339 Security Consulting Jobs - Page 11

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

10 - 16 Lacs

chennai

Work from Office

Key Responsibilities: Configure and support SAP GRC modules (ARA, BRM, ARM, EAM) Perform SoD analysis and manage risk violations Design and maintain SAP roles and authorizations Handle user provisioning and access issues Collaborate with audit/compliance teams (SOX, GDPR) Support security-related transports and documentation Requirements : 4+ years in SAP Security and GRC Strong knowledge of SAP GRC Access Control Experience with role design, SoD, and compliance Familiarity with Fiori and S/4HANA security Strong problem-solving and cross-functional collaboration skills. Job Location(s ) - Pan India.

Posted 2 months ago

AI Match Score
Apply

5.0 - 10.0 years

10 - 16 Lacs

kolkata

Work from Office

Key Responsibilities: Configure and support SAP GRC modules (ARA, BRM, ARM, EAM) Perform SoD analysis and manage risk violations Design and maintain SAP roles and authorizations Handle user provisioning and access issues Collaborate with audit/compliance teams (SOX, GDPR) Support security-related transports and documentation Requirements : 4+ years in SAP Security and GRC Strong knowledge of SAP GRC Access Control Experience with role design, SoD, and compliance Familiarity with Fiori and S/4HANA security Strong problem-solving and cross-functional collaboration skills. Job Location(s ) - Pan India.

Posted 2 months ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 2 months ago

AI Match Score
Apply

2.0 - 6.0 years

0 Lacs

maharashtra

On-site

You will be joining Essen Vision, a renowned "Digital Security Specialists" company with over 28 years of experience in providing digital protection services across more than 18 countries worldwide. The company excels in various cybersecurity domains such as Data Protection, Zero Trust Networks, Cloud Security, Endpoint and Server Security, Perimeter Defence, and Compliance. Essen Vision is also a pioneer in designing and deploying SOC and SOAR projects, with strategic alliances in 68 cities to cater to customer support needs effectively. As a Forcepoint DLP Specialist based in Mumbai, your role will involve implementing and managing Forcepoint Data Loss Prevention (DLP) solutions. This on-s...

Posted 2 months ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

pune, maharashtra

On-site

You are a skilled Cybersecurity Specialist with expertise in Vulnerability Assessment and Penetration Testing (VAPT), vulnerability lifecycle management, and regulatory compliance, specifically HIPAA. Your primary responsibility is to identify, analyze, and mitigate security vulnerabilities across infrastructure, applications, and cloud environments, ensuring alignment with healthcare data protection standards. Your key responsibilities include: 1. Conducting Vulnerability Assessment Penetration Testing (VAPT) by performing internal and external assessments across networks, applications, APIs, and cloud platforms. Utilize tools like Qualys, Nessus, Burp Suite, Nmap, and Metasploit to identif...

Posted 2 months ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

haryana

On-site

As an Information Security Analyst at Sun Life Global Solutions, you will play a crucial role in assessing the security posture and controls of external vendors. Your responsibilities will include analyzing vendor questionnaires, drafting risk reports summarizing security assessments, and collaborating with internal and external stakeholders to validate information related to security initiatives. You will also review legal agreements with vendors from an information security perspective and provide security consulting services to Enterprise Services and Business Units. To excel in this role, you should hold a Bachelor's Degree in Computer Science or a related field and have 3 to 7 years of ...

Posted 3 months ago

AI Match Score
Apply

10.0 - 14.0 years

0 Lacs

karnataka

On-site

CYFIRMA is a threat discovery and Cyber intelligence platform company that offers industry-disrupting solutions in the cybersecurity and threat intelligence category with innovative ways of deciphering threats. The company applies Cyber intelligence across all layers, including business controls. As a Cyber Threat Intelligence Lead/Manager at CYFIRMA, you will be responsible for conducting in-depth research on nation-state threat actors, campaigns, and malware from various sources, including public and dark/deep web. Your primary task will be to generate predictive and relevant threat intelligence for clients. Additionally, you will be required to outline risk scenarios and recommend actions...

Posted 3 months ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

pune, maharashtra

On-site

As a Security-focused Code Reviewer, your primary responsibility will be conducting thorough security assessments by reviewing source code utilizing the Checkmarx Platform. Your tasks will involve performing static application security testing (SAST) and software composition analysis (SCA) across various programming languages and frameworks. It will be essential for you to identify, document, and communicate vulnerabilities discovered during the code review process, ensuring comprehensive reports and analysis are provided. In terms of Customer Support for Vulnerability Mitigation, you will directly collaborate with customers" Application Security (AppSec) and Development teams to offer actio...

Posted 3 months ago

AI Match Score
Apply

4.0 - 9.0 years

5 - 9 Lacs

Nashik

Work from Office

This technical position sits inside the Global SAP Center of Excellence is responsible for managing the health of our Global SAP Architecture consisting of a number of Key Systems including SAP ERC, GRC, PO, BPC This position will also work with other IT Staff to ensure successful SAP connections to various business connectors and applications. This hands-on role will ensure that all projects and system support areas are implemented and maintained to quality by adopting best practice configuration and technology. This technical role will be involved with analysis and design, system configuration, integration, testing, maintenance and support for the delivery of projects and minor/major relea...

Posted 3 months ago

AI Match Score
Apply

10.0 - 14.0 years

0 Lacs

karnataka

On-site

CYFIRMA is a threat discovery and Cyber intelligence platform company that provides industry-disrupting solutions in the cybersecurity and threat intelligence domain, focusing on innovative ways to decode threats across all layers, including business controls. We specialize in: - Providing multi-dimensional and actionable strategic, management, and tactical cyber threat visibility and intelligence. - Anticipating cyberattacks that are most likely to occur in your industry and IT environment. - Delivering potential cyber-attack insights at the planning stage rather than the execution and exploitation phase. - Employing a predictive and deep understanding of threats through our unique Outside-...

Posted 3 months ago

AI Match Score
Apply

3.0 - 7.0 years

7 - 11 Lacs

Bengaluru

Work from Office

We are seeking an experienced QRadar Incident Forensic Specialist to manage the deployment, configuration, and day-to-day operations of the QRadar SIEM platform while supporting incident response and forensic investigations. The ideal candidate will play a critical role in enhancing security monitoring, investigating incidents, and ensuring seamless SIEM operations. This role requires a blend of expertise in QRadar deployment, incident handling, and forensic analysis to improve the organization’s security posture, Plan, design, and deploy QRadar SIEM environments including Incident forensic, ensuring proper integration with network devices, servers, and applications Required education Bachel...

Posted 3 months ago

AI Match Score
Apply

10.0 - 14.0 years

0 Lacs

karnataka

On-site

As a Consultant (CSM) at CYFIRMA, you will play a crucial role in customer onboarding, technical support, account escalations, customer renewals, upsell campaigns, and establishing customer support practices. Your primary responsibility will be to ensure new customers are efficiently onboarded to CYFIRMA's products and services, guiding them to realize ROI promptly. In this role, you will need to have a deep understanding of CYFIRMA's product and service offerings to provide technical support and training to customers. Your focus will be on educating customers on the flexibility and capabilities of CYFIRMA's solutions, aligning them with their business needs and plans. Additionally, you will...

Posted 3 months ago

AI Match Score
Apply

3.0 - 5.0 years

5 - 9 Lacs

Bengaluru

Work from Office

The ideal candidate will have a strong background in IT Services & Consulting and excellent analytical skills. Roles and Responsibility Collaborate with cross-functional teams to identify and prioritize project requirements. Develop and maintain complex data models and reports using various tools and technologies. Analyze large datasets to extract insights and trends, and provide recommendations to stakeholders. Design and implement process improvements to increase efficiency and productivity. Develop and maintain technical documentation for projects and processes. Provide training and support to junior team members on new tools and technologies. Job Requirements Strong understanding of IT S...

Posted 3 months ago

AI Match Score
Apply

6.0 - 10.0 years

25 - 40 Lacs

Pune

Work from Office

Position summary: We are looking for a highly skilled and detail-oriented Quality Engineer – Cybersecurity Migrations to support the validation of security policy migrations across major NGFW platforms. In this role, you will be responsible for analyzing the output of automated migration tools, resolving post-migration issues, and ensuring consistent, secure, and functional firewall configurations in customer environments. Your work will directly impact customer satisfaction and operational stability. Key Roles & Responsibilities: Design and maintain test plans and test cases to validate the accuracy and completeness of automated firewall migration output. Review and verify firewall configur...

Posted 3 months ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 3 months ago

AI Match Score
Apply

3.0 - 5.0 years

7 - 11 Lacs

Mumbai

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 3 months ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 3 months ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

Chennai

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 3 months ago

AI Match Score
Apply

2.0 - 7.0 years

9 - 13 Lacs

Mumbai

Work from Office

As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, ther...

Posted 3 months ago

AI Match Score
Apply

3.0 - 5.0 years

5 - 7 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 3 months ago

AI Match Score
Apply

8.0 - 10.0 years

22 - 27 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 3 months ago

AI Match Score
Apply

3.0 - 5.0 years

5 - 7 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Han...

Posted 3 months ago

AI Match Score
Apply

3.0 - 5.0 years

7 - 11 Lacs

Pune

Work from Office

The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling inci...

Posted 3 months ago

AI Match Score
Apply

15.0 - 21.0 years

18 - 22 Lacs

Gurugram

Work from Office

About The Role The Data Architecture Specialist Join our team of data architects who design and execute industry-relevant reinventions that allow organizations to realize exceptional business value from technology . Practice: Technology Strategy & Advisory, Capability Network I Areas of Work: Data Architecture | Level:Sr Manager | Location: Bangalore/Mumbai/Pune/Gurugram | Years of Exp: 15 to 21 years Explore an Exciting Career at Accenture Are you a problem solver and passionate about Tech-driven transformationDo you want to design, build and implement strategies to enhance business architecture performanceAre you passionate about being part of an inclusive, diverse and collaborative cultur...

Posted 3 months ago

AI Match Score
Apply

5.0 - 10.0 years

20 - 30 Lacs

Hyderabad

Hybrid

Job Title: SAP GRC Security Consultant Location: Hyderabad Work Mode: Hybrid (3 days Work from office) About the Role We are looking for an experienced SAP GRC Security Consultant to manage security architecture, role design, and compliance across SAP systems. If you have expertise in SAP GRC, security configurations, and risk management, this role is for you. Key Responsibilities Manage SAP security roles and authorizations across ECC, S/4HANA, BW, and Fiori Configure and administer SAP GRC Access Control modules (ARA, ARM, EAM, BRM) Conduct risk analysis and mitigation for user roles and access Oversee secure user provisioning and de-provisioning with identity management Support audit and ...

Posted 3 months ago

AI Match Score
Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies