Jobs
Interviews

153 Security Consulting Jobs - Page 4

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10.0 - 14.0 years

0 Lacs

karnataka

On-site

As a Consultant (CSM) at CYFIRMA, you will play a crucial role in customer onboarding, technical support, account escalations, customer renewals, upsell campaigns, and establishing customer support practices. Your primary responsibility will be to ensure new customers are efficiently onboarded to CYFIRMA's products and services, guiding them to realize ROI promptly. In this role, you will need to have a deep understanding of CYFIRMA's product and service offerings to provide technical support and training to customers. Your focus will be on educating customers on the flexibility and capabilities of CYFIRMA's solutions, aligning them with their business needs and plans. Additionally, you will handle account escalations, ensuring timely responses to alerts, red flags, or feedback reported by customers. Moreover, you will be responsible for customer renewals, driving upsell campaigns to increase the lifetime value of CYFIRMA's customers. Periodic health checks of customer accounts will be necessary to ensure customer engagement and satisfaction. You will collaborate with international teams to enhance research, service operations, and platform development. To excel in this role, you should have at least 10 years of experience in managing customers and accounts in the cybersecurity domain. Proficiency in customer service practices, technical aptitude to learn CYFIRMA's offerings, and familiarity with OSINT or security analysis tools are essential. Knowledge of IT networking, internet technologies, firewalls, and cybersecurity tools, along with experience in CRM software like Salesforce, will be beneficial. A bachelor's degree in computer science or a related field is required, along with proficiency in the Microsoft Office Suite. Excellent communication skills in English, both written and verbal, are necessary as this role involves client-facing interactions remotely. Holding security certifications such as GCTI, CHFI, CEH, Security+, etc., will be an additional advantage. Join CYFIRMA's dynamic team as a Consultant (CSM) in Bangalore, and contribute to enhancing customer success through effective onboarding, support, and relationship management in the cybersecurity industry.,

Posted 1 month ago

Apply

3.0 - 5.0 years

5 - 9 Lacs

Bengaluru

Work from Office

The ideal candidate will have a strong background in IT Services & Consulting and excellent analytical skills. Roles and Responsibility Collaborate with cross-functional teams to identify and prioritize project requirements. Develop and maintain complex data models and reports using various tools and technologies. Analyze large datasets to extract insights and trends, and provide recommendations to stakeholders. Design and implement process improvements to increase efficiency and productivity. Develop and maintain technical documentation for projects and processes. Provide training and support to junior team members on new tools and technologies. Job Requirements Strong understanding of IT Services & Consulting industry trends and technologies. Excellent analytical and problem-solving skills with attention to detail. Ability to work collaboratively in a team environment and communicate effectively with stakeholders. Strong technical skills including data modeling, reporting, and visualization. Experience with process improvement methodologies and tools. Strong technical documentation and communication skills. Mandatory Skills: IDAM Security Consulting. Experience: 3-5 Years.

Posted 1 month ago

Apply

6.0 - 10.0 years

25 - 40 Lacs

Pune

Work from Office

Position summary: We are looking for a highly skilled and detail-oriented Quality Engineer – Cybersecurity Migrations to support the validation of security policy migrations across major NGFW platforms. In this role, you will be responsible for analyzing the output of automated migration tools, resolving post-migration issues, and ensuring consistent, secure, and functional firewall configurations in customer environments. Your work will directly impact customer satisfaction and operational stability. Key Roles & Responsibilities: Design and maintain test plans and test cases to validate the accuracy and completeness of automated firewall migration output. Review and verify firewall configurations migrated by automation tools to ensure they meet expected functionality and security posture. Identify logic gaps, configuration anomalies, or rule mismatches introduced during tool-based migrations. Collaborate with tool development teams to report defects, validate fixes, and improve transformation logic. Troubleshoot and resolve post-migration escalations, including policy behaviour mismatches, broken traffic flows, and unexpected security outcomes. Perform side-by-side comparisons of pre- and post-migration rules to verify functional equivalence. Raise, track, and close vendor support (TAC) cases where deep platform-level issues are involved. Contribute to documentation including SOPs, test coverage reports, known issues, and configuration validation guides. Interface directly with customers to understand post-migration challenges and ensure successful resolution. Basic Qualifications: Bachelor’s degree in Computer Science, Information Technology, or a related field (BE / B.Tech / MCA or equivalent). 6+ years of hands-on experience in firewall configuration, validation, and troubleshooting. Strong technical knowledge of NGFW platforms including Palo Alto, Cisco FTD, FortiGate, and Check Point. Familiarity with policy and object modelling across different firewall platforms. Experience in writing test cases and test plans for automation tools or configuration transformation logic. Strong understanding of networking and security concepts, including routing, NAT, VPNs, zones, and application filtering. Excellent debugging and root cause analysis skills in post-deployment/migration environments. Ability to interpret logs, packet captures, and platform-specific diagnostics to isolate issues. Preferred Qualifications: Certification: PCNSA, PCNSE, NSE-1, NSE-2, NSE-3, NSE-4 Certification: CCNA (R&S) / CCNP (R&S) Exposure to firewall migration automation tools Understanding policy normalization and risk scoring tools (e.g., Tufin, FireMon)

Posted 2 months ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 8-10 Years.

Posted 2 months ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Mumbai

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Data Security Consulting.: Experience: 3-5 Years.

Posted 2 months ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 8-10 Years.

Posted 2 months ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Chennai

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 8-10 Years.

Posted 2 months ago

Apply

2.0 - 7.0 years

9 - 13 Lacs

Mumbai

Work from Office

As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. * Responsible for security researcher to provide insight and understanding of new and existing information security threats * Responsible to participate in recommending improvements to SOC security process, procedures, policies, security incident management and vulnerability management processes * You will be involved in evaluating, recommending, implementing, and solving problems related to security solutions and evaluating IT security of the new IT Infrastructure systems * Keep yourself up-to-date with emerging security threats including applicable regulatory security requirements * Work in a 24x7 Security Operation Centre (SOC) environment Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * Minimum 2+ years’ experience in SIEM. * Proven expertise in handling the daily monitoring of Information Security events on the QRadar / ArcSight / Splunk console platform * Proficient in monitoring security events from various SOC channels (SIEM, Tickets, Email and Phone), based on the security event severity to handle the service support teams, tier2 information security specialists * Expertise in threat modelling and Use case development and ability to review policies of security monitoring tools based on security concepts and logical approach. Preferred technical and professional experience * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications

Posted 2 months ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: IDAM Security Consulting.: Experience: 3-5 Years.

Posted 2 months ago

Apply

8.0 - 10.0 years

22 - 27 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Data Security Consulting Experience: 8-10 Years

Posted 2 months ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills:: IDAM Security Consulting Experience: 3-5 Years

Posted 2 months ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Pune

Work from Office

The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting. Experience: 3-5 Years.

Posted 2 months ago

Apply

15.0 - 21.0 years

18 - 22 Lacs

Gurugram

Work from Office

About The Role The Data Architecture Specialist Join our team of data architects who design and execute industry-relevant reinventions that allow organizations to realize exceptional business value from technology . Practice: Technology Strategy & Advisory, Capability Network I Areas of Work: Data Architecture | Level:Sr Manager | Location: Bangalore/Mumbai/Pune/Gurugram | Years of Exp: 15 to 21 years Explore an Exciting Career at Accenture Are you a problem solver and passionate about Tech-driven transformationDo you want to design, build and implement strategies to enhance business architecture performanceAre you passionate about being part of an inclusive, diverse and collaborative culture Then, this is the right place for you! Welcome to a host of exciting global opportunities in Accenture Technology Strategy & Advisory. The Practice- A Brief Sketch: The Technology Strategy & Advisory team helps clients achieve growth and efficiency through innovative R&D transformation, aimed at redefining business models using agile methodologies. As part of this high performing Technology Strategy and Advisory team, you will work closely with our clients to unlock the value of data, architecture, and AI to drive business agility and transformation to a real-time enterprise. As a leading Data Architecture Consulting professional, you will work on the following areas: Business Problem Data Analysis :Identifying, assessing, and solving complex business problems using in-depth evaluation of variable factors. Technology-driven journey intersection :Helping clients design, architect and scale their journey to new technology-driven growth. Architecture Transformation :Helping solve key business problems by enabling an architecture transformation, from the current state to a to-be enterprise environment. High Performance Growth and Innovation :Assisting our clients to build the required capabilities for growth and innovation to sustain high performance. Bring your best skills forward to excel at the role: Present data strate gy and develop technology solutions and value adding propositions to drive C-suite/senior leadership level discussions Capitalize on in-depth understanding of the latest technologies such as big data, data integration, data governance, data quality, cloud platforms, data modelling tools, data warehouse and hosting environments. Lead proof of concept and/or pilot implementations and defining the plan to scale implementations across multiple technology domains Maximize subject matter expertise on data-led projects and play a key role in pitches where data-based RFP responses are discussed Demonstrate ability to work creatively and analytically in a problem-solving environment. Use knowledge of key value drivers of a business , how they impact the scope and approach of the engagement. Develop client handling skills to develop, manage and deepen relationships with key stakeholders Leverage team building skills to collaborate, work and motivate teams with diverse skills and experience to achieve goals Build on leadership skills along with strong communication, problem solving, organizational and delegation skills to nurture and inspire team members Qualification Your experience counts! MBA from a tier 1 institute Your prior experience in one or more of the following is important Assessment of Information Strategy Maturity and evaluation of new IT potential with a focus on data monetization, platforms, customer 360 view and analytics strategy. Defining data-based strategy and establishing to-be Information Architecture landscape Design of cutting-edge solutions using cloud platforms like AWS, Azure, GCP, etc. and conceptualization of Data models Establish framework for effective Data Governance and define data ownership, standards, policies, and associated processes Product/ Framework/ Tools evaluation: Collaborating with business experts for business understanding, work with other consultants and platform engineers for solutions and with technology teams for prototyping and client implementations. Evaluate existing products and frameworks and develop options for proposed solutions. Practical industry expertise :The areas of Financial Services, Retail, Telecommunications, Life Sciences, Mining and Resources are of interest but experience in equivalent domains is also welcomed. Consultants should understand the key technology trends in their domain and the related business implications

Posted 2 months ago

Apply

5.0 - 10.0 years

20 - 30 Lacs

Hyderabad

Hybrid

Job Title: SAP GRC Security Consultant Location: Hyderabad Work Mode: Hybrid (3 days Work from office) About the Role We are looking for an experienced SAP GRC Security Consultant to manage security architecture, role design, and compliance across SAP systems. If you have expertise in SAP GRC, security configurations, and risk management, this role is for you. Key Responsibilities Manage SAP security roles and authorizations across ECC, S/4HANA, BW, and Fiori Configure and administer SAP GRC Access Control modules (ARA, ARM, EAM, BRM) Conduct risk analysis and mitigation for user roles and access Oversee secure user provisioning and de-provisioning with identity management Support audit and compliance requirements Troubleshoot SAP security incidents and authorization errors Participate in SAP upgrade and migration security assessments Required Skills Minimum 5 to 12 years of experience in SAP Security and GRC Strong understanding of SAP authorization concepts and risk analysis Hands-on experience with SAP GRC Access Control (AC 10.x or higher) Knowledge of SAP Fiori security and access control Ability to handle audits, compliance, and risk remediation Strong problem-solving skills and attention to detail Preferred Certifications SAP Certified Associate SAP Security / Access Control Certifications in Governance, Risk & Compliance (GRC) or IT Security are a plus

Posted 2 months ago

Apply

4.0 - 6.0 years

8 - 12 Lacs

Gurugram

Work from Office

Your Role and Responsibilities As a Network Engineer specializing in Radware Load Balancer and Web Application Firewall (WAF) solutions, you will play a critical role in ensuring optimal network performance, security, and reliability. Your responsibilities include: Load Balancer Management: Deploy, configure, and maintain Radware Server/Link Load Balancer solutions for high availability. Design and implement load balancing solutions aligned with business needs, collaborating with network engineers and system administrators. Monitor and troubleshoot network issues related to load balancing, ensuring timely resolution. Conduct regular audits and assessments to optimize load balancer configurations. Provide technical support and mentorship to junior team members. Stay updated on industry trends and best practices in networking technologies. Web Application Firewall (WAF) Administration: Oversee the deployment, configuration, and management of Radware WAF solutions. Ensure the secure operation and maintenance of WAF infrastructure. Monitor WAF alerts and incidents to protect web applications from cyber threats. Investigate and respond to security incidents involving WAF. Develop and implement security policies to safeguard web applications. Conduct periodic security audits and assessments to maintain compliance. Work closely with IT and security teams to integrate Radware WAF into the cybersecurity architecture. Optimize WAF policies to reduce false positives and improve accuracy. Provide training and documentation for WAF management and promote security awareness within the organization. Required education Bachelor's Degree Preferred education Bachelor's Degree Required technical and professional expertise 4 to 6 years of hands-on experience with Link Load Balancer (LLB) solutions. Strong understanding of WAN connectivity optimization, failover management, and ISP link aggregation. Expertise in troubleshooting and performance tuning of load balancing solutions. Radware LB certification Preferred technical and professional experience Experience in hybrid cloud or multi-site network architectures. Knowledge of MPLS, SD-WAN, and WAN optimization tools. Familiarity with network audits and compliance initiatives (ISO, PCI, etc.) Should be BE/B.Tech /MCA/BCA

Posted 2 months ago

Apply

5.0 - 8.0 years

12 - 20 Lacs

Pune

Work from Office

About the Role We are seeking a skilled and passionate Red Team Security Consultant to join our cybersecurity team. The ideal candidate will specialize in simulating adversarial tactics, techniques, and procedures (TTPs) to identify vulnerabilities and improve the organization's security posture. This role involves performing advanced penetration tests, simulating real-world attacks, and working with teams to implement effective remediation strategies Key Responsibilities Plan, execute, and document Red Team exercises mimicking advanced threat actors for medium to large enterprises. Conduct network penetration testing (VAPT), system vulnerability assessments, and security configuration reviews. Perform manual security assessments for web applications, APIs, and client-server applications. Simulate sophisticated attack chains including lateral movement, privilege escalation, and data exfiltration. Develop and execute custom attack payloads using tools and scripts. Assess physical security controls and implement social engineering assessments when required. Create and maintain custom tools/scripts in languages like Python, Bash, or PowerShell. Utilize and adapt adversary emulation frameworks such as MITRE ATT&CK, Cobalt Strike, and Metasploit. Collaborate with Blue Teams to improve detection and response mechanisms through Purple Team engagements. Basic Qualifications Education: BE/B. Tech/ MCA/ M. Sc. (IT/Computers) Experience: Required: 2 - 5 years. Excellent communication and collaboration skills. Preferred Qualifications Preferred Certifications: OSCP, OSCE, CRTP, eWPTX, Security+, CREST, CRTO. Desired Skill Set: Red Teaming, VAPT, Application Security (Web/Mobile/API). 2-5 years of relevant domain experience in VAPT, Red Teaming, and Application Security domains. Proficient in Application Security concepts, including OWASP Top 10 and OSSTMM. Experience with vulnerability scanning tools such as BurpSuite Pro, Nessus, OWASP ZAP, Kali Linux, Cobalt Strike, Caldera etc. Basic ability to write automation scripts (Bash or Python). Understanding of threat modeling and secure coding practices. Strong understanding of TTPs, threat modeling, and secure coding practices. Hands-on experience in Active Directory exploitation, phishing campaigns, and endpoint bypass techniques.

Posted 2 months ago

Apply

5.0 - 7.0 years

4 - 6 Lacs

Bengaluru

Work from Office

We are seeking an experienced and skilled Senior Consultant (SAP Basis and Security) to join our team in Chennai. As a Senior Consultant, you will be responsible for providing technical support in both SAP Basis and SAP Security. Your expertise will be crucial in ensuring the smooth operation, performance, and security of SAP systems. You will be expected to manage multiple deliverables and projects simultaneously while providing support for various system activities, including version upgrades, system refreshes, and audits. Key Responsibilities: SAP Basis and Security Support: Provide technical support for SAP Basis and SAP Security, ensuring optimal system performance, availability, and security. Database Expertise: Demonstrate hands-on experience in managing and supporting MSSQL and Oracle databases, ensuring effective database management and optimization. Version Upgrade Experience: Lead version upgrades for SAP ECC, Netweaver (ABAP and JAVA), and databases such as Oracle and MSSQL, ensuring smooth transitions and minimal downtime. SAP Security: Maintain and manage SAP security, including user, role, and authorization object-level maintenance, ensuring proper access control and compliance. Operating Systems: Work extensively with both Windows and Linux operating systems to support the SAP environment and perform troubleshooting as needed. System Refresh: Execute system refresh activities, including database-level refreshes, to ensure proper system functionality and data integrity. Audit Support: Provide support for both internal and external audits by preparing required documentation and ensuring compliance with security protocols and regulations. Ticketing Tool Management: Utilize ITSM/SERVICE NOW tools for efficient issue tracking, resolution, and management, ensuring timely response and resolution of SAP-related incidents and requests. Required Skills and Experience: Proven experience in SAP Basis and SAP Security, supporting and maintaining SAP systems. Strong expertise in database management and optimization, specifically with MSSQL and Oracle databases. Experience in performing version upgrades for SAP ECC, Netweaver, and related databases (Oracle, MSSQL). Extensive knowledge in SAP Security, including user creation, role maintenance, and authorization object management. Hands-on experience with both Windows and Linux operating systems in an SAP environment. Proven ability to perform system refreshes, including database-level refreshes. Experience supporting internal and external audits related to SAP systems and security. Proficiency in using ITSM/SERVICE NOW or other ticketing tools for incident and request management. Strong communication skills and the ability to manage multiple projects simultaneously. Ability to work independently and as part of a team, providing guidance and expertise to junior team members. Desired Skills (Optional): SAP HANA experience (preferred but not mandatory). Certifications in SAP Basis or Security will be a plus. Familiarity with cloud environments and SAP in cloud scenarios is advantageous.

Posted 2 months ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Kochi

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Data Security Consulting. Experience5-8 Years.

Posted 2 months ago

Apply

8.0 - 13.0 years

10 - 15 Lacs

Bengaluru

Work from Office

The IBM Technology Expert Labs organization is looking for an IBM zSecurity Delivery Consultant with expertise in IBM Z, RACF and Security products to lead and deliver pre-sales and post-sales client engagements that enable the adoption of IBM zSecure Suite and IBM ZMFA Ideal candidates will have demonstrated a successful history of implementing IBM Zsecure Suite engagements, be familiar with sysplex architectural methods, can independently assess IT infrastructures, evaluate gaps in best practices and create IBM Security solution recommendations for client environments while displaying excellent collaboration and communication with Clients, Sellers, Business Partners and Colleagues by delivering reports to clients. You will be responsible for developing and delivering IBM Security architecture, and implementation of IBM Security products which may include: Implement security policies and procedures to protect the integrity, confidentiality, and availability of information extensive knowledge of security administration by using the zSecure suite products Designing and customizing the ZMFA features, based on the client requirements Integrating and designing security with IBM Guardium Data centre and Quantum safe solutions. Assisting with customer to extract the audit reports for system vulnerabilities and implement security measures to mitigate risks Providing technical guidance and skills transfer to customer personnel for IBM zSecure suite products, ZMFA features, IBM Guardium and Quantum safe Producing planning and implementation reports and documentation. Installation, configuration, testing and maintenance of IBM RACF, and related Z software Other technical tasks as necessary to accomplish successful customer outcomes Aid customers to migrate the other vendor security products to the IBM RACF And Z security software’s. This role requires a strong knowledge of the IBM Systems Z security and software ecosystem, focusing on Strong Security and IBM Zsecure, Guardium and Quantum safe, are needed. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Professional and Technical Expertise: 8+ years’ experience working with: RACF Security Administrators and capabilities of IBM zSecurity products including (zSecure ,ZMFA, Guardium and Quantum safe) z/OS RACF Security Administrators ,zSecure Admin Ability to migrate the other vendor security products to the RACF and IBM z Security related products. Successfully delivering IBM Z projects and/or architecting and planning infrastructures for customer’s Security Needs 5+ years’ experience in: Customer or executive facing communications, requirements analysis, documentation, and report presentations. Create and manage RACF user profiles, group profiles, and access rights Implement security policies, extracting the Security audit reports using the zSecure suite products and procedures to protect integrity of the system Ability to lead customer technical workshops up to 20+ people. Strong written and verbal communication skills EnglishFluent Preferred technical and professional experience Preferred Professional and Technical Expertise: Knowledge or experience with RACF, zsecure products suite, Guardium data center, ZMFA, Quantum safe Experience on Security Migrations (ACF2 to RACF or TSS to RACF) Practical SMP/E knowledge Assembler, JCL, REXX and CLIST knowledge

Posted 2 months ago

Apply

8.0 - 12.0 years

6 - 10 Lacs

Noida

Work from Office

We are looking for a skilled SAP Security & GRC Process Control (PC) Technical Consultant with 8 to 12 years of experience. The position is based in Bengaluru. Roles and Responsibility Design, configure, and maintain SAP Security roles across various systems. Implement and support SAP GRC Process Control (PC) including control framework configuration, business rule automation, continuous control monitoring, and workflow setup for control assessments and surveys. Collaborate with risk, audit, and compliance teams to define control objectives and automate control testing. Integrate PC with other GRC components and SAP systems. Troubleshoot security-related issues and GRC-PC workflows, data connectors, and reports. Provide technical expertise for SOD risk analysis, rule-set updates, and audit reporting. Job Minimum 8 years of hands-on experience in SAP Security and GRC. At least 3-5 years of experience in SAP GRC Process Control. Strong understanding of SAP authorization concepts, role design, and user provisioning. Experience with Fiori app security, S/4HANA security, and BTP security concepts. Hands-on expertise in BRF+, MSMP workflow configuration, and GRC plug-ins. Good working knowledge of audit processes, risk assessments, and compliance controls. SAP Certifications in GRC Process Control and/or SAP Security are preferred. Experience with SAP BTP security, SAP Cloud Identity, and IAS/IPS is a plus. Exposure to SAP IDM (Identity Management) and SAP Analytics Cloud security is beneficial. Knowledge of SOX, GDPR, and other compliance frameworks is advantageous.

Posted 2 months ago

Apply

3.0 - 4.0 years

5 - 6 Lacs

Pune

Work from Office

Overview 170+ Years Strong. Industry Leader. Global Impact. At Pinkerton, the mission is to protect our clients. To do this, we provide enterprise risk management services and programs specifically designed for each client. Pinkerton employees are one of our most important assets and critical to the delivery of world-class solutions. Bonded together, we share a commitment to integrity, vigilance, and excellence. Pinkerton is an inclusive employer who seeks candidates with diverse backgrounds, experiences, and perspectives to join our family of industry subject matter experts. The Security Specialist provides comprehensive security management support to ensure the security and safety of company assets, associates, information and interests in the defined area as well as provides security consulting and risk management services. Security Specialist leads efforts in identifying, developing, implementing, and maintaining site wide security practices and processes to reduce risks. Responsibilities Represent Pinkerton’s core values of integrity, vigilance, and excellence. Develop, implement, and support physical security-related policy, including design requirements and badge administration. Conduct threat, vulnerability, and risk assessments to inform security strategies for planned and unplanned events. Meet regularly with Pinkerton management and client representatives for status updates. Address any actual or potential issues and make changes, as needed. Provide support during client service level changes. Maintain documentation throughout the project lifecycle and ensure timely, clear, and concise communications to all stakeholders via the appropriate channels. Assist management in maintaining a positive and professional environment in full compliance with applicable laws, regulations, policies, and procedures; ensure staff members understand and comply with applicable laws, regulations, policies, and procedures. Ability to conduct a comprehensive site vulnerability assessment. Prepare logs or reports as required for the site; write and/or type reports and/or enter information in a computer; inspect security control logs; and take action as required. Observe and report incidents or suspicious activity to security personnel, Client representatives, company management, life/safety personnel, or public safety authorities as appropriate for the circumstances and/or as required by the site. Assist in the control of access to Client site or facility through the admittance process; assist visitors with a legitimate need to gain entry to the facility; screen visitors and Client’s employees in an efficient manner in order to expedite their admittance to the site or facility. All other duties, as assigned. Qualifications Bachelor's degree and two or more years of corporate security experience, or an equivalent combination of education and experience sufficient to perform the essential functions of the job, as determined by the company. English language skills (C1 level). Knowledge of security systems and related access control technologies. Able to analyze complex situations and recommend solutions. Able to work independently with little supervision. Strong client orientation and results driven. Able to interact effectively at all levels and across diverse cultures. Attentive to detail and accuracy. Excellent written, verbal, and presentation skills. Computer skills; Microsoft Office. Working Conditions: With or without reasonable accommodation, requires the physical and mental capacity to effectively perform all essential functions; Regular computer usage. Occasional reaching and lifting of small objects and operating office equipment. Frequent sitting, standing, and/or walking. Travel, as required. Pinkerton is an equal opportunity employer to all applicants and positions without regard to race/ethnicity, color, national origin, ancestry, sex/gender, gender identity/expression, sexual orientation, marital/prenatal status, pregnancy/childbirth or related conditions, religion, creed, age, disability, genetic information, veteran status, or any protected status by local, state, federal or country-specific law.

Posted 2 months ago

Apply

8.0 - 13.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Job Title : Cybersecurity Expert- Product, Platform & Solution Security Role Summary The Cybersecurity Expert plays a critical role in protecting the integrity, availability, and confidentiality of medical software and systems by embedding security principles throughout the development lifecycle. As part of the Cybersecurity Center of Competence, the expert collaborates cross-functionally with R&D, product teams, architects, regulatory stakeholders, and external security communities to lead threat analysis, ensure secure design, validate vulnerabilities, and shape the security posture of products and platforms. This role is both technical and consultative, requiring deep knowledge of secure engineering practices, standards, and incident response. Key Responsibilities 1. Security Consulting & Risk Mitigation Provide security consultation to product teams to eliminate or mitigate weaknesses in line with industry standards (e.g., IEC 62443, NIST, ISO 27001). Participate in design and architecture discussions to ensure alignment with secure design principles. Guide software architects in integrating cyber security requirements into product and solution design. 2. Vulnerability & Threat Management Perform threat modeling, risk analysis, and attack surface assessments. Analyze vulnerabilities (internal or third-party), validate remediation measures, and guide patching strategies. Perform security incident investigations and provide forensics support when required. Stay updated on new vulnerabilities, threat vectors, and exploits"”apply findings to continuously improve product security. 3. Security Engineering & Tooling Design or extend tools, scripts, or automation frameworks for vulnerability scanning and penetration testing. Perform or oversee activities such as: Fuzz testing Reverse engineering Code analysis (static/dynamic) Secure software supply chain checks Contribute to the integration of automated security tooling into CI/CD pipelines. 4. Secure Development Lifecycle Support Lead or support security activities throughout the Secure Software Development Lifecycle (SDLC). Participate in or lead security gate reviews, release readiness assessments, and milestone reviews. Create and maintain secure coding and design guidelines for developers. Conduct or support internal security audits and regulatory submissions. 5. Community Development & Training Conduct security awareness sessions and technical training for R&D teams. Develop reusable security patterns, checklists, and guidance material. Collaborate with Cybersecurity Officers, Product Owners, and Architects to ensure cohesive security implementation across programs. Contribute to internal and external knowledge sharing, security forums, and standardization groups. Required Qualifications & Skills Education and Experience : Bachelors/Masters degree in Computer Science, Cybersecurity, or a related field. 5"“8 years of experience in IT/software development, with 3+ years focused on cybersecurity. Technical Expertise Strong foundation in: Secure architecture and design Threat modeling / Security risk analysis Static and dynamic code analysis Fuzz testing / Penetration testing Security tooling and automation (e.g., SonarQube, Burp Suite, Fortify, Checkmarx) Operating systems and networking fundamentals DevSecOps pipeline and CI/CD integration basics Working knowledge of: HIPAA, HITECH, FDA Pre/Postmarket Cybersecurity Guidance (for medical devices) Regulatory standardsIEC 62443, ISO 27001, NIST SP 800-53/82/218, CLSI AUTO11-Ax, IEC 80001 Certifications (Preferred) CISSP- Certified Information Systems Security Professional CSSLP- Certified Secure Software Lifecycle Professional OSCP, CEH, or similar ethical hacking certifications Collaboration & Stakeholders Internal Cybersecurity Officers (CYSO), R&D Development & Test teams, Quality/Risk Managers, Project Managers, Product Owners, Architects External Standardization bodies, security tool vendors, customer security teams, and external cybersecurity communities Work Style and Engagemen t Must be able to support multiple concurrent projects. Requires proactive leadership and strong communication with cross-functional teams. Expected to contribute regularly to internal security initiatives, CoPs (Communities of Practice), and lessons learned.

Posted 2 months ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Mumbai

Work from Office

* Responsible for implementation partner to see project on track along with providing required reports to management and client * Handle the project as well as BAU operations while ensuring high level of systems security compliance * Coordinate with and act as an authority to resolve incidents by working with other information security specialists to correlate threat assessment data. * Analyse data, such as logs or packets captures, from various sources within the enterprise and draw conclusions regarding past and future security incidents. * Ready to support for 24/7 environment. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * 7+ years of IT experience in security with at least 4+ Years in Security Operation Centre with SIEMs. * B.E./ B. Tech/ MCA/ M.Sc. * Maintaining SIEM/UEBA platform hygiene, Scripting, Automation SOAR Playbook Creation with Testing, with Change/Problem/Incident Management, with CP4S platform integration & dashboarding, Recovery Support. * Expertise in Security Device Management SIEM, Arcsight, Qradar, incident response, threat hunting, Use case engineering, SOC analyst, device integration with SIEM. * Working knowledge of industry standard risk, governance and security standard methodologies * Proficient in incident response processes - detection, triage, incident analysis, remediation and reporting. * Ability to multitask and work independently with minimal direction and maximum accountability. Preferred technical and professional experience * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications

Posted 2 months ago

Apply

12.0 - 17.0 years

9 - 13 Lacs

Bengaluru

Work from Office

The IBM Technology Expert Labs organization is looking for an IBM zSecurity Delivery Consultant with expertise in IBM Z, RACFand Security products to lead and deliver pre-sales and post-sales client engagements that enable the adoption of IBMzSecureSuite and IBM ZMFA Ideal candidates will have demonstrated a successful history of implementing IBM Zsecure Suiteengagements, be familiar with sysplex architectural methods, can independently assess IT infrastructures, evaluate gaps in best practices and create IBM Securitysolution recommendations for client environments while displaying excellent collaboration and communication with Clients, Sellers, Business Partners and Colleagues by delivering reports to clients. You will be responsible for developing and delivering IBM Securityarchitecture, and implementation of IBM Security productswhich may include: Implement security policies and procedures to protect the integrity, confidentiality, and availability of information extensive knowledge of security administration by using the zSecure suite products Designing and customizing the ZMFA features, based on the client requirements Integrating and designing security with IBM Guardium Data centre and Quantum safe solutions. Assisting with customer to extract the audit reports for system vulnerabilities and implement security measures to mitigate risks Providing technical guidance and skills transfer to customer personnel for IBM zSecure suite products, ZMFA features, IBM Guardium and Quantum safe Producing planning and implementation reports and documentation. Installation, configuration, testing and maintenance of IBM RACF, and related Z software Other technical tasks as necessary to accomplish successful customer outcomes Aid customers to migrate the other vendor security products to the IBM RACF And Z security software’s. This role requires a strong knowledge of the IBM Systems Z security and software ecosystem, focusing on Strong Security and IBM Zsecure, Guardium and Quantum safe , are needed. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 12+ years’ experience working with: RACF Security Administrators and capabilities of IBM zSecurity products including(zSecure ,ZMFA, Guardium and Quantum safe) z/OSRACF Security Administrators ,zSecure Admin Ability to migrate the other vendor security products to the RACF and IBM z Security related products . Successfully delivering IBM Z projects and/or architecting and planning infrastructures for customer’s Security Needs 5+ years’ experience in: Customer or executive facing communications, requirements analysis, documentation, and report presentations. Create and manage RACF user profiles, group profiles, and access rights Implement security policies, extracting the Security audit reports using the zSecure suite products and procedures to protect integrity of the system Ability to lead customer technical workshops up to 20+ people. Strong written and verbal communication skills Preferred technical and professional experience Knowledge or experience with RACF ,zsecure products suite ,Guardium data center, ZMFA, Quantum safe Experience on Security Migrations (ACF2 to RACF or TSS to RACF) Practical SMP/E knowledge Assembler, JCL, REXX and CLIST knowledge

Posted 2 months ago

Apply

6.0 - 9.0 years

6 - 10 Lacs

Bengaluru

Work from Office

Skill: SAP Security Consultant Experience: 6-9 Years Notice Period: Immediate Joiners Employee type : C2H/FT Job Description: SAP Security Consultant with 4-6 years of experience with the below skillset. (Managed Services -- CG) Work directly with clients at all different levels to guide complex projects and develop innovative solutions. Successful completion of at least two full life cycle implementations of GRC and ECC. SAP HANA Security - User administration and Role administration. Role design, configuration, testing, and deployment methodology within SAP application architecture for SAP ECC, BI, GRC, S4 HANA, EP. Detailed knowledge of ABAP, Java based authorizations within SAP applications. Expertise on SAP ECC Profile Generator (single roles, master/derived roles, composite roles). Technical expertise in core skills of SAP BI 7.0 security analysis authorization concept, working with queries, workbooks and related AO/ BEX issues. Good to have SAP GRC 12.0 configuration and administration, Business roles concept, expertise and experience on ARM, ARA, EAM full lifecycle implementation. Experience in CHARM Process and Role build, Authorization concepts, Issue handling, expertise on Charm standard processes. Good to have knowledge on EP User and Role administration. Strong communication skills to facilitate working in a dynamic project environment. Addressing process improvements, reducing manual efforts with automations. Expertise on Audit processes, Licensing, ONAPSIS recommendations and remediations. Provide leadership to junior systems analysts and client personnel assigned to projects. Must be able to participate in 24x7 Operations and Maintenance call rotation support.

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies