335 Security Consulting Jobs - Page 4

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

10 - 16 Lacs

ajmer

Work from Office

Key Responsibilities: Configure and support SAP GRC modules (ARA, BRM, ARM, EAM) Perform SoD analysis and manage risk violations Design and maintain SAP roles and authorizations Handle user provisioning and access issues Collaborate with audit/compliance teams (SOX, GDPR) Support security-related transports and documentation Requirements : 4+ years in SAP Security and GRC Strong knowledge of SAP GRC Access Control Experience with role design, SoD, and compliance Familiarity with Fiori and S/4HANA security Strong problem-solving and cross-functional collaboration skills. Job Location(s ) - Pan India.

Posted 1 week ago

AI Match Score
Apply

5.0 - 10.0 years

10 - 16 Lacs

kurnool

Work from Office

Key Responsibilities: Configure and support SAP GRC modules (ARA, BRM, ARM, EAM) Perform SoD analysis and manage risk violations Design and maintain SAP roles and authorizations Handle user provisioning and access issues Collaborate with audit/compliance teams (SOX, GDPR) Support security-related transports and documentation Requirements : 4+ years in SAP Security and GRC Strong knowledge of SAP GRC Access Control Experience with role design, SoD, and compliance Familiarity with Fiori and S/4HANA security Strong problem-solving and cross-functional collaboration skills. Job Location(s ) - Pan India.

Posted 1 week ago

AI Match Score
Apply

5.0 - 10.0 years

10 - 16 Lacs

shillong

Work from Office

Key Responsibilities: Configure and support SAP GRC modules (ARA, BRM, ARM, EAM) Perform SoD analysis and manage risk violations Design and maintain SAP roles and authorizations Handle user provisioning and access issues Collaborate with audit/compliance teams (SOX, GDPR) Support security-related transports and documentation Requirements : 4+ years in SAP Security and GRC Strong knowledge of SAP GRC Access Control Experience with role design, SoD, and compliance Familiarity with Fiori and S/4HANA security Strong problem-solving and cross-functional collaboration skills. Job Location(s ) - Pan India.

Posted 1 week ago

AI Match Score
Apply

5.0 - 10.0 years

10 - 16 Lacs

agartala

Work from Office

Key Responsibilities: Configure and support SAP GRC modules (ARA, BRM, ARM, EAM) Perform SoD analysis and manage risk violations Design and maintain SAP roles and authorizations Handle user provisioning and access issues Collaborate with audit/compliance teams (SOX, GDPR) Support security-related transports and documentation Requirements : 4+ years in SAP Security and GRC Strong knowledge of SAP GRC Access Control Experience with role design, SoD, and compliance Familiarity with Fiori and S/4HANA security Strong problem-solving and cross-functional collaboration skills. Job Location(s ) - Pan India.

Posted 1 week ago

AI Match Score
Apply

5.0 - 10.0 years

10 - 16 Lacs

shimla

Work from Office

Key Responsibilities: Configure and support SAP GRC modules (ARA, BRM, ARM, EAM) Perform SoD analysis and manage risk violations Design and maintain SAP roles and authorizations Handle user provisioning and access issues Collaborate with audit/compliance teams (SOX, GDPR) Support security-related transports and documentation Requirements : 4+ years in SAP Security and GRC Strong knowledge of SAP GRC Access Control Experience with role design, SoD, and compliance Familiarity with Fiori and S/4HANA security Strong problem-solving and cross-functional collaboration skills. Job Location(s ) - Pan India.

Posted 1 week ago

AI Match Score
Apply

8.0 - 10.0 years

12 - 17 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing...

Posted 1 week ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 week ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 week ago

AI Match Score
Apply

6.0 - 11.0 years

7 - 11 Lacs

mumbai

Work from Office

* Lead Incident Response (IR): * Act as the Subject matter expert for security incidents. * Analyze and respond to security breaches, perform root cause analysis, and coordinate remediation efforts. * Provide leadership during incident investigations, ensuring rapid and thorough handling. * SOC Automation & Integration: * Leverage Python scripting and Palo Alto XSOAR to automate security processes, streamline incident response, and enhance detection capabilities. * Design, implement, and maintain playbooks within XSOAR to address emerging security threats. * Threat Hunting & Monitoring: * Proactively perform threat hunting activities to detect advanced threats that may bypass existing securi...

Posted 2 weeks ago

AI Match Score
Apply

2.0 - 5.0 years

7 - 11 Lacs

mumbai

Work from Office

Administer and monitor Hard Disk Encryption (HDE) across ATM terminals to ensure full encryption and regulatory compliance.Manage and update Application Whitelisting policies to restrict unauthorized software and maintain endpoint integrity.Oversee ATM Antivirus tool operations, including signature updates, health monitoring, and incident management.Conduct periodic compliance audits to identify and remediate non-compliant or partially encrypted terminals.Collaborate with client security and infrastructure teams to troubleshoot and resolve endpoint-level issues.Generate and analyse compliance reports covering encryption, whitelisting, and antivirus status for management review.Perform root c...

Posted 2 weeks ago

AI Match Score
Apply

2.0 - 7.0 years

9 - 13 Lacs

mumbai

Work from Office

Provide technical inputs for monthly customer service review reports and contribute to the creation of Service Improvement Plans. Monitor ticket queues, ensuring timely updates and comprehensive closure summaries. Apply expertise in Incident, Change, Problem, Service Request, and Configuration Management Processes. Manage, monitor, resolve, and report network security incidents involving equipment deployed across multiple client locations in India. Conduct daily incident analysis and publish reports to enhance transparency and security oversight. Maintain compliance with security policies and processes while striving for continuous improvement. Analyze key security metrics and escalate anoma...

Posted 2 weeks ago

AI Match Score
Apply

8.0 - 13.0 years

8 - 13 Lacs

mumbai

Work from Office

The IAM Security professional will be responsible for providing expertise and guidance to clients regarding the implementation, configuration, and usage of IBM Security Verify Access (ISVA) and manage operations support for large IAM implementation. As a IAM Security professional, it will be required work closely with clients to understand their business requirements, assess their existing systems, and recommend optimal solutions utilizing IBM IAM products. The role will involve collaborating with cross-functional teams, conducting workshops and training sessions, and providing ongoing support to ensure successful implementation and adoption of IBM IAM products.Responsibilities & Duties: * E...

Posted 2 weeks ago

AI Match Score
Apply

3.0 - 7.0 years

5 - 9 Lacs

mumbai

Work from Office

Good understanding and hands on experience on Micro Segmentation solutions in Guardicore Understanding of complex network designs and zero trust concept network. Should be able to analyze the traffic and suggest best practices for micro segmenting the environment. Implementation and Management of complex micro segmented environment which includes solutions evolution and troubleshooting. Must have knowledge on complex application architectures deployed on data centers. Understanding of different server types and their required communication protocols and ports. Understanding and experience in the use of virtualization solutions, VMware, Hypervisor, container. Traffic packet & protocol underst...

Posted 2 weeks ago

AI Match Score
Apply

2.0 - 7.0 years

5 - 9 Lacs

mumbai

Work from Office

Monitor and respond to email security alerts, phishing incidents, and malicious attachments/URLs. Investigate and take remediation actions on suspicious emails using: 1. Microsoft Defender for Office 365 2. Exchange Online Protection (EOP) 3. Microsoft Purview/Compliance tools Review and manage user-reported phishing emails through Microsoft Report Message add-in. Analyze mail flow and message trace logs to troubleshoot delivery and quarantine issues. Escalate and work with Microsoft or other vendors for critical incidents. Create and tune mail flow rules, transport rules, spam filters, and safe sender/block lists. Support O365 DLP alerts, spam/quarantine management, and email encryption use...

Posted 2 weeks ago

AI Match Score
Apply

5.0 - 10.0 years

5 - 9 Lacs

gurugram

Work from Office

Forescout NAC Deploy, configure, and manage Fore-scout NAC for network access control across LAN/WAN environments. Develop and enforce access control policies for endpoints and users. Integrate NAC with directory services (AD, LDAP) and SIEM platforms. Perform advanced troubleshooting of NAC-related issues including device profiling, policy enforcement failures, and network access anomalies. Handle incident response for unauthorized access attempts, rogue devices, and policy violations. Conduct root cause analysis and implement corrective actions for recurring NAC issues. Perform regular health checks, upgrades, and patching of NAC Develop and enforce network access policies and compliance s...

Posted 2 weeks ago

AI Match Score
Apply

12.0 - 20.0 years

35 - 60 Lacs

mumbai

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you passionate about Senior Security Consultant and driven to protect against the latest threats? We are seeking a Senior Security Consultant who will join our team and take the lead on developing, implementing, and maintaining our security strategy within our Service Provider organization. As our Senior Security Consultant, you will work c...

Posted 2 weeks ago

AI Match Score
Apply

4.0 - 6.0 years

7 - 11 Lacs

bengaluru

Work from Office

At EY, youll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And were counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. Youllalso identify potential business opp...

Posted 2 weeks ago

AI Match Score
Apply

5.0 - 9.0 years

16 - 20 Lacs

bengaluru

Work from Office

The opportunity Were looking for Security Consultant / Senior Security Consultant in the Risk Consulting team to work on Public Key Infrastructure (PKI) & HSM and various data protection/ data privacy related projects for our customers across the globe. The Public Key Infrastructure (PKI) & HSM Senior Engineer drives IT security and productivity pillars by enabling secure connectivity for technical assets and devices within EYs global infrastructure through the creation and management of digital certificates. The role drives complex design, development, and implementation activities aligned to several technologies including, but not limited to, Microsofts Public Key Infrastructure (PKI), Onl...

Posted 2 weeks ago

AI Match Score
Apply

3.0 - 6.0 years

13 - 17 Lacs

noida

Work from Office

At EY, youll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And were counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (Strategy, Risk, Compliance and Resilience) Technology Consulting Senior As part of our EY Strategy, Risk, Compliance and Resilience (SRCR) Technology Consulting team, you would work on various SRCR projects for our customers across the globe. An important part of your role will be to actively establish, maintain and strength...

Posted 2 weeks ago

AI Match Score
Apply

8.0 - 13.0 years

30 - 35 Lacs

noida

Work from Office

The opportunity Cyber threats, social media, massive data storage, privacy requirements and continuity of the business as usual require heavy information security measures. As a security architect, you will lead the implementation of security solutions for our clients and support the clients in their desire to protect the business. You will belong to an international connected team of specialists helping our clients with their most complex information security needs and contributing toward their business resilience. You will be working with our Advanced Security centres to access the most sophisticated tools available to fight against cybercrime. Your key responsibilities Be involved in Ente...

Posted 2 weeks ago

AI Match Score
Apply

7.0 - 12.0 years

9 - 14 Lacs

maharashtra

Work from Office

Description: JD:Should have retail experience. Having around 7+ years of relevant experience in SAP R/3 Security, BI, HANA Security,HR security and SAP Basis as a Sr SAP security consultant. Strong Expertise in SAP Security and Authorization area having experience in HANA security user and roles maintenance and Central User maintenance, roles and authorization. Hands on experience in SAP Security for User and Role Maintenance. Good functional knowledge of below four Access control components (EAM, ARA, ARNI). User administration involving creation/deletion/locking/modifying users. Assigning missing authorizations as per the user's requirement. Worked with User Information System, creating an...

Posted 2 weeks ago

AI Match Score
Apply

2.0 - 5.0 years

4 - 7 Lacs

maharashtra

Work from Office

Description: 1.Manage and maintain the Claroty platform. 2.Performing the Compute Service Requirements in respect of the Clatory platform 3.Perform policy configuration and tuning as directed by the Customer 4.Configure Threat Detection rule and tune alerts as per Customer requirements. 5.Firmware updates and software patching Patch cycle monthly with additional patching as required, where security/vulnerability patches to be analysed and, all patching as approved by the Customer for deployment by the Service Provider during planned downtime 6.Create and maintain all relevant design and platform management documents 7.Report any critical anomaly to Customer SOC team if identified and provide...

Posted 2 weeks ago

AI Match Score
Apply

2.0 - 7.0 years

4 - 9 Lacs

karnataka

Work from Office

"Experience5+ Years Responsibilities Conduct application onboarding into Ping SSO, configure SSO integrations, and maintain protocols such as SAML, OAuth, and OpenID Connect. Gather application requirements, configure SSO settings, and support new integrations. Perform testing, validation, and optimization of SSO integrations to ensure smooth authentication and access control. Collaborate with internal stakeholders to support SSO strategies and identity management policies. Requirements 5+ years of experience in Ping SSO and SSO integration development. In depth knowledge of SSO protocols and experience in application onboarding and authentication configurations. "

Posted 2 weeks ago

AI Match Score
Apply

2.0 - 7.0 years

4 - 9 Lacs

maharashtra

Work from Office

Description 1.Manage and maintain the Claroty platform. 2.Performing the Compute Service Requirements in respect of the Clatory platform 3.Perform policy configuration and tuning as directed by the Customer 4.Configure Threat Detection rule and tune alerts as per Customer requirements. 5.Firmware updates and software patching Patch cycle monthly with additional patching as required, where security/vulnerability patches to be analysed and, all patching as approved by the Customer for deployment by the Service Provider during planned downtime 6.Create and maintain all relevant design and platform management documents 7.Report any critical anomaly to Customer SOC team if identified and provide ...

Posted 2 weeks ago

AI Match Score
Apply

2.0 - 7.0 years

4 - 9 Lacs

karnataka

Work from Office

"Experience5+ Years Responsibilities Provide Level 3 engineering support for CyberArk PAM, addressing complex issues and advanced troubleshooting. Configure PAM policies, manage vault and session management setup, and maintain secure access controls. Perform system upgrades, patches, and customizations to enhance functionality. Conduct root cause analysis for high impact incidents and collaborate with IT security teams for solution enhancements. Requirements 5+ years of hands on experience with CyberArk PAM, including vault configuration, policy creation, and session management. Strong troubleshooting skills with expertise in privilege management and security practices."

Posted 2 weeks ago

AI Match Score
Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies