teams to resolve security alerts and Expertise in assessment, designing and implementing GCP solutions including aspects like compute, network, storage, identity, security , DR/business continuity strategy, migration , templates , cost optimization, PowerShell , Ansible etc.. Should have prior experience in executing large complex cloud transformation programs including discovery, assessment , business case creation , design , build , migration planning and migration execution Should have prior experience in using industry leading or native discovery, assessment and migration tools Good knowledge on the cloud technology, different patterns, deployment methods, compatibility of the applications Good knowledge on the GCP technologies and associated components and variations Anthos Application Platform Compute Engine , Compute Engine Managed Instance Groups , Kubernetes Cloud Storage , Cloud Storage for Firebase , Persistant Disk , Local SSD , Filestore , Transfer Service Virtual Private Network (VPC), Cloud DNS , Cloud Interconnect , Cloud VPN Gateway , Network Load Balancing , Global load balancing , Firewall rules , Cloud Armor Cloud IAM , Resource Manager , Multi-factor Authentication , Cloud KMS Cloud Billing , Cloud Console , Stackdriver Cloud SQL, Cloud Spanner SQL, Cloud Bigtable Cloud Run Container services, Kubernetes Engine (GKE) , Anthos Service Mesh , Cloud Functions , PowerShell on GCP Solid understanding and experience in cloud computing based services architecture, technical design and implementations including IaaS, PaaS, and SaaS. Design of clients Cloud environments with a focus on mainly on GCP and demonstrate Technical Cloud Architectural knowledge. Playing a vital role in the design of production, staging, QA and development Cloud Infrastructures running in 24x7 environments. Delivery of customer Cloud Strategies, aligned with customers business objectives and with a focus on Cloud Migrations and DR strategies Nurture Cloud computing expertise internally and externally to drive Cloud Adoption Should have a deep understanding of IaaS and PaaS services offered on cloud platforms and understand how to use them together to build complex solutions. Ensure that all cloud solutions follow security and compliance controls, including data sovereignty. Deliver cloud platform architecture documents detailing the vision for how GCP infrastructure and platform services support the overall application architecture, interaction with application, database and testing teams for providing a holistic view to the customer. Collaborate with application architects and DevOps to modernize infrastructure as a service (IaaS) applications to Platform as a Service (PaaS) Create solutions that support a DevOps approach for delivery and operations of services Interact with and advise business representatives of the application regarding functional and non-functional requirements Create proof-of-concepts to demonstrate viability of solutions under consideration Develop enterprise level conceptual solutions and sponsor consensus/approval for global applications. Have a working knowledge of other architecture disciplines including application, database, infrastructure, and enterprise architecture. Identify and implement best practices, tools and standards Provide consultative support to the DevOps team for production incidents Drive and support system reliability, availability, scale, and performance activities Evangelizes cloud automation and be a thought leader and expert defining standards for building and maintaining cloud platforms. Knowledgeable about Configuration management such as Chef/Puppet/Ansible. Automation skills using CLI scripting in any language (bash, perl, python, ruby, etc) Ability to develop a robust design to meet customer business requirement with scalability, availability, performance and cost effectiveness using GCP offerings Ability to identify and gather requirements to define an architectural solution which can be successfully built and operate on GCP Ability to conclude high level and low level design for the GCP platform which may also include data center design as necessary Capabilities to provide GCP operations and deployment guidance and best practices throughout the lifecycle of a project Understanding the significance of the different metrics for monitoring, their threshold values and should be able to take necessary corrective measures based on the thresholds Knowledge on automation to reduce the number of incidents or the repetitive incidents are preferred Good knowledge on the cloud center operation, monitoring tools, backup solution GKE Set up monitoring and logging to troubleshoot a cluster, or debug a containerized application. Manage Kubernetes Objects Declarative and imperative paradigms for interacting with the Kubernetes API. Managing Secrets Managing confidential settings data using Secrets. Configure load balancing, port forwarding, or setup firewall or DNS configurations to access applications in a cluster. Configure networking for your cluster. Hands-on experience with terraform. Ability to write reusable terraform modules. Hands-on Python and Unix shell scripting is required. understanding of CI/CD Pipelines in a globally distributed environment using Git, Artifactory, Jenkins, Docker registry. Experience with GCP Services and writing cloud functions. Hands-on experience deploying and managing Kubernetes infrastructure with Terraform Enterprise. Ability to write reusable terraform modules. Certified Kubernetes Administrator (CKA) and/or Certified Kubernetes Application Developer (CKAD) is a plus Experience using Docker within container orchestration platforms such as GKE. Knowledge of setting up splunk Knowledge of Spark in GKE Process/ Quality Knowledge: Must have clear knowledge on ITIL based service delivery ITIL certification is desired Knowledge on quality Knowledge on security processes Soft Skills: Excellent communication skill and capability to work directly with global customers Strong technical leadership skill to drive solutions Focused on quality/cost/time of deliverables Timely and accurate communication Need to demonstrate the ownership for the technical issues and engage the right stakeholders for timely resolution. Flexibility to learn and lead other technology areas like other public cloud technologies, private cloud, automation Good reporting skill Willing to work in different time zones as per project requirement Good attitude to work in team and as individual contributor based on the project and situation Focused, result oriented and self-motivating
Posted 3 months ago
3.0 - 6.0 years
5 - 8 Lacs
Mumbai
Work from Office
Your day at NTT DATA The Security Managed Services Engineer (L2) is a developing engineering role, responsible for providing a managed service to clients to ensure that their Security Infrastructures and systems remain operational. Through the proactive monitoring, identifying, investigating, and resolving of technical incidents and problems, this role is able to restore service to clients. The primary objective of this role is to proactively review client requests or tickets and apply technical/process knowledge to resolve them without breaching service level agreement (SLA) and focuses on second-line support for incidents and requests with a medium level of complexity. The Security Managed Services Engineer (L2) may also contribute to / support on project work as and when required. What youll be doing Key Responsibilities: Proactively monitors the work queues. Performs operational tasks to resolve all incidents/requests in a timely manner and within the agreed SLA. Updates tickets with resolution tasks performed. Identifies, investigates, analyses issues and errors prior to or when they occur, and logs all such incidents in a timely manner. Captures all required and relevant information for immediate resolution. Provides second level support to all incidents, requests and identifies the root cause of incidents and problems. Communicates with other teams and clients for extending support. Executes changes with clear identification of risks and mitigation plans to be captured into the change record. Follows the shift handover process highlighting any key tickets to be focused on along with a handover of upcoming critical tasks to be carried out in the next shift. Escalates all tickets to seek the right focus from CoE and other teams, if needed continue the escalations to management. Works with automation teams for effort optimization and automating routine tasks. Ability to work across various other resolver group (internal and external) like Service Provider, TAC, etc. Identifies problems and errors before they impact a clients service. Provides Assistance to L1 Security Engineers for better initial triage or troubleshooting. Leads and manages all initial client escalation for operational issues. Contributes to the change management process by logging all change requests with complete details for standard and non-standard including patching and any other changes to Configuration Items. Ensures all changes are carried out with proper change approvals. Plans and executes approved maintenance activities. Audits and analyses incident and request tickets for quality and recommends improvements with updates to knowledge articles. Produces trend analysis reports for identifying tasks for automation, leading to a reduction in tickets and optimization of effort. May also contribute to / support on project work as and when required. May work on implementing and delivering Disaster Recovery functions and tests. Performs any other related task as required. Knowledge and Attributes: Ability to communicate and work across different cultures and social groups. Ability to plan activities and projects well in advance, and takes into account possible changing circumstances. Ability to maintain a positive outlook at work. Ability to work well in a pressurized environment. Ability to work hard and put in longer hours when it is necessary. Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information, and refraining from interrupting. Ability to adapt to changing circumstances. Ability to place clients at the forefront of all interactions, understanding their requirements, and creating a positive client experience throughout the total client journey. Academic Qualifications and Certifications: Bachelors degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience). Certifications relevant to services supported. Certifications carry additional weightage on the candidates qualification for the role. CCNA certification in must, CCNP in Security or PCNSE certification is good to have. Required Experience: Moderate level of relevant managed services experience handling Security Infrastructure. Moderate level of knowledge in ticketing tools preferably Service Now. Moderate level of working knowledge of ITIL processes. Moderate level of experience working with vendors and/or 3rd parties. Workplace type On-site Working
Posted 3 months ago
4.0 - 7.0 years
9 - 10 Lacs
Pune
Work from Office
Role: SOC Analyst Location: Kharadi, Pune Life Unlimited. At Smith+Nephew, we design and manufacture technology that takes the limits off living! The Security Analyst works on the detection and response for potential security incidents on the Smith & Nephew network, systems, and applications. This includes technical analysis and incident management, communications, and reporting. The role works with the Global SOC Manager. The work includes partnering closely with other functions within Information Security, with outsourced tier 1 SOC functions, with the wider IT team including Service Desk, as well as with HR, Legal, Procurement, and other functions. The role interacts with end users and technical resolver teams within Smith & Nephew as well as outsourced suppliers. The working hours are Monday to Friday (11AM - 8PM IST). What will you be doing? Complete alert and incident response activities following standard runbooks and processes, with work to include the initial triage and analysis, recording of the incident with all relevant details to high standards, and documenting all containment and response actions. Uses Smith+Nephew technology platforms and security tools to conduct investigations such as threat hunting or other proactive investigations outside the incident process. Write comprehensive reports including assessment-based findings, outcomes, and propositions for enhancements such as new detection plays, new runbooks or playbooks, process improvements, or tuning detection rules. Mentoring and coaching other team members, sharing skills and experience to enable higher levels of performance. Provide technical domain expertise to projects and initiatives aimed at improving the capability and maturity of Smith & Nephew information security practices. What will you need to be successful? Bachelor s degree in Computer Science or a related subject preferred or equivalent experience. Licenses/Certifications: Relevant entry- or mid-level security certifications are advantageous but not required. Job-specific training will be provided. Experience: At least 4 years of experience in a relevant Information Security role. Experience working hands-on with SIEM and EDR/XDR technologies for the identification and response to existing and emerging threats. Familiar with MITRE ATT&CK for the identification and mapping of attacker tactics, techniques, and procedures (TTPs). Familiarity with network models (OSI and TCP/IP), common network terminology and concepts, and network equipment. Must be able to correctly interpret logs for firewalls (including WAF and IDS/IPS), Windows and Linux operating system logs, AWS and Azure cloud logs. Familiarity with web-related technologies (Web applications, Web Services, Service Oriented Architectures) and network/web-related protocols. Competences: Understanding of industry frameworks such as MITRE ATT&CK, MITRE D3FEND, NIST CSFv2, and NIST SP800-61r2. Using SIEM (including scripted query languages) and EDR/XDR technologies, threat intelligence tools, and ITSM tools. Familiarity with AWS and Azure cloud technologies and cloud security standards (CSA or equivalent). Understanding of API security and familiarity with AI security concepts (such as NIST AI RMF). Familiarity with ITIL methodology and terminology. Excellent written and oral communication skills, service attitude, and analytical approach to problem solving. Ability to work independently without daily direction, balancing conflicting priorities, and effectively tracking and managing task completion to committed deadlines. You. Unlimited. We believe in crafting the greatest good for society. Our strongest investments are in our people and the patients we serve. Inclusion, Diversity and Equity- Committed to Welcoming, Celebrating and Thriving on Diversity, Learn more about Employee Inclusion Groups on our website ( https://www.smith-nephew.com/ ). Other reasons why you will love it here! Your Future: Major medical coverage + policy exclusions and insurance non-medical limit. Educational Assistance. Work/Life Balance: Flexible Personal/Vacation Time Off, Privilege Leave, Floater Leave. Your Wellbeing: Parents/Parents in Law s Insurance (Employer Contribution of 7,000/- annually), Employee Assistance Program, Parental Leave. Flexibility : Hybrid Work Model (For most professional roles) Training: Hands-On, Team-Customized, Mentorship Extra Perks: Free Cab Transport Facility for all employees; One-Time Meal provided to all employees as per shift. Night shift allowances
Posted 3 months ago
3.0 - 6.0 years
13 - 17 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
Alorica India Private Limited is looking for IT.Information Security.Data Security.Analyst II to join our dynamic team and embark on a rewarding career journey Monitor and analyze data security threats Implement policies for secure data access Conduct audits and risk assessments Support compliance and incident response
Posted 3 months ago
1.0 - 3.0 years
6 - 7 Lacs
Pune
Work from Office
Knowledge of Information Security technologies (EDR, NDR, IPS, WAF, SIEM) Understanding of networking protocols (TCP/IP) security methodologies (ACL/NAC) & topologies Working knowledge of Windows and Linux OS, security incident response processes Required Candidate profile Working knowledge of analyzing, responding & remediating network intrusions, web app, & server attacks, scripting ,root cause determination, containerization concepts & tools
Posted 3 months ago
5.0 - 8.0 years
12 - 16 Lacs
Chennai
Work from Office
An experienced security analyst who can independently monitor, analyze, and respond to security incidents They possess a deeper understanding of security tools, technologies, and threat landscapes compared to L1 analysts L2 analysts are capable of conducting more complex investigations, threat hunting, and contributing to the improvement of security processes They often act as mentors to L1 analysts and assist in incident escalation and resolution Additional Skills: SOC, DFIR,IR,Vulnerablity management , pentesting
Posted 3 months ago
1.0 - 5.0 years
7 - 8 Lacs
Bengaluru
Work from Office
Must haves: Security Testing experienceRoles Responsibilities: Designing the security test cases along with different attack vectors as per the best practices Conduct infrastructure security test, application security testing (SAST, DAST, Pen Test), Data Hub Platform security test, and Blue Yonder SaaS configuration review as per the defined checklist Execution of the security tests and identifying the vulnerabilities Raising of risks and issues to the Security Specialist Interaction with the client stakeholders for access and execution Prepare detailed infrastructure security test, application security testing (SAST, DAST, Pen Test), Data Hub Platform security test, and Blue Yonder SaaS configuration review report for review
Posted 3 months ago
3.0 - 8.0 years
4 - 5 Lacs
Warangal, Hyderabad, Nizamabad
Work from Office
Total experience 3 years as Cyber Security Analyst. Knowledge on LogRhythm SIEM tool. Incident handling Total experience 3 years as Cyber Security Analyst. Knowledge on LogRhythm SIEM tool. Incident handling Job description 2-3 years of Experience in SIEM analyst and incident handling. B.E/B.Tech Roles and Responsibilities: 3+ years experience as a SOC analyst and any SIEM tool. Min 2+ years experience on LogRhythm SIEM. Responsible for alerts monitoring and incident handling. Perform the initial analysis and identify if any potential threat. Analyse security alerts and determine their validity and potential impact on the organization. Review and analyse security logs from various sources (e.g., firewalls, intrusion detection/prevention systems, and endpoint protection) Correlating logs from various security controls to gather more insight of the suspected event. Regularly preparing log monitoring reports and daily security report and proactively work on it. Document security incidents, including the steps taken to resolve them and any lessons learned. Ensure compliance with security policies, procedures, and regulatory requirement Work closely with other IT and security team members to enhance overall security posture. Coordinate with the L2 and L3 for any escalations. Knowledge on cyber kill chain and MITRE Attack frameworks and mythologies. Knowdledge on various cyber attacks in Cyber security world. Certifications: LogRhythm Security Analyst (LRSA) from LogRhythm University CEH
Posted 3 months ago
4.0 - 6.0 years
6 - 13 Lacs
Chennai
Work from Office
ROLE AND RESPONSIBILITIES The Level 1 IT/OT Engineer executes assigned work orders, including support tickets and project tasks to meet Managed Security Services Provider (MSSP) and other contractually defined obligations for new and existing customer facilities. This role will perform routine and scheduled maintenance and support tasks, work break/fix and other trouble and support tickets, act as a subject matter expert for programs and products offered, and respond to other emergent conditions across the fleet. Candidates must possess a strong understanding of and direct experience with concepts and best practices related to IT/OT systems.This is an opportunity to be part of a world-class team operating at the nexus of two of the most exciting and fastest-growing sectors in renewable energy today: SCADA IT/OT and mission-critical software. Work Location : Chennai Notice period : Immediate Experience : 4 to 6 years Shift : UK Shift PREFERRED EXPERIENCE • Experience in NERC CIP-regulated environments is preferred. • Experience in compliance programs or standard-driven environments (e.g., PCI-DSS, NIST, ISO-27001) • SOC, NOC, or other operation center experience • Work experience in at least one of the following areas: • Network and infrastructure design, deployment, or maintenance. • Power generation, especially renewable energy. REQUIRED QUALIFICATION & EDUCATION • A university technical degree or minimum 1-2 years of relevant IT/OT professional experience. • Direct or indirect service experience and/or experience providing remote support. • Ability to read electrical, network, infrastructure, and cabling drawings. • All applicants must have prior professional IT/OT systems management experience and knowledge in at least two of the following fields: • Server hardware and OS management. • Networking and infrastructure design, implementation, and management. • Cybersecurity, including Next-Generation Firewall configuration and management. Interested candidates can apply to kinnera259@gmail.com. Regards, HR Manager
Posted 3 months ago
3.0 - 4.0 years
3 - 6 Lacs
Bengaluru
Work from Office
Everbridge is seeking an energetic, multi-tasking, and process focused Sales Security Analyst to support our nationwide sales team. The Sales Security Analyst provides a wide range of security, privacy, and operational support to the Everbridge sales team. The Sales Security Analyst will also become a strong user of Salesforce.com and confidential messaging technologies (email and 3rd party based). What youll do Responding to client security inquiries and questionnaires Validating confidentiality and deploying security attestation documentation Reviewing security and compliance requirements in contract negotiations Participating in security control discussions with our Legal Team and clients/prospects Interacting with Everbridge Security & Compliance teams to obtain up to date content/responses Managing and updating security response content and associated security artifacts Creating and configuring environments in Everbridge s SaaS system to be used by sales, technical, and client teams Reviewing and assigning incoming proposals and engaging with our proposal management team as first point of contact for technical and operational support. What youll bring: Minimum experience required for the role is 3 yrs. High level understanding of internet hosted applications, highly available architectures, computer security, telephony, and networking Experience interfacing with business and technical teams Ability to learn, understand, and discuss technical concepts, security/compliance requirements and regulations Ability to maintain a high level of productivity in a fast-paced, team environment while managing multiple competing priorities Strong time management skills with proficiency with the Microsoft Office Suite Knowledge of Salesforce.com application a plus
Posted 3 months ago
1.0 - 3.0 years
3 - 5 Lacs
Pune
Work from Office
Security Analyst - J48925 REQUIRED EDUCATION/QUALIFICATIONS/EXPERIENCE Bachelors degree in information technology, information security, computer science, or related field One plus (1+) years of experience working with security solutions and technologies One plus (1+) years of experience working with information/endpoint/network security DESIRED EDUCATION/QUALIFICATIONS/EXPERIENCE Security Operations Center experience Experience with Endpoint Protection Platforms, Network Intrusion Protection Systems, and Web Application Firewalls REQUIRED SKILLS/ABILITIES Basic knowledge of security incident response processes Working knowledge of Information Security technologies (EDR, NDR, IPS, WAF, SIEM, etc.) Understanding of networking protocols (TCP/IP), security methodologies (ACL/NAC), and topologies Working knowledge of Windows and Linux OS Strong critical thinking and problem-solving skills Ability to communicate effectively with other team members Excellent attention to detail and follow-through to completion Ability to handle multiple tasks in a fast-paced and deadline-driven environment DESIRED SKILLS/ABILITIES Solid understanding of Information Security Methodology Working knowledge of analyzing, responding, and remediating network intrusions, web app, and server attacks Working knowledge of scripting (PowerShell, Bash, Python) Knowledge of containerization concepts and tools (Kubernetes, Docker, etc.) Knowledge of root cause determination Understanding of impacts to environment and clients WORKING ENVIRONMENT/PHYSICAL DEMANDS Work at assigned locations Perform tasks for long periods of time on a computer Regular attendance and a regular work schedule are essential functions of this job Work includes on call rotations as part of a 24/7/365 team Required Candidate profile Candidate Experience Should Be : 1 To 3 Candidate Degree Should Be : BE-Comp/IT,BE-Other
Posted 3 months ago
3 - 8 years
9 - 10 Lacs
Bengaluru
Work from Office
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identity and access management, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the most advanced cyber threats. We leverage our global scale and decades of experience to accelerate our clients cyber outcomes through a full lifecycle of cybersecurity services. We are a global company with operating centers in the United States, Canada, the United Kingdom, and India. About the Job: The Managed Services Senior Security Analyst is responsible for providing security solutions to clients. The Senior Security Analyst will demonstrate the capacity to consistently meet and exceed client expectations, by representing and reinforcing the Cyderes brand through positive interaction with other teams within the company. Perform deep dive investigations into security threats, understand and implement MITRE mapping to identify customers current security posture. Responsibilities: Provide overall guidance, instructions, and mentorship to other Security Analysts Perform triage and security investigation based on advanced analysis tasks across the endpoint, server, and network and provide recommendations. Perform remediation actions wherever applicable. Coordinate Incident investigations and perform deep dive analysis on detected threats. Understand and identify indicators of attack and compromise in alerts, by hunting through data, and from review of investigation notes. Have full understanding of the MITRE ATT&CK framework. Mapping custom use cases to tactics and techniques. Update documentation and runbooks to avoid repeatable alerts. Document, communicate recommendations and guidelines based on results of analysis. Analyze, review, and provide raw log data for more insight into escalations through SIEM. Communicate effectively orally and in writing. Maintain current knowledge and understanding of threat landscape. Requirements: 5 or more years of progressing/in-depth IT security experience. Practical experience in a senior role within the last three years and demonstrated ability to carry out the functions of the job. Previous Experience with any of the two leading SIEM like Splunk, Sentinel, Chronical etc. Previous experience on any of the EDR tools like - Defender, SentinalOne, CrowdStrike etc. Advanced knowledge SIEM platform and query language (KQL or SPL.) Possess at least one industry certification Sec+, CEH SC200, CC (Cloud Fundamental Security knowledge). Prior knowledge of SOAR platform such as Siemplify, Forti soar etc. Understanding of Phishing and email header analysis. Contributing on whitelisting, Tuning management. Experience in SOC and Incident Response activities. Expert-level Analysis of security events. SIEM content management knowledge is an advantage. Basic scripting or development experience will be an added advantage. Cyderes i s an Equal Opportunity Employer (EOE). Qualified applicants are considered for employment without regard to race, religion, color, sex, age, disability, sexual orientation, genetic information, national origin, or veteran status. Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position.
Posted 4 months ago
2 - 7 years
7 - 10 Lacs
Bengaluru
Work from Office
Join Natus Sensory to start a new adventure in the medical device industry today and make a difference in someone s life. Our Product Security Analyst (Remote) works closely with global cross-functional teams to protect the confidentiality, integrity, and availability of Natus medical devices and services from information security threats and vulnerabilities. The role supports customer product security and privacy inquiries, security and privacy product assessments, and the Natus secure development lifecycle, including new strategies, policies, procedures, and best practices. Here s what you can expect: Location: Remote Main Responsibilities Serve as the Subject Matter Expert (SME) on industry threat intelligence and best practices. This will require conducting research and staying up-to-date on emerging security trends, threats, and technologies while working closely with cross-functional teams to identify and deploy solutions within Natus products. Conduct Product Security Risk Assessments working with cross-functional teams as needed to identify threat sources and determine the likelihood and impact of successful exploitation of vulnerabilities on product assets and functions. Work with cross-functional teams to create Product Security Requirements based on risk assessment results, industry best practices and guidelines, customer feedback, emerging trends, threats intelligence, and emerging technologies. Work with Engineering teams to assess the cybersecurity posture products supporting security testing activities (e.g. SAST, SCA, Vulnerabilities Analysis, Pen Testing, etc.). Work with Marketing, Sales, and Service to respond to customer inquiries, questionnaires, and risk assessments Travel: Up to 10% domestic or international travel on an as needed basis to visit a Natus or customer site for complex investigations Qualifications Product Security Analyst Qualifications Bachelors degree (B.A.) from a four-year college or university and five years related experience and/or training; an equivalent combination of education and experience can be considered At least three years related experience in Cybersecurity in a heavily regulated environment Demonstrated experience with system security, security compliance and securing developmental lifecycles Knowledge of Information security risk assessment methodologies and standards Ability to communicate with and influence technical and non-technical customers, colleagues, and vendors Ability to organize, prioritize, and coordinate multiple work activities and meet target deadlines in a fast paced environment Strength in statistical analysis, identification of trends, matching information to issues and relevant reporting Developing knowledge of information security best practices, standards, guidelines, and frameworks, including NIST 800-53, NIST RMF, and NIST CSF. Strongly preferred: FDA Pre-market and Post-market Guidance for Cybersecurity in Medical Devices, the HIPPA Security Rule, HSCC Joint Security Plan, AAMI TIR57, ISO/IEC 27000 family. We offer The role is a work-from-home remote position. Minimal travelling: less than 5% Collaborative and international environment with different cultures. English company language. EEO Statement Natus Sensory is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, veteran status, disability, sexual orientation, gender identity, or any other protected status.
Posted 4 months ago
1 - 3 years
2 - 4 Lacs
Pune
Work from Office
Security Analyst - J48925 REQUIRED EDUCATION/QUALIFICATIONS/EXPERIENCE Bachelors degree in information technology, information security, computer science, or related field One plus (1+) years of experience working with security solutions and technologies One plus (1+) years of experience working with information/endpoint/network security DESIRED EDUCATION/QUALIFICATIONS/EXPERIENCE Security Operations Center experience Experience with Endpoint Protection Platforms, Network Intrusion Protection Systems, and Web Application Firewalls REQUIRED SKILLS/ABILITIES Basic knowledge of security incident response processes Working knowledge of Information Security technologies (EDR, NDR, IPS, WAF, SIEM, etc.) Understanding of networking protocols (TCP/IP), security methodologies (ACL/NAC), and topologies Working knowledge of Windows and Linux OS Strong critical thinking and problem-solving skills Ability to communicate effectively with other team members Excellent attention to detail and follow-through to completion Ability to handle multiple tasks in a fast-paced and deadline-driven environment DESIRED SKILLS/ABILITIES Solid understanding of Information Security Methodology Working knowledge of analyzing, responding, and remediating network intrusions, web app, and server attacks Working knowledge of scripting (PowerShell, Bash, Python) Knowledge of containerization concepts and tools (Kubernetes, Docker, etc.) Knowledge of root cause determination Understanding of impacts to environment and clients WORKING ENVIRONMENT/PHYSICAL DEMANDS Work at assigned locations Perform tasks for long periods of time on a computer Regular attendance and a regular work schedule are essential functions of this job Work includes on call rotations as part of a 24/7/365 team Required Candidate profile Candidate Experience Should Be : 1 To 3 Candidate Degree Should Be : BE-Comp/IT,BE-Other
Posted 4 months ago
4.0 - 6.0 years
6 - 13 Lacs
chennai
Work from Office
ROLE AND RESPONSIBILITIES The Level 2 IT/OT Engineer executes assigned work orders, including support tickets and project tasks to meet Managed Security Services Provider (MSSP) and other contractually defined obligations for new and existing customer facilities. This role will perform routine and scheduled maintenance and support tasks, work break/fix and other trouble and support tickets, act as a subject matter expert for programs and products offered, and respond to other emergent conditions across the fleet. Candidates must possess a strong understanding of and direct experience with concepts and best practices related to IT/OT systems.This is an opportunity to be part of a world-class team operating at the nexus of two of the most exciting and fastest-growing sectors in renewable energy today: SCADA IT/OT and mission-critical software. Work Location : Chennai Notice period : Immediate Experience : 4 to 6 years Shift : UK Shift PREFERRED EXPERIENCE • Experience in NERC CIP-regulated environments is preferred. • Experience in compliance programs or standard-driven environments (e.g., PCI-DSS, NIST, ISO-27001) • SOC, NOC, or other operation center experience • Work experience in at least one of the following areas: • Network and infrastructure design, deployment, or maintenance. • Power generation, especially renewable energy. REQUIRED QUALIFICATION & EDUCATION • A university technical degree or minimum 1-2 years of relevant IT/OT professional experience. • Direct or indirect service experience and/or experience providing remote support. • Ability to read electrical, network, infrastructure, and cabling drawings. • All applicants must have prior professional IT/OT systems management experience and knowledge in at least two of the following fields: • Server hardware and OS management. • Networking and infrastructure design, implementation, and management. • Cybersecurity, including Next-Generation Firewall configuration and management. Interested candidates can apply to kinnera259@gmail.com. Regards, HR Manager
Posted Date not available
1.0 - 3.0 years
5 - 12 Lacs
bengaluru
Hybrid
What Were Looking For We are seeking a Security & Compliance Analyst to support the ongoing protection of Acumeras systems and the compliance requirements of our customers. This role is ideal for candidates who are detail-oriented, eager to grow, and passionate about perational security and compliance frameworks. As a member of the Compliance and Security Operations team, you will assist in vulnerability management, audit readiness, incident response, and security monitoring. Work Shift- 4:00PM-1:00AM Responsibilities: Security Operations &Monitoring Monitor and review SIEM dashboards and alerts for signs of unauthorized or suspicious activity. Assist with log analysis and incident triage. Support endpoint protection and antivirus policy enforcement. Coordinate with senior team members during incident investigations. Vulnerability Management Lead ongoing vulnerability scans, interpret results, and prioritize remediation efforts. Track remediation of findings by collaborating with relevant technical teams. Maintain up-to-date vulnerability management documentation and dashboards. Compliance & Audit Support Assist in evidence collection for internal and external audits (e.g., PCI DSS, SOC2, ISO 27001). Track completion of compliance-related tasks across departments. Help maintain policies, standards, and process documentation. Conduct spot checks or audits of configurations, logs, and access controls. Security Awareness & Training Assist in managing the Security Awareness training platform (e.g.,phishing simulations, security awareness campaigns). Track training completion and generate reports for leadership. Documentation & Reporting Maintain accurate and organized records of incidents, vulnerabilities, and audit tasks. Contribute to internal pages such as Confluence and Jira ticketing systems. Create or update playbooks & SOPs under guidance of senior staff. Preferred Qualifications 13 years of experience in IT security, compliance, or a related technical support role Experience supporting PCI DSS, SOC 2, or ISO 27001 audits Exposure to IDS/IPS, scripting, or security automation Certifications such as Security+, CySA+, PSAA, or similar are a plus Familiarity with SIEM, endpoint protection, and vulnerability scanning tools Understanding of information security principles and common compliance frameworks Excellent written and verbal communication skills Comfortable working with Linux systems and cloud platforms (AWS preferred) Strong attention to detail and ability to follow procedures Available to begin work within a 15-day notice period. Education & Experience Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, or equivalent experience. 1–3 years of experience in an information security, compliance, IT support, or network operations role. Perks of Acumera Hybrid Work Schedule Group medical insurance. Paid company holidays. Casual dress code. Cab facilities for employees working in shifts. Fully stocked snacks at office. Vibrant and Inclusive Workplace Atmosphere. Flexible work environment and an opportunity to grow as we grow. Acumera is an equal-opportunity employer. All final candidates will be subject to a pre-employment background check.
Posted Date not available
2.0 - 5.0 years
6 - 11 Lacs
mumbai
Work from Office
Monitor cloud environments for anomalous activity, security breaches using SIEM, CSPM, and native cloud security tools. Act as first responder to security alerts, investigating events across cloud workloads, containers, identities, and APIs. Triage and categorize security incidents Perform forensic analysis on affected cloud assets and log sources Coordinate and execute incident response plans for cloud-specific threats Document root cause analysis (RCA) and lessons learned from incidents. Continuously improve cloud-specific playbooks and incident handling procedures. Develop and tune detection rules, alert thresholds, and correlation logic in SIEM or XDR platforms. Required Qualifications: Bachelor s degree in Cybersecurity, Computer Science, Information Systems, or a related field. 2 5 years of experience in cybersecurity, with at least 2+ years in a cloud security role with proven experience in incident response. Proficiency with cloud-native services Hands-on experience with cloud platforms Experience with SIEM and log management tools Experience scripting or automating tasks (e.g., Python, PowerShell, Bash, Terraform). Familiarity with EDR/XDR and forensic tools. Strong understanding of incident lifecycle Knowledge of MITRE ATT&CK Cloud Matrix, kill chain, and threat modeling. Preferred Certifications: AWS Certified Security Specialty Azure Security Engineer Associate GIAC Certified Incident Handler (GCIH) Certified Cloud Security Professional (CCSP) Soft Skills: Strong analytical and problem-solving abilities. Excellent verbal and written communication. Ability to work independently and collaboratively across teams. Strong attention to detail and process-oriented mindset. Brenntag TA Team
Posted Date not available
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |