Home
Jobs

169 Security Audit Jobs - Page 6

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8 - 10 years

15 - 20 Lacs

Chennai

Work from Office

Naukri logo

Job description We are seeking a highly experienced Senior Manager - Cloud to join our dynamic team. This role requires a product-oriented mindset, a passion for cloud technologies, and a deep understanding of building, automating, deploying, and managing complex services to production in Azure environments. You will serve as the team's point of contact on cloud security, networking, and cloud-native toolchains for observability and monitoring, while driving cloud data infrastructure excellence. As a Senior Manager, you will collaborate across Managed Service Partners, Cloud Service Providers to design, implement, and maintain scalable cloud infrastructure. You will guide the team in adopting best practices for Azure cloud deployment and automation, while mentoring and supporting junior engineers in their professional growth. Key Responsibilities: 1. Manage Applications hosted on Azure Cloud & the team supporting it. 2. Lead & guide the team to ensure optimal delivery and operational success. 3. Design, build, and maintain scalable, secure, and resilient cloud-based infrastructure on Azure. 4. Lead & own Business continuity (BCP) drills & ensure successful completion. 5. Adhere & on timely mitigation of Vulnerability assessment reports, audit observations from regulatory bodies. 6. Automate complex deployments, monitoring, and security tasks to ensure seamless operation of production systems. 7. Lead initiatives to improve system performance, availability, scalability, and security across Azure services. 8. Serve as the expert on Azure networking, security, and monitoring, implementing best practices for cloud governance, compliance, and security policies. 9. Collaborate with product managers and development teams to ensure infrastructure aligns with the product vision and roadmaps. 10. Leverage Azure-native and third-party observability tools to monitor system performance and ensure proper incident management and response. 11. Act as a technical mentor for junior engineers, providing guidance on cloud infrastructure, Python scripting, automation strategies, and DevOps best practices. 12. Troubleshoot and resolve complex production issues, performing root cause analysis and implementing long-term solutions. 13. Stay up to date with the latest Azure services, features, and trends, continuously evolving the teams cloud capabilities. 14. Optimize cloud consumption by adopting cloud best practices. Key Qualifications: 1. Overall 12+ years of experience working in Service delivery, Consulting. 2. Subject matter expert & Hands-on Experience in Azure Cloud. 3. Expertise in Azure networking (VPC, subnets, security groups, etc.), cloud security (IAM, encryption, security compliance), and cloud-native monitoring tools (Azure Monitor, log analytics, App insights, Grafana, Datadog, Prometheus, etc.). 4. Experience with containerization technologies (e.g., Docker, AKS, Container Apps) and orchestration. 5. Proven track record of automating complex cloud deployments and scaling services in production environments. 6. A collaborative and mentoring mindset, with the ability to guide and support junior engineers. 7. Excellent communication skills, with the ability to work cross-functionally and influence technical direction. 8. Proven ability to troubleshoot complex production issues and optimize system performance. Candidates who are interested may send their resumes to twinkle.b@camsonline.com

Posted 2 months ago

Apply

3 - 6 years

5 - 8 Lacs

Pune

Work from Office

Naukri logo

We re seeking a resilient Cyber Security Specialist to join our team and lead the charge in securing our infrastructure. From managing endpoint security solutions to proactively hunting for threats, you ll play a vital role in safeguarding our systems, data, and people. Key Responsibilities | Cyber Security Specialist Endpoint and Cybersecurity Management: Oversee the deployment, configuration, and management of endpoint and cybersecurity solutions to protect against cyberthreats and vulnerabilities. Threat Detection and Response: Monitor and analyze security alerts and incidents, responding promptly to mitigate risks and prevent breaches. Monitor and analyze Identity-based attacks, Identity-related vulnerabilities. Threat Hunting Proactively search for signs of malicious activity within the network. Utilize advanced tools and techniques to detect and respond to threats. Threat Intelligence and Analysis Collect and analyze threat intelligence to identify potential security threats. Monitor and assess emerging threats and vulnerabilities. Incident Management: Lead the investigation and resolution of security incidents related to endpoints, documenting findings, and implementing corrective actions. Policy Development: Develop and enforce security policies, standards, and procedures related to endpoint security. Security Audits: Conduct regular security audits and assessments to identify and address potential weaknesses in the endpoint security infrastructure. Collaboration: Work closely with IT, network, and other security teams to ensure comprehensive protection across all endpoints. Training : Provide training and guidance to team members on best practices for endpoint security platforms and products. Product Management: Evaluate and recommend security products and technologies that enhance endpoint protection and align with the organization s security strategy. Reporting: Generate and present regular reports on the status of endpoint security, including metrics on incidents, vulnerabilities, and compliance. Requirement and Qualification: Proven experience in managing endpoint security solutions and products. Strong understanding of cybersecurity principles , threat landscapes, and attack vectors . Experience with security platforms Trend Cloud One , Zscaler ITDR and ZTNA . Experience with Microsoft Sentinel and Defender XDR is plus. Excellent problem-solving skills. Strong communication and interpersonal skills. Relevant certifications such as CISSP , CISM , or CEH are a plus. If you re an experienced Cyber Security Specialist looking for an opportunity to drive security innovation and protect against ever-evolving cyber threats, we want to hear from you! To apply for

Posted 2 months ago

Apply

3 - 7 years

5 - 9 Lacs

Mumbai

Work from Office

Naukri logo

Paramatrix Technologies Pvt Ltd is looking for Application Security Analyst to join our dynamic team and embark on a rewarding career journey. Defining, planning, implementing, maintaining, and upgrading security measures, policies, and controls Assisting with the creation of updates and training programs to secure the network and train the employees Keeping the security systems up to date Monitoring security access and maintaining the relevant data Conducting vulnerability testing and risk analyses to assess security and performing internal and external security audits Analyzing security breaches to identify the cause and to update incidence responses and disaster recovery plans

Posted 2 months ago

Apply

2 - 4 years

8 - 12 Lacs

Noida

Work from Office

Naukri logo

Aqusag Technologies India is looking for Cybersecurity Engineer to join our dynamic team and embark on a rewarding career journey. Security Infrastructure Design: Plan, design, and implement security measures, including firewalls, intrusion detection/prevention systems, access controls, and encryption protocols Incident Response: Develop and execute incident response plans to detect, mitigate, and recover from security incidents and breaches Vulnerability Assessment: Conduct regular security assessments and vulnerability scans to identify and address weaknesses in systems and networks Security Policies and Procedures: Develop and enforce security policies, procedures, and best practices across the organization Security Monitoring: Continuously monitor network traffic, logs, and security alerts for signs of suspicious or unauthorized activity Identity and Access Management (IAM): Manage user access, authentication, and authorization to ensure that only authorized individuals have access to sensitive resources Security Patch Management: Keep systems and software up to date with security patches and updates to mitigate known vulnerabilities Security Awareness: Educate and train employees on cybersecurity best practices and raise awareness about potential threats, phishing, and social engineering tactics Compliance and Audit: Ensure that the organization complies with relevant security regulations, standards, and industry-specific requirements Prepare for and participate in security audits Encryption: Implement encryption technologies to protect data both in transit and at rest

Posted 2 months ago

Apply

2 - 4 years

7 - 11 Lacs

Noida

Work from Office

Naukri logo

Secure High-Performance Systems! Develop C++ Applications With Strong Security Hack Before They Do! Conduct Penetration Testing, Threat Modeling, And Security Audits Harden Embedded Systems! Secure Low-Level Real-Time Applications Lock Down Infrastructure! Implement Secure Network Data Encryption Protocols Ensure Compliance! Work With Owasp, Gdpr, Nist, And Iso 27001 Frameworks

Posted 2 months ago

Apply

9 - 11 years

8 - 12 Lacs

Hyderabad

Work from Office

Naukri logo

Interpret requirements and design solution that satisfy the customer needs and also satisfied the need for standardization, usability and maintainability of the different Agent facing applications. Breakdown solution into components that could be assigned and tracked in pursuit of a fast and cost-effective solution. Must have experience in SQL/PL-SQL. Should have Implement ADF Business Components / Web Services / Oracle Objects Calls that would provide the data access layer for the Agent Applications processes. Implement the ADF View Controller components, including Tasks Flows, Beans and JSF pages that would allow the successful interaction between the agents and the applications. Supervise tasks performed by other members of the solution team in order to ensure a cohesive approach that satisfies the external (customer) requirements and internal (technology) requirements. Design and develop enhancements using exit-point based architecture within loan the origination/servicing system Designing and developing enhancements using exit-point based architecture within loan origination/servicing system Design and implement custom business applications using Oracle Application Development framework Produce, present and validate AS-IS and TO-BE landscape models for technical approval showing migration path Produce and validate solution design documentation for projects ensuring a consistent quality approach is maintained Input into the Technical Environment Plans (TEP) for projects Work directly with business users in all aspects of design and development Produce code that meets quality, coding and performance standards according to local IT guidelines and policies including Security, auditing and SOX requirements Ensure technical supporting documentation is written to company standards Undertake Unit testing making full utilization of automation tools available and working with the system test team to ensure tests are integrated as part of the overall test plan Qualification: Bachelor / master s in engineering, MCA or equivalent Experience: 9-11 years

Posted 2 months ago

Apply

2 - 7 years

4 - 9 Lacs

Maharashtra

Work from Office

Naukri logo

Description who has a more technical and practical understanding of security vulnerabilities. To help, the activities that the person in this role will performReview scan reports and alerts from monitoring tools like Qualys, Shodan and Risk Recon, perform triage on them to determine the risk level, and follow-up with the appropriate stakeholders (either internal ones or external business partners) for the remediation of those issues. Liaison with the respective stakeholders for keeping the inventory of monitored assets (IPs) up to date. Support in the scheduling, coordination, and execution of security audits. So, while vulnerability scanning is beneficial, the emphasis is more on the remediation side of things (take a vulnerability and work with the teams until full remediation). People or teams management experience is not necessary for this role. More important are the technical knowledge and good communication skills. Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility Yes Global Role Family To be defined Local Role Name To be defined Local Skills Pen Testing Languages RequiredENGLISH Role Rarity To Be Defined

Posted 2 months ago

Apply

3 - 8 years

8 - 14 Lacs

Jaipur

Work from Office

Naukri logo

IT auditor evaluates and assesses an organization's IT systems, processes, and controls to ensure compliance with regulations and industry standards, identify vulnerabilities, and recommend improvements for security and efficiency Conduct IT Audits

Posted 2 months ago

Apply

5 - 9 years

17 - 22 Lacs

Bengaluru

Hybrid

Naukri logo

The Cloud Operations Business Analyst plays a key role at the intersection of Cloud Technology, Security and Business. Our global enterprise customers and prospects rely on RWS to deliver Secure Solutions capable of handling their most sensitive content the Cloud Operations Business Analyst responds to customer requirements by engaging with both Technical and non-Technical teams, and clearly communicating the security of RWS solutions. About Cloud Operations and Tech Support At RWS our Technical Support and Cloud Operations Teams are a global organization spanning across 13 countries serving a global customer base. Technical Support deliver highly valued support and build trusted relationships with our customers, from individual freelancers to large international corporations and governments. We are constantly investigating and solving technical problems across a wide range of products and technology, with emphasis on prevention and root cause analysis. At the same time, knowledge sharing is crucial, providing our users and colleagues with the latest solutions, answers, and information. From a Cloud Operations perspective we are a team of experienced, high-performance individuals focused on serving our Enterprise customers leveraging our SaaS solutions to power their Seamless Customer Experience. Our core focus is on Quality of Service, Customer Experience, Security and Compliance. Both technical and non-technical groups are embedded within the same Cloud Operations unit. Key Responsibilities Leverage personal experience, a Knowledge Management system and other resources to confidently speak to the details of the security of RWS solutions, as well as discussing additional customer requirements across the Financial, Healthcare and other regulated industries Respond to RWS customer and prospect information requests, such as RFIs, RFPs and Security Audits. Manage and prioritize across multiple requests and deadlines Communicate with both Technical SME teams and customer-facing staff Engage, present and discuss with customer technical and security staff Skills & Experience Minimum experience in IT Security Business Analysis 5 years. Process-oriented Precise Excellent organization skills, able to manage priorities and deadlines across multiple projects simultaneously Experience communicating with Technical and non-Technical Excellent verbal and written communication skills in English, with the ability to effectively communicate information accurately and concisely Knowledge of Cloud Computing Knowledge of IT Security Knowledge of Data and Privacy Regulations Experience responding to RFPs and Audits. Experience with Knowledge Centered Service framework is a plus Experience with Responsive is a plus. Life At RWS At RWS, were here for one purpose: unlocking global understanding. As a unique, world-leading provider of technology-enabled language, content, and intellectual property services, we remove the barriers to communication to make global connection possible. Our unrivalled experience and deep understanding of language have been developed over more than 60 years. As we look to shape the future, our ambition is to create a world where understanding is universal for everyone. We work with over 80% of the world’s top 100 brands, more than three-quarters of Fortune’s 20 ‘Most Admired Companies’ and almost all the top pharmaceutical companies, investment banks, law firms and patent filers. Our client base spans Europe, Asia Pacific and North and South America. Our 65+ global locations across five continents service clients in the automotive, chemical, financial, legal, medical, pharmaceutical, technology and telecommunications sectors. Over the past 20 years we’ve been evolving our own AI solutions as well as helping clients to explore, build and use multilingual AI applications. With 45+ AI-related patents and more than 100 peer-reviewed papers, we have the experience and expertise to support clients on their AI journey. If you like the idea of working with smart people who are passionate about breaking down language barriers and giving back to their communities, then you’ll love life at RWS. Our work fundamentally recognizes the value of every language and culture. So, we celebrate difference, we are inclusive and believe that diversity makes us strong. We want every colleague to grow as an individual and excel in their career. In return, we expect all our people to live by the values that unite us: to partner with colleagues and clients, to adopt a pioneering spirit, to be positive in progressing the work we do, and always to deliver what we promise. RWS Values Get the 3Ps right – Partner, Pioneer, Progress – and well Deliver together as One RWS . For further information, please visit: RWS RWS embraces DEI and promotes equal opportunity, we are an Equal Opportunity Employer and prohibit discrimination and harassment of any kind. RWS is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment. All employment decisions at RWS are based on business needs, job requirements and individual qualifications, without regard to race, religion, nationality, ethnicity, sex, age, disability, or sexual orientation. RWS will not tolerate discrimination based on any of these characteristics Recruitment Agencies: RWS Holdings PLC does not accept agency resumes. Please do not forward any unsolicited resumes to any RWS employees. Any unsolicited resume received will be treated as the property of RWS and Terms & Conditions associated with the use of such resume will be considered null and void.

Posted 2 months ago

Apply

0 - 1 years

3 - 6 Lacs

Jaipur

Work from Office

Naukri logo

Personalized User Experience AI-driven recommendations based on user behavior. Voice & Chatbot Integration Seamless communication with AI-powered chatbots. Predictive Analytics Enhancing app performance through data-driven insights. 2. Cross-Platform App Development for Wider Reach Developing apps separately for Android and iOS can be costly. iSkylar Technologies specializes in cross-platform app development using frameworks like Flutter and React Native to: Ensure faster time-to-market with single-code deployment. Reduce development costs while maintaining a native-like experience. Provide seamless updates across both platforms simultaneously. 3. UI/UX-Centric Approach for Enhanced Engagement A well-designed user interface is crucial for retaining app users. iSkylar s UI/UX experts focus on: Intuitive Navigation Ensuring seamless interactions. Minimalist & Aesthetic Designs Creating visually appealing apps. Fast Loading Speed Optimizing performance for better user retention. 4. Security-First Mobile App Development Cybersecurity is a major concern in app development. iSkylar Technologies integrates: End-to-End Encryption to safeguard user data. Biometric Authentication for enhanced security. Regular Security Audits to eliminate vulnerabilities. 5. Agile Development Process for Faster Deployment iSkylar follows an Agile development methodology , ensuring: Faster iterations with real-time feedback. Reduced development risks with incremental updates. Scalability and flexibility to adapt to evolving business needs.

Posted 3 months ago

Apply

4 - 9 years

15 - 19 Lacs

Pune

Work from Office

Naukri logo

Divisional Risk and Control Analyst TDI Controls Testing & Assurance, AS Role Description Infrastructure Chief Operating Office (COO) is responsible for the effective operation of the infrastructure functions, driving operational efficiency whilst supporting the effective delivery of infrastructure services in line with business objectives and control requirements. It also includes oversight of Infrastructure Divisional Control Office (DCO) and Trade Settlement and Confirmations Operations (TSCO). Infrastructure Divisional Control Office (IDCO) as part of Infrastructure COO, provides services to multiple functions in infrastructure. The IDCO function is a dedicated risk, control, and regulatory oversight function, with prime responsibility for managing and proactively mitigating risk across the full breadth of the Technology and Infrastructure organization. Function also provides a consolidated view and central coordination of (non-financial) risks, as well as effective, efficient, and consistent standards and policies. (Technology Data & Innovation) TDI Control Testing & Assurance team part of IDCO identifies, tracks and reports control testing & assurance activities, conducts independent controls testing (design and operating effectiveness) on different risk types in line with the Control Testing Standards. The team also focuses on regulatory and risk-based assurance requirements. This role is within TDI Control Testing & Assurance team. Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Flexible working arrangements Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Perform Control Testing in line with Control Testing methodology/minimum standard Identify control deficiencies (findings), risks related to elements of controls, participate in findings agreement with stakeholders, escalate potential issues and exception items noted during the testing to senior management for discussion and further investigation, if deemed necessary Prepare Control Testing workpapers for senior management detailing testing results, document findings with highest quality Track Control Testing identified findings, perform required follow-up on open findings Consider regulatory and internal firm policy requirements as well as established best practices for control assurance. Support controls assurance activities Support in monitoring Control testing teams adherence to Control Testing methodology/minimum standards Support, contribute in managing Control Testing vendor resources, where applicable Track testing related effort/budget Plan Vs. Actuals throughout the testing lifecycle Build and maintain solid working relationships with key stakeholders such as within the DCO, IDCO, TSCO, GTI and other Testing Teams including Divisions/sub-divisions, 2 LoD and Group Audit (GA) Your skills and experience University degree preferably in Computer Science, Mathematics, Engineering or a related subject or equivalent qualification in the areas of information security. Professional/industry recognized qualifications e.g., CISA, CISSP, CISM, CRISC are beneficial. Experience in Cloud Security audit/testing, GCP (Google Cloud Platforms) or Professional/industry recognized qualifications e.g., CCSP, CCSK will be an advantage Good knowledge of auditing IT application controls, e.g., from IT audits or IT risk management. Understanding of the relationship between IT risk and underlying business process risk. Knowledge of regulations governing financial institutions is beneficial. Strong written and verbal communication skills and the ability to communicate effectively in conflict situations. Strong organizational skills and attention to detail. Ability to work under pressure, multi-task and prioritize workload. Strong analytical skills and structured thought process with the ability to clearly articulate control deficiencies and related risk Flexible, proactive, and innovative mind set with strong organizational skills to take ownership and responsibility for agreed targets and to meet them within budget to enable a timely and efficient completion of projects. This is an IC (individual contributor) role.

Posted 3 months ago

Apply

3 - 8 years

8 - 14 Lacs

Jaipur

Work from Office

Naukri logo

IT auditor evaluates and assesses an organization's IT systems, processes, and controls to ensure compliance with regulations and industry standards, identify vulnerabilities, and recommend improvements for security and efficiency Conduct IT Audits

Posted 3 months ago

Apply

3 - 7 years

5 - 9 Lacs

Pune

Work from Office

Naukri logo

Role Description Infrastructure Chief Operating Office (COO) is responsible for the effective operation of the infrastructure functions, driving operational efficiency whilst supporting the effective delivery of infrastructure services in line with business objectives and control requirements. It also includes oversight of Infrastructure Divisional Control Office (DCO) and Trade Settlement and Confirmations Operations (TSCO). Infrastructure Divisional Control Office (IDCO) as part of Infrastructure COO, provides services to multiple functions in infrastructure. The IDCO function is a dedicated risk, control, and regulatory oversight function, with prime responsibility for managing and proactively mitigating risk across the full breadth of the Technology and Infrastructure organization. Function also provides a consolidated view and central coordination of (non-financial) risks, as well as effective, efficient, and consistent standards and policies. (Technology Data & Innovation) TDI Control Testing & Assurance team part of IDCO identifies, tracks and reports control testing & assurance activities, conducts independent controls testing (design and operating effectiveness) on different risk types in line with the Control Testing Standards. The team also focuses on regulatory and risk-based assurance requirements. This role is within TDI Control Testing & Assurance team. Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Flexible working arrangements Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Perform Control Testing in line with Control Testing methodology/minimum standard Identify control deficiencies (findings), risks related to elements of controls, participate in findings agreement with stakeholders, escalate potential issues and exception items noted during the testing to senior management for discussion and further investigation, if deemed necessary Prepare Control Testing workpapers for senior management detailing testing results, document findings with highest quality Track Control Testing identified findings, perform required follow-up on open findings Consider regulatory and internal firm policy requirements as well as established best practices for control assurance. Support controls assurance activities Support in monitoring Control testing teams adherence to Control Testing methodology/minimum standards Support, contribute in managing Control Testing vendor resources, where applicable Track testing related effort/budget Plan Vs. Actuals throughout the testing lifecycle Build and maintain solid working relationships with key stakeholders such as within the DCO, IDCO, TSCO, GTI and other Testing Teams including Divisions/sub-divisions, 2 LoD and Group Audit (GA) Your skills and experience University degree preferably in Computer Science, Mathematics, Engineering or a related subject or equivalent qualification in the areas of information security. Professional/industry recognized qualifications e.g., CISA, CISSP, CISM, CRISC are beneficial. Experience in Cloud Security audit/testing, GCP (Google Cloud Platforms) or Professional/industry recognized qualifications e.g., CCSP, CCSK will be an advantage Good knowledge of auditing IT application controls, e.g., from IT audits or IT risk management. Understanding of the relationship between IT risk and underlying business process risk. Knowledge of regulations governing financial institutions is beneficial. Strong written and verbal communication skills and the ability to communicate effectively in conflict situations. Strong organizational skills and attention to detail. Ability to work under pressure, multi-task and prioritize workload. Strong analytical skills and structured thought process with the ability to clearly articulate control deficiencies and related risk Flexible, proactive, and innovative mind set with strong organizational skills to take ownership and responsibility for agreed targets and to meet them within budget to enable a timely and efficient completion of projects. This is an IC (individual contributor) role.

Posted 3 months ago

Apply

10 - 18 years

20 - 27 Lacs

Bengaluru

Work from Office

Naukri logo

Job Purpose: The Security Architect will be responsible for designing, implementing, and maintaining the overall security posture of the NBFC's IT infrastructure, applications, and data. This role involves developing and enforcing security policies, standards, and procedures to protect the organization from cyber threats, ensuring compliance with regulatory requirements, and safeguarding customer data. The Security Architect will work closely with IT, risk management, and business teams to align security strategies with business objectives. Key Responsibilities: Information Security Strategy Develop and implement an organization-wide information security strategy and vision. Align information security initiatives with business goals and objectives. Stay abreast of emerging threats and technologies to adapt the security strategy accordingly. Meeting and Board Presentation Participate in senior management meetings. Present the security strategy and vision to the board. Present risk and mitigation plans to the risk committee. Risk Management Identify, assess, and prioritize information security risks. Develop and implement risk mitigation strategies. Establish risk management frameworks and policies. Security Policies and Procedures Develop, implement, and enforce information security policies and procedures. Ensure compliance with relevant laws, regulations, and industry standards. Promote security awareness and education throughout the organization. Incident Response and Management Develop and maintain an incident response plan. Lead and coordinate responses to security incidents. Conduct post-incident reviews and implement improvements. Security Architecture Design and implement a robust information security architecture. Evaluate and select security technologies and tools. Ensure the integration of security measures into the organization's IT infrastructure. Security Awareness and Training Develop and implement security awareness programs for employees. Provide training to staff on security policies and best practices. Vendor and Third-Party Risk Management Assess and manage the security risks associated with external vendors and third-party relationships. Ensure that third-party contracts include appropriate security requirements. Compliance Monitor and ensure compliance with relevant data protection and privacy laws. Coordinate with legal and compliance teams to address regulatory requirements. Ensure compliance with relevant regulatory requirements (e.g., RBI guidelines, DPDPA, Cert-In, etc.). Security Audits and Assessments Conduct regular security audits and assessments. Prepare and maintain documentation for audits and regulatory inspections. Ensure the effectiveness of security controls and measures. Security Governance Establish and chair a security governance committee. Report regularly to executive leadership and the board on the state of information security. Budget and Resource Management Develop and manage the information security budget. Allocate resources effectively to support security initiatives. Collaboration and Communication Collaborate with other senior executives to integrate security into overall business strategies. Communicate effectively with stakeholders about the importance of information security. Provide guidance and training to employees on security best practices and awareness.

Posted 3 months ago

Apply

4 - 6 years

6 - 8 Lacs

Pune

Work from Office

Naukri logo

Role Description Infrastructure Chief Operating Office (COO) is responsible for the effective operation of the infrastructure functions, driving operational efficiency whilst supporting the effective delivery of infrastructure services in line with business objectives and control requirements. It also includes oversight of Infrastructure Divisional Control Office (DCO) and Trade Settlement and Confirmations Operations (TSCO). Infrastructure Divisional Control Office (IDCO) as part of Infrastructure COO, provides services to multiple functions in infrastructure. The IDCO function is a dedicated risk, control, and regulatory oversight function, with prime responsibility for managing and proactively mitigating risk across the full breadth of the Technology and Infrastructure organization. Function also provides a consolidated view and central coordination of (non-financial) risks, as well as effective, efficient, and consistent standards and policies. (Technology Data & Innovation) TDI Control Testing & Assurance team part of IDCO identifies, tracks and reports control testing & assurance activities, conducts independent controls testing (design and operating effectiveness) on different risk types in line with the Control Testing Standards. The team also focuses on regulatory and risk-based assurance requirements. This role is within TDI Control Testing & Assurance team. Your key responsibilities Perform Control Testing in line with Control Testing methodology/minimum standard Identify control deficiencies (findings), risks related to elements of controls, participate in findings agreement with stakeholders, escalate potential issues and exception items noted during the testing to senior management for discussion and further investigation, if deemed necessary Prepare Control Testing workpapers for senior management detailing testing results, document findings with highest quality Track Control Testing identified findings, perform required follow-up on open findings Consider regulatory and internal firm policy requirements as well as established best practices for control assurance. Support controls assurance activities Support in monitoring Control testing teams adherence to Control Testing methodology/minimum standards Support, contribute in managing Control Testing vendor resources, where applicable Track testing related effort/budget Plan Vs. Actuals throughout the testing lifecycle Build and maintain solid working relationships with key stakeholders such as within the DCO, IDCO, TSCO, GTI and other Testing Teams including Divisions/sub-divisions, 2 LoD and Group Audit (GA) Your skills and experience University degree preferably in Computer Science, Mathematics, Engineering or a related subject or equivalent qualification in the areas of information security. Professional/industry recognized qualifications e.g., CISA, CISSP, CISM, CRISC are beneficial. Experience in Cloud Security audit/testing, GCP (Google Cloud Platforms) or Professional/industry recognized qualifications e.g., CCSP, CCSK will be an advantage Good knowledge of auditing IT application controls, e.g., from IT audits or IT risk management. Understanding of the relationship between IT risk and underlying business process risk. Knowledge of regulations governing financial institutions is beneficial. Strong written and verbal communication skills and the ability to communicate effectively in conflict situations. Strong organizational skills and attention to detail. Ability to work under pressure, multi-task and prioritize workload. Strong analytical skills and structured thought process with the ability to clearly articulate control deficiencies and related risk Flexible, proactive, and innovative mind set with strong organizational skills to take ownership and responsibility for agreed targets and to meet them within budget to enable a timely and efficient completion of projects. This is an IC (individual contributor) role.

Posted 3 months ago

Apply

10 - 15 years

0 - 0 Lacs

Chennai, Vellore, Kanchipuram

Work from Office

Naukri logo

This Position will oversee the comprehensive safety & security protocols at ARTK this role involves managing all aspects of safety operations, protecting guests,employees & resort assets &ensuring the resort remains a secure & serene destination.

Posted 3 months ago

Apply

5 - 10 years

10 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

SUMMARY About tsworks: tsworks is a leading technology innovator, providing transformative products and services designed for the digital-first world. Our mission is to provide domain expertise, innovative solutions and thought leadership to drive exceptional user and customer experiences. Demonstrating this commitment , we have a proven track record of championing digital transformation for industries such as Banking, Travel and Hospitality, and Retail (including e-commerce and omnichannel), as well as Distribution and Supply Chain, delivering impactful solutions that drive efficiency and growth. We take pride in fostering a workplace where your skills, ideas, and attitude shape meaningful customer engagements. Cloud Security & Compliance Specialist We are looking for an experienced Security & Compliance Specialist to oversee the organization's Cloud Security, ISO certifications, SOC 2 compliance, security audits, and governance. The candidate will ensure end-to-end security across cloud infrastructure, applications, and data, conducting penetration testing, IT risk assessments, and security monitoring while managing security tools and compliance frameworks. Requirements Responsibilities Oversee security for Azure Entra ID, AWS IAM, and Google IAM with a focus on identity security. Enforce multi-cloud security best practices, including encryption and data protection. Define and implement Zero Trust Architecture and secure cloud network segmentation. Establish and maintain IT security policies and standards aligned with industry best practices. Implement and manage CSPM and CWPP tools to enhance cloud security posture. Manage ISO 27001, ISO 42001, and SOC 2 certifications, ensuring compliance through audits. Conduct risk assessments and compliance reviews across multi-cloud environments. Ensure adherence to cloud security frameworks (ISO 27017, ISO 27018, CIS, NIST, CSA CCM). Drive security initiatives through GRC frameworks and governance models. Define and enhance IT security policies, conducting periodic audits for compliance and risk mitigation. Perform penetration testing and cloud-native security assessments, identifying misconfigurations and vulnerabilities. Integrate DevSecOps within CI/CD pipelines to fortify security in development workflows. Manage SIEM solutions (Azure Sentinel, Defender for Cloud) for real-time threat detection. Oversee Microsoft security tools (M365 Defender, Intune, SCCM) for endpoint security. Investigate security incidents, perform root cause analysis, and implement preventive measures. Automate security processes using Power Automate, Power BI, and scripting Secure cloud networking (Azure VNet, AWS VPC, GCP VPC) and enforce VPN & hybrid security. Implement Zero Trust principles and strengthen Identity & Access Management (IAM). Key Attributes and Qualifications 5+ years of experience in cybersecurity, compliance, or cloud security roles, with expertise in automating security workflows and managing multi-cloud security environments. Expertise in Cloud Security (Azure, AWS, GCP) and Microsoft Security Stack with hands-on experience in SIEM, SOAR, EDR/XDR, CASB, CSPM, and vulnerability management. Preferred certifications include ISO/IEC 27001:2022 Lead Auditor, ISO/IEC 42001:2023 Lead Auditor, SOC 2 Compliance Certification, Security Operations Analyst (SC-200), Microsoft Certified: Cybersecurity Architect Expert (SC-100), AWS Certified Security Specialty, and Azure Security Engineer Associate (AZ - 500). Strong understanding of Threat Intelligence, Risk Management, Compliance Audits, DevSecOps, Infrastructure as Code (IaC), and container security (Kubernetes, Docker, EKS, AKS, GKE). Experience securing API gateways, microservices, and serverless architectures while integrating security into CI/CD pipelines. Proven ability in security policy design, audits, compliance processes, penetration testing, vulnerability assessments, and cloud security governance.

Posted 3 months ago

Apply

7 - 12 years

12 - 14 Lacs

Pune

Work from Office

Naukri logo

Job Title: Cyber Engineer Consultant Overview : We are seeking an experienced Cyber Engineer Consultant to provide expert-level consulting support to our customer-facing teams. The ideal candidate will have a strong background in cybersecurity with at least 7 years of hands-on experience, and a proven ability to help design and implement security solutions while also shaping business requirements. This is a client-facing role where the consultant will bridge the gap between technical capabilities and customer needs to build tailored cybersecurity solutions that meet complex business and security requirements. Key Responsibilities: Consulting Expertise: Provide subject matter expertise in cybersecurity, helping the team define security requirements and ensure the development of effective security solutions that align with customer needs. Solution Design: Work closely with internal teams and clients to design, architect, and implement security solutions that meet business requirements, regulatory compliance, and risk management objectives. Requirements Gathering: Collaborate with business stakeholders and customers to gather security and technical requirements, translating them into comprehensive solution specifications and implementation plans. Customer Engagement: Engage with clients to understand their cybersecurity challenges and provide guidance on best practices, security architectures, and threat mitigation strategies. Risk Assessment & Mitigation: Conduct risk assessments, identify vulnerabilities, and recommend mitigations to strengthen clients' security posture. Proposal Support: Assist in crafting RFP responses, proposals, and solution documentation, ensuring that the technical solutions meet both security and business needs. Cross-Functional Collaboration: Work alongside business development, sales, and technical teams to ensure that security requirements and solutions are properly integrated into client projects. Qualifications: Experience: Minimum of 7 years in cybersecurity engineering, with hands-on experience in security architecture, solution design, and implementation across a variety of industries. Technical Skills: Proficient in a wide range of cybersecurity tools, frameworks, and technologies, including firewalls, intrusion detection/prevention systems, encryption, vulnerability scanning, and SIEM tools. Business Acumen: Ability to work with non-technical stakeholders to gather business and security requirements and translate them into effective solutions. Experience with risk management, compliance (GDPR, HIPAA, NIST, etc.), and security audits is a plus. Security Certifications: Relevant certifications such as CISSP, CISM, CISA, or similar are strongly preferred. Problem-Solving: Strong analytical and problem-solving skills with the ability to design solutions that address complex security challenges. Communication Skills: Excellent verbal and written communication skills. Experience presenting complex security concepts to both technical and non-technical audiences. Consulting Experience: Experience working in a consulting environment, providing advisory services to clients in cybersecurity, and guiding them through security challenges. Desirable Skills: Experience with cloud security (AWS, Azure, Google Cloud) and securing hybrid environments. Familiarity with DevSecOps practices and tools. Knowledge of cybersecurity frameworks and standards (NIST, ISO 27001, etc.). Ability to lead or assist in security audits and assessments. This is important- Security Certifications: Relevant certifications such as CISSP, CISM, CISA, or similar are strongly preferred. This is an exciting opportunity for a results-driven professional. If you have a passion, we encourage you to apply. Apply Now: Drop your resume on 8308907577 . References are highly appreciated!

Posted 3 months ago

Apply

4 - 6 years

14 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

Overview 170+ Years Strong. Industry Leader. Global Impact. At Pinkerton, the mission is to protect our clients. To do this, we provide enterprise risk management services and programs specifically designed for each client. Pinkerton employees are one of our most important assets and critical to the delivery of world-class solutions. Bonded together, we share a commitment to integrity, vigilance, and excellence. Pinkerton is an inclusive employer who seeks candidates with diverse backgrounds, experiences, and perspectives to join our family of industry subject matter experts. The Security Specialist, assigned to a specific client, will ensure the security and safety of the facility, property, and personnel. The Specialist is responsible for the related training, procedures/policies, equipment, and reporting. Responsibilities Represent Pinkerton's core values of integrity, vigilance, and excellence. Provide subject matter expertise to internal physical security clients and external clients across company, as needed. Provide advice and counsel on complex physical security, internal fraud investigations, prevention, life safety risk, fire safety, crisis management, and emergency response issues. Responsible for recruiting members of the team as well as on-the-job coaching, supervision, and evaluation. Assist with security staff development plans by identifying current needs as well as future career objectives. Create partnerships with other site Physical Security Specialists and external clients regarding security and safety-related aspects. Build and maintain relationships with other teams in the area of Operations. Develop a network of industry experts, drawing on the experience of others to learn more about the prevalent security trends challenges. Collect metrics from varying sources and create reports, as needed. Ensure work performed meets or exceeds established timelines and quality standards. Establish review processes to ensure adherence. Conduct periodic site risk assessments, security audits, and fire safety drills. All other duties, as assigned. Qualifications Graduate with four to six years of security management, investigations, and/or security risk consulting experience. Demonstrated skill and knowledge of business-to-business operational activities. Knowledge of CCTV, access control, barriers, intruder/fire alarms, firefighting equipment, GPS monitoring, DFMD, HHMD, and control panels. Understanding of service industry cost and profitability drivers. Client orientated and results driven. Able to create and present a strong value proposition. Excellent planning and organization skills. Self-starter. Serve as an effective team member and leader. Computer skills; Microsoft Office, computer network architecture, data transmission, and bandwidth. Working Conditions: With or without reasonable accommodation, requires the physical and mental capacity to effectively perform all essential functions; Regular computer usage. Occasional reaching and lifting of small objects and operating office equipment. Frequent sitting, standing, and/or walking. Pinkerton is an equal opportunity employer to all applicants and positions without regard to race/ethnicity, color, national origin, ancestry, sex/gender, gender identity/expression, sexual orientation, marital/prenatal status, pregnancy/childbirth or related conditions, religion, creed, age, disability, genetic information, veteran status, or any protected status by local, state, federal or country-specific law.

Posted 3 months ago

Apply

6 - 11 years

16 - 25 Lacs

Chennai, Mumbai (All Areas)

Work from Office

Naukri logo

Role : System Audit || IT Audit || Senior Audit || Lead Auditor |\ Exp : 5- 12 Years Location: ,Mumbai, Chennai , Notice period: Immediate to 60 Days Experience in the field of information security operations, Information System Audits encompassing experience into any of the Banking Technologies Domains Application Security, Database management and administration, / Network security and SOC / Payment systems in addition to IT General controls (ITGC). Exposure to the Banking / Finance / Payment industry domains would be preferrable. Hands-on experience in the following areas: - Writing Information security policies, procedures, and processes - Conducting risk assessment covering Cyber Security domains as noted below: Application Security: Mobile application assessment, OWASP security practices for applications, VA/PT/AppSec, source-code review, black/grey/white box testing, application SDLC, Strong knowledge of programming languages for applications. Database Security: Database administration and management - Oracle, MS SQL etc., Database Activity Monitoring tools, data security and localization. Payments Systems Security: Understand payment systems and architecture such as SWIFT, UPI, IMPS, ATM, Internet Banking, Mobile Banking, Core Banking System, payment gateway, ATM switch and terminal. Experience in PCI DSS implementation/assessment and ATM end-point security and Cards data security and operations. Networks Security: Managing firewalls, routers, proxy, WAF, email filtering, DLP, DDoS protection, data encryption, IPS/IDS, Incident response and investigate security breaches, VA-PT for networks. Security Operations Centre- Implementation and review. IT General Controls: Familiarity with Technical Security controls of Identity & Access Management, Network, Server, Application, Change management, Backup and Restoration etc. and process controls reviews. Understand BCP and DR processes and architecture. Experience in conducting reviews based on ISO standards and regulatory guidelines in banking sector for a medium to large sized organization would be preferred. Experience in conducting Information System Audits Must have experience in preparing quality deliverables such as audit reports, presentations etc. Excellent written, oral communication and presentation skills Excellent organizational and interpersonal skills Ability to work independently or as part of a team Responsibilities: Candidate will have to travel extensively within Mumbai and across the country for performing audits, as per RBI requirements. Conducting audit of Information security policies, procedures, and processes to identify process/design gaps. Conduct audits of information security systems and infrastructure to verify systems are secure and support the related applications/business processes. Conducts audits in different banking technology domains such as Active Directory, WAF, Network access security, End-point security, Application VA/PT/AppSec, SDLC, Database management and security, PCI-DSS, ATM controls, Cards (Debit/Credit) security, Payment gateway and IT General Controls etc. Additional weightage will be given to candidates with experience in domains such as Cloud Security, API security. Developing project plans, work programs, evaluating system controls, identify risks and audit gaps, documenting results in proper audit report format, making recommendations, and communicating information to stakeholders. Support in maintaining audit checklist and documents, trend analysis, preparing presentations etc. Should be a self-learner and must keep updated with the latest security guidelines issued by regulators, international standards for information security, threats and vulnerabilities researched/discovered. Research public domain to keep up to date knowledge on latest banking applications / technologies and emerging technologies Cloud, Virtualisation, AI-ML, IOT etc. and ensure continuous learning in identified security competencies and new/emerging technologies

Posted 3 months ago

Apply

2 - 5 years

5 - 8 Lacs

Navi Mumbai, Bengaluru, Hyderabad

Work from Office

Naukri logo

Assist in conducting audit engagements to ensure compliance with standards& frameworks such as ISO 27001,PCI DSS,SOC 2&GDPR Support the planning, execution &reporting of audits under Sr. Auditors Gather& analyze evidence to evaluate client compliance Required Candidate profile Basic understanding of audit standards& regulatory frameworks (ISO 27001, SOC 2) Competency in using audit tools and software Strong analytical skills for evidence evaluation& compliance assessment. Perks and benefits Salary Negotiable based on Skills& Experience.

Posted 3 months ago

Apply

7 - 10 years

5 - 10 Lacs

Jaipur

Work from Office

Naukri logo

INSLP (Security & Loss Prevention) is hiring an SLP Specialist to support growth of the SLP MDR Concessions Abuse Program and help preventing losses via identification of abusive entity. The program is aimed at identifying and eliminating Concessions Abuse while preserving customer trust. The primary objective of the SLP Specialist is to provide security services, investigation and asset protection in designated area of responsibility, assist in mitigating product loss, and maintain customer satisfaction in accordance with INSLP guidelines and policies. The role is cross-functional and requires deep collaboration and influencing ability with stakeholders from business and corporate functions. SLP Specialists day-to-day activities involve planning, organizing, coordinating, implementing and executing process and procedures laid down by the organization and the SLP function. As a part of the SLP MDR Concessions Abuse program, the SLP Specialist is required to deep dive into the Concessions request raised by customer, and conduct end-to-end investigation across customer, DA/network and seller to identify the abusive entity. SLP has outlined frameworks for investigation, and the SLP Specialist is bound to adhere to the investigation guidelines. Along with primarily supporting on Concessions investigations, the SLP Specialist will be required to provide on-ground intel useful in uncovering abuse MOs. In order to ensure network integrity, the SLP Specialist will be required to conduct risk assessment and process audit for the respective sites and work in accordance with the security policies and guidelines. Key job responsibilities Security Operation Implementation and follow-up of Loss Prevention Plan in MDR Concessions Audits and Compliance Conducting SLP audits and implementing SOPs Surprise check and reports at LM (Last Mile) stations Keeping the plans and SOPs updated Periodical check of documentation Adhering to SLAs defined for the SLP MDR Concessions Abuse Program Process Improvement and Loss Prevention Process review, gap analysis and implementation of necessary improvements Weekly, monthly and quarterly assessments Loss prevention reporting Working on feedbacks received from internal and external stakeholders Follow up and completion of CAPA Recommending loss prevention initiatives based on on-ground intel Loss Prevention Analysis and Investigation Work closely with the SLP and CS teams to analyze the loss trends in MDR Concessions Weekly loss trend analysis, identifying defects / abusive entities and working towards loss reduction Conduct investigations by working closely with CS and support functions in SLP and Ops Meeting the weekly investigation targets and submitting investigation reports Sharing RCAs and PTG initiatives on shrink and unmet goals University degree or equivalent through experience and professional certification A minimum of 7-10 years in Security and Loss prevention role, law enforcement or security-related profession Extensive and up to date knowledge of Shrink Management and Data Analysis Experience in managing or coordinating security investigations of complex nature Knowledge of information security processes and systems Experience in security auditing

Posted 3 months ago

Apply

8 - 12 years

11 - 12 Lacs

Gurgaon

Work from Office

Naukri logo

about the role Efficiently and promptly, plans and standardizes ways to minimize the impact of change and incidents on business operations. Responsible for implementing all IP configuration changes on the Customer network and incidents if agreed. Manage customer network integration and provide expertise to implement hybrid and customized networks for the company. To deliver outstanding customer experience via on-time, right first time implementation of customer RFCs. Maintain a high quality of output and ensure completion of tasks to a target of zero errors. Participate in Low Level Design calls with Technical Design Consultants and propose changes for Network Design Implementation and Integration. Knowledge of WAN, MLAN, WLAN, SDx, Optimization and Scripting (Automation). Knowledge of New Technologies ISE, PRIME, DNA-C. Participate in Technical escalation management. Lead/drive Technical SPOC for L1-L2 teams, Escalation point of contact for the internal level 1 and 2 support team. Perform Quarterly/Half yearly technical audit for the designated customer network. Manage level3 incidents and lead technical discussions with customer and internal stakeholders. Deliver customer specific or new technology trainings to the team/cross functional teams. Documentation of change performed in customer network. Perform weekly/monthly security audits Build final config and perform SAT/CAT for customers. Level-3 entity for chronic incidents and major escalations. Participate in monthly customer meetings coordinated by the CSM as extended team. Support 24*7 and also support Out of office hours change requests / Planned Works from internal external customers . Compliance of Orange process and Support in Databases and tool updating during BAU and migration Projects . Managing communicating change based on creative / innovative thinking driven by changing customer / business requirements. Ability to work under pressure, dealing with multiple tasks. Applies significant knowledge of industry trends and developments, best practices, implements effective continual improvement solutions. about you Relevant Experience Min. 8-12 years experience in core enterprise network and MPLS VPN. CCNA, CCNP, CCIE, JNCIA, SD-WAN, Riverbed, Cisco Wireless LAN Minimum 8 to 12 years of experience. Area of expertise: Cisco Juniper routing switching, Nexus, Wireless LAN Data Center Technology: ACI, DNA-C (SDA) SD-WAN Cisco Viptela, Cisco Meraki, Fortinet, Versa, Prisma Core experience implementing network (MLAN, WLAN, Riverbed, MPLS VPN, QOS, Routing Protocols, SDWAN). Basic knowledge Ansible/Python Scripting, Linux will be preferred. Good knowledge of industry standards and compliance requirements. department Global Delivery Operations

Posted 3 months ago

Apply

5 - 8 years

20 - 22 Lacs

Hyderabad

Work from Office

Naukri logo

Overview 170+ Years Strong. Industry Leader. Global Impact. At Pinkerton, the mission is to protect our clients. To do this, we provide enterprise risk management services and programs specifically designed for each client. Pinkerton employees are one of our most important assets and critical to the delivery of world-class solutions. Bonded together, we share a commitment to integrity, vigilance, and excellence. Pinkerton is an inclusive employer who seeks candidates with diverse backgrounds, experiences, and perspectives to join our family of industry subject matter experts. The Site Security Manager assigned to one of Pinkerton's largest global clients, is responsible for providing guidance and recommendations regarding site-specific security concerns. The Manager will identify areas of improvements and capabilities which can be implemented to enhance physical and personal security. Responsibilities Represent Pinkerton’s core values of integrity, vigilance, and excellence. Ensure that all security systems and devices including alarms, video, locks, and door hardware are properly functional and requests service, as needed Identify improvements and capabilities that can be implemented to enhance physical and personnel security. Act independently, when appropriate, to mitigate physical and personnel related security issues. Conduct investigations into basic and complex security issues. Act as “eyes and ears on the ground” for the Regional Security Manager- India. Respond to alarms and alerts from Business Assurance Center or other emergencies. Provide advice, guidance, and decision making assistance to business partners regarding sensitive topics such as employee disputes and sensitive terminations. Oversee the day to day implementation of corporate security initiatives. Provide corporate security training and leadership to all staff. Assist the Regional Security Manager in the development of security policies and initiatives. Develop and compile post orders to ensure security posture of assigned sites. Coordinate with HR and Legal teams during investigations and ensure that the site is in compliance with corporate security policies. Coordinate with SR2 regarding corporate security audits and active participation during incident investigations. Ensure that adequate trainings are provided for the security personnel and complete security system analysis. Coordinate with the security vendor and ensure that the procedures are followed as per the standard policies. Complete maintenance of access control systems and CCTV. Provide security escort guards for female employees as per company's policy. Monitor the movement of vendor staff entering and existing the facility . . Coordinate the security perspective during company's official visits, parties, and other events. Ensure proper process is followed during NHO sessions. Perform quarterly audits as per the policy. Conduct fire evacuation drills as per the policy. All other duties, as assigned. Qualifications Graduate with a minimum of five to eight years of security management experience. Security management experience including practices and programs. Project management skills. Effective verbal, written, and presentation skills. Able to interact effectively at all levels and across diverse cultures Able to assist in facilitating progressive change. Serve as an effective team leader. Able to identify and adapt quickly to emerging situations. Strategic thinker and analytical ability. Results-oriented and client focused. Computer skills: Microsoft Office. Pinkerton is an equal opportunity employer to all applicants and positions without regard to race/ethnicity, color, national origin, ancestry, sex/gender, gender identity/expression, sexual orientation, marital/prenatal status, pregnancy/childbirth or related conditions, religion, creed, age, disability, genetic information, veteran status, or any protected status by local, state, federal or country-specific law.

Posted 3 months ago

Apply

4 - 7 years

5 - 10 Lacs

Chennai, Bengaluru, Hyderabad

Work from Office

Naukri logo

Cyber Security Engineer: Review security measures and software configuration to protect systems and information infrastructure, including firewalls and data encryption programs. Cyber Security Threat hunting, Intelligence, response Document security breaches and assess the damage they cause. Work with security team to perform tests and uncover network vulnerabilities. Coordinate with IT and Fix detected vulnerabilities to maintain a high-security standard. Stay current on IT security trends and news. Develop company-wide best practices for IT security. Help colleagues install security software and understand information security management. Research security enhancements and make recommendations to management. Stay up-to-date on information technology trends and security standards. Handle security Audits and customer reviews Analyse and recommend improvement in security posture Support for RFP response Monitor computer networks for security issues. Investigate security breaches and other cyber security incidents. Identify Data leak Discuss and present security findings to senior management. Security compliance Required Skills and Experience: Bachelor's degree is a must Experience in information security or related field. Experience with computer network penetration testing and techniques. Understanding of firewalls, proxies, SIEM, antivirus, Active Directory, and IDPS concepts. Handon experience with PA Traps and Antimalware products. Ability to identify and mitigate network vulnerabilities and explain how to avoid them. Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact. Scripting knowledge is a plus Security Standard awareness NIST, ISO 27001 and 270002 Knowledge of data privacy regulations like GDPR Certification CEH & CISSP. Cyber Security Threat hunting, Intelligence, response experience MITRE framework, DLP, Encryption knowledge, TTP Malware and Phishing analysis

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies