Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
8.0 - 12.0 years
6 - 10 Lacs
Noida
Work from Office
We are looking for a skilled SAP Security & GRC Process Control (PC) Technical Consultant with 8 to 12 years of experience. The position is based in Bengaluru. Roles and Responsibility Design, configure, and maintain SAP Security roles across various systems. Implement and support SAP GRC Process Control (PC) including control framework configuration, business rule automation, continuous control monitoring, and workflow setup for control assessments and surveys. Collaborate with risk, audit, and compliance teams to define control objectives and automate control testing. Integrate PC with other GRC components and SAP systems. Troubleshoot security-related issues and GRC-PC workflows, data connectors, and reports. Provide technical expertise for SOD risk analysis, rule-set updates, and audit reporting. Job Minimum 8 years of hands-on experience in SAP Security and GRC. At least 3-5 years of experience in SAP GRC Process Control. Strong understanding of SAP authorization concepts, role design, and user provisioning. Experience with Fiori app security, S/4HANA security, and BTP security concepts. Hands-on expertise in BRF+, MSMP workflow configuration, and GRC plug-ins. Good working knowledge of audit processes, risk assessments, and compliance controls. SAP Certifications in GRC Process Control and/or SAP Security are preferred. Experience with SAP BTP security, SAP Cloud Identity, and IAS/IPS is a plus. Exposure to SAP IDM (Identity Management) and SAP Analytics Cloud security is beneficial. Knowledge of SOX, GDPR, and other compliance frameworks is advantageous.
Posted 1 month ago
3.0 - 4.0 years
5 - 6 Lacs
Pune
Work from Office
Overview 170+ Years Strong. Industry Leader. Global Impact. At Pinkerton, the mission is to protect our clients. To do this, we provide enterprise risk management services and programs specifically designed for each client. Pinkerton employees are one of our most important assets and critical to the delivery of world-class solutions. Bonded together, we share a commitment to integrity, vigilance, and excellence. Pinkerton is an inclusive employer who seeks candidates with diverse backgrounds, experiences, and perspectives to join our family of industry subject matter experts. The Security Specialist provides comprehensive security management support to ensure the security and safety of company assets, associates, information and interests in the defined area as well as provides security consulting and risk management services. Security Specialist leads efforts in identifying, developing, implementing, and maintaining site wide security practices and processes to reduce risks. Responsibilities Represent Pinkerton’s core values of integrity, vigilance, and excellence. Develop, implement, and support physical security-related policy, including design requirements and badge administration. Conduct threat, vulnerability, and risk assessments to inform security strategies for planned and unplanned events. Meet regularly with Pinkerton management and client representatives for status updates. Address any actual or potential issues and make changes, as needed. Provide support during client service level changes. Maintain documentation throughout the project lifecycle and ensure timely, clear, and concise communications to all stakeholders via the appropriate channels. Assist management in maintaining a positive and professional environment in full compliance with applicable laws, regulations, policies, and procedures; ensure staff members understand and comply with applicable laws, regulations, policies, and procedures. Ability to conduct a comprehensive site vulnerability assessment. Prepare logs or reports as required for the site; write and/or type reports and/or enter information in a computer; inspect security control logs; and take action as required. Observe and report incidents or suspicious activity to security personnel, Client representatives, company management, life/safety personnel, or public safety authorities as appropriate for the circumstances and/or as required by the site. Assist in the control of access to Client site or facility through the admittance process; assist visitors with a legitimate need to gain entry to the facility; screen visitors and Client’s employees in an efficient manner in order to expedite their admittance to the site or facility. All other duties, as assigned. Qualifications Bachelor's degree and two or more years of corporate security experience, or an equivalent combination of education and experience sufficient to perform the essential functions of the job, as determined by the company. English language skills (C1 level). Knowledge of security systems and related access control technologies. Able to analyze complex situations and recommend solutions. Able to work independently with little supervision. Strong client orientation and results driven. Able to interact effectively at all levels and across diverse cultures. Attentive to detail and accuracy. Excellent written, verbal, and presentation skills. Computer skills; Microsoft Office. Working Conditions: With or without reasonable accommodation, requires the physical and mental capacity to effectively perform all essential functions; Regular computer usage. Occasional reaching and lifting of small objects and operating office equipment. Frequent sitting, standing, and/or walking. Travel, as required. Pinkerton is an equal opportunity employer to all applicants and positions without regard to race/ethnicity, color, national origin, ancestry, sex/gender, gender identity/expression, sexual orientation, marital/prenatal status, pregnancy/childbirth or related conditions, religion, creed, age, disability, genetic information, veteran status, or any protected status by local, state, federal or country-specific law.
Posted 1 month ago
8.0 - 13.0 years
10 - 15 Lacs
Bengaluru
Work from Office
Job Title : Cybersecurity Expert- Product, Platform & Solution Security Role Summary The Cybersecurity Expert plays a critical role in protecting the integrity, availability, and confidentiality of medical software and systems by embedding security principles throughout the development lifecycle. As part of the Cybersecurity Center of Competence, the expert collaborates cross-functionally with R&D, product teams, architects, regulatory stakeholders, and external security communities to lead threat analysis, ensure secure design, validate vulnerabilities, and shape the security posture of products and platforms. This role is both technical and consultative, requiring deep knowledge of secure engineering practices, standards, and incident response. Key Responsibilities 1. Security Consulting & Risk Mitigation Provide security consultation to product teams to eliminate or mitigate weaknesses in line with industry standards (e.g., IEC 62443, NIST, ISO 27001). Participate in design and architecture discussions to ensure alignment with secure design principles. Guide software architects in integrating cyber security requirements into product and solution design. 2. Vulnerability & Threat Management Perform threat modeling, risk analysis, and attack surface assessments. Analyze vulnerabilities (internal or third-party), validate remediation measures, and guide patching strategies. Perform security incident investigations and provide forensics support when required. Stay updated on new vulnerabilities, threat vectors, and exploits"”apply findings to continuously improve product security. 3. Security Engineering & Tooling Design or extend tools, scripts, or automation frameworks for vulnerability scanning and penetration testing. Perform or oversee activities such as: Fuzz testing Reverse engineering Code analysis (static/dynamic) Secure software supply chain checks Contribute to the integration of automated security tooling into CI/CD pipelines. 4. Secure Development Lifecycle Support Lead or support security activities throughout the Secure Software Development Lifecycle (SDLC). Participate in or lead security gate reviews, release readiness assessments, and milestone reviews. Create and maintain secure coding and design guidelines for developers. Conduct or support internal security audits and regulatory submissions. 5. Community Development & Training Conduct security awareness sessions and technical training for R&D teams. Develop reusable security patterns, checklists, and guidance material. Collaborate with Cybersecurity Officers, Product Owners, and Architects to ensure cohesive security implementation across programs. Contribute to internal and external knowledge sharing, security forums, and standardization groups. Required Qualifications & Skills Education and Experience : Bachelors/Masters degree in Computer Science, Cybersecurity, or a related field. 5"“8 years of experience in IT/software development, with 3+ years focused on cybersecurity. Technical Expertise Strong foundation in: Secure architecture and design Threat modeling / Security risk analysis Static and dynamic code analysis Fuzz testing / Penetration testing Security tooling and automation (e.g., SonarQube, Burp Suite, Fortify, Checkmarx) Operating systems and networking fundamentals DevSecOps pipeline and CI/CD integration basics Working knowledge of: HIPAA, HITECH, FDA Pre/Postmarket Cybersecurity Guidance (for medical devices) Regulatory standardsIEC 62443, ISO 27001, NIST SP 800-53/82/218, CLSI AUTO11-Ax, IEC 80001 Certifications (Preferred) CISSP- Certified Information Systems Security Professional CSSLP- Certified Secure Software Lifecycle Professional OSCP, CEH, or similar ethical hacking certifications Collaboration & Stakeholders Internal Cybersecurity Officers (CYSO), R&D Development & Test teams, Quality/Risk Managers, Project Managers, Product Owners, Architects External Standardization bodies, security tool vendors, customer security teams, and external cybersecurity communities Work Style and Engagemen t Must be able to support multiple concurrent projects. Requires proactive leadership and strong communication with cross-functional teams. Expected to contribute regularly to internal security initiatives, CoPs (Communities of Practice), and lessons learned.
Posted 1 month ago
7.0 - 12.0 years
9 - 14 Lacs
Mumbai
Work from Office
* Responsible for implementation partner to see project on track along with providing required reports to management and client * Handle the project as well as BAU operations while ensuring high level of systems security compliance * Coordinate with and act as an authority to resolve incidents by working with other information security specialists to correlate threat assessment data. * Analyse data, such as logs or packets captures, from various sources within the enterprise and draw conclusions regarding past and future security incidents. * Ready to support for 24/7 environment. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * 7+ years of IT experience in security with at least 4+ Years in Security Operation Centre with SIEMs. * B.E./ B. Tech/ MCA/ M.Sc. * Maintaining SIEM/UEBA platform hygiene, Scripting, Automation SOAR Playbook Creation with Testing, with Change/Problem/Incident Management, with CP4S platform integration & dashboarding, Recovery Support. * Expertise in Security Device Management SIEM, Arcsight, Qradar, incident response, threat hunting, Use case engineering, SOC analyst, device integration with SIEM. * Working knowledge of industry standard risk, governance and security standard methodologies * Proficient in incident response processes - detection, triage, incident analysis, remediation and reporting. * Ability to multitask and work independently with minimal direction and maximum accountability. Preferred technical and professional experience * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications
Posted 1 month ago
12.0 - 17.0 years
9 - 13 Lacs
Bengaluru
Work from Office
The IBM Technology Expert Labs organization is looking for an IBM zSecurity Delivery Consultant with expertise in IBM Z, RACFand Security products to lead and deliver pre-sales and post-sales client engagements that enable the adoption of IBMzSecureSuite and IBM ZMFA Ideal candidates will have demonstrated a successful history of implementing IBM Zsecure Suiteengagements, be familiar with sysplex architectural methods, can independently assess IT infrastructures, evaluate gaps in best practices and create IBM Securitysolution recommendations for client environments while displaying excellent collaboration and communication with Clients, Sellers, Business Partners and Colleagues by delivering reports to clients. You will be responsible for developing and delivering IBM Securityarchitecture, and implementation of IBM Security productswhich may include: Implement security policies and procedures to protect the integrity, confidentiality, and availability of information extensive knowledge of security administration by using the zSecure suite products Designing and customizing the ZMFA features, based on the client requirements Integrating and designing security with IBM Guardium Data centre and Quantum safe solutions. Assisting with customer to extract the audit reports for system vulnerabilities and implement security measures to mitigate risks Providing technical guidance and skills transfer to customer personnel for IBM zSecure suite products, ZMFA features, IBM Guardium and Quantum safe Producing planning and implementation reports and documentation. Installation, configuration, testing and maintenance of IBM RACF, and related Z software Other technical tasks as necessary to accomplish successful customer outcomes Aid customers to migrate the other vendor security products to the IBM RACF And Z security software’s. This role requires a strong knowledge of the IBM Systems Z security and software ecosystem, focusing on Strong Security and IBM Zsecure, Guardium and Quantum safe , are needed. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 12+ years’ experience working with: RACF Security Administrators and capabilities of IBM zSecurity products including(zSecure ,ZMFA, Guardium and Quantum safe) z/OSRACF Security Administrators ,zSecure Admin Ability to migrate the other vendor security products to the RACF and IBM z Security related products . Successfully delivering IBM Z projects and/or architecting and planning infrastructures for customer’s Security Needs 5+ years’ experience in: Customer or executive facing communications, requirements analysis, documentation, and report presentations. Create and manage RACF user profiles, group profiles, and access rights Implement security policies, extracting the Security audit reports using the zSecure suite products and procedures to protect integrity of the system Ability to lead customer technical workshops up to 20+ people. Strong written and verbal communication skills Preferred technical and professional experience Knowledge or experience with RACF ,zsecure products suite ,Guardium data center, ZMFA, Quantum safe Experience on Security Migrations (ACF2 to RACF or TSS to RACF) Practical SMP/E knowledge Assembler, JCL, REXX and CLIST knowledge
Posted 1 month ago
6.0 - 9.0 years
6 - 10 Lacs
Bengaluru
Work from Office
Skill: SAP Security Consultant Experience: 6-9 Years Notice Period: Immediate Joiners Employee type : C2H/FT Job Description: SAP Security Consultant with 4-6 years of experience with the below skillset. (Managed Services -- CG) Work directly with clients at all different levels to guide complex projects and develop innovative solutions. Successful completion of at least two full life cycle implementations of GRC and ECC. SAP HANA Security - User administration and Role administration. Role design, configuration, testing, and deployment methodology within SAP application architecture for SAP ECC, BI, GRC, S4 HANA, EP. Detailed knowledge of ABAP, Java based authorizations within SAP applications. Expertise on SAP ECC Profile Generator (single roles, master/derived roles, composite roles). Technical expertise in core skills of SAP BI 7.0 security analysis authorization concept, working with queries, workbooks and related AO/ BEX issues. Good to have SAP GRC 12.0 configuration and administration, Business roles concept, expertise and experience on ARM, ARA, EAM full lifecycle implementation. Experience in CHARM Process and Role build, Authorization concepts, Issue handling, expertise on Charm standard processes. Good to have knowledge on EP User and Role administration. Strong communication skills to facilitate working in a dynamic project environment. Addressing process improvements, reducing manual efforts with automations. Expertise on Audit processes, Licensing, ONAPSIS recommendations and remediations. Provide leadership to junior systems analysts and client personnel assigned to projects. Must be able to participate in 24x7 Operations and Maintenance call rotation support.
Posted 1 month ago
2.0 - 4.0 years
4 - 6 Lacs
Hyderabad
Work from Office
Manage and implement security solutions within SAP Integrated Business Planning (IBP) systems. You will focus on securing data and ensuring proper access control across IBP applications. Expertise in IBP, SAP security, and role-based access control is required.
Posted 1 month ago
8.0 - 12.0 years
10 - 14 Lacs
Chandigarh, Dadra & Nagar Haveli, Daman
Work from Office
8+ years of experience in SAP Security/GRC Should have experience in security of SAP ECC , SRM, FI, CRM, HR, GRC, BW ) SAP Security support for all SAP environments Experience in GRC access control, RAR (Risk Analysis and Remediation) and SOD (segregation of duty),mitigation and remediation Design and implement new authorization concepts along with business departments and IT stake holders SAP role design, administration and analysis SAP user administration on approved procedures Responsible for integration of SoD conform processes and authorization validation Meets or exceeds all task deadlines assigned Obtains clear and concise requirements from senior management user community Perform the role of GRC subject matter specialist including the ability to provide in-depth application support to internal/external project team members Create and maintain matrix for business processes, users & roles Strong experience in SAP security analysis, design, blueprint, development, testing Strong understanding of SAP Security processed Strong experience in Security roles & users with object, package, schema & Sys privileges. Hands-on experience in security design/redesign etc. changing business needs Support audit and compliance activities Should have experience in SAP Support projects Location - Chandigarh,Dadra & Nagar Haveli,Daman,Diu,Goa,Haveli,Hyderabad,Jammu,Lakshadweep,Nagar,New Delhi,Puducherry,Sikkim
Posted 1 month ago
6.0 - 11.0 years
4 - 8 Lacs
Hyderabad
Work from Office
Immediate Openings on Security Consultants with Vulnerability _Contract_Pan India 6+ Years Security Consultants with Vulnerability Pan India Period :Immediate. Type Contract Description 7 + Years Security Consultants with Vulnerability tools exp like Qualys or Tenable (prefer Qualys) and ServiceNow. Experience with Vulnerability tools such as Qualys or Tenable (prefer Qualys) and ServiceNow .
Posted 1 month ago
8.0 - 10.0 years
12 - 17 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: IDAM Security Consulting. Experience8-10 Years.
Posted 1 month ago
5.0 - 8.0 years
12 - 16 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to develop minimum viable product (MVP) and comprehensive AI solutions that meet and exceed clients expectations and add value to business. Do Manage the product/ solution development using the desired AI techniques Lead development and implementation of custom solutions through thoughtful use of modern AI technology Review and evaluate the use cases and decide whether a product can be developed to add business value Create the overall product development strategy and integrating with the larger interfaces Create AI models and framework and implement them to cater to a business problem Draft the desired user Interface and create AI models as per business problem Analyze technology environment and client requirements to define product solutions using AI framework/ architecture Implement the necessary security features as per products requirements Review the used case and see the latest AI that can be used in products development Identify problem areas and perform root cause analysis and provide relevant solutions to the problem Tracks industry and application trends and relates these to planning current and future AI needs Create and delegate work plans to the programming team for product development Interact with Holmes advisory board for knowledge sharing and best practices Responsible for developing and maintaining client relationships with the key strategic partners and decision makers Drive discussions and provide consultation around product design as per customer needs Participate in client interactions and gather insights regarding product development Interact with vertical delivery and business teams and provide and correct responses to RFP/ client requirements Assist in products demonstration and receive feedback from the client Design presentations for seminars, meetings and enclave primarily focused over product Team Management Resourcing Forecast talent requirements as per the current and future business needs Hire adequate and right resources for the team Talent Management Ensure adequate onboarding and training for the team members to enhance capability & effectiveness Build an internal talent pool and ensure their career progression within the organization Manage team attrition Drive diversity in leadership positions Performance Management Set goals for the team, conduct timely performance reviews and provide constructive feedback to own direct reports Ensure that the Performance Nxt is followed for the entire team Employee Satisfaction and Engagement Lead and drive engagement initiatives for the team Track team satisfaction scores and identify initiatives to build engagement within the team Deliver No.Performance ParameterMeasure1.Continuous technical project management & deliveryAdoption of new technologies, IP creation, MVP creation, Number of patents filed, Research papers created2.Client CentricityNo. of automation done, On-Time Delivery, cost of delivery, optimal resource allocation3.Capability Building & Team Management% trained on new age skills, Team attrition %, Number of webinars conducted (internal/external) Mandatory Skills: IDAM Security Consulting. Experience5-8 Years.
Posted 1 month ago
10.0 - 15.0 years
13 - 18 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: IDAM Security Consulting. Experience>10 YEARS.
Posted 1 month ago
6.0 - 9.0 years
5 - 13 Lacs
Hyderabad, Pune
Work from Office
Role & responsibilities To be successful in this role, you should meet the following requirements: Expert level knowledge and hands on experience in any one or more of HSBCs current Cloud platforms with particular focus on AWS. Extensive working knowledge of software development and mandatory control deployment tools; e.g GitHub, MS Visual Studio, Python, Bash, PowerShell, SQL, and data formats such as XML, JSON, CSV. Extensive knowledge of cloud vendor tooling e.g JupiterOne. Customer/stakeholder focus. Ability to build strong relationships with Cloud platform teams, security architects, application teams, cross functional IT and global/local IT teams. Self-motivated and possessing of a high sense of urgency and personal integrity. Strong problem-solving and trouble-shooting skills. Strong knowledge of Agile working methodologies. Excellent written and spoken communication skills with an ability to: communicate with impact, ensuring complex information is articulated in a meaningful way to wide and varied audiences; produce clear and concise reports/control documentation for targeted audiences across internal and external stakeholders.
Posted 1 month ago
10.0 - 20.0 years
25 - 40 Lacs
Pune
Remote
Position Overview: This delivery role will be expected to lead customer engagements, deliver final reports and presentations with professional excellence. The ideal candidate will have a background in zero trust, enterprise segmentation, and operational technology security, as well as consulting experience and executive leadership communication and presentations. Key Responsibilities: Customer Focus: Understand customer needs and design solutions that solve for their needs-short and long term. Evaluate and recommend security strategies for networks, systems, operations, cloud, people, process and technologies. Through the application of industry standards and security best practices, develop and recommend plans to structure secure architectures. Use a strategic approach to managing customer interactions and data throughout the customer journey with a goal of higher business growth through better customer experiences. Build strong customer relationships to deliver customer-centric solutions End to End Solution Management/Delivery Be the primary lead in cybersecurity delivery engagements for a wide variety of clients in different industry verticals Collaborate with cross-functional teams to ensure the reliability, availability, and efficiency of OT systems. Implement and maintain cybersecurity measures to protect OT assets. Develop and implement best practices for OT system configuration, monitoring, and optimization. Analyze security measures such as access controls, firewalls, and intrusion detection systems to protect OT assets. Apply principles to ensure compliance with relevant regulations (NERC CIP, TSA), and standards (NIST, IEC 62443). Develop, create and write and deliver documentation and technical artifacts (OT architecture, configurations, and procedures) in a professional matter that will be given to Clients and others in a professional manner Qualifications: Thorough knowledge of the lifecycle, maintenance, and security of ICS, SCADA systems, and other OT infrastructure. Measurable Experience in: Experience with OT systems such as SCADA, PLCs, DCS, and HMI. Proficiency in network protocols and communication technologies used in OT environments (e.g., Modbus, Profibus, OPC). Strong understanding of cybersecurity principles and best practices. Excellent problem-solving and communication skills. Consulting for security consulting firms with example deliverables Overall cyber security technical experience Datacenter administration, including design, implementation, and support Networking expertise, including hands-on roles in supporting routers, switches, and firewalls Ability to perform concurrent tasks in complex environments under adjusting priorities Ability to communicate and modify approach, language, and style to different audiences Professional writing style and experience with demonstrable technical and business-related artifacts is required Ability to manage conflicting interests and deal with ambiguity. Effective communication skills: capable of supporting presentations to convey concepts and solutions, writing effective emails, and discussing strategy with senior executives. Strong teamwork qualities: able to gain the trust of customers and collaborate effectively within the WWT team. Intellectually curious with a desire to understand constantly evolving technology solutions. Proactive, collaborative, with emotional intelligence, and the capacity to learn and synthesize new information. Adaptable, with the ability to conform to shifting priorities, demands, and timelines through analytical and problem-solving capabilities. Self-directed, with the ability to adapt to change and competing demands.
Posted 1 month ago
4.0 - 8.0 years
8 - 12 Lacs
Bengaluru
Work from Office
Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less
Posted 1 month ago
4.0 - 8.0 years
8 - 12 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less
Posted 1 month ago
4.0 - 8.0 years
8 - 12 Lacs
Hyderabad
Work from Office
Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less
Posted 1 month ago
4.0 - 8.0 years
8 - 12 Lacs
Mumbai
Work from Office
Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less
Posted 1 month ago
8.0 - 10.0 years
27 - 30 Lacs
Gurugram
Work from Office
NAB is looking for Security Assurance Consultant to join our dynamic team and embark on a rewarding career journey Undertake short-term or long-term projects to address a variety of issues and needs Meet with management or appropriate staff to understand their requirements Use interviews, surveys etc. to collect necessary data Conduct situational and data analysis to identify and understand a problem or issue Present and explain findings to appropriate executives Provide advice or suggestions for improvement according to objectives Formulate plans to implement recommendations and overcome objections Arrange for or provide training to people affected by change Evaluate the situation periodically and make adjustments when needed Replenish knowledge of industry, products and field
Posted 1 month ago
2.0 - 6.0 years
8 - 12 Lacs
Noida
Work from Office
Primary Responsibilities: Writing clean, maintainable and testable code to develop software features Reproduce bugs, investigate root cause and develop fix Review code and offer technical support to fellow team members as needed Communicate effectively with technical and non-technical stakeholders Work closely with various teams that own Systems of Records or Sources of Truth to query, analyze, sanitize, and ingest their data into our knowledge graph Think critically to analyze data and gather insights that lead to high-value decisions that improve the security posture across the enterprise Stay updated with the latest technologies and industry trends to continuously improve the teams capabilities. Comply with the terms and conditions of the employment contract, company policies and procedures, and any and all directives (such as, but not limited to, transfer and/or re-assignment to different work locations, change in teams and/or work shifts, policies in regards to flexibility of work benefits and/or work environment, alternative work arrangements, and other decisions that may arise due to the changing business environment). The Company may adopt, vary or rescind these policies and directives in its absolute discretion and without any limitation (implied or otherwise) on its ability to do so Required Qualifications: Undergraduate degree in Computer Science, Engineering, or a related field, or equivalent experience Hands-on experience authoring highly performance SQL queries, working with a wide variety of databases including RDBMS as well as NoSQL databases Hands-on experience authoring scalable, high-performance APIs (REST) Hands-on experience with automated testing Experience with engineering projects hosted in public cloud AWS, Azure or GCP Solid proficiency in TypeScript Good understanding of CI/CD pipelines Ability to deal with ambiguity, changing and often conflicting priorities, to plan and execute while balancing timeliness, quality of deliverables Proven excellent problem-solving skills and a proactive, go-getter attitude Ability to work collaboratively with globally distributed teams in a fast-paced agile development environment and manage time effectively Preferred Qualifications: Experience with Apollo Server, GraphQL Experience with graph databases and Meilisearch or Elasticsearch Experience with Containers and Kubernetes Understanding of Network Security in cloud and on-prem hosting environments Points to note: Flexible to work in and overlap with teams in India as well as teams based on US (between 7 AM Central Time 11 AM Central Time) At UnitedHealth Group, our mission is to help people live healthier lives and make the health system work better for everyone. We believe everyone of every race, gender, sexuality, age, location and income deserves the opportunity to live their healthiest life. Today, however, there are still far too many barriers to good health which are disproportionately experienced by people of color, historically marginalized groups and those with lower incomes. We are committed to mitigating our impact on the environment and enabling and delivering equitable care that addresses health disparities and improves health outcomes an enterprise priority reflected in our mission. #njp ##SSTech
Posted 1 month ago
3.0 - 8.0 years
15 - 25 Lacs
Bengaluru
Work from Office
Hi We have the below opening with one of our prestigious client. If you are interested and willing to explore opportunity, Please shared your CV to vivitha.d@randstad,in Exp: 3+ Years Location: Bangalore Mode of work: 5 Days Work from office Shift time- 5:30 am or 7:30 am ( 9 Hours) Need only OSCP Certified candidates Role Description Responsibilities: Oversee and conduct tests for system vulnerabilities, such as: SOE Security Assessments Source Code Review Security Risk (ISO27k) & Privacy Impact (APP) Assessments NCSC Cyber Essentials Plus Assessments Red Team Attack Simulations Firewall and Password Audits Vulnerability Assessments (Internal, External, Web Application, and Database) Penetration Testing (Internal, External, Web Application, Database, Mobile, and Wireless) Provide complex technical advice, recommendations, and consultancy on networks, products, and services supplied to our managed service customers Compiling and presenting reports on the test results. Lead the design, implementation, operation, and maintenance of security management systems. Support internal security initiatives or mentoring junior team members Role Description Requirements: Minimum 3 years experience as a security consultant or penetration tester An existing penetration testing certification, such as OSCP, OSCE, or CREST is mandatory Experience delivering at least 6 of the different types of engagements listed above Extensive knowledge and experience within the IT Security industry Knowledge of a range of consulting and security vendor solution offerings Nice-to-have: Defence Force experience is desirable Hold a current active security clearance (NV-1 or NV-2) is desirable
Posted 1 month ago
2.0 - 7.0 years
7 - 11 Lacs
Mumbai
Work from Office
As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. * Responsible for security researcher to provide insight and understanding of new and existing information security threats * Responsible to participate in recommending improvements to SOC security process, procedures, policies, security incident management and vulnerability management processes * You will be involved in evaluating, recommending, implementing, and solving problems related to security solutions and evaluating IT security of the new IT Infrastructure systems * Keep yourself up-to-date with emerging security threats including applicable regulatory security requirements * Work in a 24x7 Security Operation Centre (SOC) environment Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * Minimum 2+ years’ experience in SIEM. * Proven expertise in handling the daily monitoring of Information Security events on the QRadar / ArcSight / Splunk console platform * Proficient in monitoring security events from various SOC channels (SIEM, Tickets, Email and Phone), based on the security event severity to handle the service support teams, tier2 information security specialists * Expertise in threat modelling and Use case development and ability to review policies of security monitoring tools based on security concepts and logical approach. Preferred technical and professional experience * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications
Posted 1 month ago
2.0 - 5.0 years
4 - 8 Lacs
Mumbai
Hybrid
Your day at NTT DATA The Senior Associate Security Consultant is responsible for developing expertise in their area of specialization. This role is responsible for translating clients cybersecurity requirements and customizing and implementing security solutions into specific systems, applications and product designs. This role identifies and develops the security solutions for clients using company products, outsourced technology solutions and technical tools. This role consults with clients regarding secure product configuration, deployment, and security patches to minimize security vulnerabilities. In addition, this role provides comprehensive scanning, penetration testing, vulnerability assessments, monitoring services and source code analysis and delivers detailed results to clients, as well as guides and supports clients in the development and implementation of product security controls. What you'll be doing Key Responsibilities: Assists in conducting security assessments, vulnerability scans, and penetration tests to identify weaknesses in client systems. Analyzes security data, logs, and reports to detect and investigate security incidents or anomalies. Prepares and maintains documentation, including security assessment reports, findings, and recommendations. Collaborates with senior consultants to provide advice and support to clients on security best practices and risk mitigation strategies. Learns and uses various security tools and technologies for assessments and monitoring. Stays updated on the latest cybersecurity threats, vulnerabilities, and industry best practices. Assists in evaluating client systems for compliance with industry standards (e.g., ISO 27001, NIST) and regulatory requirements. Communicates effectively with clients to understand their security needs and concerns. Participates in training programs and certifications to develop expertise in cybersecurity. Knowledge and Attributes: Strong interest in cybersecurity and a desire to learn and grow in the field. Knowledge of basic cybersecurity concepts, principles, and best practices. Familiarity with common security tools and technologies is a plus. Excellent analytical and problem-solving skills. Effective communication skills, both written and verbal. Ability to work collaboratively in a team environment. Eagerness to stay up to date with the evolving cybersecurity landscape. Academic Qualifications and Certifications: Bachelor's degree or equivalent in Information Technology or Computer Science or Engineering or related field. Industry relevant certifications such as CISSP, CISM, CEH, GSEC or CompTIA Security+ essential. Required Experience: Moderate level of demonstrable experience in the Information Technology Security Industry or relevant experience in similar role within a related environment. Moderate level of experience with security architecture design principles. Moderate level of experience with industry compliance and standards such as ISO 27000, PCI:DSS, NIST, HIPAA or others. Moderate level of experience with security tools and techniques to cover SANS Top 25, OWASP or others.
Posted 1 month ago
7.0 - 11.0 years
20 - 25 Lacs
Bengaluru
Work from Office
OPERATIONAL TITLE (ENGLISH)Senior Consultant - Security Policy and Architecture REPORTING LOCATION Bangalore, IN WORKING LOCATIONBangalore, IN SUMMARY OF POSITION AND OBJECTIVES The Information Security Consultant/Architect plays a pivotal role in safeguarding the technological infrastructure andassets of Eurofins through meticulous evaluation, integration, and enhancement of security measures, evaluation of intricate IT technologies to ensure alignment with stringent security standards before their approval by the Technology Council, and contribution to the formulation and refinement of security policies, ensuring their relevance and effectiveness in the dynamic landscape of cybersecurity. POSITION & OBJECTIVES : GSC Security Policy and Architecture Advisory is part of GSC Security Support Office pilar, combining the Security Policy and Architecture Advisory, Regional Security Support and Security Certifications Support crews. As part of his significant role in safeguarding the IT infrastructure and assets, Information Security Consultant: evaluates complex IT technologies from security standpoint before they are approved by the Technology Council; contributes to newly created and updated security policies; provides consultancy to other IT and business crews regarding the policies and security recommendations; contributes to technical integration scenarios, ensuring security in ongoing and planned projects; engages into strategic initiatives aimed at enhancing Eurofins overall security posture, ensuring resilience against evolving threats and vulnerabilities (Information Security Architect); provides internal consultancies for other crew members (Information Security Architect); QUALIFICATIONS AND EXPERIENCE REQUIRED: Experience: 7-10+ years of experience in information security, preferably in the security architecture area; experience in one or more areas such as: managing complex IT environment utilizing directory services; designing/managing/protecting complex network environments; design and/or management of cloud-based services; identifying the requirements, architecting, deploying, and managing security tools , such as vulnerability management, identity management, PKI, log management, MFA, penetration tests, automate code analysis, antimalware solutions; acting as security SME (Key Word) in IT projects; delivering security policies, standards and guidelines. As we are working in an international environment, Information Security Consultants English needs to be excellent. He/She needs to be an effective communicator (both to technical and non-technical professionals), convincing that his/her concepts are relevant and important for the whole organization. Role requires also skills such as orientation on details, team working, problem solving and independence. Additionally, following trainings or certificates are appreciated: CISPP (*Added Advantage) CCSP (*Added Advantage) CEH AZ-500, AZ-xxx, SC-xxx AWS Security CompTIA Security+ Others, related to security, public cloud, networking, IT infra Qualifications Bachelors degree in computer science, security and similar is appreciated. Knowledge, Skills and Abilities:
Posted 2 months ago
3.0 - 7.0 years
5 - 9 Lacs
Bengaluru
Work from Office
-Develop a deep technical understanding of IBM Public Cloud offerings and infrastructure -Plan and perform red team exercises against various cloud offerings -Plan and perform full stack security tests against various system(s) and application(s) independently as well as within a team -Engage in security monitoring and visibility improvement activities across the IBM Public Cloud organization -Thoroughly document techniques, tactics, and proof of concepts used during security testing and red team exercises -Communicate with various business and technology leaders to interpret identified vulnerabilities and assist in the development and planning for risk mitigation plans -Research and continuously improve skills in attacker tools, methods, and techniques -Lead by example for the greater red team in professionalism, communication, and technical expertise Required education Bachelor's Degree Preferred education Bachelor's Degree Required technical and professional expertise 3+ years of demonstrating experience in planning and executing penetration tests/red team exercises against web applications, containers, APIs, network devices, databases, operating systems, and various cloud technologies Demonstrates strong understanding of offensive cybersecurity operations and defensive integrations, including enumeration and exploitation of various cloud-based technologies and development of secure applications. Demonstrates strong ability to communicate highly technical aspects to Executives and IT staffs, respectively Demonstrates ability by creating custom tools for penetration testing and contributing to opensource technologies Demonstrates strong experience with various scripting languages (Python, Ruby, Bash, etc.) Possess one or more of the following credentialsOSCP, OSCE, OSWE, GWAPT, GPEN, GXPN, CRTP, Crest Penetration Certification. Familiarity with serverless services, containerization and other cloud technologies Strong familiarity with OWASP Top Ten, NIST, and MITRE ATT&CK 3+ years of demonstrating experience in system or application administration role(s) Preferred technical and professional experience 5+ years of demonstrating experience in planning and executing penetration tests/red team exercises against web applications, containers, APIs, network devices, databases, operating systems, and various cloud technologies Understanding of offensive cybersecurity operations and defensive integrations, including enumeration and exploitation of various cloud-based technologies and development of secure applications. Ability to communicate highly technical aspects to Executives and IT staff, respectively Demonstrates ability by creating custom tools for penetration testing and contributing to opensource technologies Expertise in developing exploits and customized attack tooling and approaches Demonstratedsecurity research leading to bug bounty and CVE awards Deep understanding of serverless services, containerization and other cloud technologies Demonstrates strong experience with various scripting languages (Python, Ruby, Bash, etc.) CGood to have one of these certsCRTP, CEH, OSCP, OSCE, OSWE, GWAPT, GPEN, GXPN, CRTP, Crest Penetration Certification. Familiarity with serverless services, containerization and other cloud technologies Strong familiarity with OWASP Top Ten, NIST, and MITRE ATT&CK 5+ years of demonstrating experience in system or application administration role(s)
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough