Jobs
Interviews

153 Security Consulting Jobs - Page 6

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

10 - 16 Lacs

mumbai

Work from Office

Key Responsibilities: Configure and support SAP GRC modules (ARA, BRM, ARM, EAM) Perform SoD analysis and manage risk violations Design and maintain SAP roles and authorizations Handle user provisioning and access issues Collaborate with audit/compliance teams (SOX, GDPR) Support security-related transports and documentation Requirements : 4+ years in SAP Security and GRC Strong knowledge of SAP GRC Access Control Experience with role design, SoD, and compliance Familiarity with Fiori and S/4HANA security Strong problem-solving and cross-functional collaboration skills. Job Location(s ) - Pan India.

Posted Date not available

Apply

7.0 - 12.0 years

9 - 14 Lacs

mumbai

Work from Office

* Responsible for implementation partner to see project on track along with providing required reports to management and client * Handle the project as well as BAU operations while ensuring high level of systems security compliance * Coordinate with and act as an authority to resolve incidents by working with other information security specialists to correlate threat assessment data. * Analyse data, such as logs or packets captures, from various sources within the enterprise and draw conclusions regarding past and future security incidents. * Ready to support for 24/7 environment. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * 7+ years of IT experience in security with at least 4+ Years in Security Operation Centre with SIEMs. * B.E./ B. Tech/ MCA/ M.Sc. * Maintaining SIEM/UEBA platform hygiene, Scripting, Automation SOAR Playbook Creation with Testing, with Change/Problem/Incident Management, with CP4S platform integration & dashboarding, Recovery Support. * Expertise in Security Device Management SIEM, Arcsight, Qradar, incident response, threat hunting, Use case engineering, SOC analyst, device integration with SIEM. * Working knowledge of industry standard risk, governance and security standard methodologies * Proficient in incident response processes - detection, triage, incident analysis, remediation and reporting. * Ability to multitask and work independently with minimal direction and maximum accountability. Preferred technical and professional experience * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications

Posted Date not available

Apply

3.0 - 4.0 years

5 - 6 Lacs

pune

Work from Office

Overview 170+ Years Strong. Industry Leader. Global Impact. At Pinkerton, the mission is to protect our clients. To do this, we provide enterprise risk management services and programs specifically designed for each client. Pinkerton employees are one of our most important assets and critical to the delivery of world-class solutions. Bonded together, we share a commitment to integrity, vigilance, and excellence. Pinkerton is an inclusive employer who seeks candidates with diverse backgrounds, experiences, and perspectives to join our family of industry subject matter experts. The Security Specialist provides comprehensive security management support to ensure the security and safety of company assets, associates, information and interests in the defined area as well as provides security consulting and risk management services. Security Specialist leads efforts in identifying, developing, implementing, and maintaining site wide security practices and processes to reduce risks. Responsibilities R epresent Pinkerton’s core values of integrity, vigilance, and excellence. Develop, implement, and support physical security-related policy, including design requirements and badge administration. Conduct threat, vulnerability, and risk assessments to inform security strategies for planned and unplanned events. Meet regularly with Pinkerton management and client representatives for status updates. Address any actual or potential issues and make changes, as needed. Provide support during client service level changes. Maintain documentation throughout the project lifecycle and ensure timely, clear, and concise communications to all stakeholders via the appropriate channels. Assist management in maintaining a positive and professional environment in full compliance with applicable laws, regulations, policies, and procedures; ensure staff members understand and comply with applicable laws, regulations, policies, and procedures. Ability to conduct a comprehensive site vulnerability assessment. Prepare logs or reports as required for the site; write and/or type reports and/or enter information in a computer; inspect security control logs; and take action as required. Observe and report incidents or suspicious activity to security personnel, Client representatives, company management, life/safety personnel, or public safety authorities as appropriate for the circumstances and/or as required by the site. Assist in the control of access to Client site or facility through the admittance process; assist visitors with a legitimate need to gain entry to the facility; screen visitors and Client’s employees in an efficient manner in order to expedite their admittance to the site or facility. All other duties, as assigned. Qualifications Bachelor's degree and two or more years of corporate security experience, or an equivalent combination of education and experience sufficient to perform the essential functions of the job, as determined by the company. English language skills (C1 level). Knowledge of security systems and related access control technologies. Able to analyze complex situations and recommend solutions. Able to work independently with little supervision. Strong client orientation and results driven. Able to interact effectively at all levels and across diverse cultures. Attentive to detail and accuracy. Excellent written, verbal, and presentation skills. Computer skills; Microsoft Office. Working Conditions: With or without reasonable accommodation, requires the physical and mental capacity to effectively perform all essential functions; Regular computer usage. Occasional reaching and lifting of small objects and operating office equipment. Frequent sitting, standing, and/or walking. Travel, as required. Pinkerton is an equal opportunity employer to all applicants and positions without regard to race/ethnicity, color, national origin, ancestry, sex/gender, gender identity/expression, sexual orientation, marital/prenatal status, pregnancy/childbirth or related conditions, religion, creed, age, disability, genetic information, veteran status, or any protected status by local, state, federal or country-specific law.

Posted Date not available

Apply

3.0 - 8.0 years

9 - 13 Lacs

mumbai

Work from Office

As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. Responsibilities Responsible for security researcher to provide insight and understanding of new and existing information security threats Responsible to participatein recommending improvements to SOC security process, procedures, policies, security incident management and vulnerability management processes You will be involved in evaluating, recommending, implementing, and solving problems related to security solutions and evaluating IT security of the new IT Infrastructure systems Keep yourself up-to-date with emerging security threats including applicable regulatory security requirements Work in a 24x7 Security Operation Centre (SOC) environment Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Minimum 3+ years’ experience in SIEM. Proven expertise in handling the daily monitoring of Information Security events on the QRadar / ArcSight / Splunk console platform Proficient in monitoring security events from various SOC channels (SIEM, Tickets, Email and Phone), based on the security event severity to handle the service support teams, tier2 information security specialists Expertise in threat modelling and Use case development and ability to review policies of security monitoring tools based on security concepts and logical approach Preferred technical and professional experience Preferred OEM Certified SOAR specialist + CEH Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work Intuitive individual with an ability to manage change and proven time management Proven interpersonal skills while contributing to team effort by accomplishing related results as needed Up-to-date technical knowledge by attending educational workshops, reviewing publications

Posted Date not available

Apply

3.0 - 8.0 years

9 - 13 Lacs

mumbai

Work from Office

As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. Responsibilities Responsible for security researcher to provide insight and understanding of new and existing information security threats Responsible to participatein recommending improvements to SOC security process, procedures, policies, security incident management and vulnerability management processes You will be involved in evaluating, recommending, implementing, and solving problems related to security solutions and evaluating IT security of the new IT Infrastructure systems Keep yourself up-to-date with emerging security threats including applicable regulatory security requirements Work in a 24x7 Security Operation Centre (SOC) environment Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Minimum 3+ years’ experience in SIEM. Proven expertise in handling the daily monitoring of Information Security events on the QRadar / ArcSight / Splunk console platform Proficient in monitoring security events from various SOC channels (SIEM, Tickets, Email and Phone), based on the security event severity to handle the service support teams, tier2 information security specialists Expertise in threat modelling and Use case development and ability to review policies of security monitoring tools based on security concepts and logical approach Preferred technical and professional experience Preferred OEM Certified SOAR specialist + CEH Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work Intuitive individual with an ability to manage change and proven time management Proven interpersonal skills while contributing to team effort by accomplishing related results as needed Up-to-date technical knowledge by attending educational workshops, reviewing publications

Posted Date not available

Apply

5.0 - 10.0 years

8 - 12 Lacs

mumbai

Work from Office

Key Responsibilities: Act as the subject matter expert (SME) forPalo Alto Cortex XDR and endpoint security. Lead investigation and response for advanced endpoint threats and alerts using XDR. Develop and fine-tune detection rules, response playbooks, and behavioral indicators. Integrate Cortex XDR with other security tools (SIEM, SOAR, firewalls, etc.). Analyze complex threat patterns, perform root cause analysis, and recommend mitigation strategies. Collaborate with SOC teams to escalate, triage, and resolve endpoint incidents. Create and maintain technical documentation, runbooks, and training materials. Support compliance and audit requirements for endpoint security. Provide L3 support and mentor junior team members. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 5+ years of experience in Cybersecurity or Information Security. Minimum 2+ years hands-on experience specifically with Palo Alto Cortex XDR (endpoint or extended detection and response). Strong knowledge of endpoint detection and response (EDR) technologies and incident handling. Experience in scripting (Python, PowerShell) for automation is a plus. Familiarity with security frameworks such as MITRE ATT&CK. Experience in working with SIEM and SOAR platforms. Excellent analytical, communication, and troubleshooting skills. Certifications like PCNSE, CISSP, CEH, or GCIA are advantageous.

Posted Date not available

Apply

5.0 - 10.0 years

10 - 16 Lacs

hyderabad

Work from Office

Key Responsibilities: Configure and support SAP GRC modules (ARA, BRM, ARM, EAM) Perform SoD analysis and manage risk violations Design and maintain SAP roles and authorizations Handle user provisioning and access issues Collaborate with audit/compliance teams (SOX, GDPR) Support security-related transports and documentation Requirements : 4+ years in SAP Security and GRC Strong knowledge of SAP GRC Access Control Experience with role design, SoD, and compliance Familiarity with Fiori and S/4HANA security Strong problem-solving and cross-functional collaboration skills. Job Location(s ) - Pan India.

Posted Date not available

Apply

15.0 - 20.0 years

13 - 17 Lacs

bengaluru

Work from Office

Project Role :Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Cloud Security Architecture Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking a highly skilled and motivated Solution Architect and Engineer specializing in WIZ Cloud Security Consulting Services to join our team. This role focuses on designing, implementing, and consulting on Cloud-Native Application Protection Platform (CNAPP) solutions using WIZ. The ideal candidate will have a strong background in cloud security, architecture, and engineering, with a passion for delivering innovative solutions to clients. Roles & Responsibilities:Architect and design comprehensive CNAPP solutions using WIZ to address client-specific cloud security needs.Develop scalable and secure cloud-native application protection strategies tailored to multi-cloud environments.Collaborate with clients to understand their business requirements and translate them into technical solutions.Lead the deployment and configuration of WIZ CNAPP solutions across various cloud platforms (e.g., AWS, Azure, GCP).Ensure seamless integration of WIZ with existing cloud infrastructure and security tools.Conduct performance optimization and troubleshooting for implemented solutions.Provide expert guidance to clients on cloud security best practices and WIZ capabilities.Conduct workshops, training sessions, and knowledge-sharing activities to empower client teams.Act as a trusted advisor to clients, offering strategic insights on cloud security trends and technologies. Professional & Technical Skills: Strong knowledge of WIZ CNAPP (Cloud, Code, Defend and Runtime Sensors) and its features, including vulnerability management, workload protection, and compliance monitoring.Proficiency in cloud platforms such as AWS, Azure, and Google Cloud Platform.Hands-on experience with cloud security tools and frameworks (e.g., CSPM, CWPP, DSPM, IAM).5+ years of experience in cloud security architecture, engineering, or consulting roles.Proven track record of designing and implementing cloud security solutions for enterprise clients.Relevant certifications such as AWS Certified Solutions Architect, Microsoft Azure Security Engineer, or Google Cloud Professional Cloud Architect.WIZ-specific certifications (if available) or equivalent experience. Additional Information:7+ years of experience in security architecture with strong GCP expertiseThis role is based in our Bangalore office15 years of full-time education required Qualification 15 years full time education

Posted Date not available

Apply

8.0 - 12.0 years

10 - 14 Lacs

chandigarh, dadra & nagar haveli, daman

Work from Office

8+ years of experience in SAP Security/GRC Should have experience in security of SAP ECC , SRM, FI, CRM, HR, GRC, BW ) SAP Security support for all SAP environments Experience in GRC access control, RAR (Risk Analysis and Remediation) and SOD (segregation of duty),mitigation and remediation Design and implement new authorization concepts along with business departments and IT stake holders SAP role design, administration and analysis SAP user administration on approved procedures Responsible for integration of SoD conform processes and authorization validation Meets or exceeds all task deadlines assigned Obtains clear and concise requirements from senior management user community Perform the role of GRC subject matter specialist including the ability to provide in-depth application support to internal/external project team members Create and maintain matrix for business processes, users & roles Strong experience in SAP security analysis, design, blueprint, development, testing Strong understanding of SAP Security processed Strong experience in Security roles & users with object, package, schema & Sys privileges. Hands-on experience in security design/redesign etc. changing business needs Support audit and compliance activities Should have experience in SAP Support projects Location - Chandigarh,Dadra & Nagar Haveli,Daman,Diu,Goa,Haveli,Hyderabad,Jammu,Lakshadweep,Nagar,New Delhi,Puducherry,Sikkim

Posted Date not available

Apply

6.0 - 11.0 years

4 - 8 Lacs

hyderabad

Work from Office

Immediate Openings on Security Consultants with Vulnerability _Contract_Pan India 6+ Years Security Consultants with Vulnerability Pan India Period :Immediate. Type Contract Description 7 + Years Security Consultants with Vulnerability tools exp like Qualys or Tenable (prefer Qualys) and ServiceNow. Experience with Vulnerability tools such as Qualys or Tenable (prefer Qualys) and ServiceNow .

Posted Date not available

Apply

6.0 - 10.0 years

17 - 32 Lacs

pune

Work from Office

Position summary: We are looking for a highly skilled and detail-oriented Quality Engineer – Cybersecurity Migrations to support the validation of security policy migrations across major NGFW platforms. In this role, you will be responsible for analyzing the output of automated migration tools, resolving post-migration issues, and ensuring consistent, secure, and functional firewall configurations in customer environments. Your work will directly impact customer satisfaction and operational stability. Key Roles & Responsibilities: Design and maintain test plans and test cases to validate the accuracy and completeness of automated firewall migration output. Review and verify firewall configurations migrated by automation tools to ensure they meet expected functionality and security posture. Identify logic gaps, configuration anomalies, or rule mismatches introduced during tool-based migrations. Collaborate with tool development teams to report defects, validate fixes, and improve transformation logic. Troubleshoot and resolve post-migration escalations, including policy behaviour mismatches, broken traffic flows, and unexpected security outcomes. Perform side-by-side comparisons of pre- and post-migration rules to verify functional equivalence. Raise, track, and close vendor support (TAC) cases where deep platform-level issues are involved. Contribute to documentation including SOPs, test coverage reports, known issues, and configuration validation guides. Interface directly with customers to understand post-migration challenges and ensure successful resolution. Basic Qualifications: Bachelor’s degree in Computer Science, Information Technology, or a related field (BE / B.Tech / MCA or equivalent). 6+ years of hands-on experience in firewall configuration, validation, and troubleshooting. Strong technical knowledge of NGFW platforms including Palo Alto, Cisco FTD, FortiGate, and Check Point. Familiarity with policy and object modelling across different firewall platforms. Experience in writing test cases and test plans for automation tools or configuration transformation logic. Strong understanding of networking and security concepts, including routing, NAT, VPNs, zones, and application filtering. Excellent debugging and root cause analysis skills in post-deployment/migration environments. Ability to interpret logs, packet captures, and platform-specific diagnostics to isolate issues. Preferred Qualifications: Certification: PCNSA, PCNSE, NSE-1, NSE-2, NSE-3, NSE-4 Certification: CCNA (R&S) / CCNP (R&S) Exposure to firewall migration automation tools Understanding policy normalization and risk scoring tools (e.g., Tufin, FireMon)

Posted Date not available

Apply

3.0 - 5.0 years

5 - 8 Lacs

pune

Work from Office

Install, configure, and administer IBM WebSEAL reverse proxy servers. Manage policies for authentication, authorization, and single sign-on (SSO). Integrate WebSEAL with various web applications and backend systems. Monitor WebSEAL performance and conduct regular health checks. Troubleshoot WebSEAL and access-related issues, including analyzing logs and traces. Perform upgrades, patches, and migrations of WebSEAL components. Configure SSL certificates, junctions, ACLs, and POPs. Collaborate with application teams and security teams to support secure integrations. Implement access control based on business and regulatory requirements. Document configurations, change requests, and standard operating procedures. Ensure compliance with security policies and best practices.components. The ideal candidate will be responsible for implementing and maintaining secure web access infrastructures, managing access control policies, troubleshooting authentication/authorization issues, and ensuring high availability and performance of access gateways. Mandatory Skills: IDAM Security Consulting. Experience: 3-5 Years.

Posted Date not available

Apply

5.0 - 8.0 years

5 - 9 Lacs

kochi

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Data Security Consulting. Experience: 5-8 Years.

Posted Date not available

Apply

10.0 - 15.0 years

13 - 18 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: IDAM Security Consulting.Experience: 10 YEARS.

Posted Date not available

Apply

4.0 - 8.0 years

7 - 11 Lacs

mumbai

Work from Office

The CyberArk Operation Support Team Lead is a pivotal role responsible for overseeing and managing the day-to-day operations of the CyberArk environment. This position involves leading a team of support professionals, ensuring the availability, performance, and security of CyberArk solutions, and collaborating with cross-functional teams to deliver efficient privileged access management.Key Responsibilities: * Team LeadershipSupervise and mentor a team of CyberArk support professionals, fostering collaboration and skill development. * Operational ManagementOversee the operational aspects of CyberArk solutions, ensuring 24/7 availability, scalability, and optimal performance. * Incident ManagementLead the resolution of CyberArk-related incidents and problems, coordinating with technical teams and stakeholders to ensure timely and effective solutions. * Security EnhancementCollaborate with the security team to implement and enhance security controls, policies, and procedures for privileged access management. * Performance MonitoringMonitor system performance, conduct regular health checks, and proactively identify and address potential performance bottlenecks. * Patch and Upgrade ManagementPlan and execute system upgrades, patches, and enhancements, ensuring minimal disruption to ongoing operations. * DocumentationMaintain thorough documentation of configurations, processes, and procedures related to CyberArk operations. * Vendor ManagementCoordinate with CyberArk vendors for support, troubleshooting, and escalations to ensure timely issue resolution. * Continuous ImprovementDrive continuous improvement initiatives to enhance the effectiveness and efficiency of CyberArk operations. * ReportingGenerate regular reports on system performance, incident management, and operational metrics for management review. * Willing to work in 24/7 operations and project support activities Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Professional and Technical Expertise* * Proven experience in CyberArk operations and support, with a minimum of 4+years of hands-on experience. * Professional certifications such as CyberArk Certified Trustee (CCT) or Certified Delivery Engineer (CDE). * Strong knowledge of privileged access management concepts and CyberArk technologies. * Experience in organizations control, monitor, and secure privileged access across their IT infrastructure. * Good Exposure in endpoint * Analytics capabilities to identify unusual or suspicious activities related to privileged access. Preferred technical and professional experience * Leadership skills with the ability to guide and mentor a team effectively. * Problem-solving aptitude with a proactive approach to resolving technical challenges. * Strong communication skills for effective collaboration with cross-functional teams. * Detail-oriented mindset with a commitment to maintaining high standards. * Adaptability to changing requirements and a willingness to stay updated on emerging technologies

Posted Date not available

Apply

2.0 - 6.0 years

4 - 8 Lacs

mumbai

Work from Office

Key Responsibilities NAC Implementation & Management : Design, deploy, upgrade and manage HPE Aruba ClearPass Policy Manager for zero-trust security, enforcing role-based access controls across wired, and VPN infrastructures Configure authentication methods (e.g., 802.1X, PEAP, MAC Auth, EAP-TLS) and troubleshoot issues like captive portal redirections or MAC address conflicts. Integrate ClearPass with third-party systems (e.g., SIEM, firewalls, TACACS+, RADIUS for contextual security enforcement. Perform PoC for the different Network vendor devices to check compatibility with Aruba ClearPass NAC. Policy Automation & Threat Response : Creation of policy, profile, cluster and enforcement. Automate responses to security incidents (e.g., quarantine non-compliant endpoints via ClearPass OnGuard) Posture policy testing and compliance check. Work with Network teams to implement Switch with Radius and TACACS+ workflow Integrate ClearPass with Active Directory, LDAP, Radius, DHCP, and other identity sources. Security & Compliance : Conduct vulnerability assessments, audits, and root-cause analyses for NAC/wired environment incidents. Perform regular Compliance checks, patching and upgrades of the ClearPass environment Monitor logs and alerts, and work with Security/Network team on Incident response related to Network Access Control. (NAC) Training & Documentation : Train IT teams/end-users on ClearPass workflows (e.g., guest access portals, self-service device onboarding) Maintain documentation for configurations, policies, and integrations (ex. SOP, Report, Returns etc.) Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Skills & Qualifications Technical Expertise : Proficiency in ClearPass Policy Manager, Onboard, OnGuard, and Guest modules. Hands-on experience with RADIUS, TACACS+, LDAP, and 802.1X protocols. Familiarity with network tools (Wireshark, SolarWinds) and troubleshooting. Soft Skills : Ability to collaborate with cross-functional teams (IT, security, vendors) Problem-solving for complex NAC/wireless issues (e.g., docking station MAC conflicts) Preferred technical and professional experience Certifications (Preferred) : Aruba Certified ClearPass Associate (ACCA) Aruba Certified ClearPass Professional (ACCP) Cisco CCNA/CCNP Security or CWNP

Posted Date not available

Apply

4.0 - 9.0 years

9 - 13 Lacs

bengaluru

Work from Office

The IBM Technology Expert Labs organization is looking for an IBM zSecurity Delivery Consultant with expertise in IBM Z, RACFand Security products to lead and deliver pre-sales and post-sales client engagements that enable the adoption of IBMzSecureSuite and IBM ZMFA Ideal candidates will have demonstrated a successful history of implementing IBM Zsecure Suiteengagements, be familiar with sysplex architectural methods, can independently assess IT infrastructures, evaluate gaps in best practices and create IBM Securitysolution recommendations for client environments while displaying excellent collaboration and communication with Clients, Sellers, Business Partners and Colleagues by delivering reports to clients. You will be responsible for developing and delivering IBM Securityarchitecture, and implementation of IBM Security productswhich may include: Implement security policies and procedures to protect the integrity, confidentiality, and availability of information extensive knowledge of security administration by using the zSecure suite products Designing and customizing the ZMFA features, based on the client requirements Integrating and designing security with IBM Guardium Data centre and Quantum safe solutions. Assisting with customer to extract the audit reports for system vulnerabilities and implement security measures to mitigate risks Providing technical guidance and skills transfer to customer personnel for IBM zSecure suite products, ZMFA features, IBM Guardium and Quantum safe Producing planning and implementation reports and documentation. Installation, configuration, testing and maintenance of IBM RACF, and related Z software Other technical tasks as necessary to accomplish successful customer outcomes Aid customers to migrate the other vendor security products to the IBM RACF And Z security software’s. This role requires a strong knowledge of the IBM Systems Z security and software ecosystem, focusing on Strong Security and IBM Zsecure, Guardium and Quantum safe , are needed. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 12+ years’ experience working with: RACF Security Administrators and capabilities of IBM zSecurity products including(zSecure ,ZMFA, Guardium and Quantum safe) z/OSRACF Security Administrators ,zSecure Admin Ability to migrate the other vendor security products to the RACF and IBM z Security related products . Successfully delivering IBM Z projects and/or architecting and planning infrastructures for customer’s Security Needs 5+ years’ experience in: Customer or executive facing communications, requirements analysis, documentation, and report presentations. Create and manage RACF user profiles, group profiles, and access rights Implement security policies, extracting the Security audit reports using the zSecure suite products and procedures to protect integrity of the system Ability to lead customer technical workshops up to 20+ people. Strong written and verbal communication skills Preferred technical and professional experience Knowledge or experience with RACF ,zsecure products suite ,Guardium data center, ZMFA, Quantum safe Experience on Security Migrations (ACF2 to RACF or TSS to RACF) Practical SMP/E knowledge Assembler, JCL, REXX and CLIST knowledge

Posted Date not available

Apply

4.0 - 9.0 years

9 - 13 Lacs

bengaluru

Work from Office

The IBM Technology Expert Labs organization is looking for an IBM zSecurity Delivery Consultant with expertise in IBM Z, RACF and Security products to lead and deliver pre-sales and post-sales client engagements that enable the adoption of IBM zSecure Suite and IBM ZMFA Ideal candidates will have demonstrated a successful history of implementing IBM Zsecure Suite engagements, be familiar with sysplex architectural methods, can independently assess IT infrastructures, evaluate gaps in best practices and create IBM Security solution recommendations for client environments while displaying excellent collaboration and communication with Clients, Sellers, Business Partners and Colleagues by delivering reports to clients. You will be responsible for developing and delivering IBM Security architecture, and implementation of IBM Security products which may include: Implement security policies and procedures to protect the integrity, confidentiality, and availability of information extensive knowledge of security administration by using the zSecure suite products Designing and customizing the ZMFA features, based on the client requirements Integrating and designing security with IBM Guardium Data centre and Quantum safe solutions. Assisting with customer to extract the audit reports for system vulnerabilities and implement security measures to mitigate risks Providing technical guidance and skills transfer to customer personnel for IBM zSecure suite products, ZMFA features, IBM Guardium and Quantum safe Producing planning and implementation reports and documentation. Installation, configuration, testing and maintenance of IBM RACF, and related Z software Other technical tasks as necessary to accomplish successful customer outcomes Aid customers to migrate the other vendor security products to the IBM RACF And Z security software’s. This role requires a strong knowledge of the IBM Systems Z security and software ecosystem, focusing on Strong Security and IBM Zsecure, Guardium and Quantum safe, are needed. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Professional and Technical Expertise: 8+ years’ experience working with: RACF Security Administrators and capabilities of IBM zSecurity products including (zSecure ,ZMFA, Guardium and Quantum safe) z/OS RACF Security Administrators ,zSecure Admin Ability to migrate the other vendor security products to the RACF and IBM z Security related products. Successfully delivering IBM Z projects and/or architecting and planning infrastructures for customer’s Security Needs 5+ years’ experience in: Customer or executive facing communications, requirements analysis, documentation, and report presentations. Create and manage RACF user profiles, group profiles, and access rights Implement security policies, extracting the Security audit reports using the zSecure suite products and procedures to protect integrity of the system Ability to lead customer technical workshops up to 20+ people. Strong written and verbal communication skills EnglishFluent Preferred technical and professional experience Preferred Professional and Technical Expertise: Knowledge or experience with RACF, zsecure products suite, Guardium data center, ZMFA, Quantum safe Experience on Security Migrations (ACF2 to RACF or TSS to RACF) Practical SMP/E knowledge Assembler, JCL, REXX and CLIST knowledge

Posted Date not available

Apply

4.0 - 8.0 years

7 - 11 Lacs

mumbai

Work from Office

The CyberArk Operation Support Team Lead is a pivotal role responsible for overseeing and managing the day-to-day operations of the CyberArk environment. This position involves leading a team of support professionals, ensuring the availability, performance, and security of CyberArk solutions, and collaborating with cross-functional teams to deliver efficient privileged access management. Key Responsibilities: * Team LeadershipSupervise and mentor a team of CyberArk support professionals, fostering collaboration and skill development. * Operational ManagementOversee the operational aspects of CyberArk solutions, ensuring 24/7 availability, scalability, and optimal performance. * Incident ManagementLead the resolution of CyberArk-related incidents and problems, coordinating with technical teams and stakeholders to ensure timely and effective solutions. * Security EnhancementCollaborate with the security team to implement and enhance security controls, policies, and procedures for privileged access management. * Performance MonitoringMonitor system performance, conduct regular health checks, and proactively identify and address potential performance bottlenecks. * Patch and Upgrade ManagementPlan and execute system upgrades, patches, and enhancements, ensuring minimal disruption to ongoing operations. * DocumentationMaintain thorough documentation of configurations, processes, and procedures related to CyberArk operations. * Vendor ManagementCoordinate with CyberArk vendors for support, troubleshooting, and escalations to ensure timely issue resolution. * Continuous ImprovementDrive continuous improvement initiatives to enhance the effectiveness and efficiency of CyberArk operations. * ReportingGenerate regular reports on system performance, incident management, and operational metrics for management review. * Willing to work in 24/7 operations and project support activities Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * Proven experience in CyberArk operations and support, with a minimum of 4+years of hands-on experience* Professional certifications such as CyberArk Certified Trustee (CCT) or Certified Delivery Engineer (CDE) * Strong knowledge of privileged access management concepts and CyberArk technologies. * Experience in organizations control, monitor, and secure privileged access across their IT infrastructure. * Good Exposure in endpoint * Analytics capabilities to identify unusual or suspicious activities related to privileged access. Preferred technical and professional experience * Problem-solving aptitude with a proactive approach to resolving technical challenges.* Strong communication skills for effective collaboration with cross-functional teams.* Detail-oriented mindset with a commitment to maintaining high standards.* Adaptability to changing requirements and a willingness to stay updated on emerging technologies

Posted Date not available

Apply

4.0 - 9.0 years

9 - 13 Lacs

bengaluru

Work from Office

The IBM Technology Expert Labs organization is looking for an IBM zSecurity Delivery Consultant with expertise in IBM Z, RACFand Security products to lead and deliver pre-sales and post-sales client engagements that enable the adoption of IBMzSecureSuite and IBM ZMFA Ideal candidates will have demonstrated a successful history of implementing IBM Zsecure Suiteengagements, be familiar with sysplex architectural methods, can independently assess IT infrastructures, evaluate gaps in best practices and create IBM Securitysolution recommendations for client environments while displaying excellent collaboration and communication with Clients, Sellers, Business Partners and Colleagues by delivering reports to clients. You will be responsible for developing and delivering IBM Securityarchitecture, and implementation of IBM Security productswhich may include: Implement security policies and procedures to protect the integrity, confidentiality, and availability of information extensive knowledge of security administration by using the zSecure suite products Designing and customizing the ZMFA features, based on the client requirements Integrating and designing security with IBM Guardium Data centre and Quantum safe solutions. Assisting with customer to extract the audit reports for system vulnerabilities and implement security measures to mitigate risks Providing technical guidance and skills transfer to customer personnel for IBM zSecure suite products, ZMFA features, IBM Guardium and Quantum safe Producing planning and implementation reports and documentation. Installation, configuration, testing and maintenance of IBM RACF, and related Z software Other technical tasks as necessary to accomplish successful customer outcomes Aid customers to migrate the other vendor security products to the IBM RACF And Z security software’s. This role requires a strong knowledge of the IBM Systems Z security and software ecosystem, focusing on Strong Security and IBM Zsecure, Guardium and Quantum safe , are needed. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 12+ years’ experience working with: RACF Security Administrators and capabilities of IBM zSecurity products including(zSecure ,ZMFA, Guardium and Quantum safe) z/OSRACF Security Administrators ,zSecure Admin Ability to migrate the other vendor security products to the RACF and IBM z Security related products . Successfully delivering IBM Z projects and/or architecting and planning infrastructures for customer’s Security Needs 5+ years’ experience in: Customer or executive facing communications, requirements analysis, documentation, and report presentations. Create and manage RACF user profiles, group profiles, and access rights Implement security policies, extracting the Security audit reports using the zSecure suite products and procedures to protect integrity of the system Ability to lead customer technical workshops up to 20+ people. Strong written and verbal communication skills Preferred technical and professional experience Knowledge or experience with RACF ,zsecure products suite ,Guardium data center, ZMFA, Quantum safe Experience on Security Migrations (ACF2 to RACF or TSS to RACF) Practical SMP/E knowledge Assembler, JCL, REXX and CLIST knowledge

Posted Date not available

Apply

5.0 - 10.0 years

8 - 12 Lacs

mumbai

Work from Office

As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. Responsibilities* Responsible for security researcher to provide insight and understanding of new and existing information security threats * Responsible to participate in recommending improvements to SOC security process, procedures, policies, security incident management and vulnerability management processes * You will be involved in evaluating, recommending, implementing, and solving problems related to security solutions and evaluating IT security of the new IT Infrastructure systems * Keep yourself up-to-date with emerging security threats including applicable regulatory security requirements * Work in a 24x7 Security Operation Centre (SOC) environment Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Requirements* Minimum 3+ years’ experience in SIEM. * Proven expertise in handling the daily monitoring of Information Security events on the QRadar / ArcSight / Splunk console platform * Proficient in monitoring security events from various SOC channels (SIEM, Tickets, Email and Phone), based on the security event severity to handle the service support teams, tier2 information security specialists * Expertise in threat modelling and Use case development and ability to review policies of security monitoring tools based on security concepts and logical approach Preferred technical and professional experience * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications

Posted Date not available

Apply

4.0 - 8.0 years

8 - 12 Lacs

gurugram

Work from Office

As a Network Engineer specializing in Radware Load Balancer and Web Application Firewall (WAF) solutions, you will play a critical role in ensuring optimal network performance, security, and reliability. Your responsibilities include:Load Balancer Management:* Deploy, configure, and maintain Radware Server/Link Load Balancer solutions for high availability. * Design and implement load balancing solutions aligned with business needs, collaborating with network engineers and system administrators. * Monitor and troubleshoot network issues related to load balancing, ensuring timely resolution. * Conduct regular audits and assessments to optimize load balancer configurations. * Provide technical support and mentorship to junior team members. * Stay updated on industry trends and best practices in networking technologies.Web Application Firewall (WAF) Administration:* Oversee the deployment, configuration, and management of Radware WAF solutions. * Ensure the secure operation and maintenance of WAF infrastructure. * Monitor WAF alerts and incidents to protect web applications from cyber threats. * Investigate and respond to security incidents involving WAF. * Develop and implement security policies to safeguard web applications. * Conduct periodic security audits and assessments to maintain compliance. * Work closely with IT and security teams to integrate Radware WAF into the cybersecurity architecture. * Optimize WAF policies to reduce false positives and improve accuracy. * Provide training and documentation for WAF management and promote security awareness within the organization Required education Bachelor's Degree Preferred education Bachelor's Degree Required technical and professional expertise * 4 to 6 years of hands-on experience with Link Load Balancer (LLB) solutions. * Strong understanding of WAN connectivity optimization, failover management, and ISP link aggregation. * Expertise in troubleshooting and performance tuning of load balancing solutions. * Radware LB certification Preferred technical and professional experience Experience in hybrid cloud or multi-site network architectures. * Knowledge of MPLS, SD-WAN, and WAN optimization tools. * Familiarity with network audits and compliance initiatives (ISO, PCI, etc.) * Should be BE/B.Tech /MCA/BCA

Posted Date not available

Apply

3.0 - 7.0 years

6 - 10 Lacs

mumbai

Work from Office

The role supports full end to end software development cycle, from initial client engagement, through assessments and road-mapping, to longer term engagement in an advisory capacity. As an Application Security Consultants, the person should leverage the technical expertise of the security competencies, varied product and delivery capabilities. Hands on experience in Secure SDLC, DAST, SAST, HP Fortify and Burp Suite Provide strategic advice and insights to clients based on deep domain knowledge and industry best practices. Identify potential risks and develop mitigation strategies to ensure project success and client satisfaction. Lead and coordinate incident response activities, including investigation, containment, and remediation of security incidents. Provide security training and awareness programs to developers on security policies, procedures, and best practices. Ensure applications team adhere to relevant security standards, regulatory requirements, and industry best practices (e.g., OWASP, NIST, PCI DSS). Provide support for regulatory and internal audits, diligently tracking reported observations through to closure. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Education Qualification - BE/Btech/MCA/M.Tech. 5-7 yrs hands on experience. Hands on experience in Secure SDLC, DAST, SAST, HP Fortify and Burp Suite Ensure applications team adhere to relevant security standards, regulatory requirements, and industry best practices (e.g., OWASP, NIST, PCI DSS). Preferred technical and professional experience OEM certification from one of the following HP Fortify and Burp Suite

Posted Date not available

Apply

4.0 - 8.0 years

7 - 11 Lacs

mumbai

Work from Office

* Lead Incident Response (IR): * Act as the Subject matter expert for security incidents. * Analyze and respond to security breaches, perform root cause analysis, and coordinate remediation efforts. * Provide leadership during incident investigations, ensuring rapid and thorough handling. * SOC Automation & Integration: * Leverage Python scripting and Palo Alto XSOAR to automate security processes, streamline incident response, and enhance detection capabilities. * Design, implement, and maintain playbooks within XSOAR to address emerging security threats. * Threat Hunting & Monitoring: * Proactively perform threat hunting activities to detect advanced threats that may bypass existing security solutions. * Leverage both internal and external threat intelligence to identify and mitigate potential security risks. * OSINT Utilization: * Utilize Open-Source Intelligence (OSINT) techniques to gather and analyze publicly available information for early identification of threats. * Collaboration & Communication: * Collaborate with other teams (IT, legal, risk) to align incident response strategies. * Clearly communicate complex security issues to both technical and non-technical stakeholders through reports and presentations. * Provide security awareness training and mentoring to SOC analysts and other team members. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * 6+ years of experience in IT security with SOC Operations * Expertise in Security Device Management SIEM, Arcsight, Qradar, incident response, threat hunting, Use case engineering, SOC analyst, device integration with SIEM * Working knowledge of industry standard risk, governance and security standard methodologies * Proficient in incident response processes - detection, triage, incident analysis, remediation and reporting * Competence with Microsoft Office, e.g. Word, PowerPoint, Excel, Visio, etc * Expertise in Python scripting and Palo-alto XSOAR

Posted Date not available

Apply

2.0 - 7.0 years

5 - 9 Lacs

mumbai

Work from Office

Monitor and respond to email security alerts, phishing incidents, and malicious attachments/URLs. Investigate and take remediation actions on suspicious emails using: 1. Microsoft Defender for Office 365 2. Exchange Online Protection (EOP) 3. Microsoft Purview/Compliance tools Review and manage user-reported phishing emails through Microsoft Report Message add-in. Analyze mail flow and message trace logs to troubleshoot delivery and quarantine issues. Escalate and work with Microsoft or other vendors for critical incidents. Create and tune mail flow rules, transport rules, spam filters, and safe sender/block lists. Support O365 DLP alerts, spam/quarantine management, and email encryption use-cases. Maintain incident documentation and generate periodic threat summary reports. Ready to work on 24/7 shifts to support client requirement. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Strong hands-on experience with: 1. Microsoft Defender for Office 365 (MDO/M365D) 2. Exchange Online Admin Center (EAC) 3. Email headers analysis Understanding of phishing, spoofing, BEC, malware delivery via email. Knowledge of SPF, DKIM, and DMARC validation. Ability to correlate email alerts with SIEM (like Sentinel, Splunk) is a plus. Familiarity with PowerShell for basic O365/email operations. Preferred technical and professional experience Strong written and verbal communication Analytical mindset and attention to detail Ability to prioritize and work under pressure in rotational shift environments

Posted Date not available

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies