Jobs
Interviews

56 Security Consulting Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 7.0 years

0 Lacs

haryana

On-site

As an Information Security Analyst at Sun Life Global Solutions, you will play a crucial role in assessing the security posture and controls of external vendors. Your responsibilities will include analyzing vendor questionnaires, drafting risk reports summarizing security assessments, and collaborating with internal and external stakeholders to validate information related to security initiatives. You will also review legal agreements with vendors from an information security perspective and provide security consulting services to Enterprise Services and Business Units. To excel in this role, you should hold a Bachelor's Degree in Computer Science or a related field and have 3 to 7 years of relevant experience in Information Security. Strong verbal and written communication skills are essential, as you will be required to communicate complex technical issues in simple terms and write detailed reports. You should possess excellent analytical and problems solving abilities, along with a deep understanding of both existing and emerging Information Security technologies. In addition, you should have strong consulting skills, the ability to influence positive outcomes, and be a self-starter with strategic thinking capabilities. Collaboration and consensus-building skills are key, as you will be working with diverse groups within Sun Life's business units. While not mandatory, it would be advantageous to have a sound knowledge of technologies related to Information Security, such as encryption, firewalls, intrusion detection/prevention, anti-virus, DDoS, and behavioral analysis/advanced malware detection. Join us at Sun Life Global Solutions and be part of a dynamic team that is shaping the future of Digital and Innovation, driving transformation, and delivering superior client experiences through expert Technology, Business, and Knowledge Services. Your contributions will help our clients achieve lifetime financial security and lead healthier lives, reflecting our core purpose and mission.,

Posted 2 days ago

Apply

10.0 - 14.0 years

0 Lacs

karnataka

On-site

CYFIRMA is a threat discovery and Cyber intelligence platform company that offers industry-disrupting solutions in the cybersecurity and threat intelligence category with innovative ways of deciphering threats. The company applies Cyber intelligence across all layers, including business controls. As a Cyber Threat Intelligence Lead/Manager at CYFIRMA, you will be responsible for conducting in-depth research on nation-state threat actors, campaigns, and malware from various sources, including public and dark/deep web. Your primary task will be to generate predictive and relevant threat intelligence for clients. Additionally, you will be required to outline risk scenarios and recommend actions based on the threat landscape to help clients make informed decisions regarding threat intelligence information consumption. You will also be expected to present research findings, reports, and advisories in both public conferences/seminars/blogs and private client meetings. Collaboration with international teams to enhance research, service operations, and service platform development is a crucial aspect of this role. The ideal candidate for this position should possess at least 10-12 years of experience in cyber threat intelligence research, incident response, forensic analysis, malware research, or EDR/SIEM event analysis (tier 2 or higher). Additionally, a minimum of 10-12 years of experience in OSINT or the usage of paid/private security analysis tools such as Shodan, Censys, BinaryEdge, Spiderfoot, Domain tools, Virus Total, Hybrid Analysis, EDR, SIEM, IDS/IPS, etc., is required. Proficiency in creating and enhancing the strategy for threat intelligence research, process automation, knowledge sharing, and training other team members is essential. Moreover, the ability to develop and write scripts/programs from scratch using at least one programming language such as python, perl, ruby, php, javascript, C, C++, C#, etc., is highly desirable. Strong communication skills are a must for writing and presenting technical documents, blogs, reports, and papers in both public conferences and private client meetings. A flexible mindset and a willingness to collaborate with various teams, including pre-sales, partner alliances, marketing, customer success, product management, etc., on local and international levels, are essential for success in this role. Proficiency in English, including reading, writing, and speaking, is required. This is a client-facing role that will be conducted remotely. The qualification required for this position is a Bachelors's degree in computer science/IT or an equivalent field, along with a security certification (GCTI, CHFI, CEH, Security +, etc.). The relevant experience expected for this role is 10 to 12 years, and the position will report to the Vertical SVP or a similar authority. Join CYFIRMA and be a part of a team dedicated to revolutionizing cybersecurity and threat intelligence solutions.,

Posted 4 days ago

Apply

5.0 - 9.0 years

0 Lacs

pune, maharashtra

On-site

As a Security-focused Code Reviewer, your primary responsibility will be conducting thorough security assessments by reviewing source code utilizing the Checkmarx Platform. Your tasks will involve performing static application security testing (SAST) and software composition analysis (SCA) across various programming languages and frameworks. It will be essential for you to identify, document, and communicate vulnerabilities discovered during the code review process, ensuring comprehensive reports and analysis are provided. In terms of Customer Support for Vulnerability Mitigation, you will directly collaborate with customers" Application Security (AppSec) and Development teams to offer actionable advice on remediating vulnerabilities. Your role will also include providing hands-on guidance on secure coding practices, assisting in understanding the root cause of vulnerabilities, and applying best practices for remediation. Additionally, you will support customers in prioritizing security fixes based on severity and potential impact. You will be expected to develop and present proof-of-concept (PoC) attacks to illustrate how identified vulnerabilities can be exploited in real-world scenarios. Providing technical demonstrations to help customers understand the risk level of specific vulnerabilities and the importance of remediation will be crucial aspects of your responsibilities. Collaboration with AppSec and Dev teams for Application Architecture Analysis will also be part of your role. You will collaborate to analyze the security aspects of application architecture, provide recommendations to secure the architecture at the design stage, and conduct threat modeling to identify potential attack vectors, embedding security into the development lifecycle. Furthermore, you will play a key role in mentoring junior engineers and security analysts, conducting internal training sessions, and staying updated on the latest security vulnerabilities, exploit techniques, and industry trends to contribute to continuous improvement. Act as a trusted advisor to clients, provide security consulting services, and collaborate with internal teams to ensure that security tools and platforms remain at the cutting edge of technology. Your skills should include a Bachelor's degree in computer science or a related technical discipline, 8+ years of experience in high-level programming languages, 5+ years of experience in security-focused code review, a deep understanding of enterprise-grade systems and architectures, and a proactive approach to problem-solving. Proficiency in English and security-related certifications are highly desirable. Please note that the role involves a hybrid work model with international travel occasionally required.,

Posted 4 days ago

Apply

4.0 - 9.0 years

5 - 9 Lacs

Nashik

Work from Office

This technical position sits inside the Global SAP Center of Excellence is responsible for managing the health of our Global SAP Architecture consisting of a number of Key Systems including SAP ERC, GRC, PO, BPC This position will also work with other IT Staff to ensure successful SAP connections to various business connectors and applications. This hands-on role will ensure that all projects and system support areas are implemented and maintained to quality by adopting best practice configuration and technology. This technical role will be involved with analysis and design, system configuration, integration, testing, maintenance and support for the delivery of projects and minor/major releases of SAP. The successful candidate will work closely with SAP technical analysts and functional consultants to understand the business requirements and deliver solutions that support the ongoing Global IT and business strategy. Skill Requirements Performs SAP software application installation, configuration, integration, upgrades, enhancement-pack upgrades, support pack and kernel patch updates Experience in SQL Server database installation, upgrade and patch updates Experience working with SAP NW Portal, Webdispatcher, Webapplications and SCPI (SAP Cloud Platform Integration) Experience working with BSI Tax factory and release updates Installation, setup and configuration of open text archive server, experience in Designing and executing archiving of standard objects in areas like FI/MM/SD/PP and archiving custom tables, provides support for SAP Archiving using Opentext components Provide SAP & third party interface software version updates and coordinate implementation of fixes/changes to application interfaces and application client installations Collaborates with the business departments in analyzing and defining requirements Manages projects and ensure deadlines are met. Plans system sizing (capacity planning), disk / storage / server layout Completes performance monitoring of the SAP system landscape Coordinates SAP QA system refreshes, backups and client copy administration Knowledge on networks, VPNs, encryption, Web-Services, SFTP, Authentication SSO, SAML, LDAP, Integration with identity manager, Collaborates with other IT teams on SSO implementation and support Ensures high availability of SAP systems and databases Perform daily monitoring of SAP production systems, review system logs to identify signs of potential problems Experience working with Solution Manger 7.2, EWA config, CCMS and other monitoring tools Experience working in DR (Disaster Recovery) process Demonstrates high level of communication skills (verbal and written) Keeps well-informed of the latest SAP technologies, system releases to determine compatibility and enhancements. Researches and implements enhancements and new technologies as required. Defines, creates, reviews, updates, and maintains standard-operational-procedure documentation relating to SAP application support and processes Leads process improvement in the SAP Basis area

Posted 1 week ago

Apply

10.0 - 14.0 years

0 Lacs

karnataka

On-site

CYFIRMA is a threat discovery and Cyber intelligence platform company that provides industry-disrupting solutions in the cybersecurity and threat intelligence domain, focusing on innovative ways to decode threats across all layers, including business controls. We specialize in: - Providing multi-dimensional and actionable strategic, management, and tactical cyber threat visibility and intelligence. - Anticipating cyberattacks that are most likely to occur in your industry and IT environment. - Delivering potential cyber-attack insights at the planning stage rather than the execution and exploitation phase. - Employing a predictive and deep understanding of threats through our unique Outside-In approach. We are currently seeking a dynamic individual with hands-on experience in threat intelligence research, malware analysis, forensic investigation, and/or security consulting to join our research team in the role of Cyber Threat Intelligence Lead/Manager based in Bangalore. **Role and Responsibility:** - Conduct in-depth research on nation-state threat actors, campaigns, and malware from public and dark/deep web sources to generate predictive and relevant threat intelligence for clients. - Develop risk scenarios and recommend actions based on the threat landscape to assist clients in consuming threat intelligence information effectively. - Present research findings, reports, and advisories at public conferences, seminars, blogs, etc., as well as in private client meetings. - Collaborate with international teams to enhance research, service operations, and service platform development. **Skills & Experience:** - Minimum 10-12 years of experience in cyber threat intelligence research, incident response, forensic analysis, malware research, or EDR/SIEM event analysis (tier 2 or higher). - Minimum 10-12 years of experience in OSINT or paid/private security analysis tools such as Shodan, Censys, BinaryEdge, Spiderfoot, Domain tools, Virus Total, Hybrid Analysis, EDR, SIEM, IDS/IPS, etc. - Proficiency in creating and enhancing the strategy for threat intelligence research, process automation, knowledge sharing, and training other team members. - Ability to develop and script programs from scratch using programming languages like python, perl, ruby, php, javascript, C, C++, C#, etc. - Strong skills in writing and presenting technical documents, blogs, reports, and papers for public conferences and private client meetings. - Adaptable mindset with a keen willingness to collaborate with various teams such as pre-sales, partner alliances, marketing, customer success, product management, etc., locally and internationally. - Fluent in English language for reading, writing, and speaking. **Client Facing Role:** Remotely **Qualification:** - Bachelor's degree in computer science/IT or equivalent. - Security certification (GCTI, CHFI, CEH, Security +, etc.). **Industry:** Cyber Security **Relevant Experience:** 10 to 12 Years **Reporting to:** Vertical SVP or similar,

Posted 1 week ago

Apply

3.0 - 7.0 years

7 - 11 Lacs

Bengaluru

Work from Office

We are seeking an experienced QRadar Incident Forensic Specialist to manage the deployment, configuration, and day-to-day operations of the QRadar SIEM platform while supporting incident response and forensic investigations. The ideal candidate will play a critical role in enhancing security monitoring, investigating incidents, and ensuring seamless SIEM operations. This role requires a blend of expertise in QRadar deployment, incident handling, and forensic analysis to improve the organization’s security posture, Plan, design, and deploy QRadar SIEM environments including Incident forensic, ensuring proper integration with network devices, servers, and applications Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Develop and maintain documentation, including deployment guides, SOPs. Generate forensic reports and compliance dashboards for internal stakeholders and external audits. Proactively identify gaps in threat detection capabilities and recommend enhancements. Implement updates, patches, and upgrades to maintain system reliability and performance. Optimize architecture and storage allocation to ensure scalability and efficiency. Hands-on experience with QRadar architecture, deployment, and administration. Strong knowledge in Linux, unix, redhat OS. Strong knowledge in TCP/IP & networking. Proven track record in incident handling, forensic investigations, and log analysis. Expertise in QRadar features such as AQL queries, rule creation, offense management, and dashboards. Proficiency in forensic tools and methodologies for log analysis and evidence gathering Preferred technical and professional experience Support threat hunting activities by leveraging anomaly detection and root cause analysis. Research and implement emerging QRadar features, integrations, and third-party tools to enhance functionality. Perform daily health checks, ensure system availability, and resolve performance bottlenecks. Use the tools in IBM QRadar Incident Forensics in specific scenarios in the different types of investigations, such as network security, insider analysis, fraud and abuse, and evidence-gathering. Investigate security incidents by analyzing logs, offenses, and related data within QRadar. Manage and troubleshoot log ingestion, data flow, and parsing issues across multiple data sources. Extract and analyze digital evidence to support forensic investigations and incident response. Reconstruct attack scenarios and provide root cause analysis for post-incident reviews

Posted 1 week ago

Apply

10.0 - 14.0 years

0 Lacs

karnataka

On-site

As a Consultant (CSM) at CYFIRMA, you will play a crucial role in customer onboarding, technical support, account escalations, customer renewals, upsell campaigns, and establishing customer support practices. Your primary responsibility will be to ensure new customers are efficiently onboarded to CYFIRMA's products and services, guiding them to realize ROI promptly. In this role, you will need to have a deep understanding of CYFIRMA's product and service offerings to provide technical support and training to customers. Your focus will be on educating customers on the flexibility and capabilities of CYFIRMA's solutions, aligning them with their business needs and plans. Additionally, you will handle account escalations, ensuring timely responses to alerts, red flags, or feedback reported by customers. Moreover, you will be responsible for customer renewals, driving upsell campaigns to increase the lifetime value of CYFIRMA's customers. Periodic health checks of customer accounts will be necessary to ensure customer engagement and satisfaction. You will collaborate with international teams to enhance research, service operations, and platform development. To excel in this role, you should have at least 10 years of experience in managing customers and accounts in the cybersecurity domain. Proficiency in customer service practices, technical aptitude to learn CYFIRMA's offerings, and familiarity with OSINT or security analysis tools are essential. Knowledge of IT networking, internet technologies, firewalls, and cybersecurity tools, along with experience in CRM software like Salesforce, will be beneficial. A bachelor's degree in computer science or a related field is required, along with proficiency in the Microsoft Office Suite. Excellent communication skills in English, both written and verbal, are necessary as this role involves client-facing interactions remotely. Holding security certifications such as GCTI, CHFI, CEH, Security+, etc., will be an additional advantage. Join CYFIRMA's dynamic team as a Consultant (CSM) in Bangalore, and contribute to enhancing customer success through effective onboarding, support, and relationship management in the cybersecurity industry.,

Posted 1 week ago

Apply

3.0 - 5.0 years

5 - 9 Lacs

Bengaluru

Work from Office

The ideal candidate will have a strong background in IT Services & Consulting and excellent analytical skills. Roles and Responsibility Collaborate with cross-functional teams to identify and prioritize project requirements. Develop and maintain complex data models and reports using various tools and technologies. Analyze large datasets to extract insights and trends, and provide recommendations to stakeholders. Design and implement process improvements to increase efficiency and productivity. Develop and maintain technical documentation for projects and processes. Provide training and support to junior team members on new tools and technologies. Job Requirements Strong understanding of IT Services & Consulting industry trends and technologies. Excellent analytical and problem-solving skills with attention to detail. Ability to work collaboratively in a team environment and communicate effectively with stakeholders. Strong technical skills including data modeling, reporting, and visualization. Experience with process improvement methodologies and tools. Strong technical documentation and communication skills. Mandatory Skills: IDAM Security Consulting. Experience: 3-5 Years.

Posted 1 week ago

Apply

6.0 - 10.0 years

25 - 40 Lacs

Pune

Work from Office

Position summary: We are looking for a highly skilled and detail-oriented Quality Engineer – Cybersecurity Migrations to support the validation of security policy migrations across major NGFW platforms. In this role, you will be responsible for analyzing the output of automated migration tools, resolving post-migration issues, and ensuring consistent, secure, and functional firewall configurations in customer environments. Your work will directly impact customer satisfaction and operational stability. Key Roles & Responsibilities: Design and maintain test plans and test cases to validate the accuracy and completeness of automated firewall migration output. Review and verify firewall configurations migrated by automation tools to ensure they meet expected functionality and security posture. Identify logic gaps, configuration anomalies, or rule mismatches introduced during tool-based migrations. Collaborate with tool development teams to report defects, validate fixes, and improve transformation logic. Troubleshoot and resolve post-migration escalations, including policy behaviour mismatches, broken traffic flows, and unexpected security outcomes. Perform side-by-side comparisons of pre- and post-migration rules to verify functional equivalence. Raise, track, and close vendor support (TAC) cases where deep platform-level issues are involved. Contribute to documentation including SOPs, test coverage reports, known issues, and configuration validation guides. Interface directly with customers to understand post-migration challenges and ensure successful resolution. Basic Qualifications: Bachelor’s degree in Computer Science, Information Technology, or a related field (BE / B.Tech / MCA or equivalent). 6+ years of hands-on experience in firewall configuration, validation, and troubleshooting. Strong technical knowledge of NGFW platforms including Palo Alto, Cisco FTD, FortiGate, and Check Point. Familiarity with policy and object modelling across different firewall platforms. Experience in writing test cases and test plans for automation tools or configuration transformation logic. Strong understanding of networking and security concepts, including routing, NAT, VPNs, zones, and application filtering. Excellent debugging and root cause analysis skills in post-deployment/migration environments. Ability to interpret logs, packet captures, and platform-specific diagnostics to isolate issues. Preferred Qualifications: Certification: PCNSA, PCNSE, NSE-1, NSE-2, NSE-3, NSE-4 Certification: CCNA (R&S) / CCNP (R&S) Exposure to firewall migration automation tools Understanding policy normalization and risk scoring tools (e.g., Tufin, FireMon)

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Mumbai

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Data Security Consulting.: Experience: 3-5 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Chennai

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

2.0 - 7.0 years

9 - 13 Lacs

Mumbai

Work from Office

As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. * Responsible for security researcher to provide insight and understanding of new and existing information security threats * Responsible to participate in recommending improvements to SOC security process, procedures, policies, security incident management and vulnerability management processes * You will be involved in evaluating, recommending, implementing, and solving problems related to security solutions and evaluating IT security of the new IT Infrastructure systems * Keep yourself up-to-date with emerging security threats including applicable regulatory security requirements * Work in a 24x7 Security Operation Centre (SOC) environment Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * Minimum 2+ years’ experience in SIEM. * Proven expertise in handling the daily monitoring of Information Security events on the QRadar / ArcSight / Splunk console platform * Proficient in monitoring security events from various SOC channels (SIEM, Tickets, Email and Phone), based on the security event severity to handle the service support teams, tier2 information security specialists * Expertise in threat modelling and Use case development and ability to review policies of security monitoring tools based on security concepts and logical approach. Preferred technical and professional experience * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications

Posted 2 weeks ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: IDAM Security Consulting.: Experience: 3-5 Years.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

22 - 27 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Data Security Consulting Experience: 8-10 Years

Posted 2 weeks ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills:: IDAM Security Consulting Experience: 3-5 Years

Posted 3 weeks ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Pune

Work from Office

The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 3-5 Years.

Posted 3 weeks ago

Apply

15.0 - 21.0 years

18 - 22 Lacs

Gurugram

Work from Office

About The Role The Data Architecture Specialist Join our team of data architects who design and execute industry-relevant reinventions that allow organizations to realize exceptional business value from technology . Practice: Technology Strategy & Advisory, Capability Network I Areas of Work: Data Architecture | Level:Sr Manager | Location: Bangalore/Mumbai/Pune/Gurugram | Years of Exp: 15 to 21 years Explore an Exciting Career at Accenture Are you a problem solver and passionate about Tech-driven transformationDo you want to design, build and implement strategies to enhance business architecture performanceAre you passionate about being part of an inclusive, diverse and collaborative culture Then, this is the right place for you! Welcome to a host of exciting global opportunities in Accenture Technology Strategy & Advisory. The Practice- A Brief Sketch: The Technology Strategy & Advisory team helps clients achieve growth and efficiency through innovative R&D transformation, aimed at redefining business models using agile methodologies. As part of this high performing Technology Strategy and Advisory team, you will work closely with our clients to unlock the value of data, architecture, and AI to drive business agility and transformation to a real-time enterprise. As a leading Data Architecture Consulting professional, you will work on the following areas: Business Problem Data Analysis :Identifying, assessing, and solving complex business problems using in-depth evaluation of variable factors. Technology-driven journey intersection :Helping clients design, architect and scale their journey to new technology-driven growth. Architecture Transformation :Helping solve key business problems by enabling an architecture transformation, from the current state to a to-be enterprise environment. High Performance Growth and Innovation :Assisting our clients to build the required capabilities for growth and innovation to sustain high performance. Bring your best skills forward to excel at the role: Present data strate gy and develop technology solutions and value adding propositions to drive C-suite/senior leadership level discussions Capitalize on in-depth understanding of the latest technologies such as big data, data integration, data governance, data quality, cloud platforms, data modelling tools, data warehouse and hosting environments. Lead proof of concept and/or pilot implementations and defining the plan to scale implementations across multiple technology domains Maximize subject matter expertise on data-led projects and play a key role in pitches where data-based RFP responses are discussed Demonstrate ability to work creatively and analytically in a problem-solving environment. Use knowledge of key value drivers of a business , how they impact the scope and approach of the engagement. Develop client handling skills to develop, manage and deepen relationships with key stakeholders Leverage team building skills to collaborate, work and motivate teams with diverse skills and experience to achieve goals Build on leadership skills along with strong communication, problem solving, organizational and delegation skills to nurture and inspire team members Qualification Your experience counts! MBA from a tier 1 institute Your prior experience in one or more of the following is important Assessment of Information Strategy Maturity and evaluation of new IT potential with a focus on data monetization, platforms, customer 360 view and analytics strategy. Defining data-based strategy and establishing to-be Information Architecture landscape Design of cutting-edge solutions using cloud platforms like AWS, Azure, GCP, etc. and conceptualization of Data models Establish framework for effective Data Governance and define data ownership, standards, policies, and associated processes Product/ Framework/ Tools evaluation: Collaborating with business experts for business understanding, work with other consultants and platform engineers for solutions and with technology teams for prototyping and client implementations. Evaluate existing products and frameworks and develop options for proposed solutions. Practical industry expertise :The areas of Financial Services, Retail, Telecommunications, Life Sciences, Mining and Resources are of interest but experience in equivalent domains is also welcomed. Consultants should understand the key technology trends in their domain and the related business implications

Posted 3 weeks ago

Apply

5.0 - 10.0 years

20 - 30 Lacs

Hyderabad

Hybrid

Job Title: SAP GRC Security Consultant Location: Hyderabad Work Mode: Hybrid (3 days Work from office) About the Role We are looking for an experienced SAP GRC Security Consultant to manage security architecture, role design, and compliance across SAP systems. If you have expertise in SAP GRC, security configurations, and risk management, this role is for you. Key Responsibilities Manage SAP security roles and authorizations across ECC, S/4HANA, BW, and Fiori Configure and administer SAP GRC Access Control modules (ARA, ARM, EAM, BRM) Conduct risk analysis and mitigation for user roles and access Oversee secure user provisioning and de-provisioning with identity management Support audit and compliance requirements Troubleshoot SAP security incidents and authorization errors Participate in SAP upgrade and migration security assessments Required Skills Minimum 5 to 12 years of experience in SAP Security and GRC Strong understanding of SAP authorization concepts and risk analysis Hands-on experience with SAP GRC Access Control (AC 10.x or higher) Knowledge of SAP Fiori security and access control Ability to handle audits, compliance, and risk remediation Strong problem-solving skills and attention to detail Preferred Certifications SAP Certified Associate SAP Security / Access Control Certifications in Governance, Risk & Compliance (GRC) or IT Security are a plus

Posted 3 weeks ago

Apply

4.0 - 6.0 years

8 - 12 Lacs

Gurugram

Work from Office

Your Role and Responsibilities As a Network Engineer specializing in Radware Load Balancer and Web Application Firewall (WAF) solutions, you will play a critical role in ensuring optimal network performance, security, and reliability. Your responsibilities include: Load Balancer Management: Deploy, configure, and maintain Radware Server/Link Load Balancer solutions for high availability. Design and implement load balancing solutions aligned with business needs, collaborating with network engineers and system administrators. Monitor and troubleshoot network issues related to load balancing, ensuring timely resolution. Conduct regular audits and assessments to optimize load balancer configurations. Provide technical support and mentorship to junior team members. Stay updated on industry trends and best practices in networking technologies. Web Application Firewall (WAF) Administration: Oversee the deployment, configuration, and management of Radware WAF solutions. Ensure the secure operation and maintenance of WAF infrastructure. Monitor WAF alerts and incidents to protect web applications from cyber threats. Investigate and respond to security incidents involving WAF. Develop and implement security policies to safeguard web applications. Conduct periodic security audits and assessments to maintain compliance. Work closely with IT and security teams to integrate Radware WAF into the cybersecurity architecture. Optimize WAF policies to reduce false positives and improve accuracy. Provide training and documentation for WAF management and promote security awareness within the organization. Required education Bachelor's Degree Preferred education Bachelor's Degree Required technical and professional expertise 4 to 6 years of hands-on experience with Link Load Balancer (LLB) solutions. Strong understanding of WAN connectivity optimization, failover management, and ISP link aggregation. Expertise in troubleshooting and performance tuning of load balancing solutions. Radware LB certification Preferred technical and professional experience Experience in hybrid cloud or multi-site network architectures. Knowledge of MPLS, SD-WAN, and WAN optimization tools. Familiarity with network audits and compliance initiatives (ISO, PCI, etc.) Should be BE/B.Tech /MCA/BCA

Posted 3 weeks ago

Apply

5.0 - 8.0 years

12 - 20 Lacs

Pune

Work from Office

About the Role We are seeking a skilled and passionate Red Team Security Consultant to join our cybersecurity team. The ideal candidate will specialize in simulating adversarial tactics, techniques, and procedures (TTPs) to identify vulnerabilities and improve the organization's security posture. This role involves performing advanced penetration tests, simulating real-world attacks, and working with teams to implement effective remediation strategies Key Responsibilities Plan, execute, and document Red Team exercises mimicking advanced threat actors for medium to large enterprises. Conduct network penetration testing (VAPT), system vulnerability assessments, and security configuration reviews. Perform manual security assessments for web applications, APIs, and client-server applications. Simulate sophisticated attack chains including lateral movement, privilege escalation, and data exfiltration. Develop and execute custom attack payloads using tools and scripts. Assess physical security controls and implement social engineering assessments when required. Create and maintain custom tools/scripts in languages like Python, Bash, or PowerShell. Utilize and adapt adversary emulation frameworks such as MITRE ATT&CK, Cobalt Strike, and Metasploit. Collaborate with Blue Teams to improve detection and response mechanisms through Purple Team engagements. Basic Qualifications Education: BE/B. Tech/ MCA/ M. Sc. (IT/Computers) Experience: Required: 2 - 5 years. Excellent communication and collaboration skills. Preferred Qualifications Preferred Certifications: OSCP, OSCE, CRTP, eWPTX, Security+, CREST, CRTO. Desired Skill Set: Red Teaming, VAPT, Application Security (Web/Mobile/API). 2-5 years of relevant domain experience in VAPT, Red Teaming, and Application Security domains. Proficient in Application Security concepts, including OWASP Top 10 and OSSTMM. Experience with vulnerability scanning tools such as BurpSuite Pro, Nessus, OWASP ZAP, Kali Linux, Cobalt Strike, Caldera etc. Basic ability to write automation scripts (Bash or Python). Understanding of threat modeling and secure coding practices. Strong understanding of TTPs, threat modeling, and secure coding practices. Hands-on experience in Active Directory exploitation, phishing campaigns, and endpoint bypass techniques.

Posted 3 weeks ago

Apply

5.0 - 7.0 years

4 - 6 Lacs

Bengaluru

Work from Office

We are seeking an experienced and skilled Senior Consultant (SAP Basis and Security) to join our team in Chennai. As a Senior Consultant, you will be responsible for providing technical support in both SAP Basis and SAP Security. Your expertise will be crucial in ensuring the smooth operation, performance, and security of SAP systems. You will be expected to manage multiple deliverables and projects simultaneously while providing support for various system activities, including version upgrades, system refreshes, and audits. Key Responsibilities: SAP Basis and Security Support: Provide technical support for SAP Basis and SAP Security, ensuring optimal system performance, availability, and security. Database Expertise: Demonstrate hands-on experience in managing and supporting MSSQL and Oracle databases, ensuring effective database management and optimization. Version Upgrade Experience: Lead version upgrades for SAP ECC, Netweaver (ABAP and JAVA), and databases such as Oracle and MSSQL, ensuring smooth transitions and minimal downtime. SAP Security: Maintain and manage SAP security, including user, role, and authorization object-level maintenance, ensuring proper access control and compliance. Operating Systems: Work extensively with both Windows and Linux operating systems to support the SAP environment and perform troubleshooting as needed. System Refresh: Execute system refresh activities, including database-level refreshes, to ensure proper system functionality and data integrity. Audit Support: Provide support for both internal and external audits by preparing required documentation and ensuring compliance with security protocols and regulations. Ticketing Tool Management: Utilize ITSM/SERVICE NOW tools for efficient issue tracking, resolution, and management, ensuring timely response and resolution of SAP-related incidents and requests. Required Skills and Experience: Proven experience in SAP Basis and SAP Security, supporting and maintaining SAP systems. Strong expertise in database management and optimization, specifically with MSSQL and Oracle databases. Experience in performing version upgrades for SAP ECC, Netweaver, and related databases (Oracle, MSSQL). Extensive knowledge in SAP Security, including user creation, role maintenance, and authorization object management. Hands-on experience with both Windows and Linux operating systems in an SAP environment. Proven ability to perform system refreshes, including database-level refreshes. Experience supporting internal and external audits related to SAP systems and security. Proficiency in using ITSM/SERVICE NOW or other ticketing tools for incident and request management. Strong communication skills and the ability to manage multiple projects simultaneously. Ability to work independently and as part of a team, providing guidance and expertise to junior team members. Desired Skills (Optional): SAP HANA experience (preferred but not mandatory). Certifications in SAP Basis or Security will be a plus. Familiarity with cloud environments and SAP in cloud scenarios is advantageous.

Posted 3 weeks ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Kochi

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Data Security Consulting. Experience5-8 Years.

Posted 3 weeks ago

Apply

8.0 - 13.0 years

10 - 15 Lacs

Bengaluru

Work from Office

The IBM Technology Expert Labs organization is looking for an IBM zSecurity Delivery Consultant with expertise in IBM Z, RACF and Security products to lead and deliver pre-sales and post-sales client engagements that enable the adoption of IBM zSecure Suite and IBM ZMFA Ideal candidates will have demonstrated a successful history of implementing IBM Zsecure Suite engagements, be familiar with sysplex architectural methods, can independently assess IT infrastructures, evaluate gaps in best practices and create IBM Security solution recommendations for client environments while displaying excellent collaboration and communication with Clients, Sellers, Business Partners and Colleagues by delivering reports to clients. You will be responsible for developing and delivering IBM Security architecture, and implementation of IBM Security products which may include: Implement security policies and procedures to protect the integrity, confidentiality, and availability of information extensive knowledge of security administration by using the zSecure suite products Designing and customizing the ZMFA features, based on the client requirements Integrating and designing security with IBM Guardium Data centre and Quantum safe solutions. Assisting with customer to extract the audit reports for system vulnerabilities and implement security measures to mitigate risks Providing technical guidance and skills transfer to customer personnel for IBM zSecure suite products, ZMFA features, IBM Guardium and Quantum safe Producing planning and implementation reports and documentation. Installation, configuration, testing and maintenance of IBM RACF, and related Z software Other technical tasks as necessary to accomplish successful customer outcomes Aid customers to migrate the other vendor security products to the IBM RACF And Z security software’s. This role requires a strong knowledge of the IBM Systems Z security and software ecosystem, focusing on Strong Security and IBM Zsecure, Guardium and Quantum safe, are needed. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Professional and Technical Expertise: 8+ years’ experience working with: RACF Security Administrators and capabilities of IBM zSecurity products including (zSecure ,ZMFA, Guardium and Quantum safe) z/OS RACF Security Administrators ,zSecure Admin Ability to migrate the other vendor security products to the RACF and IBM z Security related products. Successfully delivering IBM Z projects and/or architecting and planning infrastructures for customer’s Security Needs 5+ years’ experience in: Customer or executive facing communications, requirements analysis, documentation, and report presentations. Create and manage RACF user profiles, group profiles, and access rights Implement security policies, extracting the Security audit reports using the zSecure suite products and procedures to protect integrity of the system Ability to lead customer technical workshops up to 20+ people. Strong written and verbal communication skills EnglishFluent Preferred technical and professional experience Preferred Professional and Technical Expertise: Knowledge or experience with RACF, zsecure products suite, Guardium data center, ZMFA, Quantum safe Experience on Security Migrations (ACF2 to RACF or TSS to RACF) Practical SMP/E knowledge Assembler, JCL, REXX and CLIST knowledge

Posted 4 weeks ago

Apply
Page 1 of 3
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies