Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
8.0 - 10.0 years
0 Lacs
thiruvananthapuram, kerala, india
On-site
At EY, we're all in to shape your future with confidence. We'll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. EY Telecom Infrastructure Review Manager-Level As part of our Risk Consulting team, you will be part of the focused team to activities related to Telecom Infrastructure reviews for various clients across the MENA region. Telecom Security is one of the few most important risks facing businesses today. We are looking for trusted consultants to enhance the capability. Also, as organizations move forward on their digital journey the telecom risk exposure is increasing...
Posted 1 day ago
5.0 - 9.0 years
0 Lacs
noida, all india
On-site
As the Manager IT Operations, you will lead a team of IT Help Desk Support Specialists and System Administrators. Your role is crucial in overseeing IT Operations, Infrastructure, and Security to ensure the smooth running of our IT environment. Here are your key responsibilities: - Lead and manage the assigned IT team, including hiring, employee development, and mentoring. - Engage in strategic IT planning and execution, contributing to global IT initiatives. - Drive technical innovations to modernize the work environment and achieve organizational targets. - Develop and maintain technical documentation, policies, and procedures. - Manage IT equipment lifecycle from procurement to decommissi...
Posted 1 day ago
8.0 - 12.0 years
0 Lacs
hyderabad, all india
On-site
As the Chief Information Officer (CIO) at Zenoti, you will play a crucial role in leading the organization's technological strategies and operations to align with business objectives. Your responsibilities will include: - Crafting and executing an innovative IT strategy that aligns with the company's goals, prioritizing initiatives for optimal impact. - Directing Information Security, Application Security, and Cloud Security programs to embed security into IT operations and development life cycles. - Developing strategies for business applications such as ERP, CRM systems, collaboration tools, and BI solutions to support organizational goals. - Strategizing and directing internal teams towar...
Posted 3 days ago
2.0 - 4.0 years
6 - 10 Lacs
bengaluru
Work from Office
Excellent written and verbal communication skills. Strong attention to detail and organizational skills. Ability to work independently and as part of a team. Proficiency in Microsoft Office Suite (Word, Excel, PowerPoint). Problem-solving aptitude. Eagerness to learn and adapt to new technologies and security challenges 2-4 years of experience in an IT, security, or compliance-related role. Internship experience in information security is a plus Bachelors degree in information technology/ computer science, Information Security or equivalent. Will support the development, implementation, maintenance, and continuous improvement of the organization''s Information Security Management System (ISM...
Posted 4 days ago
1.0 - 2.0 years
4 - 8 Lacs
thane, maharashtra, india
On-site
Responsibilities Serve visitors by greeting, welcoming, and directing them appropriately, both in person and over the phone. Notify company personnel of visitor arrivals and handle inquiries promptly. Direct visitors by maintaining and utilizing employee and department directories; provide instructions as needed. Maintain security by following company procedures, monitoring the logbook, and issuing visitor badges. Manage the telecommunication system, including house phones and console operations, as per manufacturer instructions. Ensure the reception area is organized, professional, and welcoming at all times.
Posted 4 days ago
5.0 - 9.0 years
0 Lacs
hyderabad, telangana
On-site
Role Overview: As a Vulnerability Assessment Specialist at NTT DATA, you will be a seasoned subject matter expert responsible for conducting advanced vulnerability assessments to identify vulnerabilities and provide expert recommendations to mitigate security risks, ensuring the security and integrity of the organization's systems and infrastructure. Collaboration with cross-functional teams and leading vulnerability assessments will be key in analyzing findings and contributing to the improvement of vulnerability management practices. Key Responsibilities: - Conduct vulnerability assessments using automated scanning tools and manual techniques to identify security vulnerabilities in systems...
Posted 1 week ago
10.0 - 14.0 years
0 Lacs
pune, maharashtra
On-site
As the Governance, Risk, Compliance (GRC) and Programs Manager at Avient, your role will involve leading a global team to monitor cyber regulations and ensure compliance. You will be responsible for creating and implementing a comprehensive training and awareness program to educate all users on IT best practices, information classification, and handling requirements. Additionally, you will oversee the execution of the cyber transformation portfolio to ensure timely and high-quality delivery. **Key Responsibilities:** - Establish, implement, and lead a comprehensive risk management program aligned with applicable regulations and industry best practices - Author policies and standards defining...
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
As a Security Analyst/Engineer, you will be responsible for supporting the security operations of the organization by assisting in the monitoring, detection, and response to security incidents. This role offers a blend of security analysis and engineering tasks, providing a progression from foundational knowledge to more advanced responsibilities, allowing you to contribute significantly to the organization's cybersecurity efforts. Key Responsibilities: - Security monitoring and analysis - Assist in monitoring security events and alerts from various sources such as SIEM, IDS/IPS, antivirus systems, and endpoint detection platforms - Conduct initial analysis of security events to determine th...
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
haryana
On-site
As a Senior IT & Information Security Analyst at Makse Group, you will play a crucial role in enhancing the stability, security, and compliance of our technology infrastructure. Your expertise in IT operations and cybersecurity will be instrumental in supporting cross-functional teams, managing security tools, and contributing to strategic improvements aligned with industry best practices and regulatory standards. Key Responsibilities: - Support and monitor daily IT infrastructure operations to ensure system availability, performance, and security. - Lead advanced troubleshooting for IT issues and provide Tier 2/3 support for end users. - Administer and enhance endpoint protection, firewalls...
Posted 1 week ago
5.0 - 8.0 years
3 - 6 Lacs
bengaluru
Work from Office
Role & responsibilities Hardware Troubleshooting & Repair: Diagnosing and fixing hardware issues, replacing components, understanding connections. Operating System (OS) Knowledge: Installing, configuring, and troubleshooting Windows, macOS, and/or Linux. Networking Basics: Understanding IP addresses, networks, and troubleshooting connectivity. Data Backup & Recovery: Basic knowledge of backup strategies and data recovery. Security Awareness: Malware removal, physical security best practices. Software Skills JumpCloud Google Workspace Crowdstrike AWS Azure Preferred candidate profile Only Male can apply Perks and benefits
Posted 1 week ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...
Posted 1 week ago
1.0 - 3.0 years
6 - 10 Lacs
hyderabad
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
hyderabad
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
maharashtra
On-site
Role Overview: As the IT & OT Infrastructure, Data, and Applications Security Manager at Godrej Agrovet, your main responsibility will be to lead the security strategy and implementation for IT & OT environments. You will play a crucial role in ensuring that critical infrastructure, network systems, and applications are secure from cyber threats while maintaining operational continuity in both IT and OT domains. Collaboration with cross-functional teams will be essential to safeguard digital assets and operations effectively. Key Responsibilities: - Develop, implement, and maintain security policies, procedures, and controls to protect IT & OT infrastructure components. - Collaborate with IT...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
mumbai
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
hyderabad
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
hyderabad
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...
Posted 1 week ago
2.0 - 6.0 years
5 - 9 Lacs
mumbai
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...
Posted 1 week ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...
Posted 1 week ago
4.0 - 6.0 years
9 - 13 Lacs
pune
Work from Office
Job Purpose Information security governance team member (with skip level reporting to CISO) who is proficient in information security risk assessments, understanding of regulatory requirements, drafting of ISMS and BCMS policies and procedures, monitoring Key Risk Indicators (KRIs) for information security governance across IT. Duties and Responsibilities A- Minimum required Accountabilities for this role Experience in conducting information security audits for IT vendors. Basic understanding of data privacy concepts and consent framework. Managing information security risk framework inline with ISO 31000 framework Discussion and follow up with risk owners to tracking risk mitigation actions...
Posted 1 week ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
174558 Jobs | Dublin
Wipro
55192 Jobs | Bengaluru
EY
44116 Jobs | London
Accenture in India
37169 Jobs | Dublin 2
Turing
30851 Jobs | San Francisco
Uplers
30086 Jobs | Ahmedabad
IBM
27225 Jobs | Armonk
Capgemini
23907 Jobs | Paris,France
Accenture services Pvt Ltd
23788 Jobs |
Infosys
23603 Jobs | Bangalore,Karnataka