Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 10.0 years
10 - 16 Lacs
chennai
Work from Office
Key Responsibilities: Configure and support SAP GRC modules (ARA, BRM, ARM, EAM) Perform SoD analysis and manage risk violations Design and maintain SAP roles and authorizations Handle user provisioning and access issues Collaborate with audit/compliance teams (SOX, GDPR) Support security-related transports and documentation Requirements : 4+ years in SAP Security and GRC Strong knowledge of SAP GRC Access Control Experience with role design, SoD, and compliance Familiarity with Fiori and S/4HANA security Strong problem-solving and cross-functional collaboration skills. Job Location(s ) - Pan India.
Posted 2 months ago
5.0 - 10.0 years
10 - 16 Lacs
kolkata
Work from Office
Key Responsibilities: Configure and support SAP GRC modules (ARA, BRM, ARM, EAM) Perform SoD analysis and manage risk violations Design and maintain SAP roles and authorizations Handle user provisioning and access issues Collaborate with audit/compliance teams (SOX, GDPR) Support security-related transports and documentation Requirements : 4+ years in SAP Security and GRC Strong knowledge of SAP GRC Access Control Experience with role design, SoD, and compliance Familiarity with Fiori and S/4HANA security Strong problem-solving and cross-functional collaboration skills. Job Location(s ) - Pan India.
Posted 2 months ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 2 months ago
2.0 - 6.0 years
0 Lacs
maharashtra
On-site
You will be joining Essen Vision, a renowned "Digital Security Specialists" company with over 28 years of experience in providing digital protection services across more than 18 countries worldwide. The company excels in various cybersecurity domains such as Data Protection, Zero Trust Networks, Cloud Security, Endpoint and Server Security, Perimeter Defence, and Compliance. Essen Vision is also a pioneer in designing and deploying SOC and SOAR projects, with strategic alliances in 68 cities to cater to customer support needs effectively. As a Forcepoint DLP Specialist based in Mumbai, your role will involve implementing and managing Forcepoint Data Loss Prevention (DLP) solutions. This on-s...
Posted 2 months ago
3.0 - 7.0 years
0 Lacs
pune, maharashtra
On-site
You are a skilled Cybersecurity Specialist with expertise in Vulnerability Assessment and Penetration Testing (VAPT), vulnerability lifecycle management, and regulatory compliance, specifically HIPAA. Your primary responsibility is to identify, analyze, and mitigate security vulnerabilities across infrastructure, applications, and cloud environments, ensuring alignment with healthcare data protection standards. Your key responsibilities include: 1. Conducting Vulnerability Assessment Penetration Testing (VAPT) by performing internal and external assessments across networks, applications, APIs, and cloud platforms. Utilize tools like Qualys, Nessus, Burp Suite, Nmap, and Metasploit to identif...
Posted 2 months ago
3.0 - 7.0 years
0 Lacs
haryana
On-site
As an Information Security Analyst at Sun Life Global Solutions, you will play a crucial role in assessing the security posture and controls of external vendors. Your responsibilities will include analyzing vendor questionnaires, drafting risk reports summarizing security assessments, and collaborating with internal and external stakeholders to validate information related to security initiatives. You will also review legal agreements with vendors from an information security perspective and provide security consulting services to Enterprise Services and Business Units. To excel in this role, you should hold a Bachelor's Degree in Computer Science or a related field and have 3 to 7 years of ...
Posted 3 months ago
10.0 - 14.0 years
0 Lacs
karnataka
On-site
CYFIRMA is a threat discovery and Cyber intelligence platform company that offers industry-disrupting solutions in the cybersecurity and threat intelligence category with innovative ways of deciphering threats. The company applies Cyber intelligence across all layers, including business controls. As a Cyber Threat Intelligence Lead/Manager at CYFIRMA, you will be responsible for conducting in-depth research on nation-state threat actors, campaigns, and malware from various sources, including public and dark/deep web. Your primary task will be to generate predictive and relevant threat intelligence for clients. Additionally, you will be required to outline risk scenarios and recommend actions...
Posted 3 months ago
5.0 - 9.0 years
0 Lacs
pune, maharashtra
On-site
As a Security-focused Code Reviewer, your primary responsibility will be conducting thorough security assessments by reviewing source code utilizing the Checkmarx Platform. Your tasks will involve performing static application security testing (SAST) and software composition analysis (SCA) across various programming languages and frameworks. It will be essential for you to identify, document, and communicate vulnerabilities discovered during the code review process, ensuring comprehensive reports and analysis are provided. In terms of Customer Support for Vulnerability Mitigation, you will directly collaborate with customers" Application Security (AppSec) and Development teams to offer actio...
Posted 3 months ago
4.0 - 9.0 years
5 - 9 Lacs
Nashik
Work from Office
This technical position sits inside the Global SAP Center of Excellence is responsible for managing the health of our Global SAP Architecture consisting of a number of Key Systems including SAP ERC, GRC, PO, BPC This position will also work with other IT Staff to ensure successful SAP connections to various business connectors and applications. This hands-on role will ensure that all projects and system support areas are implemented and maintained to quality by adopting best practice configuration and technology. This technical role will be involved with analysis and design, system configuration, integration, testing, maintenance and support for the delivery of projects and minor/major relea...
Posted 3 months ago
10.0 - 14.0 years
0 Lacs
karnataka
On-site
CYFIRMA is a threat discovery and Cyber intelligence platform company that provides industry-disrupting solutions in the cybersecurity and threat intelligence domain, focusing on innovative ways to decode threats across all layers, including business controls. We specialize in: - Providing multi-dimensional and actionable strategic, management, and tactical cyber threat visibility and intelligence. - Anticipating cyberattacks that are most likely to occur in your industry and IT environment. - Delivering potential cyber-attack insights at the planning stage rather than the execution and exploitation phase. - Employing a predictive and deep understanding of threats through our unique Outside-...
Posted 3 months ago
3.0 - 7.0 years
7 - 11 Lacs
Bengaluru
Work from Office
We are seeking an experienced QRadar Incident Forensic Specialist to manage the deployment, configuration, and day-to-day operations of the QRadar SIEM platform while supporting incident response and forensic investigations. The ideal candidate will play a critical role in enhancing security monitoring, investigating incidents, and ensuring seamless SIEM operations. This role requires a blend of expertise in QRadar deployment, incident handling, and forensic analysis to improve the organization’s security posture, Plan, design, and deploy QRadar SIEM environments including Incident forensic, ensuring proper integration with network devices, servers, and applications Required education Bachel...
Posted 3 months ago
10.0 - 14.0 years
0 Lacs
karnataka
On-site
As a Consultant (CSM) at CYFIRMA, you will play a crucial role in customer onboarding, technical support, account escalations, customer renewals, upsell campaigns, and establishing customer support practices. Your primary responsibility will be to ensure new customers are efficiently onboarded to CYFIRMA's products and services, guiding them to realize ROI promptly. In this role, you will need to have a deep understanding of CYFIRMA's product and service offerings to provide technical support and training to customers. Your focus will be on educating customers on the flexibility and capabilities of CYFIRMA's solutions, aligning them with their business needs and plans. Additionally, you will...
Posted 3 months ago
3.0 - 5.0 years
5 - 9 Lacs
Bengaluru
Work from Office
The ideal candidate will have a strong background in IT Services & Consulting and excellent analytical skills. Roles and Responsibility Collaborate with cross-functional teams to identify and prioritize project requirements. Develop and maintain complex data models and reports using various tools and technologies. Analyze large datasets to extract insights and trends, and provide recommendations to stakeholders. Design and implement process improvements to increase efficiency and productivity. Develop and maintain technical documentation for projects and processes. Provide training and support to junior team members on new tools and technologies. Job Requirements Strong understanding of IT S...
Posted 3 months ago
6.0 - 10.0 years
25 - 40 Lacs
Pune
Work from Office
Position summary: We are looking for a highly skilled and detail-oriented Quality Engineer – Cybersecurity Migrations to support the validation of security policy migrations across major NGFW platforms. In this role, you will be responsible for analyzing the output of automated migration tools, resolving post-migration issues, and ensuring consistent, secure, and functional firewall configurations in customer environments. Your work will directly impact customer satisfaction and operational stability. Key Roles & Responsibilities: Design and maintain test plans and test cases to validate the accuracy and completeness of automated firewall migration output. Review and verify firewall configur...
Posted 3 months ago
8.0 - 10.0 years
12 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 3 months ago
3.0 - 5.0 years
7 - 11 Lacs
Mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 3 months ago
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 3 months ago
8.0 - 10.0 years
12 - 17 Lacs
Chennai
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 3 months ago
2.0 - 7.0 years
9 - 13 Lacs
Mumbai
Work from Office
As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, ther...
Posted 3 months ago
3.0 - 5.0 years
5 - 7 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 3 months ago
8.0 - 10.0 years
22 - 27 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...
Posted 3 months ago
3.0 - 5.0 years
5 - 7 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Han...
Posted 3 months ago
3.0 - 5.0 years
7 - 11 Lacs
Pune
Work from Office
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling inci...
Posted 3 months ago
15.0 - 21.0 years
18 - 22 Lacs
Gurugram
Work from Office
About The Role The Data Architecture Specialist Join our team of data architects who design and execute industry-relevant reinventions that allow organizations to realize exceptional business value from technology . Practice: Technology Strategy & Advisory, Capability Network I Areas of Work: Data Architecture | Level:Sr Manager | Location: Bangalore/Mumbai/Pune/Gurugram | Years of Exp: 15 to 21 years Explore an Exciting Career at Accenture Are you a problem solver and passionate about Tech-driven transformationDo you want to design, build and implement strategies to enhance business architecture performanceAre you passionate about being part of an inclusive, diverse and collaborative cultur...
Posted 3 months ago
5.0 - 10.0 years
20 - 30 Lacs
Hyderabad
Hybrid
Job Title: SAP GRC Security Consultant Location: Hyderabad Work Mode: Hybrid (3 days Work from office) About the Role We are looking for an experienced SAP GRC Security Consultant to manage security architecture, role design, and compliance across SAP systems. If you have expertise in SAP GRC, security configurations, and risk management, this role is for you. Key Responsibilities Manage SAP security roles and authorizations across ECC, S/4HANA, BW, and Fiori Configure and administer SAP GRC Access Control modules (ARA, ARM, EAM, BRM) Conduct risk analysis and mitigation for user roles and access Oversee secure user provisioning and de-provisioning with identity management Support audit and ...
Posted 3 months ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
123151 Jobs | Dublin
Wipro
40198 Jobs | Bengaluru
EY
32154 Jobs | London
Accenture in India
29674 Jobs | Dublin 2
Uplers
24333 Jobs | Ahmedabad
Turing
22774 Jobs | San Francisco
IBM
19350 Jobs | Armonk
Amazon.com
18945 Jobs |
Accenture services Pvt Ltd
18931 Jobs |
Capgemini
18788 Jobs | Paris,France